SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
Computer Ethics
      Presentation by
       Nadine Fray
         INF 103
   PROF Mortoza Abdullah
        May 3 2012
Table of contents

   1. A brief history of computer
    and internet
   2. The meaning of Ethics
   3. The distinction between law
    and Ethics
   4.The subject of Ethics
   5.computer Ethics as a unique
    kind of Ethics
   6.chapter summary
Ethics?

    Ethic refers to the standards and rules
     that "should" be followed and it helps us
     to regulate our conduct in a group or with
     a set of individuals. Since the term
     Ethics is a relative term, it is branched
     under philosophy, which states how
     users of World Wide Web should make
     decisions regarding their conduct.
 Computer ethics is
  a new branch of
  ethics that is
  growing and
  changing rapidly as
  computer
  technology also
  grows and
  develops.
The Ten Commandments On Computer Ethics


          1. Thou shalt not use a computer to harm other people.
      2. Thou shalt not interfere with other people's computer work.
     3. Thou shalt not snoop around in other people's computer files.
                 4. Thou shalt not use a computer to steal.
          5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not
                                    paid.
     7. Thou shalt not use other people's computer resources without
                  authorization or proper compensation.
     8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are
                 writing or the system you are designing.
 10. Thou shalt always use a computer in ways that ensure consideration
                    and respect for your fellow humans
Computers are often far more
efficient than humans in performing
many tasks. In the industrialized
world many workers already have
been replaced by computerized
devices -- bank tellers, auto workers,
telephone operators, typists, graphic
artists, security guards, assembly-
line workers, and on and on. Even
professionals like medical doctors,
lawyers, teachers, accountants and
psychologists are finding that
computers can perform many of
their traditional professional duties
quite effectively.
Why do we need computer ethics?

 The growth of the WWW has created several
               novel legal issues
The existence of new questions that older laws
                cannot answer
 Traditional laws are outdated/anachronistic
                 in this world
  a more coherent body of law is needed to
       govern Internet and computers
Cyber Ethics
• the most common problem isn't hacking (illegally
  accessing Web sites) or cracking (vandalizing
  Web sites); It's the unauthorized downloading of
  games and software.
• the average hacker is likely to be a teenager and
  given that most homes now have at least one
  computer
Code of Ethics
   Information stored on the computer should be treated
    as seriously as written or spoken word.
   Privacy should not be violated. In case of academic
    use, it is known plagiarism.
   Information from public viewing should not be
    modified or deleted or inaccessible since these are
    considered as destructive acts.
   Intrusive software such as "worms" and "viruses"
    which are destructive to the computer system is also
    illegal.
   Congesting somebody’s system with a lot of unwanted
    information is also unethical.
   Sending obscene and crude messages through mail or
    chat is also forbidden.
   Sending sexually explicit content, message or pictures
    is also forbidden.
Ethics is a set of moral
principles that govern
individual or a group on what
is acceptable behavior while
using a computer.
Computer ethics is set of
moral principles that govern
the usage of computers.
One of the common issue of
computer ethics is violation of
copyright issues.
Duplicating the copyrighted
content without the authors
approval ,
accessing personal
information of others are
some of the examples that
violate ethical principles.
Ethical rules for computer users

    Do not use computer to harm other users.
     Do not use computers to steal other's information.
     Do not access files without the permission of owner.
     Do not copy copyrighted software's without the authors permission.
     Always respect copyright laws and policies.
     Respect the privacy of others, just as you expect the same from
    others.
     Do not use other user's computer resources with out their permission.
     Use Internet ethically.
     Complain about illegal communication and activities, if found, to
    Internet service Providers and local law enforcement authorities.
     Users are responsible for safeguarding their User Id and passwords.
    They should not write them on paper or anywhere else for
    remembrance.
     Users should not intentionally use the computers to retrieve or modify
    the information of others which may include password information, files
    etc.
References
• Stanford Encyclopedia Of Philosophy
• Computers Professionals For Social
  Responsibility
• Computer Ethics - code of ethics in
  computing
• Computer Ethics — Information Security
  Education and Awareness

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Ethics
EthicsEthics
Ethics
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Destacado

Chapter 2
Chapter 2Chapter 2
Chapter 2gbrand
 
How to teach Ethics to Computer Science Students
How to teach Ethics to Computer Science StudentsHow to teach Ethics to Computer Science Students
How to teach Ethics to Computer Science StudentsPer Arne Godejord
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And ComputingDavid Ramirez
 
Ethics as viewed from Computer Games
Ethics as viewed from Computer GamesEthics as viewed from Computer Games
Ethics as viewed from Computer GamesPer Arne Godejord
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Ethics in the workplace
Ethics in the workplaceEthics in the workplace
Ethics in the workplaceviviandabu
 
Workplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint PresentationWorkplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint PresentationAndrew Schwartz
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShareSlideShare
 

Destacado (10)

Ethics
EthicsEthics
Ethics
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
How to teach Ethics to Computer Science Students
How to teach Ethics to Computer Science StudentsHow to teach Ethics to Computer Science Students
How to teach Ethics to Computer Science Students
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And Computing
 
Ethics as viewed from Computer Games
Ethics as viewed from Computer GamesEthics as viewed from Computer Games
Ethics as viewed from Computer Games
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in the workplace
Ethics in the workplaceEthics in the workplace
Ethics in the workplace
 
Workplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint PresentationWorkplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint Presentation
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 

Similar a Nfwordle

Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
computer ethics
computer ethicscomputer ethics
computer ethicssdrhr
 
erasmusgroup2-160126193027 (4).pdf
erasmusgroup2-160126193027 (4).pdferasmusgroup2-160126193027 (4).pdf
erasmusgroup2-160126193027 (4).pdfVarenyakaushik
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computingMichael Jarata
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxjennyJey2
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptxMuruganS82
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 

Similar a Nfwordle (20)

Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Shak taha
Shak tahaShak taha
Shak taha
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Erasmus+ group 2
Erasmus+ group 2Erasmus+ group 2
Erasmus+ group 2
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
erasmusgroup2-160126193027 (4).pdf
erasmusgroup2-160126193027 (4).pdferasmusgroup2-160126193027 (4).pdf
erasmusgroup2-160126193027 (4).pdf
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computing
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 

Último

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Último (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Nfwordle

  • 1. Computer Ethics Presentation by Nadine Fray INF 103 PROF Mortoza Abdullah May 3 2012
  • 2. Table of contents  1. A brief history of computer and internet  2. The meaning of Ethics  3. The distinction between law and Ethics  4.The subject of Ethics  5.computer Ethics as a unique kind of Ethics  6.chapter summary
  • 3. Ethics?  Ethic refers to the standards and rules that "should" be followed and it helps us to regulate our conduct in a group or with a set of individuals. Since the term Ethics is a relative term, it is branched under philosophy, which states how users of World Wide Web should make decisions regarding their conduct.
  • 4.  Computer ethics is a new branch of ethics that is growing and changing rapidly as computer technology also grows and develops.
  • 5. The Ten Commandments On Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans
  • 6. Computers are often far more efficient than humans in performing many tasks. In the industrialized world many workers already have been replaced by computerized devices -- bank tellers, auto workers, telephone operators, typists, graphic artists, security guards, assembly- line workers, and on and on. Even professionals like medical doctors, lawyers, teachers, accountants and psychologists are finding that computers can perform many of their traditional professional duties quite effectively.
  • 7. Why do we need computer ethics? The growth of the WWW has created several novel legal issues The existence of new questions that older laws cannot answer Traditional laws are outdated/anachronistic in this world a more coherent body of law is needed to govern Internet and computers
  • 8. Cyber Ethics • the most common problem isn't hacking (illegally accessing Web sites) or cracking (vandalizing Web sites); It's the unauthorized downloading of games and software. • the average hacker is likely to be a teenager and given that most homes now have at least one computer
  • 9. Code of Ethics  Information stored on the computer should be treated as seriously as written or spoken word.  Privacy should not be violated. In case of academic use, it is known plagiarism.  Information from public viewing should not be modified or deleted or inaccessible since these are considered as destructive acts.  Intrusive software such as "worms" and "viruses" which are destructive to the computer system is also illegal.  Congesting somebody’s system with a lot of unwanted information is also unethical.  Sending obscene and crude messages through mail or chat is also forbidden.  Sending sexually explicit content, message or pictures is also forbidden.
  • 10. Ethics is a set of moral principles that govern individual or a group on what is acceptable behavior while using a computer. Computer ethics is set of moral principles that govern the usage of computers. One of the common issue of computer ethics is violation of copyright issues. Duplicating the copyrighted content without the authors approval , accessing personal information of others are some of the examples that violate ethical principles.
  • 11. Ethical rules for computer users  Do not use computer to harm other users.  Do not use computers to steal other's information.  Do not access files without the permission of owner.  Do not copy copyrighted software's without the authors permission.  Always respect copyright laws and policies.  Respect the privacy of others, just as you expect the same from others.  Do not use other user's computer resources with out their permission.  Use Internet ethically.  Complain about illegal communication and activities, if found, to Internet service Providers and local law enforcement authorities.  Users are responsible for safeguarding their User Id and passwords. They should not write them on paper or anywhere else for remembrance.  Users should not intentionally use the computers to retrieve or modify the information of others which may include password information, files etc.
  • 12. References • Stanford Encyclopedia Of Philosophy • Computers Professionals For Social Responsibility • Computer Ethics - code of ethics in computing • Computer Ethics — Information Security Education and Awareness