Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.
Próximo SlideShare
Cyber ethics
Cyber ethics
Cargando en…3
×
7 de 8

Cyber ethics

10

Compartir

Descargar para leer sin conexión

Libros relacionados

Gratis con una prueba de 30 días de Scribd

Ver todo

Cyber ethics

  1. 1. Cyber Ethics<br />NurulFifiAmalinabtMohdHashim<br />ASD4T<br />PuanHjhFazilah<br />
  2. 2. Definition <br />Cyber ethics is the ethics applied to the online environment. The treatment of what is and is not cyber-ethical behavior may vary from place to place.<br />Cyber ethics is a code of behavior for using the Internet. One easy way to think about cyber ethics and to address the subject with children is this: acceptable behavior on the Internet is very much the same as acceptable behavior in everyday life. <br />Cyber-Ethics is the Ethics applied to the online environment. The treatment of what is and is not cyber-ethical behavior may vary from place to place<br />Manners applied to the Internet and the use of technology in everyday situations<br />
  3. 3. Do & don’t in cyber ethics<br />
  4. 4. Do & don’t in cyber ethics<br />
  5. 5. Rules of cyber<br />Do not use rude or offensive language. <br />Don’t be a bully on the Internet. Do not call people names, lie about them, send embarrassing pictures of them, or do anything else to try to hurt them. <br />Do not copy information from the Internet and claim it as yours. That is called plagiarism. <br />Adhere to copyright restrictions when downloading material including software, games, movies, or music from the Internet. <br />Do not break into someone else’s computer. <br />Do not use someone else’s password. <br />Do not attempt to infect or in any way try to make someone else’s computer unusable. <br />
  6. 6. Faults in cyber <br />Appropriate other people’s intellectual property (IP) <br />Ignore the social and legal consequences related to the software program one is writing or the computer system one is designing <br />Illegally copy or use proprietary software that has not been paid for or for which credit has not been given <br />Interfere with others computer or online work <br />Snoop into or alter others computer files or data <br />Use a computer to bear false witness <br />Use a computer to cause harm to others <br />Use others computer resources without prior authorization <br />Use the computer in ways that ignore the consideration of and respect for fellow human beings<br />
  7. 7. Conclusion<br />Cyber ethics is important in cyber life. Although cyber world is not in reality life, but we have to follow the ethics. For example, don’t take other people work and make it like your own work. You should credit to them. Moreover, when people follow the rules, there is no misunderstood in cyber world. People will respect each other even in cyber world.<br />
  8. 8. References<br />http://us.norton.com/library/familyresource/article.jsp?aid=pr_cyberethics<br />http://iris.nyit.edu/~mtehrani/Week2_assignment1_MTehrani.pdf<br />http://computer.yourdictionary.com/cyber-etiquette<br />

×