Cyberethics-(Contd.)



Chap-6: Cyberethics 

(Page-167 (Old Book) or 187(New Book))

Good Morning Students

I am happy to connect with you once again. I hope everyone is enjoying the sharing in e-Classroom

In my last class I gave you the following questions to answer, as your homework:

Q1. Is Internet a boon? Elaborate if you answer is either yes or no.
Q2. Given two points to define Cyberethics or Netiquettes.
Q3. Elucidate E-Commerce.
Q4. Enumerate the ways of paperless exchange of business information.
Q5. When did online shopping become possible for public?
Q6. Name some pioneer e-Commerce sites.
Q7. Write four points to explain about the responsibilities of online sellers or e-retails to their customers.

I hope you have written the answers in your notebook or sheets (as per the WhatsApp messages in Class Group).

Those who were not able to do it, feel free to write the reason in the Comments Section of the blog.

Remember: Punctuality can save from last minute rush and you enjoy the process of learning.



ΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘ

Let’s begin with the topic for today.

Learning Outcomes:

By the end of this period, you will be able to:

  • Enumerate the measures to protect privacy
  • Define:
    • Online Fraud 
    • Counterfeit Products
    • Phishing
  • Enlist the types of Online Fraud
Does anyone remember the topic which was given by me, to you, for reading?

Yes, you are right… I told you to read about ‘Cyberethics’.

Let’s begin…

Before we move ahead, as you press like buttons on YouTube and Facebook, please mark your attendance in the Comments Section of this blog (with your NAME, CLASS AND SECTION)




So, my dear students please refer to Page: 167 (old books) or Page: 187 (new books) in your book.

We ended our last class with the discussion about the responsibilities of an e-Retailer.

For sure, if an e-Retailer and any online vendor don’t bother about the security of the data of her/his customers, then the adverse effects are born by the consumer only.

But do you feel that keeping data safe and secure is the duty of the seller only?

If the answer is NO, then one should know about – How to safeguard user privacy?

Following video of around 3 mins, will surely give you some information about it…



Please click on the following link, if the video doesn't play within the blog:


Even our government has taken some important steps in this connection…

You must have seen this slogan.





This bill was passed for strengthening the rights of consumers and providing a mechanism for the redressal of their complaints regarding defects in goods and deficiency in services.



So, my dear students – JAGO GRAHAK JAGO.

Means, it’s not only the duty of the retailer but we also need to be aware about our rights, so that we can set our expectations in the mind of the seller before any transaction.





ΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘ

Why do you need to keep your data safe? Is it only because of privacy or something else too?

Fraud is other factor.

And when the fraud is committed by using the Internet, then it is called as Online Fraud.

Let us see some forms of Online Frauds:
These can be controlled by proper monitoring:
  • Non-delivered goods
  • Counterfeit products
  • Non-existent companies

Just monitoring is not sufficient for the following types of frauds:
  • Stealing of Information
  • Fraudulent payments etc.

ΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘ

Now, please read the ‘Remember’ and ‘Do You Know’ sections on your Page: 167 (old books) and Page: 187 (new books)


Counterfeit products are most commonly known as first copy, second copy etc.

Did you ever find that the product bought by you is labeled with proper brand name, but its quality is not matching with that of the original item?
It could be a case of Counterfeit Product.

This problem is increasing day by day in electronic market. And that’s because of the reason that the customer is not directly able to see and touch the product before buying.

When with the intention of taking advantage of superior value of a product, the producers make fake or unauthorized duplicates of the real product, it is called a case of Counterfeit Product.


ΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘ

My dear boys have you or your parents ever received any e-mail giving you a very lucrative offer or congratulating you about winning a lucky draw which you never participated in?

Thousands of such mails are daily sent to several people all over the world. You can’t vouch for the percentage of them, which are really genuine.

Actually, this is a common practice of many people or organizations with malicious intentions, to send such a mail to the person. The recipients of such mails are offered with such a lucrative deal or a gift or a prize that they tend to click on the given links. From there they are redirected to a page which may ask them to furnish some confidential information like username, passwords or credit card details. Ultimately the recipient of the mail is trapped in a fraud.

Such an act of attempting to obtain sensitive information by disguising as a trust worthy entity in an electronic communication is called Phishing.



ΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘΘ



Let's summarise:

  • Consumer Protection Bill 2018 was passed to strengthen consumer rights. It provides a mechanism redressal of complaints. 
  • We should keep strong passwords and virus free computers to safeguard privacy.
  • Merchants should assure user about safety of data in terms and conditions.
  • Merchants should not let the transaction to take place until user has read the terms and conditions. 
  • There should be the use of trusted platforms for financial transactions. 
  • Fraud committed by using the Internet is called as online fraud. 
  • Counterfeit products are fake or unauthorized duplicates of the real product. 
  • Phishing is fraudulent attempt to obtain sensitive information.


That's all for today

Before you join my next class, make sure that you do all the homework mentions given today in this blog and make an effort to read about 'Few things one can do to protect his/her business'. 



God Bless 

Mrs G.Sehgal

Comments

  1. Good morning maam
    RONIT is present

    ReplyDelete
  2. Good morning ma'am
    Farhan is present 10C

    ReplyDelete
  3. Good morning ma'am
    Anirudh Rawat

    ReplyDelete
  4. Those who were absent in the last class must visit the previous blog and note down the work. We will not be able to repeat.

    ReplyDelete
  5. Good morning ma'am
    Ashwanth is present

    ReplyDelete
  6. Good Morning Ma'am
    Jay Sati is Present

    ReplyDelete
  7. Good morning ma'am
    Vaibbhav Mathur is present

    ReplyDelete
  8. Good Morning Ma'am
    George Gomes is present

    ReplyDelete
  9. Good morning ma'am
    Arjun is present

    ReplyDelete
  10. This comment has been removed by the author.

    ReplyDelete

Post a Comment

Popular posts from this blog

Python-IF(Prac)

Python-IF command

Python- IF(2)