SlideShare a Scribd company logo
1 of 16
CHAPTER 1: INFORMATION
AND COMMUNICATION
TECHNOLOGY
Computer Ethics and Legal Issues
Definition
Computer Ethics   Is a system of moral standards or moral values
                  used as a guideline for computer users
Code of Ethics    Is a guideline in ICT that help determine whether
                  a specific computer action is ethical or unethical
Intellectual      Is works created by inventors, authors and artists
Property
Privacy           Refers to the right of individuals and companies
                  to deny or restrict the collection and use of
                  information about them
Computer Crime    Is any illegal acts involving computers
Cyber Law         Is any laws relating to protect the Internet and
                  other online communication technologies
Differentiate between ethics and law

            ETHICS                              LAW
As a guideline to computer        As a rule to control computer
users                             users
Computers users are free to       Computers users must follow
follow or ignore the code of      the regulations and law
ethics
Universal, can be applied         Depend on country and state
anywhere, all over the world      where the crime is committed
To produced ethical computers     To prevent misuse of
users                             computers
Not following ethics are called   Not obeying laws are called
immoral                           crime
Intellectual Property Laws
    Four types of Intellectual Property are:




•    Patents for inventions
•    Trademarks for brand identity
•    Design for product appearance
•    Copyright for materials
Privacy
Ways of making personal data more privates:
 Install personal firewall

 Clear your history file when you are browsing

 Purchase goods with cash, rather than credit card
Authentication
   Authentication is a process where user verifies their
    identity. Authentication deals with the problem of
    determining whether a user should be allowed
    access to a particular system.
   Four commonly authentication methods:
A) User identification
   Is a unique combination of characters (letter,
    number or symbol) that identify specific user
   Examples:
              pin number
              password
B) Possessed object
   Is a any item that you must carry to gain access to
    computer of computer facility
   Examples:
               ATM card
               credit card
               smart card
C) Biometric device
   Is a device that translates personal characteristics
    into digital code that is compared with the digital
    code stored in the database
   Examples:
               fingerprint reader
               iris scanner
               hand geometric scanner
               signature verification system
Controversial Contents and Control
         PORNOGRAPHY                                     SLANDER
 is any form media or material (like       is a false spoken statement about
books, video or photos) that show erotic   someone, intended to damage his or her
behavior and intended to cause sexual      reputation
excitement
                                            the effects of slander on society are:
 the effects of pornography on society    iv)Can develop society that disregards on
are:                                       honesty and truth
iv)Can lead to criminal acts such as       v)Can lead to bad habits of spreading
exploitation of women                      rumors and untruth
v)Can lead to sexual addiction             vi)Can cause people to have nagative
vi)Can develop lower moral values          attitudes toward another person
towards other people
vii)Can erode good religious, cultural,
behaviors and beliefs
Computer Crimes
   Why we need cyber law?
    i)     Cyber laws are made to force people to be good
    ii)    To give protection against the misuse of computers
           and computer criminal activities
   Examples of cyber abuse on the users:
    i)     Sending a computer virus via e-mail
    ii)    Harassment through e-mail
    iii)   Hacking into your school's database to change your
           examination results
   Malaysian Cyber Law
    i)     Computer Crime Act 1997
    ii)    Copyright (Amendment) Bill 1997
    iii)   Digital Signature Act 1997
    iv)    Telemedicine Bill 1997
    v)     Communication and Multimedia Act 1998
    vi)    Digital Signature Regulations 1998
   4 examples of computer crimes:
   Computer fraud - is the crime of obtaining money
    by deceiving (to trick) people through the use of
    computers such as email hoaxes, program fraud,
    investment schemes and claim of expertise on
    certain fields
   Copyright infringement - is a violation of the rights
    secured by a copyright. It occurs when you break
    the copyright laws such as copying movie, software
    or CD’s illegally
Computer theft – is defined as the unauthorized
    used of another person’s property such as transfer
    of payment to the wrong accounts, get online
    material with no cost and tap into the data
    transmission lines
e   Computer attack – is defined as any activities
    taken to disrupt the equipments of computers
    systems, change processing controls and corrupt
    stored data

More Related Content

What's hot

Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICSRJ Khan
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsPrabesh Shrestha
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing professionshahmansoor109
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineeringjndatirwa
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 

What's hot (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineering
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Viewers also liked

Viewers also liked (12)

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Towards comprehensive public & private sector whistleblower protection
Towards comprehensive public & private sector whistleblower protectionTowards comprehensive public & private sector whistleblower protection
Towards comprehensive public & private sector whistleblower protection
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Security policy
Security policySecurity policy
Security policy
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
EU-GDPR On Boarding & IT Handlungsfelder
 EU-GDPR On Boarding & IT Handlungsfelder  EU-GDPR On Boarding & IT Handlungsfelder
EU-GDPR On Boarding & IT Handlungsfelder
 
Ethical Constraints
Ethical Constraints Ethical Constraints
Ethical Constraints
 
Netiquette and code of conduct in communication
Netiquette and code of conduct in communicationNetiquette and code of conduct in communication
Netiquette and code of conduct in communication
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Risk Analysis
Risk AnalysisRisk Analysis
Risk Analysis
 
Ethics
EthicsEthics
Ethics
 

Similar to Computer Ethics and Legal Issues

Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxtalhajann43
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1ikmalsham
 
Ethical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfEthical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfDesireDelosSantos
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 

Similar to Computer Ethics and Legal Issues (20)

Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
English in written
English in writtenEnglish in written
English in written
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
Ethical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfEthical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology Presentatiopdf
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 

More from Kak Yong

Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersifKak Yong
 
Module programming
Module programmingModule programming
Module programmingKak Yong
 
Module info systems
Module info systemsModule info systems
Module info systemsKak Yong
 
Module ict society
Module ict societyModule ict society
Module ict societyKak Yong
 
Module computer systems
Module computer systemsModule computer systems
Module computer systemsKak Yong
 
Module networks
Module networksModule networks
Module networksKak Yong
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programmingKak Yong
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaKak Yong
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsKak Yong
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksKak Yong
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsKak Yong
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyKak Yong
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Kak Yong
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Kak Yong
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Kak Yong
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Kak Yong
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Kak Yong
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Kak Yong
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Kak Yong
 

More from Kak Yong (20)

Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersif
 
Module programming
Module programmingModule programming
Module programming
 
Module info systems
Module info systemsModule info systems
Module info systems
 
Module ict society
Module ict societyModule ict society
Module ict society
 
Module computer systems
Module computer systemsModule computer systems
Module computer systems
 
Module networks
Module networksModule networks
Module networks
 
Synopsis
SynopsisSynopsis
Synopsis
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programming
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimedia
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-society
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

Computer Ethics and Legal Issues

  • 1. CHAPTER 1: INFORMATION AND COMMUNICATION TECHNOLOGY Computer Ethics and Legal Issues
  • 2. Definition Computer Ethics Is a system of moral standards or moral values used as a guideline for computer users Code of Ethics Is a guideline in ICT that help determine whether a specific computer action is ethical or unethical Intellectual Is works created by inventors, authors and artists Property Privacy Refers to the right of individuals and companies to deny or restrict the collection and use of information about them Computer Crime Is any illegal acts involving computers Cyber Law Is any laws relating to protect the Internet and other online communication technologies
  • 3. Differentiate between ethics and law ETHICS LAW As a guideline to computer As a rule to control computer users users Computers users are free to Computers users must follow follow or ignore the code of the regulations and law ethics Universal, can be applied Depend on country and state anywhere, all over the world where the crime is committed To produced ethical computers To prevent misuse of users computers Not following ethics are called Not obeying laws are called immoral crime
  • 4. Intellectual Property Laws Four types of Intellectual Property are: • Patents for inventions • Trademarks for brand identity • Design for product appearance • Copyright for materials
  • 5. Privacy Ways of making personal data more privates:  Install personal firewall  Clear your history file when you are browsing  Purchase goods with cash, rather than credit card
  • 6. Authentication  Authentication is a process where user verifies their identity. Authentication deals with the problem of determining whether a user should be allowed access to a particular system.
  • 7. Four commonly authentication methods:
  • 8. A) User identification  Is a unique combination of characters (letter, number or symbol) that identify specific user  Examples: pin number password
  • 9. B) Possessed object  Is a any item that you must carry to gain access to computer of computer facility  Examples: ATM card credit card smart card
  • 10. C) Biometric device  Is a device that translates personal characteristics into digital code that is compared with the digital code stored in the database  Examples: fingerprint reader iris scanner hand geometric scanner signature verification system
  • 11. Controversial Contents and Control PORNOGRAPHY SLANDER  is any form media or material (like  is a false spoken statement about books, video or photos) that show erotic someone, intended to damage his or her behavior and intended to cause sexual reputation excitement  the effects of slander on society are:  the effects of pornography on society iv)Can develop society that disregards on are: honesty and truth iv)Can lead to criminal acts such as v)Can lead to bad habits of spreading exploitation of women rumors and untruth v)Can lead to sexual addiction vi)Can cause people to have nagative vi)Can develop lower moral values attitudes toward another person towards other people vii)Can erode good religious, cultural, behaviors and beliefs
  • 12.
  • 13. Computer Crimes  Why we need cyber law? i) Cyber laws are made to force people to be good ii) To give protection against the misuse of computers and computer criminal activities  Examples of cyber abuse on the users: i) Sending a computer virus via e-mail ii) Harassment through e-mail iii) Hacking into your school's database to change your examination results
  • 14. Malaysian Cyber Law i) Computer Crime Act 1997 ii) Copyright (Amendment) Bill 1997 iii) Digital Signature Act 1997 iv) Telemedicine Bill 1997 v) Communication and Multimedia Act 1998 vi) Digital Signature Regulations 1998
  • 15. 4 examples of computer crimes:  Computer fraud - is the crime of obtaining money by deceiving (to trick) people through the use of computers such as email hoaxes, program fraud, investment schemes and claim of expertise on certain fields  Copyright infringement - is a violation of the rights secured by a copyright. It occurs when you break the copyright laws such as copying movie, software or CD’s illegally
  • 16. Computer theft – is defined as the unauthorized used of another person’s property such as transfer of payment to the wrong accounts, get online material with no cost and tap into the data transmission lines e Computer attack – is defined as any activities taken to disrupt the equipments of computers systems, change processing controls and corrupt stored data