You are on page 1of 8

COMSATS INSTITUTES OF INFORMATION TECHNOLOGY ISLAMABAD LHR

SECTION NO. 1
COMPUTER ETHICS:

Ethics is a set of moral principles that govern the behavior of a group or


individual. Therefore, computer ethics is set of principles that regulates
the use of computer. Some common issues of computer ethics includes
intellectual property rights, privacy concerns and how computer affect
society. For example, while it is easy to duplicate copyright electronic
(or digital) contents, computer ethics would suggest that it is wrong to
do so without the authors approval. And while it may be access
someone’s personal information on a computer system, computer
ethics would advice that such an action is unethical. As technology
advance, computer continue to have a greater impact on society.
Therefore company ethics promotes the discussion of how much
influence computer should have in areas such as artificial intelligence
and human communication. As the world of computer involves,
computer ethics continues to creates ethical standards that address
new issues raised by new technology. Understanding importance of
computer ethics and software privacy protection computer ethics are
increasingly becomes important because of the rising number of cyber
crime issues includes software privacy, unauthorized access, spamming,
target marketing and hacking.

SECTION NO.2

WITHOUT ETHICAL BOUNDARIES INFORMANTION SYSTEM IS:

Software bugs and errors

Hardware or facility failures caused by natural or other causes


COMSATS INSTITUTES OF INFORMATION TECHNOLOGY ISLAMABAD LHR

Poor input data quality

Phishing scams. Phishing is a practice of a cybercriminal or hacker


attempting to obtain sensitive or personal information from a
computer user.
Identity Theft scams.
Online Harassment.
Cyber stalking.
Invasion of privacy..

SECTION NO.3

CYBER CRIME:
Cybercrime, also called computer crime, the use of a computer as an
instrument to further illegal ends, such as committing fraud, trafficking
in child pornography and intellectual property, stealing identities, or
violating privacy. Cybercrime, especially through the Internet, has
grown in importance as the computer has become central to
commerce, entertainment, and government. New technologies create
new criminal opportunities but few new types of crime. What
distinguishes cybercrime from traditional criminal activity? Obviously,
one difference is the use of the digital computer, but technology alone
is insufficient for any distinction that might exist between different
realms of criminal activity. Criminals do not need a computer to commit
fraud, traffic in child pornography and intellectual property, steal an
identity, or violate someone’s privacy. All those activities existed before
the “cyber” prefix became ubiquitous. Cybercrime, especially involving
the Internet, represents an extension of existing criminal behaviour
alongside some novel illegal activities.
COMSATS INSTITUTES OF INFORMATION TECHNOLOGY ISLAMABAD LHR

Most cybercrime is an attack on information about individuals,


corporations, or governments. Although the attacks do not take place
on a physical body, they do take place on the personal or corporate
virtual body, which is the set of informational attributes that define
people and institutions on the Internet. In other words, in the digital
age our virtual identities are essential elements of everyday life: we are
a bundle of numbers and identifiers in multiple
computer databases owned by governments and corporations.
Cybercrime highlights the centrality of networked computers in our
lives, as well as the fragility of such seemingly solid facts as individual
identity.
An important aspect of cybercrime is its nonlocal character: actions can
occur in jurisdictions separated by vast distances. This poses severe
problems for law enforcement since previously local or even national
crimes now require international cooperation. For example, if a person
accesses child pornography located on a computer in a country that
does not ban child pornography, is that individual committing a crime in
a nation where such materials are illegal? Where exactly does
cybercrime take place? Cyberspace is simply a richer version of the
space where a telephone conversation takes place, somewhere
between the two people having the conservation.
Reasons of cyber crime:

1.Capacity to store data in comparatively small space:

2.Easy to access:

3.Complex:

4. Negligence:

5. Loss of evidence:
COMSATS INSTITUTES OF INFORMATION TECHNOLOGY ISLAMABAD LHR

A Suggested Solution of cybercrime against children:


One of the solutions that is often offered is that parents should be
responsible for their children’s actions on the internet, however,
parents are not able to take this responsibility alone because it is
difficult and challenging for them to always stay with their children
whilst they are surfing the Internet. Thus, this challenge can be tackled
by the close cooperation between parents and governments. In terms
of the responsibility parents have over their children within their
homes, parents are required to be educated enough to recognize the
risk of cybercrimes that their children may face while using the internet
. This could be rectified by installing protective software on the PC
which restricts access to certain websites containing pre-determined
key words, for example “sex”. In addition, they should also advise their
children to avoid these risks such as talking to the strangers in
cyberspace which can lead to dangerous situations. Parents should not
just rely on using various software and monitor which websites that
their children join. They could restrict their children’s access by only
allowing giving them access to pre-screen or pre-approved content on
the internet and therefore manage to keep their children safe from any
sexually orientated content.. Outside the home responsibility can be
taken by states, which have a real effect on safety of children.
According to Year (2006) (cited in Creighton, 2003: 3),” Operation Ore
2003 led to 1,600 arrests in the UK of individuals who had subscribed to
a US-based child pornography website; the arrests were made possible
by cooperation with US law enforcement authorities who provided
credit card details of UK residents who had subscribed to the service”.
Cybercrime against organizations:
The second problem of cybercrime is one that is extremely threatening
to organisations such as business and political websites, to name but a
few. It is quite common that cybercriminals are focused on attacking
one particular sector which is commercial websites such as shopping
websites and banks. According to a 2001 pilot survey, which 198
COMSATS INSTITUTES OF INFORMATION TECHNOLOGY ISLAMABAD LHR

businesses responded and proved that 74% have been attacked by


cybercriminals who used several tools against them such as a computer
varies. Cybercrimes against commercial websites can be accrued in
several ways, however, in cyberspace there is one common activity
between cybercriminals which is piracy such as downloading music,
films and games illegally and stealing information or any substances
that are private or not made freely accessible.

SECTION NO. 4

Security:

Security is an essential pillar of the Internet and one that ISOC


perceives to be equally essential and ‘the’ most significant challenge for
the IoT. Increasing the number of connected devices increases the
opportunity to exploit security vulnerabilities, as do poorly designed
devices, which can expose user data to theft by leaving data streams
inadequately protected and in some cases people’s health and
safety (implanted, Internet-enabled medical devices and hack able
cars) can be put at risk. Many IoT deployments will also consist of
collections of identical or near identical devices. This homogeneity
magnifies the potential impact of any single security vulnerability by the
sheer number of devices that all have the same characteristics.

Privacy:

This is becoming more prevalent in consumer devices, such as tracking


devices for phones and cars as well as smart televisions. In terms of the
latter, voice recognition or vision features are being integrated that can
continuously listen to conversations or watch for activity and selectively
transmit that data to a cloud service for processing, which sometimes
COMSATS INSTITUTES OF INFORMATION TECHNOLOGY ISLAMABAD LHR

includes a third party. The collection of this information exposes legal


and regulatory challenges facing data protection and privacy law.
COMSATS INSTITUTES OF INFORMATION TECHNOLOGY ISLAMABAD LHR

TABLE OF CONTENTS

1. COMPUTER ETHICS
2. WITHOUT ETHICAL BOUNDARY COMPUTER SYSTEM IS
3. CYBER CRIME
4. REASONS OF CYBER CRIME
5. A SUGGESTED SOLUTIONS OF CYBERCRIME AGAINST
CHILDERNS
6. CYBER CRIME AGAINST ORGANIZATIONS
7. SECURITY
8. PRIVACY


COMSATS INSTITUTES OF INFORMATION TECHNOLOGY ISLAMABAD LHR

NAME :SADIA SAFDAR


FA16-BBA-075
MIS ASSIGNMENT
SUBMITTED TO SIR QAMMAR SAJAD

You might also like