SlideShare una empresa de Scribd logo
1 de 31
INTRODUCTION
 Ethics is a set of moral principles that govern (control)
the behavior of a group or individual.
 likewise, computer ethics is set of moral principles
that regulate (control) the use of computers.
Explanation
 Ethic refers to the standards and rules that
"should" be followed and it helps us to regulate our
conduct in a group or with a set of individuals.
Since the term Ethics is a relative term, it is
branched under philosophy, which states how
users of World Wide Web should make decisions
regarding their conduct.
 Computer ethics is a new branch of ethics that is
growing and changing rapidly as computer technology
also grows and develops.
Common issues of computer ethics
Some common issues of computer ethics include
intellectual property rights such as copyrighted
electronic content, privacy concerns, and how
computers affect society.
Contd….
For example, while it is easy to duplicate copyrighted
electronic or digital content, computer ethics would
suggest that it is wrong to do so without the author's
approval.
And while it may be possible to access someone's
personal information on a computer system, computer
ethics would advise that such an action is unethical.
The Ten Commandments On Computer Ethics
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you
have not paid.
7. Thou shalt not use other people's computer resources without
authorization or proper compensation.
8. Thou shalt not appropriate other people's intellectual(idea of
others) output.
9. Thou shalt think about the social consequences of the program
you are writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure
consideration (attention) and respect for your fellow humans.
Explanation
 Computers are often far more efficient than humans in
performing many tasks. In the industrialized world many
workers already have been replaced by computerized
devices -- bank tellers, auto workers, telephone
operators, typists, graphic artists, security guards,
assembly-line workers, and on and on. Even
professionals like medical doctors, lawyers, teachers,
accountants and psychologists are finding that computers
can perform many of their traditional professional duties
quite effectively.
Why do we need computer ethics?
 The growth of the WWW has created several novel
legal issues
 The existence of new questions that older laws
cannot answer
 Traditional laws are outdated/anachronistic in this
world
 a more coherent (clear) body of law is needed to
govern Internet and computers
Cyber ethics
 the most common problem isn't hacking (illegally
accessing Web sites) or cracking (vandalizing Web sites);
It's the unauthorized downloading of games and software.
 the average hacker is likely to be a teenager and given that
most homes now have at least one computer
Code of Ethics
 Information stored on the computer should be treated as
seriously as written or spoken word.
 Privacy should not be violated. In case of academic use, it
is known. plagiarism
 Information from public viewing should not be modified
or deleted or inaccessible since these are considered as
destructive acts.
 Intrusive (unpleasant) software such as "worms" and
"viruses" which are destructive to the computer system is
also illegal.
 Congesting (blocking) somebody’s system with a lot of
unwanted information is also unethical.
 Sending obscene and crude (indecent) messages through
mail or chat is also forbidden.
 Sending sexually explicit (clear) content, message or
pictures is also forbidden.
INTELLECTUAL
You have certainly heard the word property before: it is
generally used to mean a possession, or more specifically,
something to which the owner has legal rights.
You might have also encountered the phrase intellectual
property. This term has become more commonplace
during the past few years, especially in the context of
computer ethics. But what exactly does it refer to?
Contd…
Intellectual property refers to creations of the intellect
(hence, the name): inventions, literary and artistic works,
symbols, names, images, and designs used in commerce
are a part of it.
Intellectual property is usually divided into two branches,
namely industrial property which broadly speaking
protects inventions and copyright, which protects literary
and artistic works.
Categorizing Intellectual Property
 Intellectual property is divided into two categories:
 Industrial property, which includes inventions (patents),
trademarks, industrial designs, commercial names,
designations and geographic indications (location
specific brands) etc.
 Copyright, which includes literary and artistic works such
as novels, poems and plays, films, musical works, artistic
works such as drawings, paintings, photographs,
sculptures, and architectural designs.
Copy rights
Copyright is a legal concept, enacted by most
governments, giving the creator of an original
work exclusive rights to it, usually for a limited time.
History of copy right
Copyright came about with the invention of the printing
press and with wider public literacy. As a legal concept,
its origins in Britain were from a reaction to printers'
monopolies at the beginning of the
18th century. Charles II of England was concerned by
the unregulated copying of books and passed
the Licensing of the Press Act 1662 by Act of
Parliament.
WHAT IT CAN PROTECT AND WHAT
NOT
In summary, copyright laws protect intellectual property
which includes literary and artistic works such as novels,
poems and plays, films, musical works, artistic works such
as drawings, paintings, photographs and sculptures, and
architectural designs.
But unlike protection of inventions, copyright law protects
only the form of expressions of ideas, not the ideas
themselves.
Remember that a created work is considered protected as
soon as it exists, and a public register of copyright
protected work is not necessary.
COPY RIGHT ON INTERNET
 But what of works made available to the public on the
Internet? Are they at all protected by copyright? Once
again, yes! For works made available over a
communications network (such as the Internet), the
copyright protects original authorship.
 But, according to the Copyright Law, it does not protect
ideas, procedures, systems, or methods of operation. This
means that once such an online work has been made
public, nothing in the copyright laws prevents others from
developing another work based on similar principles, or
ideas.
NETIQUTTES
Netiquette are about the various risks related to using
the Internet.
It is about proper ways in which to use a network and to
determine whether information is reliable, while
emphasizing four important points given in next slides.
REAL PEPOLE EXIST BEHIND THE
COMPUTERS
You are dealing with people, not machines. So think twice
before you click on Send button in the mail/chat window
You are not the only one using the network
Keep these other people in mind when you say something on
a network.
Ethical rules for computer users
 Do not use computer to harm other users.
 Do not use computers to steal other's information.
 Do not access files without the permission of owner.
 Do not copy copyrighted software's without the authors
permission.
 Always respect copyright laws and policies.
 Respect the privacy of others, just as you expect the same from
others.
 Do not use other user's computer resources with out their
permission.
 Use Internet ethically.
 Complain about illegal communication and activities, if found, to
Internet service Providers and local law enforcement authorities.
 Users are responsible for safeguarding their User Id and passwords.
They should not write them on paper or anywhere else for
remembrance.
 Users should not intentionally use the computers to retrieve or
modify the information of others which may include password
information, files etc.
PROTECT YOUR PRIVACY
 Just as you would in the real world, be aware of risks, fraud
and false information which exists on the Internet. Use
common sense when deciding whether information is
valid. Don't trust or spread further any information about
which you are in doubt. Always try to obtain reliable
information.
 Protect your personal information to keep someone from
using it in an unethical way. (For example, when you enter
a prize contest, your name, address, and phone number
may be given to a dealer of personal information.)
AVOID SPAMMING
 Spamming is sending unsolicited bulk and/or
commercial messages over the Internet.
 Spamming is morally bad if it is intended to destroy and
done by infringing on the right of privacy of others.
 It could be good if the message sent benefits the
recipients, like giving out warnings or useful information
to others.
HELP MAKING NETWORK BETTER
The existence of the information society is based on give
and take. Making a contribution is an essential part of
being a good network user. For example, if you make a
request and find the information you receive helpful, write
a summary and report what you learned , publish it on
the Net or give links to others.
SOFTWARE PRIVACY
 Software piracy is morally bad when someone reproduces
a copy of the software and sells it for profit, produces
exactly the same or similar version without giving proper
credit to the original author, or simply produces it and
distributes it to others.
 It is not immoral to copy the software if someone who has
a licensed copy of the software and simply makes a
backup copy of the original. One back-up copy of the
commercial software can be made, but the back-up copy
cannot be used except when the original package fails or
is destroyed.
CREATION OF WORMS AND
COMPUTER VIRUS
 Creation of worms and computer viruses is morally bad
when it is intended for malicious purposes like to steal
information or destroying of data.
 However, it could be used like a vaccine – poison to kill
another poison – to cure or prevent a potentially
destructive system from wreaking havoc in the network.
The way some worms and viruses work could be used to
gather information that could help protect the majority of
computer users.
PLAGIARISM
 Plagiarism is copying someone else's work and then
passing it off as one's own. It is morally bad because it is
an act of stealing.
 Copying programs written by other programmers and
claiming it as your own could be an act of plagiarism. It
involves lying, cheating, theft, and dishonesty.
FILE PRIVACY
Any computer document produced either by an individual in
his private home or in his office should remain private. No
one has should open any document unless authorized by the
individual who created the file himself.
Computer ethical hacking
An ethical hacker is usually employed by an organization
who trusts him or her to attempt to penetrate
networks and/or computer systems, using the same
methods as a hacker, for the purpose of finding and
fixing computer security vulnerabilities. Unauthorized
hacking (i.e., gaining access to computer systems
without prior authorization from the owner) is a crime
in most countries, but penetration testing done by
request of the owner of the victim system or network is
not.
Contd..
A Certified Ethical Hacker has obtained a certification in
how to look for the weaknesses and vulnerabilities in
target systems and uses the same knowledge and tools
as a hacker.
CONCLUSION
As technology advances, computers continue to have a
greater impact on society. Therefore, computer ethics
promotes the discussion of how much influence
computers should have in areas such as artificial
intelligence and human communication. As the world
of computers evolves, computer ethics continues to
create ethical standards that address new issues raised
by new technologies.
THANK YOU!

Más contenido relacionado

La actualidad más candente

Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsScøtt Lıgøckı
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyrightAdyns
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsPrabesh Shrestha
 

La actualidad más candente (20)

Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 

Destacado

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Ethics, Part 1
Ethics, Part 1Ethics, Part 1
Ethics, Part 1ARH_Miller
 
06 professional ethics & code of ethics
06 professional ethics & code of ethics06 professional ethics & code of ethics
06 professional ethics & code of ethicsNimantha Perera
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
Software Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEESoftware Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEESamsuddoha Sams
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringLemi Orhan Ergin
 

Destacado (12)

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Ethics, Part 1
Ethics, Part 1Ethics, Part 1
Ethics, Part 1
 
06 professional ethics & code of ethics
06 professional ethics & code of ethics06 professional ethics & code of ethics
06 professional ethics & code of ethics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ethics, Part 2
Ethics, Part 2Ethics, Part 2
Ethics, Part 2
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Software Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEESoftware Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEE
 
Unit 4 Utilitarian Ethics
Unit 4   Utilitarian EthicsUnit 4   Utilitarian Ethics
Unit 4 Utilitarian Ethics
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software Engineering
 

Similar a computer ethics slides

Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Lesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxLesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxCherryLim21
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computingMichael Jarata
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Computer ethics and copyright 282607 hasbi dişlen
Computer ethics and copyright 282607 hasbi dişlenComputer ethics and copyright 282607 hasbi dişlen
Computer ethics and copyright 282607 hasbi dişlenhasbidislen
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
INTRODUCTION TO INTERNET(UNIT 5).pptx
INTRODUCTION TO INTERNET(UNIT 5).pptxINTRODUCTION TO INTERNET(UNIT 5).pptx
INTRODUCTION TO INTERNET(UNIT 5).pptxSURBHI SAROHA
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 

Similar a computer ethics slides (19)

Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Lesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxLesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptx
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Assignment 2
Assignment 2Assignment 2
Assignment 2
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computing
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Social media
Social mediaSocial media
Social media
 
Ethics By ZAK
Ethics By ZAKEthics By ZAK
Ethics By ZAK
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics and copyright 282607 hasbi dişlen
Computer ethics and copyright 282607 hasbi dişlenComputer ethics and copyright 282607 hasbi dişlen
Computer ethics and copyright 282607 hasbi dişlen
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
INTRODUCTION TO INTERNET(UNIT 5).pptx
INTRODUCTION TO INTERNET(UNIT 5).pptxINTRODUCTION TO INTERNET(UNIT 5).pptx
INTRODUCTION TO INTERNET(UNIT 5).pptx
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
MIL WEEK 8.pptx
MIL WEEK 8.pptxMIL WEEK 8.pptx
MIL WEEK 8.pptx
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 

Último

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 

Último (20)

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 

computer ethics slides

  • 1.
  • 2. INTRODUCTION  Ethics is a set of moral principles that govern (control) the behavior of a group or individual.  likewise, computer ethics is set of moral principles that regulate (control) the use of computers.
  • 3. Explanation  Ethic refers to the standards and rules that "should" be followed and it helps us to regulate our conduct in a group or with a set of individuals. Since the term Ethics is a relative term, it is branched under philosophy, which states how users of World Wide Web should make decisions regarding their conduct.  Computer ethics is a new branch of ethics that is growing and changing rapidly as computer technology also grows and develops.
  • 4. Common issues of computer ethics Some common issues of computer ethics include intellectual property rights such as copyrighted electronic content, privacy concerns, and how computers affect society.
  • 5. Contd…. For example, while it is easy to duplicate copyrighted electronic or digital content, computer ethics would suggest that it is wrong to do so without the author's approval. And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical.
  • 6. The Ten Commandments On Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual(idea of others) output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration (attention) and respect for your fellow humans.
  • 7. Explanation  Computers are often far more efficient than humans in performing many tasks. In the industrialized world many workers already have been replaced by computerized devices -- bank tellers, auto workers, telephone operators, typists, graphic artists, security guards, assembly-line workers, and on and on. Even professionals like medical doctors, lawyers, teachers, accountants and psychologists are finding that computers can perform many of their traditional professional duties quite effectively.
  • 8. Why do we need computer ethics?  The growth of the WWW has created several novel legal issues  The existence of new questions that older laws cannot answer  Traditional laws are outdated/anachronistic in this world  a more coherent (clear) body of law is needed to govern Internet and computers
  • 9. Cyber ethics  the most common problem isn't hacking (illegally accessing Web sites) or cracking (vandalizing Web sites); It's the unauthorized downloading of games and software.  the average hacker is likely to be a teenager and given that most homes now have at least one computer
  • 10. Code of Ethics  Information stored on the computer should be treated as seriously as written or spoken word.  Privacy should not be violated. In case of academic use, it is known. plagiarism  Information from public viewing should not be modified or deleted or inaccessible since these are considered as destructive acts.  Intrusive (unpleasant) software such as "worms" and "viruses" which are destructive to the computer system is also illegal.  Congesting (blocking) somebody’s system with a lot of unwanted information is also unethical.  Sending obscene and crude (indecent) messages through mail or chat is also forbidden.  Sending sexually explicit (clear) content, message or pictures is also forbidden.
  • 11. INTELLECTUAL You have certainly heard the word property before: it is generally used to mean a possession, or more specifically, something to which the owner has legal rights. You might have also encountered the phrase intellectual property. This term has become more commonplace during the past few years, especially in the context of computer ethics. But what exactly does it refer to?
  • 12. Contd… Intellectual property refers to creations of the intellect (hence, the name): inventions, literary and artistic works, symbols, names, images, and designs used in commerce are a part of it. Intellectual property is usually divided into two branches, namely industrial property which broadly speaking protects inventions and copyright, which protects literary and artistic works.
  • 13. Categorizing Intellectual Property  Intellectual property is divided into two categories:  Industrial property, which includes inventions (patents), trademarks, industrial designs, commercial names, designations and geographic indications (location specific brands) etc.  Copyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs, sculptures, and architectural designs.
  • 14. Copy rights Copyright is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time.
  • 15. History of copy right Copyright came about with the invention of the printing press and with wider public literacy. As a legal concept, its origins in Britain were from a reaction to printers' monopolies at the beginning of the 18th century. Charles II of England was concerned by the unregulated copying of books and passed the Licensing of the Press Act 1662 by Act of Parliament.
  • 16. WHAT IT CAN PROTECT AND WHAT NOT In summary, copyright laws protect intellectual property which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs and sculptures, and architectural designs. But unlike protection of inventions, copyright law protects only the form of expressions of ideas, not the ideas themselves. Remember that a created work is considered protected as soon as it exists, and a public register of copyright protected work is not necessary.
  • 17. COPY RIGHT ON INTERNET  But what of works made available to the public on the Internet? Are they at all protected by copyright? Once again, yes! For works made available over a communications network (such as the Internet), the copyright protects original authorship.  But, according to the Copyright Law, it does not protect ideas, procedures, systems, or methods of operation. This means that once such an online work has been made public, nothing in the copyright laws prevents others from developing another work based on similar principles, or ideas.
  • 18. NETIQUTTES Netiquette are about the various risks related to using the Internet. It is about proper ways in which to use a network and to determine whether information is reliable, while emphasizing four important points given in next slides.
  • 19. REAL PEPOLE EXIST BEHIND THE COMPUTERS You are dealing with people, not machines. So think twice before you click on Send button in the mail/chat window You are not the only one using the network Keep these other people in mind when you say something on a network.
  • 20. Ethical rules for computer users  Do not use computer to harm other users.  Do not use computers to steal other's information.  Do not access files without the permission of owner.  Do not copy copyrighted software's without the authors permission.  Always respect copyright laws and policies.  Respect the privacy of others, just as you expect the same from others.  Do not use other user's computer resources with out their permission.  Use Internet ethically.  Complain about illegal communication and activities, if found, to Internet service Providers and local law enforcement authorities.  Users are responsible for safeguarding their User Id and passwords. They should not write them on paper or anywhere else for remembrance.  Users should not intentionally use the computers to retrieve or modify the information of others which may include password information, files etc.
  • 21. PROTECT YOUR PRIVACY  Just as you would in the real world, be aware of risks, fraud and false information which exists on the Internet. Use common sense when deciding whether information is valid. Don't trust or spread further any information about which you are in doubt. Always try to obtain reliable information.  Protect your personal information to keep someone from using it in an unethical way. (For example, when you enter a prize contest, your name, address, and phone number may be given to a dealer of personal information.)
  • 22. AVOID SPAMMING  Spamming is sending unsolicited bulk and/or commercial messages over the Internet.  Spamming is morally bad if it is intended to destroy and done by infringing on the right of privacy of others.  It could be good if the message sent benefits the recipients, like giving out warnings or useful information to others.
  • 23. HELP MAKING NETWORK BETTER The existence of the information society is based on give and take. Making a contribution is an essential part of being a good network user. For example, if you make a request and find the information you receive helpful, write a summary and report what you learned , publish it on the Net or give links to others.
  • 24. SOFTWARE PRIVACY  Software piracy is morally bad when someone reproduces a copy of the software and sells it for profit, produces exactly the same or similar version without giving proper credit to the original author, or simply produces it and distributes it to others.  It is not immoral to copy the software if someone who has a licensed copy of the software and simply makes a backup copy of the original. One back-up copy of the commercial software can be made, but the back-up copy cannot be used except when the original package fails or is destroyed.
  • 25. CREATION OF WORMS AND COMPUTER VIRUS  Creation of worms and computer viruses is morally bad when it is intended for malicious purposes like to steal information or destroying of data.  However, it could be used like a vaccine – poison to kill another poison – to cure or prevent a potentially destructive system from wreaking havoc in the network. The way some worms and viruses work could be used to gather information that could help protect the majority of computer users.
  • 26. PLAGIARISM  Plagiarism is copying someone else's work and then passing it off as one's own. It is morally bad because it is an act of stealing.  Copying programs written by other programmers and claiming it as your own could be an act of plagiarism. It involves lying, cheating, theft, and dishonesty.
  • 27. FILE PRIVACY Any computer document produced either by an individual in his private home or in his office should remain private. No one has should open any document unless authorized by the individual who created the file himself.
  • 28. Computer ethical hacking An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e., gaining access to computer systems without prior authorization from the owner) is a crime in most countries, but penetration testing done by request of the owner of the victim system or network is not.
  • 29. Contd.. A Certified Ethical Hacker has obtained a certification in how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a hacker.
  • 30. CONCLUSION As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies.