2. Define computer ethics and give classifications of ethical issues.
OR, Explain the four classifications of ethical issues.
Ans:- Computer Ethics:- Computer ethics is the analysis of the nature and social impact of computer technology and the formulation and justification of the policies for the ethical use of technology. It includes consideration of both personal and social policies for ethical use of computer technology. Its main goal is to understand the impact of computing technology upon human values. There are four kinds of ethical issues:-- i) Privacy:- It deals with collection, storage and dissemination of information about individuals. ii) Accuracy:- It deals with authenticity, fidelity and accuracy of information collected and procured. iii) Property:- It deals about ownership and value of information (intellectual property). iv) Accessibility:- It deals about right to access information and payment towards the same. 3. Explain the social and ethical issues arising out of the presence of computers in the workplace. Ans: The social and ethical issues that can arise out of the presence of computers in the workplace are: i)Task Automation: At workplace, computers have become universal tools that can in principle perform any task and hence pose a threat to jobs. They are far more efficient than humans in performing many tasks. Therefore, economic incentives to replace humans with computerized devices are very high. In the industrialized world, many workers doing jobs as bank tellers, autoworkers, telephone operators, typists etc have already been replaced by computers.. On the other hand, the computer industry has generated a wide range of new jobs in the form of hardware engineers, software engineers, system analysts, webmasters, information technology teachers, and computer sales clerks. Even when a job is not eliminated by computers, the job profile could be radically altered. So, job gains and losses are to be viewed in the context of the society we live in. ii)Health and Safety: Another workplace issue concerns health and safety. Often radiation from machines, repetitive injuries, and posture related problems are common at computer dominated workplaces. Another concern is poisonous non biodegradable computer waste, which is causing a major threat to the environment. The advent of stress in the workplace due to the introduction of computers is becoming more and more evident. iii)Employee Monitoring: Another major concern is the employee monitoring or surveillance by the organizations using sophisticated computer driven technology. Some amount of monitoring may be vital for protecting the interest of the employer and to increase productivity, but excess of such surveillance can becomes unethical. 10. Discuss the different forms of computer crime. OR Discuss the current forms of computer crimes. Ans: Different forms of computer crimes:- i) Privacy infringement: The personal rights of the citizens are endangered with the collection, transmission, and storage of the personal data. Therefore, in the data processing area, the protection of privacy needs to be considered. A balance needs to be maintained between the privacy interests of data subjects concerned and the economic freedom of the holders of personal data. ii) Economic offences: The economic crimes are considered as the central area of computer crime. Hacking, fraudulent manipulation of the computer data is some of the economic offences related to computers. iii) Computer Hacking:-This is a greatest risk in terms of integrity, availability, and confidentiality. Website defacements, credit card frauds, non-availability of web and application servers, and new virus attacks are common. These defacements are done by hackers and this process is called as hacking. iv) Software Piracy and Other forms of Product Piracy:- This includes illegal access of computer programs. It also includes copying the important software and information of the individual. v) Computer Espionage:- It rarely appears in official statistics constitute a special danger compared with traditional economic espionage. The object of this offence are especially copying computer program, data of research and defence, data of commercial accounting as well as address of client. It is done by data telecommunication. vii) Computer Sabotage and Computer Extortion:- It is danger for business and administration. It includes activities like destroying the store tangible and intangible data containing computer programs and other valuable information. It also affect the data processing. viii) Computer Fraud:- It describe a spectrum of various cases within the field of economic crimes. It includes invoice manipulations concerning the payment of bill and salaries of industrial companies along with the manipulation of account balance and balance sheets. viii) Illegal and Harmful content:- It includes providing harmful contents such as porn movies or videos, adult picture or story, more violent games etc, on internet through website which are illegal. 20. Discuss the adjudicatory processes incorporated in the act. Ans: The adjudicatory processes incorporated in IT act 2000 are: i)Penalty for damage to computer: If any damage cause by any computer due to accessing or securing data, Downloading, coping data and disrupting the working of computer by any unauthorized user then he will have to paid one crore rupees as a compensation to the affected person. ii) Penalty for failure to furnish information, return: If any individual fall in its preview using the computer to furnish any document, return or reports then he will have to give 1,50,000 rupees as penalty. iii) Residuary penalty: This act provides that whoever contravenes any rule or regulation for which a penalty has not specified, the person contravening the act is liable to pay 25,000 rupees as compensation iv) Power to adjudicate: According to this the adjudicating officer has power to: a) Summon and enforce the attendance of any person and examine him on oath. b) Direct the production of records and other electronic records. c) Issue warrant for the examination of witness and receive evidence on record. 4. Discuss the classification of crimes under the IT Act 2000. Ans: The following acts are cyber crime in the I.T. Act 2000:- Without permission of the authorized user i) Accessing or securing access to computer system or network. ii) Downloading, coping or extracting any data or information. iii) Introducing any computer, virus or contaminant in the computer. iv) Disrupting the working of the computer. v) Disrupting the access of the computer of an authorized user. vi) Providing assistance to ensure unauthorized access to the computer. vii) Tampering with computer source documents. viii) Hacking of computer system. ix) Carring on activities that are not in compliance with the provisions of the Act. x) Failure to extend all facilities and technical assistance to the Controller to decrypt any information necessary for the security of the nation. xi) Publishing Digital Certificate that are false in certain particular. xii) Misrepresenting or suppressing any material fact from the Controller or Certifying Authority for obtaining any license or Digital Signature Certificate 21. Discuss the policy approaches to privacy issues. Ans: Policy approach to privacy issues:- i) Market approach:- The market oriented approach rejects extrinsic legal enforcement and takes within its fold self-regulatory mechanisms which would enable the market players to employ or adopt. Any failure on the part of the market player will get disciplined or rectified by the market place. ii) Human rights approach:- This approach recognize right to information and the related attribute of privacy as a human right. Due to this, surveillance becomes operational strategy to protect the interests of the members. iii) Contract approach:- It recognizes contract model. The contract imposes an obligation on the parties to protect the privacy concerns and it provides for contractual remedies. Almost in every case of cyber service provider, policy pertaining to protection of the privacy interests of the consumer is normally announced. Normally this forms part of the envisaged terms and conditions of the contractual relationship. b) Discuss the significance of legislation. Ans: Significance of legislation:-- i) The legislature can legislate in advance. But judges cant do so. ii) The legislature can make a law on any subject within its competence. But judges can deal with a subject. iii) The legislature can override the law laid down by the courts, on a particular point because of the doctrine of separation of powers. iv) Legislation is the most fertile source of law. The legislature can vest a subordinate authority with power to make rules, orders, etc. v) A legislative enactment is not subject to appeal; and the law enacted by it cannot be reversed. 11. Explain the different sources of law. Ans: Following are the different source of law:-- a) Legislation:- It is the formal enactment of law by the legislature created or authorized by the constitution. It stands in contrasted with judge made law. Legislation consists of written laws, as contrasted with judge made law or common law. It also stands in contrasted to customary law. b) Common Law:- It comprises the body of principle, which derive their authority solely from the decisions of courts. It is a body of law that develops and derives through judicial decisions different from legislative enactments. Its principals do not derive their validity from formal law making by anybody, but from their enunciation through decisions of courts. c) Custom:- Custom denotes a usage or practice of the people (including a particular social group or a group residing in a particular locality) which by common adoption and acquiescence and by long and unvarying habit, has become compulsory and has acquired the force of law with respect to the place or subject matter to which it relates. Legislation and case law can operate in any sphere of human activity, while the operation of custom is generally restricted to a particular locality, group or family. 16. Explain the term Digital Signature. What is a Digital Signature Certificate? Ans: Digital Signature: The IT Act states that any law provides that information shall be in writing or in printed form. The key ingredients of the formation of electronic contracts comprise communication of offer and acceptance by electronic means, verification of the source of the communication, authentication of the time and place of dispatch and finally the verifiability of the receipt of the data communication. A 'digital signature' may be affixed to authenticate an electronic record. The digital signature serves to satisfy the legal requirement of affixing of a signature in a written or printed document. The Central Government has the power to make rules about the type of digital signature. Digital Signature Certificate: It certifies the identity of the subscriber and implies his acceptance of the provisions of this act and the rules and regulations contained therein. The certificate is issued only on the following grounds: i) The Certifying Authority being satisfied that the information contained in the application of certificate is accurate. ii) The subscriber holds a Private Key capable of creating a Public Key. iii) The Private Key corresponds to the Public Key to be listed in the Digital Signature Certificate. iv) The Public Key to be listed in the certificate can be used to verify a digital signature affixed by the Private Key held by the subscriber. 5. Discuss the essential of a valid contract. Ans: The general law of contracts is contained in the Indian Contract Act 1872. The Act defines contract as an agreement enforced by law. The essentials of a valid contract are:- i) Intention to be bound:- The intention to create a contract should be clear otherwise, it will be treated as invalid. ii) Offer and acceptance:-It is an essential ingredient of a contract that there must be an offer and its acceptance. If there is no offer then there is no contract. But if one party offer but another one does not accept it then also no contract will be formed iii) Concept of offer:- An offer is not defined by statue. It is generally understood as denoting the expression, by words or conduct, of a willingness to enter into a legally binding contract. It expressly indicates that it is to become binding on the offer or as soon as it has been accepted. iv) Offer by and whom: - An offer must be made by a person legally competent to contract or on his behalf by someone authorized by him to make the offer. If there is no particular individuals to whom that offer a contract then that contract become a unilateral contract. So, there must be two parties to made contract. vi) Statements which are not offer: - Every statement of intention is not an offer. A statement must be made with the intention that it will be accepted and will constitute a binding contract. 9. State and discuss the primary assumptions of a legal system. Ans: Following are the primary assumptions of a legal system: i) Sovereignty: Law making power is a matter of sovereign prerogative. As a result, the writ of sovereign authority runs throughout wherever sovereign power exercises authority. Beyond its authority, which is always attributed to determine geographical boundaries, the sovereign cannot regulate a subject matter through legal intervention. ii)Territorial Enforcement: Any law in real world context can only be subjected to predetermined territorial enforcements. There are some exceptions to this. The sovereign authority could join extra territorial jurisdiction in case of criminal law. This indicates that if the crime is committed beyond the limits of the territory the sovereign authority can initiate prosecution. iii) Notion of property: The obtaining premise of the legal response considers 'property' as tangible and physical. In the cyber context, 'property' in the form of digitized services or goods poses serious challenges to this legal understanding. Also that the 'domain names' raise fundamental questions. iv) Paper-based transaction: Legal response considers and encourages people to create and constitute legally binding relationships on the basis of paper- based transactions. Although the word document under law takes within its fold material other than paper also. Since in cyber context, digital or electronic record forms the basis of electronic transactions. Hence, the transactions are on the basis of electronic records. v) Real relationships: Legal response considers relationships, which are real world oriented. In view of connectivity, pace and accuracy as to transmission, in the cyber context, these relationships acquire unique distinction of virtual character. In case of trade and commerce, commercial transaction in the form of contracts constitutes the foundation of legal relationship. 1. What are the evidentiary presumptions of a secured electronic document. Explain the process of encryption and decryption of data. Answer- An electronic document is said to be secure where any security procedure has been applied to the electronic document at a specific point of time. Such a document is deemed to be secure till the time of verification. But there is no presumption about the integrity and authenticity of the electronic record. To create a legally bound electronic document is technologically complex. A legally enforceable electronic document must pass the test of authentication, non-repudiation, confidentiality, and information integrity during transmission or storage. The key element in the authentication of a paper-based document is the signature of the contracting persons. Likewise an electronic signature is the key in an electronic record. The equivalent electronic signature is referred to as digital signature. A digital signature is to identify the sender of the electronic record, authenticate the originator of the message and to certify that the message could not have been tampered with during the course of its transmission. The process of making the information unintelligible to the unauthorized reader is known as encryption of data. The process of making the information readable once again is known as decryption of data. The science of Cryptography is made up of encryption and decryption. There are two types of Cryptographic systems - symmetric and asymmetric. The symmetric Crypto system consists of both the sender and the receiver having access and sharing a common 'Key' to encrypt or decrypt a message. The asymmetric Crypto system is a more a secure system. This system uses two keys. The originator of the document keeps one of the keys known as the 'Private key' and the other key is sent to the recipient of the message. The recipient affixes the digital signature when he uses the public key to open the message sent to him. Thus the combination of the Public Key and the Private Key provide both confidentiality and authentication, which enables for secure electronic transmission 1. What is meant by unauthorized access to a computer under the provisions of the IT Act, 2000. Answer- The IT Act defines unauthorized access by any person as acts done without the permission of the owner, which includes: ork, computer network including information or data held or stored on any removable storage medium, computer, computer system or network,
Providing assistance to ensure unauthorized access to the computer, computer system or network, one crore rupees to the affected person. 6. What are the amendments to the Indian Penal Code? Ans: The Indian Panel Code (IPC) details actions that constitute a crime and the punishments prescribed for such actions. It elaborately classifies crimes based on interests that are intended to be protected. The classification includes :- i) Offences against body ii) Offences against property iii) Offences against marriage iv) Offences against public tranquility v) Offences against state Some important aspects have to be weighed while determining whether a crime has been committed or not. 4. There is no nexus between cyber space and real space - Comment. Answer- There is the difference between the business rules for online commerce and carrying business in the real space. Much of this difference comes from Internet's telepresence features. This feature renders the network technologically indifferent to physical location. The network is very insensitive to geography. It is not possible to determine the physical location of a user or a resource. In real space, locating a person or entity with which business is interacting is much easier. In the cyberspace to know the location of the partners with whom you are interacting is very difficult to know. In some instances, even an Internet address tells something only about the location of a given machine. There is no way to find the information about the actual user. b) What are the remedies for the breach of the contract? Ans:-Remedies for breach of a contract:- i)Damage:- When a contract has been broken, the party who suffer by such breach isentitled to receive compensation from the party who broken the contract for any loss or damage caused by him. Such compensation is not to be given for any remote and indirectloss or damage sustained by reason of the breach. ii)Penal Stipulations:- If a sum is named in the contract or if the contract contains anyother stipulation by way of penalty, the party complaining of the breach is entitled toreceive reasonable compensation from party who broken the contract, whether or notactual damage or loss is proved to have been caused thereby. iii) Specific performance:- In certain cases the court may direct against the party indefault specific performance of the contract means that party may be directed to perform the very obligation which he has undertaken by the contract. iv) Injunction:- An injunction is a preventive relief and is granted at the discretion of thecourt. The discretion of court is not arbitrary but is guided by judicial principles. A further check on the discretion is the provision for correction through an appeal in ahigher court 17. What is cyber privacy? Explain. Ans: The issue of privacy on the Internet has generated a lot of debate and controversy. On one hand, it is necessary for the authorities to indulge in surveillance in order to keep cyber crime in control. The same surveillance affects the privacy of millions of the people who use the Internet every day. However, privacy is extremely important to all individuals, organizations, and nations. Unfortunately, the Indian judiciary has not laid down specific laws regarding cyber privacy. Currently, the judiciary can only interpret privacy in accordance with the existing regulations. As per Article 21 of the Indian constitution, the right to privacy is an integral part of the fundamental right to life. Today, several individuals and organizations collect information regarding the surfing habits of Internet users and sell the same to interested companies for a tidy sum of money. Hundreds of websites are hacked and information is stolen and then sold to interested parties. Every day, individual users have to deal with the nuisance of dealing with unsolicited e-mail. All the entities - Individuals, organizations, and the government - need to contribute in the fight to curb cyber crime and at the same time respect the privacy. The NIF privacy principals deal with three fundamental concern including information privacy, information integrity and information quality. The government and the judiciary need to frame comprehensive laws related to privacy immediately 22. Explain the essentials of privacy preferences project (p3p) platform. Ans: P3P provides a simple, automated way for users to gain more control over the use of personal information on websites they browse. P3P is a standardized set of multiple-choice questions about the website's privacy policies. Online customers can answer these questions to select the way their personal information will be handled by the service provider. This snapshot could be read by P3P enabled browsers and set according to the set of privacy preferences of the consumer. P3P not only provides facilitating environment for the consumer to decide, negotiate and firm up the contractual relationship, but also recognizes nine aspects of online privacy. The first five aspects deal with (a) who is collecting this data? (b) Exactly what information is being collected? (c) for what purposes? (d) which information is being shared with others? (e) who are these recipients? The remaining four aspects focus on the site's internal privacy policies. They include (a) can users make changes in how their data is used? (b) how are disputes resolved? (c) what is the policy for retaining data? (d) and where can be detailed policies found in human readable form? P3P is software to negotiate privacy agreements between websites and online visitors. It is a kind of social technology that involves not merely technology but also active participation of human beings. 4. What is common law. How does it differ from codified law? Answer- Common law or uncodified law is the law flowing from judicial decisions. E.g. the process of dispute resolution or adjudication of liability by either village elders or people holding power through the process of issuing commands has received social acceptance. The uncodified law governs large segment of the legal regime. The judgment pronounced by an organ of the higher judiciary performs at least two important functions:
For the immediate parties, the judgment becomes a source, rights and duties. For the world, it becomes a source of law, it happens to deal with a legal proposition - and to make a definite pronouncement on the subject. 2. a) Explain how custom is a source of law. Ans:- Custom denotes a usage or practice of the people (including a particular socialgroup or a group residing in a particular locality) which by common adoption andacquiescence and by long and unvarying habit, has become compulsory and has acquiredthe force of law with respect to the place or subject matter to which it relates. Legislation and case law can operate in any sphere of human activity, whilethe operation of custom is generally restricted to a particular locality, group or family.Custom denotes a usage or practice of the people (including a particular social group or a group residing in a particular locality) which by common adoption and acquiescencehas become compulsory and has acquired the force of law with respect to the place or subject matter to which it relates. 1. E-Commerce is the new mantra of business Explain? Answer- -Commerce is the use of the Internet to buy and sell goods and services. E-Commerce is changing the way in which organizations do business, resulting in streamlined purchasing processes and lowering the cost of transacting business for both large and small companies. -Business helps in improving the way the business is conducted with the government, customers, and other businesses. -mail can be used in businesses to communicate with suppliers. It can also be used for responding and receiving the customer queries. For example, e-mail can be used to accept orders from the customers. The customers can also make the payments online and get the information regarding the products available along with their price. businesses for managing their records and they can make use of electronic bookkeeping. An on-line banking service is another area, which can be used by the businesses. These services can be used for funds transfer, payroll management, and electronic bill payment. 19. Discuss the impact of the information technology revolution on society. Ans: The amazing growth of information technology has implications for every aspect of society. So far there is little research that reveals how technology has and will continue to change the dynamics of society and the nonprofit sector. Following point elaborate how information technology affects various sections of society: i) The nonprofit sector is experiencing an organizational version of the "digital divide"-the technology gap between large and small nonprofits. Hardware, software, and technical assistance are not enough to close the divide; strategic planning and staff time are also essential. ii) The true impact the Internet will have on society is in "building community," bringing together groups of citizens, who are united by shared values working for the public good, often spanning international lines. Organizations that use technology well are usually marked by strong support from the executive director, support from the board, and the presence of a "key user" staff person. iii) The Internet enables an organization to strengthen relationships with its current audiences as it enables targeted, fast, and consistent communication. It can also enable nonprofits to reach out to new audiences through effective use of search engines and "viral marketing". 20. Discuss the adjudicatory processes incorporated in the act. Ans: The adjudicatory processes incorporated in IT act 2000 are: i)Penalty for damage to computer: If any damage cause by any computer due to accessing or securing data, Downloading, coping data and disrupting the working of computer by any unauthorized user then he will have to paid one crore rupees as a compensation to the affected person. ii) Penalty for failure to furnish information, return: If any individual fall in its preview using the computer to furnish any document, return or reports then he will have to give 1,50,000 rupees as penalty. iii) Residuary penalty: This act provides that whoever contravenes any rule or regulation for which a penalty has not specified, the person contravening the act is liable to pay 25,000 rupees as compensation iv) Power to adjudicate: According to this the adjudicating officer has power to: a) Summon and enforce the attendance of any person and examine him on oath. b) Direct the production of records and other electronic records. c) Issue warrant for the examination of witness and receive evidence on record. 2. Discuss the impact of globalization on computer ethics. The fast pace of globalization and creation of global and cyber markets, has given computing a new meaning. Bynum and Rogerson (1996) have suggested the use of the expression "Global Information Ethics" to describe the impact of globalization on computers ethics. Others (see van den Hoven, Introna, Johnson, and Nissenbaum, 1999) have used the expression "Information Communications Technology Ethics" or ICT Ethics to attempt to capture the convergence of information-related and communications-related ethical issues in a global context.
Global networks like the Internet and especially the World Wide Web (WWW) are connecting people all over the globe. Efforts are on to develop mutually agreeable standards of conduct and efforts to advance and defend human values. Globalization has led to the discussion of the following issues:
Global Laws: Over 200 countries are already interconnected by the Internet. Given this situation, what is the effect and impact of the law of one particular country on the rest of the world? Issues regarding freedom of speech, protection of intellectual property, invasion of privacy vary from country to country. The framing of common laws pertaining to such issues to ensure compliance by all the countries is one of the foremost questions being debated. Global Cyber Business: Technology is growing rapidly to enable electronic privacy and security on the Internet to safely conduct international business transactions. With such advanced technology in place, there will be a rapid expansion of global cyber business. Nations with a technological infrastructure already in place will enjoy rapid economic growth, while the rest of the world will lag behind. This disparity in levels of technology will fuel political and economic fallout, which could further widen the gap between the rich and the poor. Global Education: Inexpensive access to the global information net for the rich and the poor alike is necessary for everyone. However the impact of this sudden and global education on different communities, cultures, and religious practices is likely to be profound. The impact on lesser known universities would be felt as older well-established universities begin offering degrees and knowledge modules over the Internet. 1.Discuss the distinct features of the Internet. Answer- The Internet has three distinct features:
Global Scope: The Internet has a global reach. Internet technology has much broader scope and access than conventional modes of communications and data retrieval. With little effort, a user can reach hundreds and thousands of individuals around the globe. The ability to reach many people quickly and easily is not exactly new or unique compared to radio or television communication. But the significant difference between the Internet and television and radio is that in the case of radio and television, communication is in most cases one way whereas in the case of Internet it is interactive. It is this interactivity, which is the unique characteristic of the Internet. Not just interactivity, customizability, easy usability, and accessibility are also distinct features of Internet. Anonymity: The second important feature of the Internet is that it provides a certain kind of anonymity. On the Internet, individuals have the possibility of creating a different profile, ensuring that information about them cannot be traced while in communication with others on the Internet. It is a silent feature of Internet communication and people can deliberately avoid seeing or hearing one another directly. Anonymity makes accountability for ones action difficult to achieve and tends to diminish trust in the information that is being exchanged. The feature of anonymity has also facilitated the development of virtual information. The open and anonymous nature of communications on the web, has led to the development of software with stealth to gather information intelligently. An inference is made from information gathered without our knowledge or consent, which is termed as virtual information. This type of information adds information to a persons profile and tends to redefine a persons digital persona. This is an invasion of ones virtual privacy. Reproducibility: The third feature is not just a feature of the Internet, but of information technology in general. Electronic information exists in the form that makes it easy to copy without any loss of originality or value in the process of reproduction. Copied data or software is perfectly usable. Copied data or software leaves no evidence behind and the creator/owner of the data or software could remain unaware of their work being copied. Reproducibility facilitates anonymity.
2. What are the fundamental conceptions regarding the evaluation of individual actions? Answer- In the history of moral philosophy, two fundamentally different and mutually exclusive conceptions of the moral evaluation of individual actions are prevalent:
One approach or school of thought believes that it is important to examine an issue under independently justified principles of what one considers being right. The idea here is to follow the principles that articulate what is morally right irrespective of the consequences. This is referred to as deontological approach. In this approach, one starts out with one or more moral principles and see how they apply to particular cases. The other school of thought believes that it is important to look for the course of action that maximizes the good. This approach involves determining which action yields the best consequences measured in some standard of the good or morality. This approach referred to as teleological approach involves deciding on what is good for population. It also spells out what is wrong with actions that interfere with attempts to get it. 7. Explain with the help of historical millstones evolution of computer ethics. 15 Ans: Evolution of computer ethics:- The term computer ethics was coined in the mid 1970s by Walter Manor to refer to that field of applied professional ethics dealing with ethical problems aggravated, transformed or created by human technology. The evolution of computer ethics is tied to the wide range of philosophical theories and methodologies, which is rooted in the understanding of the technological revolution from introduction to permeation. In the 1940s and 1950s computer ethics as a field of study had its roots in the new field of research called cybernetic the science of information feedback system undertaken by Professor Norbert Weiner. The concepts of cybernetic led Weiner to draw some remarkable ethical conclusions about the technology that is now called information and communication technology. In his views the integration of computer technology into society would eventually constitute the remarking the society, which he turned as the second industrial revolution. In the 1960s Don Parker of SRI Inc. began to examine the unethical and illegal uses of computer by computer professions. He published Rules of Ethics in Information Processing and headed the development of the first code of professional conduct for his association of computing machinery. The 1970s saw Walter Manor coin the term Computer Ethics to refer to that field of inquiry dealing with ethical problems aggravated, transformed by computer technology. He disseminated his starter Kit in computer ethics, which contain curriculum materials and guideline to develop and teach computer ethics. In 1980s a number of social and ethical consequences of information technology were becoming public issues in America and Europe. Issues like computer enabled crime, disasters caused by computer failure; invasions of privacy through computer database etc become the order of the day. The 1990s heralded the beginning of the second generation of computer ethics. Q.Computer hacking: The greatest risk that the information technology business faces today is the security of information in terms of integrity, availability, and confidentiality. Stories about website defacements, credit card frauds, non-availability of web and application servers, and new virus attacks are common. These defacements are done by hackers and this process is called as hacking.