SlideShare une entreprise Scribd logo
1  sur  40
THE LSPU MISSION AND VISION
MISSION “The University shall serve a center of excellence in agriculture, fisheries, forestry, science, engineering and industrial technology, teacher education, information technology and other related fields in arts and sciences. It also serves as research and extension services centers in its fields of expertise.”
VISION “A premier university in CALABARZON, offering academic programs and related services designed to respond to the requirements of the Philippines and the global economy particularly Asian countries”
COMPUTER            ETHICS
What is a Computer Ethics: …………..Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct..
Introduction:	             A computer system consists not only of software , hardware, data/information and procedures, but also people (the users of computer system). Because computers systems are the products of human efforts, we cannot trust them anymore than we trust people. People can use computer systems for both good and bad purposes, and they may appreciate them or be suspicious of them when they use them.
…..…….But regardless of how they use them or how they feel about them, most people realize that computers have changed the way we live.
What are the consequences of the widespread presence of the computer technology??
.…..The threats to computers and communication systems…….
Introduction:              Information technology can be disabled by a number of occurrences. It may be harmed by people, procedural, and software errors; by electromechanical problems; and by “dirty data”. It may be threatened by natural hazards and by civil strife and terrorism. Criminal acts perpetrated against computers include theft of hardware, software, time and services, and information; and crimes of malice and destruction…
….Computers may be harmed by viruses. Computers can also be used as instruments of crime. Criminals may be employees, outside users, hackers, crackers, and professional criminals…
Is computer technology creating more problems than its solving??
The threats to computers and communications systems… Errors and Accidents Natural and Other Hazards Crimes Against Information Technology Crimes Using Information Technology Virus
Errors and Accidents
…….In general, errors and accidents in computer systems may be classified as People Errors, Procedural Errors, Software Errors, Electromechanical Problems, and “Dirty Data” problems….
People Errors            Recall that one part of computer system is the people who manage it or run it…
Procedural Errors           Some spectacular computer failures have occurred because someone didn’t follow procedures..
Software Errors  		We are forever hearing about “Software Glitches” or software bugs. A Software Bug is an error in a program that causes it to malfunction..
Electromechanical Problems 		 Absence of Electricity or power failure causing the system not to work ..
Dirty Data 		Is Data that is incomplete, outdated or otherwise inaccurate that causes errors in the computer  system..
Natural and Other Hazards
Natural Hazards 		  What ever is harmful to property and to people, is harmful to computers and communication system. This certainly includes natural disasters… 	………Natural Hazards can disable all the electronic systems we take for granted…
Civil Strife and Terrorism
Crimes Against Computers and Communications
Information-technology Crime can be of two types: Illegal act perpetrated against computers or telecommunications.. Use of computers or telecommunications to accomplish an illegal act..
Crimes against information technology include theft…. Theft of Hardware Theft of Software Theft of Time and Services Theft of Information Theft of Malice and Destruction
Crimes Using Computers and   Communications…… 		Computers and communications or information technology has also been used to solve crimes…. 	……..Just as a car can be used to assist  	in a crime, so can a computer or communication system..
VIRUSES
Viruses 		Viruses are a form of high-tech maliciousness. Computer Viruses are “Deviant” programs that can cause destruction to computers that contract them…
They are passed in two ways……. Via an Infected Diskette Via a Network
Some common forms of Viruses… Boot-sector Virus File Virus Worm Logic Bomb Trojan Horse Polymorphic Virus Virus Mutation Engines
Antivirus Software Scans a computer’s hard disk, diskettes, and main memory to detect viruses, and sometimes, to destroythem…..
Computer Criminals
What kind of people are perpetrating most of the Information Technology??? Employees Outside Users Hackers Crackers Professional Criminals
COMPUTER ETHICS

Contenu connexe

Tendances

Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethicsbadak sumbu
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018Fizaril Amzari Omar
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resourcesb5thom
 

Tendances (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
7 computer ethics
7 computer ethics7 computer ethics
7 computer ethics
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
 

Similaire à COMPUTER ETHICS

A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...theijes
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyAMOSOGAGAH
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The HealthcareTracy Berry
 
Speech on Computers a boon or a bane.pdf
Speech on Computers a boon or a bane.pdfSpeech on Computers a boon or a bane.pdf
Speech on Computers a boon or a bane.pdfHome
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Anna Gomez
 
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...Audrey Britton
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3Suad 00
 
Computers a boon or a bane.pdf
Computers a boon or a bane.pdfComputers a boon or a bane.pdf
Computers a boon or a bane.pdfHome
 
Information Technology
Information TechnologyInformation Technology
Information TechnologyUlduz Sadiq
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...ijaia
 

Similaire à COMPUTER ETHICS (20)

Computers
ComputersComputers
Computers
 
Computer
ComputerComputer
Computer
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
 
Speech on Computers a boon or a bane.pdf
Speech on Computers a boon or a bane.pdfSpeech on Computers a boon or a bane.pdf
Speech on Computers a boon or a bane.pdf
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
 
Essay About Computers
Essay About ComputersEssay About Computers
Essay About Computers
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
 
Computers a boon or a bane.pdf
Computers a boon or a bane.pdfComputers a boon or a bane.pdf
Computers a boon or a bane.pdf
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17
Beekman5 std ppt_17
 

Dernier

Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Dernier (20)

YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

COMPUTER ETHICS

  • 1.
  • 2. THE LSPU MISSION AND VISION
  • 3. MISSION “The University shall serve a center of excellence in agriculture, fisheries, forestry, science, engineering and industrial technology, teacher education, information technology and other related fields in arts and sciences. It also serves as research and extension services centers in its fields of expertise.”
  • 4. VISION “A premier university in CALABARZON, offering academic programs and related services designed to respond to the requirements of the Philippines and the global economy particularly Asian countries”
  • 5.
  • 6. COMPUTER ETHICS
  • 7. What is a Computer Ethics: …………..Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct..
  • 8. Introduction: A computer system consists not only of software , hardware, data/information and procedures, but also people (the users of computer system). Because computers systems are the products of human efforts, we cannot trust them anymore than we trust people. People can use computer systems for both good and bad purposes, and they may appreciate them or be suspicious of them when they use them.
  • 9. …..…….But regardless of how they use them or how they feel about them, most people realize that computers have changed the way we live.
  • 10.
  • 11. What are the consequences of the widespread presence of the computer technology??
  • 12. .…..The threats to computers and communication systems…….
  • 13. Introduction: Information technology can be disabled by a number of occurrences. It may be harmed by people, procedural, and software errors; by electromechanical problems; and by “dirty data”. It may be threatened by natural hazards and by civil strife and terrorism. Criminal acts perpetrated against computers include theft of hardware, software, time and services, and information; and crimes of malice and destruction…
  • 14. ….Computers may be harmed by viruses. Computers can also be used as instruments of crime. Criminals may be employees, outside users, hackers, crackers, and professional criminals…
  • 15.
  • 16. Is computer technology creating more problems than its solving??
  • 17. The threats to computers and communications systems… Errors and Accidents Natural and Other Hazards Crimes Against Information Technology Crimes Using Information Technology Virus
  • 19. …….In general, errors and accidents in computer systems may be classified as People Errors, Procedural Errors, Software Errors, Electromechanical Problems, and “Dirty Data” problems….
  • 20. People Errors Recall that one part of computer system is the people who manage it or run it…
  • 21. Procedural Errors Some spectacular computer failures have occurred because someone didn’t follow procedures..
  • 22. Software Errors We are forever hearing about “Software Glitches” or software bugs. A Software Bug is an error in a program that causes it to malfunction..
  • 23. Electromechanical Problems Absence of Electricity or power failure causing the system not to work ..
  • 24. Dirty Data Is Data that is incomplete, outdated or otherwise inaccurate that causes errors in the computer system..
  • 25. Natural and Other Hazards
  • 26. Natural Hazards What ever is harmful to property and to people, is harmful to computers and communication system. This certainly includes natural disasters… ………Natural Hazards can disable all the electronic systems we take for granted…
  • 27. Civil Strife and Terrorism
  • 28. Crimes Against Computers and Communications
  • 29. Information-technology Crime can be of two types: Illegal act perpetrated against computers or telecommunications.. Use of computers or telecommunications to accomplish an illegal act..
  • 30. Crimes against information technology include theft…. Theft of Hardware Theft of Software Theft of Time and Services Theft of Information Theft of Malice and Destruction
  • 31. Crimes Using Computers and Communications…… Computers and communications or information technology has also been used to solve crimes…. ……..Just as a car can be used to assist in a crime, so can a computer or communication system..
  • 33. Viruses Viruses are a form of high-tech maliciousness. Computer Viruses are “Deviant” programs that can cause destruction to computers that contract them…
  • 34. They are passed in two ways……. Via an Infected Diskette Via a Network
  • 35. Some common forms of Viruses… Boot-sector Virus File Virus Worm Logic Bomb Trojan Horse Polymorphic Virus Virus Mutation Engines
  • 36.
  • 37. Antivirus Software Scans a computer’s hard disk, diskettes, and main memory to detect viruses, and sometimes, to destroythem…..
  • 39. What kind of people are perpetrating most of the Information Technology??? Employees Outside Users Hackers Crackers Professional Criminals