SlideShare una empresa de Scribd logo
1 de 5
GÜVEN KORKMAZ
282672
MANAGMENT INFORMATION
SYSTEMS
What is Computer Ethics ?
• Computer ethics, computer technology, and
an analysis of the effect of the natural and
social policies for the use of ethical
considerable reasons for such a technology.
Major Computer Ethics Rules
• Who can use the system
• Who has the authority to grant access to that
• How to create and how to retain the stored passwords
• Limitation of the system can be used only for business purposes and for
personal gain kullanılamayacağının specified. Spending time and resources
are limited in the use of the system for personal purpose or that it is
completely forbidden issues brought about limitations.
• Girilemeyeceği the system or if the system is sparse and the available
resources, authority, or can not be intentionally interfere with the
functioning of the system yapılamayacağı changes.
• Other users can not be deliberately harassed and their rights can not be
violated.
• Internet download or send material unsuitable for minors. And often
sexually explicit material may be unsuitable material covers a very wide
definition.
Major Computer Ethics Rules
• Authorized someone with a valid reason will not be done without the
consent of the trial subjects related to safety. (Such trials encryption and
security systems in the university setting, but you are allowed to work on
the course.)
• Due to system maintenance, system administrators, the circumstances
under which the files, mail messages, enter data, and the BASIC lists. To
protect the confidentiality of users' activities are limited to such activities.
• System administrators and other authorized personnel to maintain the
system, in order to limit the circumstances under which the use of the
system at any time, or changed at the end erdirebilecekleri. This
permission is not unlimited, but is in danger of sudden intervention may
be necessary in some cases, if the security of the system.
• About software copyrights and licenses principles (guidelines). The system
should not be used to create copies of unlicensed copyrighted material.
The same principle applies to photographs and they can not be copied
without license a vehicle such as a browser
What is Copyright ?
Products caused by the labor of every kind of
person on the idea of ​​rights provided by law.

Más contenido relacionado

Destacado

스마트큐 발표자료 김재우
스마트큐 발표자료 김재우스마트큐 발표자료 김재우
스마트큐 발표자료 김재우JaeWoo Kim
 
Inspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for CorrosionInspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for CorrosionEddyfi
 
JLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine ManualJLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine ManualJLL Fitness
 
Inspecting Laser Welds in Component Manufacturing
Inspecting Laser Welds in Component ManufacturingInspecting Laser Welds in Component Manufacturing
Inspecting Laser Welds in Component ManufacturingEddyfi
 
Trainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers TestimoniesTrainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers TestimoniesTrainerDavid
 
Factors affecting lls usage
Factors affecting lls usageFactors affecting lls usage
Factors affecting lls usageEvelyn Estrella
 
Texture Powerpoint Final
Texture Powerpoint FinalTexture Powerpoint Final
Texture Powerpoint Finalkphan22
 
State-of-the-Art RFT— Meeting the Ferromagnetic Tube Challenge
State-of-the-Art RFT— Meeting the Ferromagnetic Tube ChallengeState-of-the-Art RFT— Meeting the Ferromagnetic Tube Challenge
State-of-the-Art RFT— Meeting the Ferromagnetic Tube ChallengeEddyfi
 
Detecting Cracks and Corrosion in Aircraft Longerons
Detecting Cracks and Corrosion in Aircraft LongeronsDetecting Cracks and Corrosion in Aircraft Longerons
Detecting Cracks and Corrosion in Aircraft LongeronsEddyfi
 
EE 305 Project_1 The Effective External Defibrillators
EE 305 Project_1 The Effective External Defibrillators EE 305 Project_1 The Effective External Defibrillators
EE 305 Project_1 The Effective External Defibrillators kehali Haileselassie
 
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger Tubes
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger TubesAssessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger Tubes
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger TubesEddyfi
 
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)Looking for Cracks in Control Rod Drive Mechanisms (CRDM)
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)Eddyfi
 
JLL JF 100 Excercise Bike Manual
JLL JF 100 Excercise Bike ManualJLL JF 100 Excercise Bike Manual
JLL JF 100 Excercise Bike ManualJLL Fitness
 
The avanti group sharp turn for electronics company
The avanti group sharp turn for electronics companyThe avanti group sharp turn for electronics company
The avanti group sharp turn for electronics companyApplecherr McDougal
 
что такое Smm в 2013 году на примере
что такое Smm в 2013 году на примеречто такое Smm в 2013 году на примере
что такое Smm в 2013 году на примереАнтон Чернятин
 
Defect Detection & Prevention in Cast Turbine Wheels
Defect Detection & Prevention in Cast Turbine WheelsDefect Detection & Prevention in Cast Turbine Wheels
Defect Detection & Prevention in Cast Turbine WheelsEddyfi
 
Alejandra Ortiz bibliography
Alejandra Ortiz bibliographyAlejandra Ortiz bibliography
Alejandra Ortiz bibliographyAlejandrita Ortiz
 

Destacado (17)

스마트큐 발표자료 김재우
스마트큐 발표자료 김재우스마트큐 발표자료 김재우
스마트큐 발표자료 김재우
 
Inspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for CorrosionInspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for Corrosion
 
JLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine ManualJLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine Manual
 
Inspecting Laser Welds in Component Manufacturing
Inspecting Laser Welds in Component ManufacturingInspecting Laser Welds in Component Manufacturing
Inspecting Laser Welds in Component Manufacturing
 
Trainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers TestimoniesTrainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers Testimonies
 
Factors affecting lls usage
Factors affecting lls usageFactors affecting lls usage
Factors affecting lls usage
 
Texture Powerpoint Final
Texture Powerpoint FinalTexture Powerpoint Final
Texture Powerpoint Final
 
State-of-the-Art RFT— Meeting the Ferromagnetic Tube Challenge
State-of-the-Art RFT— Meeting the Ferromagnetic Tube ChallengeState-of-the-Art RFT— Meeting the Ferromagnetic Tube Challenge
State-of-the-Art RFT— Meeting the Ferromagnetic Tube Challenge
 
Detecting Cracks and Corrosion in Aircraft Longerons
Detecting Cracks and Corrosion in Aircraft LongeronsDetecting Cracks and Corrosion in Aircraft Longerons
Detecting Cracks and Corrosion in Aircraft Longerons
 
EE 305 Project_1 The Effective External Defibrillators
EE 305 Project_1 The Effective External Defibrillators EE 305 Project_1 The Effective External Defibrillators
EE 305 Project_1 The Effective External Defibrillators
 
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger Tubes
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger TubesAssessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger Tubes
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger Tubes
 
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)Looking for Cracks in Control Rod Drive Mechanisms (CRDM)
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)
 
JLL JF 100 Excercise Bike Manual
JLL JF 100 Excercise Bike ManualJLL JF 100 Excercise Bike Manual
JLL JF 100 Excercise Bike Manual
 
The avanti group sharp turn for electronics company
The avanti group sharp turn for electronics companyThe avanti group sharp turn for electronics company
The avanti group sharp turn for electronics company
 
что такое Smm в 2013 году на примере
что такое Smm в 2013 году на примеречто такое Smm в 2013 году на примере
что такое Smm в 2013 году на примере
 
Defect Detection & Prevention in Cast Turbine Wheels
Defect Detection & Prevention in Cast Turbine WheelsDefect Detection & Prevention in Cast Turbine Wheels
Defect Detection & Prevention in Cast Turbine Wheels
 
Alejandra Ortiz bibliography
Alejandra Ortiz bibliographyAlejandra Ortiz bibliography
Alejandra Ortiz bibliography
 

Similar a Assigment 6

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptDrBasemMohamedElomda
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network designnephtalie
 
BTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical IssuesBTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical Issuesmrcox
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Sreekanth Narendran
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7limsh
 
C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptshanthishyam
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptxdotco
 
IntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxIntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxnormanibarber20063
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10APSU
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROLshinydey
 
IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxpriestmanmable
 
6.12 expert systems
6.12 expert systems6.12 expert systems
6.12 expert systemsDave Smith
 

Similar a Assigment 6 (20)

Shak taha
Shak tahaShak taha
Shak taha
 
Socio technical system
Socio technical systemSocio technical system
Socio technical system
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
 
Network Security of Windows Servers
Network Security of Windows ServersNetwork Security of Windows Servers
Network Security of Windows Servers
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
 
Cyber ethics.pptx
Cyber ethics.pptxCyber ethics.pptx
Cyber ethics.pptx
 
BTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical IssuesBTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical Issues
 
auditing-190520092523.pdf
auditing-190520092523.pdfauditing-190520092523.pdf
auditing-190520092523.pdf
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.ppt
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptx
 
IntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxIntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docx
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic ProceduresPACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic Procedures
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docx
 
6.12 expert systems
6.12 expert systems6.12 expert systems
6.12 expert systems
 

Último

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Último (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Assigment 6

  • 2. What is Computer Ethics ? • Computer ethics, computer technology, and an analysis of the effect of the natural and social policies for the use of ethical considerable reasons for such a technology.
  • 3. Major Computer Ethics Rules • Who can use the system • Who has the authority to grant access to that • How to create and how to retain the stored passwords • Limitation of the system can be used only for business purposes and for personal gain kullanılamayacağının specified. Spending time and resources are limited in the use of the system for personal purpose or that it is completely forbidden issues brought about limitations. • Girilemeyeceği the system or if the system is sparse and the available resources, authority, or can not be intentionally interfere with the functioning of the system yapılamayacağı changes. • Other users can not be deliberately harassed and their rights can not be violated. • Internet download or send material unsuitable for minors. And often sexually explicit material may be unsuitable material covers a very wide definition.
  • 4. Major Computer Ethics Rules • Authorized someone with a valid reason will not be done without the consent of the trial subjects related to safety. (Such trials encryption and security systems in the university setting, but you are allowed to work on the course.) • Due to system maintenance, system administrators, the circumstances under which the files, mail messages, enter data, and the BASIC lists. To protect the confidentiality of users' activities are limited to such activities. • System administrators and other authorized personnel to maintain the system, in order to limit the circumstances under which the use of the system at any time, or changed at the end erdirebilecekleri. This permission is not unlimited, but is in danger of sudden intervention may be necessary in some cases, if the security of the system. • About software copyrights and licenses principles (guidelines). The system should not be used to create copies of unlicensed copyrighted material. The same principle applies to photographs and they can not be copied without license a vehicle such as a browser
  • 5. What is Copyright ? Products caused by the labor of every kind of person on the idea of ​​rights provided by law.