Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Chapter - 3

Cyber Ethics
Exercise:-
Answer the following questions:-
1. What is cyber ethics?

Ans: Cyber ethics involve the code of conduct to use Information Technology
in a responsible way.

2. Define netiquettes. List some precautions you should follow while chatting.

Ans: Net etiquette is defined as a special set of rules that governs the behavior
of a user communicating online. The communication can be via e-mails,
forums, blogs, and social networking sites, etc.
Guidelines to follow while communicating online:
a) Use proper salutation and signature
b) Include subject line
c) Keep your message concise
d) Be respectful, avoid sarcasm
e) Respect other’s privacy
f) Obey copyright laws
g) Do not indulge spamming
h) Use appropriate language
i) Do not reveal sensitive information online

3. Define E-commerce.

Ans: E-Commerce refers to the occurrence of commerce activity online or


electronically. So, we can say that e-commerce is the buying or selling of
goods and services over electronics networks like Internet and making
payments or transferring funds over electronic networks like Internet.

4. What do you understand by privacy of data in e-commerce context?

Ans: Privacy is the protection of personal information given online while


carrying out some online activity or transaction. In e –commerce
especially, it is related to a company’s policies on the use of user data.

1|P a g e
5. Why should an e-commerce website have a privacy policy?

Ans:

a. Privacy is one of the primary concerns that prevent consumers from


engaging with the e-commerce and doing various online transactions such
as online banking, or the use of credit cards, debit cards, and other
platforms like the Paytm, google pay, etc.
b. As all such services are preferable choices for hackers, this makes such
applications vulnerable to security breaches.
c. So an important factor of privacy is the consumer consent- whether the
consumer is given a choice to decide what the information can and cannot
be used for.
d. Usually, when the proper security systems are in place, the user will not
mind sharing the information necessary for a transaction to take place.
But then the consent will relate to whether this information can be further
exploited.

6. How to safeguard user privacy?

Ans: The critical issue in maintaining data privacy is to share data while
protecting personal information.
Successful security solutions require a convergence of three components,
i.e., Technology, People, and Processes.
a. People
➢ Do not share your sensitive financial information like credit card
numbers, personal verification details, OTP, etc, with anyone, especially
on the phone.
b. Processes
➢ Check the privacy policies of online merchants before signing up or
making financial transactions online.
➢ Select the privacy clauses that restrict online retailers to share your
personal information with other businesses.
➢ Read the reviews of the online customers of the site before making any
purchases.
c. Technology
➢ Always set strong Password
➢ Check if the website URL has https: and a padlock icon next to it,
indicating that it is a secure website, before entering payment details
into any site.

2|P a g e
➢ Update the operating system and regularly install safety patches to
safeguard your computing devices from malicious software, illegal
access to bank account numbers and credit card details.
➢ Never use open connections for communication. Use secure wi-fi or
mobile data connections for making any online transactions.

7. How fraud is associated with e –commerce?

Ans: Online fraud can be occur in one of the following ways:


a. Non delivered goods
b. Non existence company
c. Stealing information
d. Fraudulent payment etc

8. Explain various techniques used for safeguard data transmission.

Ans: Some techniques to safeguard data transmission are:


a. SSL(Secure Sockets Layer):
The usage of SSL technology ensures that all data transmitted between
the web server and browser remains encrypted and hence data safe.
b. Data encryption:
Encrypted data when sent over internet is hard to steal and hence is
safer.
c. Use safe protocols:
It will ensure the safety of data being transferred. Such as for files use
Secure FTP. Some others secure protocols are HTTPS, SSH etc.

9. What do you mean by Intellectual Property Rights?

Ans: Intellectual property rights are the rights of the owner of information to
decide how much information is to be exchanged, shared, or distributed.
Also, it gives the owner a right to decide the price for doing so.
To protect one’s intellectual property rights one can, get information
copyrighted or patented or use trademarks.

10. Explain various types of Intellectual Property Rights with example.

Ans: The four types of IPR to protect our ideas are as follows:
S. No IPR Example
1 Trade Secrets It protects secret information. New invention, Coke
formula

3|P a g e
2 Trademarks A logo or symbol that is Our school logo, apple
printed on business items to for cell phone
make it exclusive, is known as
trademark.
3 Copyrights Copyright is a right that is Books, movies,
granted by law to the creator drawings, music, novels,
or inventor for his original etc.
work.
4 Patents Patent is a legal document that Swipe feature or iPhone
gives the inventor sole rights design
to make, sell or use an
invention.

4|P a g e

You might also like