SlideShare une entreprise Scribd logo
1  sur  7
Görkem PULCU
115400
SOFTWARE ENG.
Information about the
ethics of hacking, file
sharing, the Internet is the
lack of a democratic,
licensing schemes
frequently discussed
issues.
 The computer can not be used to harm other
people.
 Other people's computer work can not be
mixed.
 Other people's files can not be mixed in a
computer environment.
 The computer can not be used to make a
theft.
 The computer can not be used to
disseminate information to lie.
 Add unpaid copied and used software.
 Other people's computer resources can not
be used without permission.
 Other people's intellectual property
information can not be someone else.
 People should take into account the effects
of his program's social life.
 Contact your computer, taking into account
and respect other people use.
 Computer software is protected under
copyright laws in the capacity of intellectual
works. Copy any software to use, subject to
the permission to change the owner of that
software.
 unauthorized downloading of music
 share the film
 software sharing
 unlicensed software use
they made ​​the most of copyright violations.

Contenu connexe

Tendances

International Journal Of Information And Network Security
International Journal Of Information And Network SecurityInternational Journal Of Information And Network Security
International Journal Of Information And Network Security
Shaun Mc Brearty
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital Divide
Deniz Cengiz
 

Tendances (20)

International Journal Of Information And Network Security
International Journal Of Information And Network SecurityInternational Journal Of Information And Network Security
International Journal Of Information And Network Security
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Piracy
PiracyPiracy
Piracy
 
Multimedia digital piracy
Multimedia digital piracyMultimedia digital piracy
Multimedia digital piracy
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
 
9 ethics in it space
9 ethics in it space9 ethics in it space
9 ethics in it space
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Safety And Security Of Data Student Work
Safety And Security Of Data Student WorkSafety And Security Of Data Student Work
Safety And Security Of Data Student Work
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital Divide
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 

En vedette

ممنوع التدخين
ممنوع التدخينممنوع التدخين
ممنوع التدخين
afraa777
 
Copy of p pt. materi ipa.1 enzim-2
Copy of p pt. materi ipa.1 enzim-2Copy of p pt. materi ipa.1 enzim-2
Copy of p pt. materi ipa.1 enzim-2
Aisyah Fitri
 
Trade Finance Basics
Trade Finance BasicsTrade Finance Basics
Trade Finance Basics
maheshpadwal
 

En vedette (14)

Uso de procesos de alcance de consenso para mejorar la recomendación a grupos
Uso de procesos de alcance de consenso para mejorar la recomendación a gruposUso de procesos de alcance de consenso para mejorar la recomendación a grupos
Uso de procesos de alcance de consenso para mejorar la recomendación a grupos
 
Jornada nac educar_en_igualdad_orientaciones
Jornada nac educar_en_igualdad_orientacionesJornada nac educar_en_igualdad_orientaciones
Jornada nac educar_en_igualdad_orientaciones
 
ممنوع التدخين
ممنوع التدخينممنوع التدخين
ممنوع التدخين
 
Computacion
ComputacionComputacion
Computacion
 
Copy of p pt. materi ipa.1 enzim-2
Copy of p pt. materi ipa.1 enzim-2Copy of p pt. materi ipa.1 enzim-2
Copy of p pt. materi ipa.1 enzim-2
 
Professionals - Storms - Response
Professionals - Storms - ResponseProfessionals - Storms - Response
Professionals - Storms - Response
 
Classified2
Classified2Classified2
Classified2
 
Acuerdo dejación de armas y cese al fuego bilateral FARC EP Gobierno Nacional
Acuerdo dejación de armas y cese al fuego bilateral FARC EP Gobierno NacionalAcuerdo dejación de armas y cese al fuego bilateral FARC EP Gobierno Nacional
Acuerdo dejación de armas y cese al fuego bilateral FARC EP Gobierno Nacional
 
Classified1
Classified1Classified1
Classified1
 
Bovie Medical Exhibit 10.12
Bovie Medical Exhibit 10.12Bovie Medical Exhibit 10.12
Bovie Medical Exhibit 10.12
 
Professionals - Storms - Prevention
Professionals - Storms - PreventionProfessionals - Storms - Prevention
Professionals - Storms - Prevention
 
Ayuda hipermedial didáctica inteligencias multiples
Ayuda hipermedial didáctica inteligencias multiplesAyuda hipermedial didáctica inteligencias multiples
Ayuda hipermedial didáctica inteligencias multiples
 
Professionals - Wildfires - Preparedness part 1
Professionals - Wildfires - Preparedness part 1Professionals - Wildfires - Preparedness part 1
Professionals - Wildfires - Preparedness part 1
 
Trade Finance Basics
Trade Finance BasicsTrade Finance Basics
Trade Finance Basics
 

Similaire à Görkem pulcu

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Computer ethics and copyright 282607 hasbi dişlen
Computer ethics and copyright 282607 hasbi dişlenComputer ethics and copyright 282607 hasbi dişlen
Computer ethics and copyright 282607 hasbi dişlen
hasbidislen
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorent
Altacit Global
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
aamatya
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
Amplephi
 

Similaire à Görkem pulcu (20)

TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Computer ethics and copyright 282607 hasbi dişlen
Computer ethics and copyright 282607 hasbi dişlenComputer ethics and copyright 282607 hasbi dişlen
Computer ethics and copyright 282607 hasbi dişlen
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorent
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Chapter5 freesoftware
Chapter5 freesoftwareChapter5 freesoftware
Chapter5 freesoftware
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringement
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Software piracy
Software piracySoftware piracy
Software piracy
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
 
Digital law
Digital lawDigital law
Digital law
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Görkem pulcu

  • 2. Information about the ethics of hacking, file sharing, the Internet is the lack of a democratic, licensing schemes frequently discussed issues.
  • 3.
  • 4.  The computer can not be used to harm other people.  Other people's computer work can not be mixed.  Other people's files can not be mixed in a computer environment.  The computer can not be used to make a theft.  The computer can not be used to disseminate information to lie.
  • 5.  Add unpaid copied and used software.  Other people's computer resources can not be used without permission.  Other people's intellectual property information can not be someone else.  People should take into account the effects of his program's social life.  Contact your computer, taking into account and respect other people use.
  • 6.  Computer software is protected under copyright laws in the capacity of intellectual works. Copy any software to use, subject to the permission to change the owner of that software.
  • 7.  unauthorized downloading of music  share the film  software sharing  unlicensed software use they made ​​the most of copyright violations.