You are on page 1of 11

2. Define computer ethics and give classifications of ethical issues.

OR, Explain the four classifications of ethical issues.


Ans:- Computer Ethics:- Computer ethics is the analysis of the nature and social impact of computer
technology and the formulation and justification of the policies for the ethical use of technology. It
includes consideration of both personal and social policies for ethical use of computer technology. Its
main goal is to understand the impact of computing technology upon human values.
There are four kinds of ethical issues:--
i) Privacy:- It deals with collection, storage and dissemination of information about individuals.
ii) Accuracy:- It deals with authenticity, fidelity and accuracy of information collected and procured.
iii) Property:- It deals about ownership and value of information (intellectual property).
iv) Accessibility:- It deals about right to access information and payment towards the same.
3. Explain the social and ethical issues arising out of the presence of computers in
the workplace.
Ans: The social and ethical issues that can arise out of the presence of computers in the workplace
are:
i)Task Automation: At workplace, computers have become universal tools that can in principle
perform any task and hence pose a threat to jobs. They are far more efficient than humans in
performing many tasks. Therefore, economic incentives to replace humans with computerized
devices are very high. In the industrialized world, many workers doing jobs as bank tellers,
autoworkers, telephone operators, typists etc have already been replaced by computers.. On the other
hand, the computer industry has generated a wide range of new jobs in the form of hardware
engineers, software engineers, system analysts, webmasters, information technology teachers, and
computer sales clerks. Even when a job is not eliminated by computers, the job profile could be
radically altered. So, job gains and losses are to be viewed in the context of the society we live in.
ii)Health and Safety: Another workplace issue concerns health and safety. Often radiation from
machines, repetitive injuries, and posture related problems are common at computer dominated
workplaces. Another concern is poisonous non biodegradable computer waste, which is causing a
major threat to the environment. The advent of stress in the workplace due to the introduction of
computers is becoming more and more evident.
iii)Employee Monitoring: Another major concern is the employee monitoring or surveillance by the
organizations using sophisticated computer driven technology. Some amount of monitoring may be
vital for protecting the interest of the employer and to increase productivity, but excess of such
surveillance can becomes unethical.
10. Discuss the different forms of computer crime. OR
Discuss the current forms of computer crimes.
Ans: Different forms of computer crimes:- i) Privacy infringement: The personal rights of the
citizens are endangered with the collection, transmission, and storage of the personal data. Therefore,
in the data processing area, the protection of privacy needs to be considered. A balance needs to be
maintained between the privacy interests of data subjects concerned and the economic freedom of the
holders of personal data.
ii) Economic offences: The economic crimes are considered as the central area of computer crime.
Hacking, fraudulent manipulation of the computer data is some of the economic offences related to
computers.
iii) Computer Hacking:-This is a greatest risk in terms of integrity, availability, and confidentiality.
Website defacements, credit card frauds, non-availability of web and application servers, and new
virus attacks are common. These defacements are done by hackers and this process is called as
hacking.
iv) Software Piracy and Other forms of Product Piracy:- This includes illegal access of computer
programs. It also includes copying the important software and information of the individual.
v) Computer Espionage:- It rarely appears in official statistics constitute a special danger compared
with traditional economic espionage. The object of this offence are especially copying computer
program, data of research and defence, data of commercial accounting as well as address of client. It
is done by data telecommunication.
vii) Computer Sabotage and Computer Extortion:- It is danger for business and administration. It
includes activities like destroying the store tangible and intangible data containing computer
programs and other valuable information. It also affect the data processing.
viii) Computer Fraud:- It describe a spectrum of various cases within the field of economic crimes. It
includes invoice manipulations concerning the payment of bill and salaries of industrial companies
along with the manipulation of account balance and balance sheets.
viii) Illegal and Harmful content:- It includes providing harmful contents such as porn movies or
videos, adult picture or story, more violent games etc, on internet through website which are illegal.
20. Discuss the adjudicatory processes incorporated in the act.
Ans: The adjudicatory processes incorporated in IT act 2000 are:
i)Penalty for damage to computer: If any damage cause by any computer due to accessing or securing
data, Downloading, coping data and disrupting the working of computer by any unauthorized user
then he will have to paid one crore rupees as a compensation to the affected person.
ii) Penalty for failure to furnish information, return: If any individual fall in its preview using the
computer to furnish any document, return or reports then he will have to give 1,50,000 rupees as
penalty.
iii) Residuary penalty: This act provides that whoever contravenes any rule or regulation for which a
penalty has not specified, the person contravening the act is liable to pay 25,000 rupees as
compensation iv) Power to adjudicate: According to this the adjudicating officer has power to: a)
Summon and enforce the attendance of any person and examine him on oath.
b) Direct the production of records and other electronic records.
c) Issue warrant for the examination of witness and receive evidence on record.
4. Discuss the classification of crimes under the IT Act 2000.
Ans: The following acts are cyber crime in the I.T. Act 2000:-
Without permission of the authorized user
i) Accessing or securing access to computer system or network.
ii) Downloading, coping or extracting any data or information.
iii) Introducing any computer, virus or contaminant in the computer.
iv) Disrupting the working of the computer.
v) Disrupting the access of the computer of an authorized user.
vi) Providing assistance to ensure unauthorized access to the computer.
vii) Tampering with computer source documents.
viii) Hacking of computer system.
ix) Carring on activities that are not in compliance with the provisions of the Act.
x) Failure to extend all facilities and technical assistance to the Controller to decrypt any information
necessary for the security of the nation.
xi) Publishing Digital Certificate that are false in certain particular.
xii) Misrepresenting or suppressing any material fact from the Controller or Certifying Authority for
obtaining any license or Digital Signature Certificate
21. Discuss the policy approaches to privacy issues.
Ans: Policy approach to privacy issues:- i) Market approach:- The market oriented approach rejects
extrinsic legal enforcement and takes within its fold self-regulatory mechanisms which would enable
the market players to employ or adopt. Any failure on the part of the market player will get
disciplined or rectified by the market place.
ii) Human rights approach:- This approach recognize right to information and the related attribute of
privacy as a human right. Due to this, surveillance becomes operational strategy to protect the
interests of the members.
iii) Contract approach:- It recognizes contract model. The contract imposes an obligation on the
parties to protect the privacy concerns and it provides for contractual remedies. Almost in every case
of cyber service provider, policy pertaining to protection of the privacy interests of the consumer is
normally announced. Normally this forms part of the envisaged terms and conditions of the
contractual relationship.
b) Discuss the significance of legislation.
Ans: Significance of legislation:-- i) The legislature can legislate in advance. But judges cant do so.
ii) The legislature can make a law on any subject within its competence. But judges can deal with a
subject.
iii) The legislature can override the law laid down by the courts, on a particular point because of the
doctrine of separation of powers.
iv) Legislation is the most fertile source of law. The legislature can vest a subordinate authority with
power to make rules, orders, etc.
v) A legislative enactment is not subject to appeal; and the law enacted by it cannot be reversed.
11. Explain the different sources of law.
Ans: Following are the different source of law:--
a) Legislation:- It is the formal enactment of law by the legislature created or authorized by the
constitution. It stands in contrasted with judge made law. Legislation consists of written laws, as
contrasted with judge made law or common law. It also stands in contrasted to customary law.
b) Common Law:- It comprises the body of principle, which derive their authority solely from the
decisions of courts. It is a body of law that develops and derives through judicial decisions different
from legislative enactments. Its principals do not derive their validity from formal law making by
anybody, but from their enunciation through decisions of courts.
c) Custom:- Custom denotes a usage or practice of the people (including a particular social group or
a group residing in a particular locality) which by common adoption and acquiescence and by long
and unvarying habit, has become compulsory and has acquired the force of law with respect to the
place or subject matter to which it relates.
Legislation and case law can operate in any sphere of human activity, while the operation of custom
is generally restricted to a particular locality, group or family.
16. Explain the term Digital Signature. What is a Digital Signature Certificate?
Ans: Digital Signature: The IT Act states that any law provides that information shall be in writing or
in printed form. The key ingredients of the formation of electronic contracts comprise
communication of offer and acceptance by electronic means, verification of the source of the
communication, authentication of the time and place of dispatch and finally the verifiability of the
receipt of the data communication. A 'digital signature' may be affixed to authenticate an electronic
record. The digital signature serves to satisfy the legal requirement of affixing of a signature in a
written or printed document. The Central Government has the power to make rules about the type of
digital signature. Digital Signature Certificate: It certifies the identity of the subscriber and implies
his acceptance of the provisions of this act and the rules and regulations contained therein. The
certificate is issued only on the following grounds:
i) The Certifying Authority being satisfied that the information contained in the application of
certificate is accurate.
ii) The subscriber holds a Private Key capable of creating a Public Key.
iii) The Private Key corresponds to the Public Key to be listed in the Digital Signature Certificate.
iv) The Public Key to be listed in the certificate can be used to verify a digital signature affixed by
the Private Key held by the subscriber.
5. Discuss the essential of a valid contract.
Ans: The general law of contracts is contained in the Indian Contract Act 1872. The Act defines
contract as an agreement enforced by law. The essentials of a valid contract are:-
i) Intention to be bound:- The intention to create a contract should be clear otherwise, it will be
treated as invalid.
ii) Offer and acceptance:-It is an essential ingredient of a contract that there must be an offer and its
acceptance. If there is no offer then there is no contract. But if one party offer but another one does
not accept it then also no contract will be formed
iii) Concept of offer:- An offer is not defined by statue. It is generally understood as denoting the
expression, by words or conduct, of a willingness to enter into a legally binding contract. It expressly
indicates that it is to become binding on the offer or as soon as it has been accepted.
iv) Offer by and whom: - An offer must be made by a person legally competent to contract or on his
behalf by someone authorized by him to make the offer. If there is no particular individuals to whom
that offer a contract then that contract become a unilateral contract. So, there must be two parties to
made contract.
vi) Statements which are not offer: - Every statement of intention is not an offer. A statement must be
made with the intention that it will be accepted and will constitute a binding contract.
9. State and discuss the primary assumptions of a legal system.
Ans: Following are the primary assumptions of a legal system:
i) Sovereignty: Law making power is a matter of sovereign prerogative. As a result, the writ of
sovereign authority runs throughout wherever sovereign power exercises authority. Beyond its
authority, which is always attributed to determine geographical boundaries, the sovereign cannot
regulate a subject matter through legal intervention.
ii)Territorial Enforcement: Any law in real world context can only be subjected to predetermined
territorial enforcements. There are some exceptions to this. The sovereign authority could join extra
territorial jurisdiction in case of criminal law. This indicates that if the crime is committed beyond
the limits of the territory the sovereign authority can initiate prosecution.
iii) Notion of property: The obtaining premise of the legal response considers 'property' as tangible
and physical. In the cyber context, 'property' in the form of digitized services or goods poses serious
challenges to this legal understanding. Also that the 'domain names' raise fundamental questions.
iv) Paper-based transaction: Legal response considers and encourages people to create and
constitute legally binding relationships on the basis of paper- based transactions. Although the word
document under law takes within its fold material other than paper also. Since in cyber context,
digital or electronic record forms the basis of electronic transactions. Hence, the transactions are on
the basis of electronic records.
v) Real relationships: Legal response considers relationships, which are real world oriented. In view
of connectivity, pace and accuracy as to transmission, in the cyber context, these relationships
acquire unique distinction of virtual character. In case of trade and commerce, commercial
transaction in the form of contracts constitutes the foundation of legal relationship.
1. What are the evidentiary presumptions of a secured electronic document. Explain the
process of encryption and decryption of data.
Answer-
An electronic document is said to be secure where any security procedure has been applied to the
electronic document at a specific point of time. Such a document is deemed to be secure till the time
of verification. But there is no presumption about the integrity and authenticity of the electronic
record. To create a legally bound electronic document is technologically complex. A legally
enforceable electronic document must pass the test of authentication, non-repudiation,
confidentiality, and information integrity during transmission or storage. The key element in the
authentication of a paper-based document is the signature of the contracting persons. Likewise an
electronic signature is the key in an electronic record. The equivalent electronic signature is referred
to as digital signature. A digital signature is to identify the sender of the electronic record,
authenticate the originator of the message and to certify that the message could not have been
tampered with during the course of its transmission. The process of making the information
unintelligible to the unauthorized reader is known as encryption of data. The process of making the
information readable once again is known as decryption of data. The science of Cryptography is
made up of encryption and decryption. There are two types of Cryptographic systems - symmetric
and asymmetric. The symmetric Crypto system consists of both the sender and the receiver having
access and sharing a common 'Key' to encrypt or decrypt a message. The asymmetric Crypto
system is a more a secure system. This system uses two keys. The originator of the document
keeps one of the keys known as the 'Private key' and the other key is sent to the recipient of the
message. The recipient affixes the digital signature when he uses the public key to open the
message sent to him. Thus the combination of the Public Key and the Private Key provide both
confidentiality and authentication, which enables for secure electronic transmission
1. What is meant by unauthorized access to a computer under the provisions of the IT Act, 2000.
Answer- The IT Act defines unauthorized access by any person as acts done without the permission of
the owner, which includes:
ork,
computer network including information or data held or stored on any removable storage medium,
computer, computer system or network,



Providing assistance to ensure unauthorized access to the computer, computer system or network,
one crore rupees to the affected person.
6. What are the amendments to the Indian Penal Code?
Ans: The Indian Panel Code (IPC) details actions that constitute a crime and the punishments
prescribed for such actions. It elaborately classifies crimes based on interests that are intended to be
protected. The classification includes :- i) Offences against body ii) Offences against property
iii) Offences against marriage iv) Offences against public tranquility v) Offences against state
Some important aspects have to be weighed while determining whether a crime has been committed
or not.
4. There is no nexus between cyber space and real space - Comment.
Answer- There is the difference between the business rules for online commerce and carrying business
in the real space. Much of this difference comes from Internet's telepresence features. This feature
renders the network technologically indifferent to physical location. The network is very insensitive to
geography. It is not possible to determine the physical location of a user or a resource. In real space,
locating a person or entity with which business is interacting is much easier. In the cyberspace to know
the location of the partners with whom you are interacting is very difficult to know. In some instances,
even an Internet address tells something only about the location of a given machine. There is no way to
find the information about the actual user.
b) What are the remedies for the breach of the contract?
Ans:-Remedies for breach of a contract:-
i)Damage:- When a contract has been broken, the party who suffer by such breach isentitled to
receive compensation from the party who broken the contract for any loss or damage caused by
him. Such compensation is not to be given for any remote and indirectloss or damage sustained by
reason of the breach.
ii)Penal Stipulations:- If a sum is named in the contract or if the contract contains anyother stipulation
by way of penalty, the party complaining of the breach is entitled toreceive reasonable compensation
from party who broken the contract, whether or notactual damage or loss is proved to have been
caused thereby.
iii) Specific performance:- In certain cases the court may direct against the party indefault specific
performance of the contract means that party may be directed to perform the very obligation which
he has undertaken by the contract.
iv) Injunction:- An injunction is a preventive relief and is granted at the discretion of thecourt. The
discretion of court is not arbitrary but is guided by judicial principles. A further check on the discretion
is the provision for correction through an appeal in ahigher court
17. What is cyber privacy? Explain.
Ans: The issue of privacy on the Internet has generated a lot of debate and controversy. On one hand,
it is necessary for the authorities to indulge in surveillance in order to keep cyber crime in control.
The same surveillance affects the privacy of millions of the people who use the Internet every day.
However, privacy is extremely important to all individuals, organizations, and nations.
Unfortunately, the Indian judiciary has not laid down specific laws regarding cyber privacy.
Currently, the judiciary can only interpret privacy in accordance with the existing regulations. As per
Article 21 of the Indian constitution, the right to privacy is an integral part of the fundamental right to
life.
Today, several individuals and organizations collect information regarding the surfing habits of
Internet users and sell the same to interested companies for a tidy sum of money. Hundreds of
websites are hacked and information is stolen and then sold to interested parties. Every day,
individual users have to deal with the nuisance of dealing with unsolicited e-mail. All the entities -
Individuals, organizations, and the government - need to contribute in the fight to curb cyber crime
and at the same time respect the privacy.
The NIF privacy principals deal with three fundamental concern including information privacy,
information integrity and information quality. The government and the judiciary need to frame
comprehensive laws related to privacy immediately
22. Explain the essentials of privacy preferences project (p3p) platform.
Ans: P3P provides a simple, automated way for users to gain more control over the use of personal
information on websites they browse. P3P is a standardized set of multiple-choice questions about
the website's privacy policies. Online customers can answer these questions to select the way their
personal information will be handled by the service provider. This snapshot could be read by P3P
enabled browsers and set according to the set of privacy preferences of the consumer.
P3P not only provides facilitating environment for the consumer to decide, negotiate and firm up the
contractual relationship, but also recognizes nine aspects of online privacy. The first five aspects deal
with (a) who is collecting this data? (b) Exactly what information is being collected? (c) for what
purposes? (d) which information is being shared with others? (e) who are these recipients? The
remaining four aspects focus on the site's internal privacy policies. They include (a) can users make
changes in how their data is used? (b) how are disputes resolved? (c) what is the policy for retaining
data? (d) and where can be detailed policies found in human readable form?
P3P is software to negotiate privacy agreements between websites and online visitors. It is a kind of
social technology that involves not merely technology but also active participation of human beings.
4. What is common law. How does it differ from codified law?
Answer-
Common law or uncodified law is the law flowing from judicial decisions. E.g. the process of dispute
resolution or adjudication of liability by either village elders or people holding power through the
process of issuing commands has received social acceptance. The uncodified law governs large
segment of the legal regime. The judgment pronounced by an organ of the higher judiciary performs
at least two important functions:

For the immediate parties, the judgment becomes a source, rights and duties.
For the world, it becomes a source of law, it happens to deal with a legal proposition - and to
make a definite pronouncement on the subject.
2. a) Explain how custom is a source of law.
Ans:- Custom denotes a usage or practice of the people (including a particular socialgroup or a
group residing in a particular locality) which by common adoption andacquiescence and by long
and unvarying habit, has become compulsory and has acquiredthe force of law with respect to
the place or subject matter to which it relates.
Legislation and case law can operate in any sphere of human activity, whilethe operation of
custom is generally restricted to a particular locality, group or family.Custom denotes a usage or
practice of the people (including a particular social group or a group residing in a particular
locality) which by common adoption and acquiescencehas become compulsory and has
acquired the force of law with respect to the place or subject matter to which it relates.
1. E-Commerce is the new mantra of business Explain? Answer-
-Commerce is the use of the Internet to buy and sell goods and services. E-Commerce is changing
the way in which organizations do business, resulting in streamlined purchasing processes and lowering
the cost of transacting business for both large and small companies.
-Business helps in improving the way the business is conducted with the government, customers, and
other businesses.
-mail can be used in businesses to communicate with suppliers. It can also be used for responding
and receiving the customer queries. For example, e-mail can be used to accept orders from the
customers. The customers can also make the payments online and get the information regarding the
products available along with their price.
businesses for managing their records and they can make use of
electronic bookkeeping. An on-line banking service is another area, which can be used by the
businesses. These services can be used for funds transfer, payroll management, and electronic bill
payment.
19. Discuss the impact of the information technology revolution on society.
Ans: The amazing growth of information technology has implications for every aspect of society. So
far there is little research that reveals how technology has and will continue to change the dynamics
of society and the nonprofit sector. Following point elaborate how information technology affects
various sections of society:
i) The nonprofit sector is experiencing an organizational version of the "digital divide"-the
technology gap between large and small nonprofits. Hardware, software, and technical assistance are
not enough to close the divide; strategic planning and staff time are also essential.
ii) The true impact the Internet will have on society is in "building community," bringing together
groups of citizens, who are united by shared values working for the public good, often spanning
international lines. Organizations that use technology well are usually marked by strong support from
the executive director, support from the board, and the presence of a "key user" staff person.
iii) The Internet enables an organization to strengthen relationships with its current audiences as
it enables targeted, fast, and consistent communication. It can also enable nonprofits to reach out
to new audiences through effective use of search engines and "viral marketing".
20. Discuss the adjudicatory processes incorporated in the act.
Ans: The adjudicatory processes incorporated in IT act 2000 are:
i)Penalty for damage to computer: If any damage cause by any computer due to accessing or securing
data, Downloading, coping data and disrupting the working of computer by any unauthorized user
then he will have to paid one crore rupees as a compensation to the affected person.
ii) Penalty for failure to furnish information, return: If any individual fall in its preview using the
computer to furnish any document, return or reports then he will have to give 1,50,000 rupees as
penalty.
iii) Residuary penalty: This act provides that whoever contravenes any rule or regulation for which a
penalty has not specified, the person contravening the act is liable to pay 25,000 rupees as
compensation iv) Power to adjudicate: According to this the adjudicating officer has power to: a)
Summon and enforce the attendance of any person and examine him on oath.
b) Direct the production of records and other electronic records.
c) Issue warrant for the examination of witness and receive evidence on record.
2. Discuss the impact of globalization on computer ethics.
The fast pace of globalization and creation of global and cyber markets, has given computing a new
meaning. Bynum and Rogerson (1996) have suggested the use of the expression "Global
Information Ethics" to describe the impact of globalization on computers ethics. Others (see van den
Hoven, Introna, Johnson, and Nissenbaum, 1999) have used the expression "Information
Communications Technology Ethics" or ICT Ethics to attempt to capture the convergence of
information-related and
communications-related ethical issues in a global context.

Global networks like the Internet and especially the World Wide Web (WWW) are connecting people
all over the globe. Efforts are on to develop mutually agreeable standards of conduct and efforts to
advance and defend human values. Globalization has led to the discussion of the following issues:

Global Laws: Over 200 countries are already interconnected by the Internet. Given this
situation, what is the effect and impact of the law of one particular country on the rest of the
world? Issues regarding freedom of speech, protection of intellectual property, invasion of
privacy vary from country to country. The framing of common laws pertaining to such issues
to ensure compliance by all the countries is one of the foremost questions being debated.
Global Cyber Business: Technology is growing rapidly to enable electronic privacy and
security on the Internet to safely conduct international business transactions. With such
advanced technology in place, there will be a rapid expansion of global cyber business.
Nations with a technological infrastructure already in place will enjoy rapid economic growth,
while the rest of the world will lag behind. This disparity in levels of technology will fuel
political and economic fallout, which could further widen the gap between the rich and the
poor.
Global Education: Inexpensive access to the global information net for the rich and the poor
alike is necessary for everyone. However the impact of this sudden and global education on
different communities, cultures, and religious practices is likely to be profound. The impact on
lesser known universities would be felt as older well-established universities begin offering
degrees and knowledge modules over the Internet.
1.Discuss the distinct features of the Internet.
Answer-
The Internet has three distinct features:

Global Scope: The Internet has a global reach. Internet technology has much broader scope
and access than conventional modes of communications and data retrieval. With little effort,
a user can reach hundreds and thousands of individuals around the globe. The ability to
reach many people quickly and easily is not exactly new or unique compared to radio or
television communication. But the significant difference between the Internet and television
and radio is that in the case of radio and television, communication is in most cases one way
whereas in the case of Internet it is interactive. It is this interactivity, which is the unique
characteristic of the Internet. Not just interactivity, customizability, easy usability, and
accessibility are also distinct features of Internet.
Anonymity: The second important feature of the Internet is that it provides a certain kind of
anonymity. On the Internet, individuals have the possibility of creating a different profile,
ensuring that information about them cannot be traced while in communication with others on
the Internet. It is a silent feature of Internet communication and people can deliberately avoid
seeing or hearing one another directly. Anonymity makes accountability for ones action
difficult to achieve and tends to diminish trust in the information that is being exchanged. The
feature of anonymity has also facilitated the development of virtual information.
The open and anonymous nature of communications on the web, has led to the development of
software with stealth to gather information intelligently. An inference is made from information
gathered without our knowledge or consent, which is termed as virtual information. This type of
information adds information to a persons profile and tends to redefine a persons digital persona.
This is an invasion of ones virtual privacy.
Reproducibility: The third feature is not just a feature of the Internet, but of information
technology in general. Electronic information exists in the form that makes it easy to copy
without any loss of originality or value in the process of reproduction. Copied data or
software is perfectly usable. Copied data or software leaves no evidence behind and the
creator/owner of the data or software could remain unaware of their work being copied.
Reproducibility facilitates anonymity.

2. What are the fundamental conceptions regarding the evaluation of individual actions?
Answer-
In the history of moral philosophy, two fundamentally different and mutually exclusive conceptions of
the moral evaluation of individual actions are prevalent:

One approach or school of thought believes that it is important to examine an issue under
independently justified principles of what one considers being right. The idea here is to follow
the principles that articulate what is morally right irrespective of the consequences. This is
referred to as deontological approach. In this approach, one starts out with one or more
moral principles and see how they apply to particular cases.
The other school of thought believes that it is important to look for the course of action that
maximizes the good. This approach involves determining which action yields the best
consequences measured in some standard of the good or morality. This approach
referred to as teleological approach involves deciding on what is good for population. It also
spells out what is wrong with actions that interfere with attempts to get it.
7. Explain with the help of historical millstones evolution of computer ethics. 15
Ans: Evolution of computer ethics:- The term computer ethics was coined in the mid 1970s by
Walter Manor to refer to that field of applied professional ethics dealing with ethical problems
aggravated, transformed or created by human technology.
The evolution of computer ethics is tied to the wide range of philosophical theories and
methodologies, which is rooted in the understanding of the technological revolution from
introduction to permeation.
In the 1940s and 1950s computer ethics as a field of study had its roots in the new field of research
called cybernetic the science of information feedback system undertaken by Professor Norbert
Weiner. The concepts of cybernetic led Weiner to draw some remarkable ethical conclusions about
the technology that is now called information and communication technology. In his views the
integration of computer technology into society would eventually constitute the remarking the
society, which he turned as the second industrial revolution.
In the 1960s Don Parker of SRI Inc. began to examine the unethical and illegal uses of computer by
computer professions. He published Rules of Ethics in Information Processing and headed the
development of the first code of professional conduct for his association of computing machinery.
The 1970s saw Walter Manor coin the term Computer Ethics to refer to that field of inquiry
dealing with ethical problems aggravated, transformed by computer technology. He disseminated his
starter Kit in computer ethics, which contain curriculum materials and guideline to develop and teach
computer ethics.
In 1980s a number of social and ethical consequences of information technology were becoming
public issues in America and Europe. Issues like computer enabled crime, disasters caused by
computer failure; invasions of privacy through computer database etc become the order of the day.
The 1990s heralded the beginning of the second generation of computer ethics.
Q.Computer hacking:
The greatest risk that the information technology business faces today is the security of
information in terms of integrity, availability, and confidentiality. Stories about website
defacements, credit card frauds, non-availability of web and application servers, and new virus
attacks are common. These defacements are done by hackers and this process is called as
hacking.

You might also like