Computer Ethics and Crime
Computer Ethics and Crime
What Is Computer Ethics?
Computer Ethics is set of moral principles that regulate the use of computers.
The name “computer ethics” was not commonly used until the mid-1970s when Walter Maner began to use it. Maner’s definition “ethical problems aggravated, transformed or created by computer technology.”
Now we take about Computer Crime
Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company’s or individual’s private information.

As technology continues to advance , computer ethics continue to create ethical standards that address the new issues caused by new technologies.
It would be easy to duplicate a copyright electronic content but computer ethics suggest not to do without owner’s or author’s permission.
It is also unethical to copy or use software you have not paid yet for. The internet makes it easy to someone to access someone’s else personal information what so ever,it does not make it ethical to do so.
The ethics and computer crime has grown, due to the growth of the internet,along with privacy issue.
Examples of computer crimes
Below is a listing of the different types of computer crimes today. Clicking on any of the links below gives further information about each crime.
Copyright violation – Stealing or using another person’s Copyrighted material without permission.
Cracking – Breaking or deciphering codes that are being used to protect data.
Cyber terrorism – Hacking, threats, and blackmailing towards a business or person.
Illegal sales – Buying or selling illicit goods online including drugs, guns, and psychotropic substances.
Intellectual property theft – Stealing practical or conceptual information developed by another person or company.
IPR violation – An intellectual property rights violation is any infringement of another’s Copyright, patent, or trademark.
Phishing – Deceiving individuals to gain private or personal information about that person.
How to protect yourself against cyber-crime
Use Antivirus (AV) & Firewalls-
AV software detects, and then prevents, disarms or removes malicious programs or malware, often referred to as ‘viruses’. AV doesn’t offer a perfect solution to the problem of malware, but it is a critical first step to securing your PC or laptop. To help prevent viruses infecting your PC you must install AV, and then regularly update your AV software.

Always install updates
Keep your software up to date. Your AV solution often has software updates that get released to fix vulnerabilities that can be exploited to install ransomware on your computer, so it is important to always download the newest version of the software as soon as possible.
Back up your data
Data is the lifeblood of any company, therefore, your one of your big concerns when you suffer a ransomware attack should be in regards to getting your data back as quickly so there is as little down time as possible.
Data theft and data loss through negligence or hardware failure can cause irreparable damage if the data is not easily retrievable. The best protection against ransomware is to back up all of the information and files on your devices in a completely separate system. A good rule to apply is the 3-2-1 rule:
Create 3 copies of data (1 primary and 2 backups)
Keep data on at least 2 types of storage media (local drive, NAS, tape, etc.)
Store 1 of these offsite (secure storage, cloud, etc.)
This means that if you suffer an attack you won’t lose any information to the attackers. That is why making regular backups of your data is so important.
Finalize my opinion about computer crime and ethics
Do not use a computer to harm other people.
Do not interfere with other people’s computer work.
Do not snoop around in other people’s computer files.
Do not use a computer to steal.
Do not use a computer to bear false witness.
Do not copy or use proprietary software for which you have not paid (without permission).
Do not use other people’s computer resources without authorization or proper compensation.
Do not appropriate other people’s intellectual output.
Always think about the social consequences of the program you are writing or the system you are designing.
Always use a computer in ways that ensure consideration and respect for your fellow humans.