SlideShare une entreprise Scribd logo
1  sur  19
3.0COMPUTER ETHICS Understand the standards of conduct in computing code of ethics.
Define Ethics Ethic refers to the standards and rules that "should" be followed and it helps us to regulate our conduct in a group or with a set of individuals.  As computer and Internet or intranet has come big time in our lives and it is an interactive medium where we can directly or indirectly communicate with people. (buzzle.com)
Codes of Ethic The ACM Code of Ethics The ACM/IEEE Software Engineering Code of Ethics and Professional Practice The IEEE Code of Ethics
Cont.. Information stored on the computer should be treated as seriously as written or spoken word. Privacy should not be violated. In case of academic use, it is known plagiarism. Information fro public viewing should not be modified or deleted or inaccessible since these are considered as destructive acts.
Cont.. Intrusive software such as "worms" and "viruses" which are destructive to the computer system is also illegal. Congesting somebody’s system with a lot of unwanted information is also unethical.
Cont… Sending obscene and crude messages through mail or chat is also forbidden. Sending sexually explicit content, message or pictures is also forbidden.
Discuss the professional ethics, engineering ethics and computer ethics.
Professional Ethics Professional ethics are a code of conduct that govern how members of a profession deal with each other and with third parties. (Dr. David Sinclair)
Why should we have a Professional Code of Ethics? ,[object Object]
Symbolises the professionalism of the group.
Defines and promotes a standard for external relations with clients and employers.
Protects the group’s interests.
Codifies members’ rights.
Expresses ideals to aspire to.,[object Object]
We have pride in our work and want the work that we do to be given recognition and respect.
We want to protect our livelihood.,[object Object]
http://www.acm.org/constitution/code.html
Bitish Computer Society Code of Conduct
http://www1.bcs.org.uk/DocsRepository/03200/3224/default.htm

Contenu connexe

Tendances (20)

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 
7 computer ethics
7 computer ethics7 computer ethics
7 computer ethics
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics
EthicsEthics
Ethics
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Similaire à 3.0 computer ethic

Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptxMohammedAish
 
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSISINVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSISijseajournal
 
Professional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptxProfessional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptxbahmed0192
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Definition of ethics
Definition of ethicsDefinition of ethics
Definition of ethicsVenkat Rao
 
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxEthics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxSANSKAR20
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional EthicsIMAD HASSAN
 
Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppteastitech
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineeringjndatirwa
 

Similaire à 3.0 computer ethic (20)

P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
 
Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
 
Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering  Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering
 
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSISINVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
 
Professional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptxProfessional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptx
 
Ethics in IT
Ethics in ITEthics in IT
Ethics in IT
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 
Definition of ethics
Definition of ethicsDefinition of ethics
Definition of ethics
 
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxEthics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Ethics
EthicsEthics
Ethics
 
Codemaking
CodemakingCodemaking
Codemaking
 
Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppt
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineering
 

Dernier

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Dernier (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

3.0 computer ethic

  • 1. 3.0COMPUTER ETHICS Understand the standards of conduct in computing code of ethics.
  • 2. Define Ethics Ethic refers to the standards and rules that "should" be followed and it helps us to regulate our conduct in a group or with a set of individuals. As computer and Internet or intranet has come big time in our lives and it is an interactive medium where we can directly or indirectly communicate with people. (buzzle.com)
  • 3. Codes of Ethic The ACM Code of Ethics The ACM/IEEE Software Engineering Code of Ethics and Professional Practice The IEEE Code of Ethics
  • 4. Cont.. Information stored on the computer should be treated as seriously as written or spoken word. Privacy should not be violated. In case of academic use, it is known plagiarism. Information fro public viewing should not be modified or deleted or inaccessible since these are considered as destructive acts.
  • 5. Cont.. Intrusive software such as "worms" and "viruses" which are destructive to the computer system is also illegal. Congesting somebody’s system with a lot of unwanted information is also unethical.
  • 6. Cont… Sending obscene and crude messages through mail or chat is also forbidden. Sending sexually explicit content, message or pictures is also forbidden.
  • 7. Discuss the professional ethics, engineering ethics and computer ethics.
  • 8. Professional Ethics Professional ethics are a code of conduct that govern how members of a profession deal with each other and with third parties. (Dr. David Sinclair)
  • 9.
  • 11. Defines and promotes a standard for external relations with clients and employers.
  • 14.
  • 15. We have pride in our work and want the work that we do to be given recognition and respect.
  • 16.
  • 18. Bitish Computer Society Code of Conduct
  • 20. IEEE-CS/ACM Software Engineering Code of Ethics and Professional Practice
  • 21.
  • 22. Vincenti Definition concludes that "(e)ngineering knowledge reflects the fact that design does not take place for its own sake and in isolation". Rather, it occurs as "a social activity directed at a practical set of goals intended to serve human beings in some direct way" (Vincenti 1990).
  • 23. Davis Definition Davis (1998) also alludes to this attribute of engineering when he refers to it as "sociological knowledge, a knowledge of how people and tools work together, but it is nonetheless engineering knowledge."
  • 24. McLean Definition McLean (1993), an engineer, utilizes three categories in discussing engineering ethics: technical ethics, dealing with technical decisions by engineers; professional ethics, dealing with interactions among managers, engineers and employers; and social ethics, dealing with sociopolitical decisions concerning technology. 
  • 25. Computer Ethics Computer Ethics is to determine what we should do in such cases, that is, formulate policies to guide our actions. . . .
  • 26. Albert Einstein It is not enough that you should understand about applied science in order that your work may increase man’s blessings. Concern for man himself and his fate must always form the chief interest of all technical endeavors.
  • 27. Moor’s Definition computer ethics as a field concerned with “policy vacuums” and “conceptual muddles” regarding the social and ethical use of information technology
  • 28. Bynum’s Definition computer ethics identifies and analyzes the impacts of information technology on such social and human values as health, wealth, work, opportunity, freedom, democracy, knowledge, privacy, security, self-fulfillment, etc.