SlideShare una empresa de Scribd logo
1 de 29
1
COMPUTER
ETHICS
2
What is computer ethics?
Computer ethics a system of
moral standards or value uses
as a guideline for computer user
Analysis of the nature and
social impact of computer
technology
3
THE TEN COMMANDMENTS OF
COMPUTER ETHICS
 You shall not use a computer to harm other people.
 You shall not interfere with other people's computer work.
 You shall not snoop around in other people's computer files.
 You shall not use a computer to steal.
 You shall not use a computer to bear false witness.
 You shall not copy or use proprietary software for which you
have not paid.
 You shall not use other people's computer resources without
authorisation or proper compensation.
 You shall not appropriate other people's intellectual output.
 You shall think about the social consequences of the
program you are writing or the system you are designing.
 You shall always use a computer in ways that ensure
consideration and respect for your fellow humans
The United States Institute of Computer Ethics
4
GUIDELINES ON THE E-MAIL AND
INTERNET USAGE IN MALAYSIA
 use only individual e-mail address to forward individual opinion
 keep the identity name and password a secret to avoid the
misuse of your e-mail without your knowledge
 e-mail must be active to promptly reply the necessary actions
needed for any matters
 ensure the total mail kept in the box is within the computer
storage capacity
 scan files regularly to avoid the transmission of virus from one
computer to another
 do not send e-mails that contain classified information which can
be used to tarnish other people or country
 choose a suitable time to search the Internet to save access time
and cost
 beware of prohibited sites which could affect one's moral,
organisation or nation
 print only relevant documents that you think can be used in future
to save cost
5
Examples of unethical
computer code of conducts
include
 modifying certain information on the
Internet, affecting the accuracy of the
information
 selling information to other parties without
the owner’s permission
 using information without authorization
 involvement in stealing software
 invasion of privacy
6
Examples of ethical computer code of conducts
include:
sending warning about viruses to
other computer users
asking permission before sending
any business advertisements to
others
using information with
authorization
7
Why do we need
ethics and law in
computing?
 Respecting Ownership
 not stealing other people’s work
 Respecting Privacy
 reading others’ mails or files without
permission
 Respecting Property
 act of tampering and changing electronic
information is considered as vandalism and
disrespect for other people’s property
8
The Differences between Ethics
and Law
Ethics
Free to Follow
No Punishment
Universals
Produce ethical
computer user
Immoral
Law
Must follow
Penalties, Punishment
Depends on Country
Prevent misusing of
Computer
Crime
9
COMPUTER ETHICS
Intellectual Properties (IP)
Privacy
Authentications
Verification
Controversial contents
10
INTELLECTUAL
PROPERTY
(IP)
These works are
unique and have value
in the market placeWork created by
inventors, authors
and artist
school begs, shoes
and even your socks
are protected by IP
11
1) INTELECTUAL PROPERTY
PROTECTION
DesignPatent
Trademarks Copyright
TYPESTo safeguard intellectual
property rights
16
2) PRIVACY
Data and information privacy
The rights of individuals and
companies to deny or restrict
the collection and use of
information about them
Anonymity, confidentiality
17
Ways Computer Technology
Threaten Our Privacy
Cookies
- used to identify users by web casting,
e-commerce and other
- contain user information and are saved
in the computer hard disk
- used by some websites to store
passwords and track how regularly we
visit a websites, that’s how we become
potential targets for web advertisers
Cookies
Electronic
profile
Spyware
18
A program that collects user
information without the user’s
knowledge
Can enter computers, sneaking in
like a virus
Is a result of installing new programs
Communicates information it collects
to some outside source while we are
online
Spyware
19
the combining of data in a database
that can be sold to the Internet by the
company to the interested parties
this database is in a form such as
magazine subscription or product
warranty cards that had been filled
by online subscribers
includes personal details such as your
age, address and marital status
Electronic Profile
20
ways to protect privacy
1. Privacy law
– Security Services to review the security
policy
– Security Management to protect the
resources
– Security Mechanism to implement the
required security services
– Security Objects, the important entities
within the system environment
21
2. Utilities software
–anti-spam program,
firewall, anti-spyware
and antivirus
22
3. Authentications
A process where users verify
that they are who they say
they are
Example ATM machine
Methods of authentications:-
a) Biometric devices
b) Callback system
Important  to safeguard
against the unauthorized
access and use
23
a) Biometric devices
 a device that
translates personal
characteristics into
a digital code that is
compared with a
digital code stored
in the database
24
BIOMETRIC DEVICES
25
b) Callback system
The checking system that
authenticates the user
Commonly used in the bank
operation and business
transaction
26
Callback system
 For example, when you book
for the taxi service, the
operator will ask you to hang
up and she will call you back
to confirm for the service
required
27
4. Verification
Act of proving or disproving
the correctness of a system
with respect to a certain
formal specification
Methods of verification:-
a) User identification
b) Processed object
28
User identification
 The process of
validating the user
 E.g.; Key in the
user name to log-in
to a system, show
exam slip to verify
that you are the
valid candidate for
the exam
Processed identification
 Something the user has
(identification card,
security token, key,
badge and cell phone)
E.g.; The policeman will
check on the driver’s
license to identify the
valid driver, buy
blouses at the mall
using a credit card
29
5. Controversial content
Information that causes
disagreement in opinions and
may cause the disruption of
peace because different people
or culture will have different
views about the contents
Pornography, Slander
30
 Can lead to criminal acts
such as exploitation of
women and children
 Can lead to sexual
addiction or perversion
 Can develop low moral
value towards other
men, women or children
 Can erode good
religious, cultural and
social beliefs and
behaviors
 Can develop into a
society that disregards
honesty and truth
 Can develop bad habit
of spreading untruths
and rumors
 Can lead to unnecessary
argument
 Can cause people to
have negative attitudes
towards another person.
Pornography Slander
31
32
33

Más contenido relacionado

La actualidad más candente

ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsMichael Heron
 
computer ethics
computer ethicscomputer ethics
computer ethicsHoney jose
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing professionshahmansoor109
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 

La actualidad más candente (20)

ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 

Similar a Ethics in using computer

chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptxMuruganS82
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018Fizaril Amzari Omar
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptYäsh Chaudhary
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.pptpixvilx
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldExpeed Software
 

Similar a Ethics in using computer (20)

chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Ethical privacy and security issues
Ethical privacy and security issuesEthical privacy and security issues
Ethical privacy and security issues
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
Newethics
NewethicsNewethics
Newethics
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital World
 

Más de nurulafifa_matsaleh (8)

Aktiviti kelab komputer
Aktiviti kelab komputerAktiviti kelab komputer
Aktiviti kelab komputer
 
Programming exercise
Programming exerciseProgramming exercise
Programming exercise
 
Overview of comp system
Overview of comp systemOverview of comp system
Overview of comp system
 
RP ICT F5 2013
RP ICT F5 2013RP ICT F5 2013
RP ICT F5 2013
 
RP ICT F4 2013
RP ICT F4 2013RP ICT F4 2013
RP ICT F4 2013
 
huraian sukatan pelajaran ict
huraian sukatan pelajaran icthuraian sukatan pelajaran ict
huraian sukatan pelajaran ict
 
Intro to ict
Intro to ictIntro to ict
Intro to ict
 
sukatan pelajaran ict
sukatan pelajaran ictsukatan pelajaran ict
sukatan pelajaran ict
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Ethics in using computer

  • 2. 2 What is computer ethics? Computer ethics a system of moral standards or value uses as a guideline for computer user Analysis of the nature and social impact of computer technology
  • 3. 3 THE TEN COMMANDMENTS OF COMPUTER ETHICS  You shall not use a computer to harm other people.  You shall not interfere with other people's computer work.  You shall not snoop around in other people's computer files.  You shall not use a computer to steal.  You shall not use a computer to bear false witness.  You shall not copy or use proprietary software for which you have not paid.  You shall not use other people's computer resources without authorisation or proper compensation.  You shall not appropriate other people's intellectual output.  You shall think about the social consequences of the program you are writing or the system you are designing.  You shall always use a computer in ways that ensure consideration and respect for your fellow humans The United States Institute of Computer Ethics
  • 4. 4 GUIDELINES ON THE E-MAIL AND INTERNET USAGE IN MALAYSIA  use only individual e-mail address to forward individual opinion  keep the identity name and password a secret to avoid the misuse of your e-mail without your knowledge  e-mail must be active to promptly reply the necessary actions needed for any matters  ensure the total mail kept in the box is within the computer storage capacity  scan files regularly to avoid the transmission of virus from one computer to another  do not send e-mails that contain classified information which can be used to tarnish other people or country  choose a suitable time to search the Internet to save access time and cost  beware of prohibited sites which could affect one's moral, organisation or nation  print only relevant documents that you think can be used in future to save cost
  • 5. 5 Examples of unethical computer code of conducts include  modifying certain information on the Internet, affecting the accuracy of the information  selling information to other parties without the owner’s permission  using information without authorization  involvement in stealing software  invasion of privacy
  • 6. 6 Examples of ethical computer code of conducts include: sending warning about viruses to other computer users asking permission before sending any business advertisements to others using information with authorization
  • 7. 7 Why do we need ethics and law in computing?  Respecting Ownership  not stealing other people’s work  Respecting Privacy  reading others’ mails or files without permission  Respecting Property  act of tampering and changing electronic information is considered as vandalism and disrespect for other people’s property
  • 8. 8 The Differences between Ethics and Law Ethics Free to Follow No Punishment Universals Produce ethical computer user Immoral Law Must follow Penalties, Punishment Depends on Country Prevent misusing of Computer Crime
  • 9. 9 COMPUTER ETHICS Intellectual Properties (IP) Privacy Authentications Verification Controversial contents
  • 10. 10 INTELLECTUAL PROPERTY (IP) These works are unique and have value in the market placeWork created by inventors, authors and artist school begs, shoes and even your socks are protected by IP
  • 11. 11 1) INTELECTUAL PROPERTY PROTECTION DesignPatent Trademarks Copyright TYPESTo safeguard intellectual property rights
  • 12. 16 2) PRIVACY Data and information privacy The rights of individuals and companies to deny or restrict the collection and use of information about them Anonymity, confidentiality
  • 13. 17 Ways Computer Technology Threaten Our Privacy Cookies - used to identify users by web casting, e-commerce and other - contain user information and are saved in the computer hard disk - used by some websites to store passwords and track how regularly we visit a websites, that’s how we become potential targets for web advertisers Cookies Electronic profile Spyware
  • 14. 18 A program that collects user information without the user’s knowledge Can enter computers, sneaking in like a virus Is a result of installing new programs Communicates information it collects to some outside source while we are online Spyware
  • 15. 19 the combining of data in a database that can be sold to the Internet by the company to the interested parties this database is in a form such as magazine subscription or product warranty cards that had been filled by online subscribers includes personal details such as your age, address and marital status Electronic Profile
  • 16. 20 ways to protect privacy 1. Privacy law – Security Services to review the security policy – Security Management to protect the resources – Security Mechanism to implement the required security services – Security Objects, the important entities within the system environment
  • 17. 21 2. Utilities software –anti-spam program, firewall, anti-spyware and antivirus
  • 18. 22 3. Authentications A process where users verify that they are who they say they are Example ATM machine Methods of authentications:- a) Biometric devices b) Callback system Important  to safeguard against the unauthorized access and use
  • 19. 23 a) Biometric devices  a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database
  • 21. 25 b) Callback system The checking system that authenticates the user Commonly used in the bank operation and business transaction
  • 22. 26 Callback system  For example, when you book for the taxi service, the operator will ask you to hang up and she will call you back to confirm for the service required
  • 23. 27 4. Verification Act of proving or disproving the correctness of a system with respect to a certain formal specification Methods of verification:- a) User identification b) Processed object
  • 24. 28 User identification  The process of validating the user  E.g.; Key in the user name to log-in to a system, show exam slip to verify that you are the valid candidate for the exam Processed identification  Something the user has (identification card, security token, key, badge and cell phone) E.g.; The policeman will check on the driver’s license to identify the valid driver, buy blouses at the mall using a credit card
  • 25. 29 5. Controversial content Information that causes disagreement in opinions and may cause the disruption of peace because different people or culture will have different views about the contents Pornography, Slander
  • 26. 30  Can lead to criminal acts such as exploitation of women and children  Can lead to sexual addiction or perversion  Can develop low moral value towards other men, women or children  Can erode good religious, cultural and social beliefs and behaviors  Can develop into a society that disregards honesty and truth  Can develop bad habit of spreading untruths and rumors  Can lead to unnecessary argument  Can cause people to have negative attitudes towards another person. Pornography Slander
  • 27. 31
  • 28. 32
  • 29. 33