SlideShare une entreprise Scribd logo
1  sur  24
Ethical issues in computing
INTRODUCTION
• Ethics
Set of moral principles
that govern the behaviour
of a group or individual
• Computer Ethics
System of moral
standards or values used
as guidelines for the
computer user
COMPUTER ETHICS vs LAW
 Ethics
• Serves as guidelines
• Free to follow
• Universal
• Results in ethical
computer users
• Not following is
immoral
 Law
• Rules
• Must follow
• Country dependent
• Prevents misuse of
computer
• Not following is a
crime
ETHICAL ISSUES
ETHICAL VALUES
• Do not install or uninstall software without
prior permission
• Do not steal information of any other
computer
• Do not make illegal copies of software
• Protect important documents using
passwords
• Do not browse unwanted websites or
emails
INTELLECTUAL PROPERTY RIGHT
• New useful ideas and
designs
• Functional and
Technical inventions
• Original works that
express ideas
• Purely artistic works
• Brand that identifies
source of goods or
services
• Symbol, logo, word,
sound, colour, design,
etc.
DATA PROTECTION
Install
high
quality
antivirus
Avoid using
pirated
software
Do not
disclose
passwords
Do not
open
unwanted
emails
Do not
download
unwanted
software
Cancel any
suspicious
downloads
SPAM PREVENTION
•Avoid opening spam emails and
clicking on links in spam messages
•Don’t buy anything from a spammer
•Don’t be tempted to reply
•Avoid ‘unsubscribe’ options
• Use a disposable email
address
• Munging: Use address
as ‘a at b dot com’ instead
of a@b.com
SOFTWARE PIRACY
Always buy your
software from a reputed
organization
Make sure that your
software comes with a
licensed agreement ,
original disc and
authentic packaging
Avoid buying multiple
software titles from
different publishers on a
single disc
If the seller provides a
serial number other than
one mentioned on
package, it indicates that
software is not authentic
CYBER CRIME
Online criminal activities such as illegal copying of software, computer viruses, stealing data
CYBER LAWS
• Cyber space is governed by a
system of law and regulations called
Cyber Law
• Refers to all legal and regulatory
aspects of internet
• Cyber law is the part of the overall legal system that deals with the
Internet, cyberspace, and their respective legal issues.
• Cyber law covers a fairly broad area, encompassing several subtopics
including freedom of expression, access to and usage of the Internet,
and online privacy
HACKING
Technique by which some computer experts can access data from confidential
areas of the system
MALICIOUS INTENT AND CODE
Malicious code is a program that is covertly inserted into another program with the intent of
malicious activities
Can be prevented by limiting the capabilities of the servers and web applications to only the
functions necessary to support the operations, and bringing awareness and training programs, we
can protect our system from malicious intent
CONCLUSION
Safeguard yourself and others by following all best practices and the 10 commandments of
computer ethics
1. Thou shalt not use a computer to harm other people
2. Thou shalt not interfere with other people's computer work
3. Thou shalt not snoop around in other people's computer files
4. Thou shalt not use a computer to steal
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not copy or use proprietary software for which you have not paid (without
permission)
7. Thou shalt not use other people's computer resources without authorization or proper
compensation
8. Thou shalt not appropriate other people's intellectual output
9. Thou shalt think about the social consequences of the program you are writing or the
system you are designing
10.Thou shalt always use a computer in ways that ensure consideration and respect for other
humans
QUESTION 1:
Unwanted messages in the mailbox are called?
Malicious Code SPAM
Cookies
NEXT->
CLICK ON THE CORRECT ANSWER
QUESTION 2:
Cyber criminals who crack the password to
access information from the Internet are called?
Sackers
Hackers
Virus
NEXT->
CLICK ON THE CORRECT ANSWER
QUESTION 3:
Set of moral values which regulate the use of
computers are called?
Cyber Law Computer Ethics
Malicious Intent
NEXT->
Privacy
CLICK ON THE CORRECT ANSWER
QUESTION 4:
The process of making duplicate copy of the
original software illegally is known as?
Malicious Code
Software Piracy
Cookies
NEXT->
Hacking
CLICK ON THE CORRECT ANSWER
QUESTION 5:
There are 5 commandments of Computer Ethics?
True
NEXT->
False
CLICK ON THE CORRECT ANSWER
Correct Answer!
<-BACK
Wrong Answer!
<-BACK
ComputingEthics.pptx

Contenu connexe

Similaire à ComputingEthics.pptx

Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.rizwanshafique4321
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challengesCRM
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxSATYAJIT58
 
L2 COMPUTER ETHICS PPT [Autosaved].pptx
L2 COMPUTER  ETHICS  PPT [Autosaved].pptxL2 COMPUTER  ETHICS  PPT [Autosaved].pptx
L2 COMPUTER ETHICS PPT [Autosaved].pptxJoshCasas1
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Computer Ethics By Anas Habib
Computer Ethics By Anas HabibComputer Ethics By Anas Habib
Computer Ethics By Anas HabibAnasHabib23
 

Similaire à ComputingEthics.pptx (20)

Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Shak taha
Shak tahaShak taha
Shak taha
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
L2 COMPUTER ETHICS PPT [Autosaved].pptx
L2 COMPUTER  ETHICS  PPT [Autosaved].pptxL2 COMPUTER  ETHICS  PPT [Autosaved].pptx
L2 COMPUTER ETHICS PPT [Autosaved].pptx
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Computer Ethics By Anas Habib
Computer Ethics By Anas HabibComputer Ethics By Anas Habib
Computer Ethics By Anas Habib
 

Dernier

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

ComputingEthics.pptx

  • 1. Ethical issues in computing
  • 2. INTRODUCTION • Ethics Set of moral principles that govern the behaviour of a group or individual • Computer Ethics System of moral standards or values used as guidelines for the computer user
  • 3. COMPUTER ETHICS vs LAW  Ethics • Serves as guidelines • Free to follow • Universal • Results in ethical computer users • Not following is immoral  Law • Rules • Must follow • Country dependent • Prevents misuse of computer • Not following is a crime
  • 5. ETHICAL VALUES • Do not install or uninstall software without prior permission • Do not steal information of any other computer • Do not make illegal copies of software • Protect important documents using passwords • Do not browse unwanted websites or emails
  • 6. INTELLECTUAL PROPERTY RIGHT • New useful ideas and designs • Functional and Technical inventions • Original works that express ideas • Purely artistic works • Brand that identifies source of goods or services • Symbol, logo, word, sound, colour, design, etc.
  • 7. DATA PROTECTION Install high quality antivirus Avoid using pirated software Do not disclose passwords Do not open unwanted emails Do not download unwanted software Cancel any suspicious downloads
  • 8.
  • 9. SPAM PREVENTION •Avoid opening spam emails and clicking on links in spam messages •Don’t buy anything from a spammer •Don’t be tempted to reply •Avoid ‘unsubscribe’ options • Use a disposable email address • Munging: Use address as ‘a at b dot com’ instead of a@b.com
  • 10. SOFTWARE PIRACY Always buy your software from a reputed organization Make sure that your software comes with a licensed agreement , original disc and authentic packaging Avoid buying multiple software titles from different publishers on a single disc If the seller provides a serial number other than one mentioned on package, it indicates that software is not authentic
  • 11. CYBER CRIME Online criminal activities such as illegal copying of software, computer viruses, stealing data
  • 12. CYBER LAWS • Cyber space is governed by a system of law and regulations called Cyber Law • Refers to all legal and regulatory aspects of internet • Cyber law is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues. • Cyber law covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy
  • 13. HACKING Technique by which some computer experts can access data from confidential areas of the system
  • 14. MALICIOUS INTENT AND CODE Malicious code is a program that is covertly inserted into another program with the intent of malicious activities Can be prevented by limiting the capabilities of the servers and web applications to only the functions necessary to support the operations, and bringing awareness and training programs, we can protect our system from malicious intent
  • 15. CONCLUSION Safeguard yourself and others by following all best practices and the 10 commandments of computer ethics 1. Thou shalt not use a computer to harm other people 2. Thou shalt not interfere with other people's computer work 3. Thou shalt not snoop around in other people's computer files 4. Thou shalt not use a computer to steal 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid (without permission) 7. Thou shalt not use other people's computer resources without authorization or proper compensation 8. Thou shalt not appropriate other people's intellectual output 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing 10.Thou shalt always use a computer in ways that ensure consideration and respect for other humans
  • 16.
  • 17. QUESTION 1: Unwanted messages in the mailbox are called? Malicious Code SPAM Cookies NEXT-> CLICK ON THE CORRECT ANSWER
  • 18. QUESTION 2: Cyber criminals who crack the password to access information from the Internet are called? Sackers Hackers Virus NEXT-> CLICK ON THE CORRECT ANSWER
  • 19. QUESTION 3: Set of moral values which regulate the use of computers are called? Cyber Law Computer Ethics Malicious Intent NEXT-> Privacy CLICK ON THE CORRECT ANSWER
  • 20. QUESTION 4: The process of making duplicate copy of the original software illegally is known as? Malicious Code Software Piracy Cookies NEXT-> Hacking CLICK ON THE CORRECT ANSWER
  • 21. QUESTION 5: There are 5 commandments of Computer Ethics? True NEXT-> False CLICK ON THE CORRECT ANSWER