Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

ComputingEthics.pptx

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Chargement dans…3
×

Consultez-les par la suite

1 sur 24 Publicité
Publicité

Plus De Contenu Connexe

Plus récents (20)

Publicité

ComputingEthics.pptx

  1. 1. Ethical issues in computing
  2. 2. INTRODUCTION • Ethics Set of moral principles that govern the behaviour of a group or individual • Computer Ethics System of moral standards or values used as guidelines for the computer user
  3. 3. COMPUTER ETHICS vs LAW  Ethics • Serves as guidelines • Free to follow • Universal • Results in ethical computer users • Not following is immoral  Law • Rules • Must follow • Country dependent • Prevents misuse of computer • Not following is a crime
  4. 4. ETHICAL ISSUES
  5. 5. ETHICAL VALUES • Do not install or uninstall software without prior permission • Do not steal information of any other computer • Do not make illegal copies of software • Protect important documents using passwords • Do not browse unwanted websites or emails
  6. 6. INTELLECTUAL PROPERTY RIGHT • New useful ideas and designs • Functional and Technical inventions • Original works that express ideas • Purely artistic works • Brand that identifies source of goods or services • Symbol, logo, word, sound, colour, design, etc.
  7. 7. DATA PROTECTION Install high quality antivirus Avoid using pirated software Do not disclose passwords Do not open unwanted emails Do not download unwanted software Cancel any suspicious downloads
  8. 8. SPAM PREVENTION •Avoid opening spam emails and clicking on links in spam messages •Don’t buy anything from a spammer •Don’t be tempted to reply •Avoid ‘unsubscribe’ options • Use a disposable email address • Munging: Use address as ‘a at b dot com’ instead of a@b.com
  9. 9. SOFTWARE PIRACY Always buy your software from a reputed organization Make sure that your software comes with a licensed agreement , original disc and authentic packaging Avoid buying multiple software titles from different publishers on a single disc If the seller provides a serial number other than one mentioned on package, it indicates that software is not authentic
  10. 10. CYBER CRIME Online criminal activities such as illegal copying of software, computer viruses, stealing data
  11. 11. CYBER LAWS • Cyber space is governed by a system of law and regulations called Cyber Law • Refers to all legal and regulatory aspects of internet • Cyber law is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues. • Cyber law covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy
  12. 12. HACKING Technique by which some computer experts can access data from confidential areas of the system
  13. 13. MALICIOUS INTENT AND CODE Malicious code is a program that is covertly inserted into another program with the intent of malicious activities Can be prevented by limiting the capabilities of the servers and web applications to only the functions necessary to support the operations, and bringing awareness and training programs, we can protect our system from malicious intent
  14. 14. CONCLUSION Safeguard yourself and others by following all best practices and the 10 commandments of computer ethics 1. Thou shalt not use a computer to harm other people 2. Thou shalt not interfere with other people's computer work 3. Thou shalt not snoop around in other people's computer files 4. Thou shalt not use a computer to steal 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid (without permission) 7. Thou shalt not use other people's computer resources without authorization or proper compensation 8. Thou shalt not appropriate other people's intellectual output 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing 10.Thou shalt always use a computer in ways that ensure consideration and respect for other humans
  15. 15. QUESTION 1: Unwanted messages in the mailbox are called? Malicious Code SPAM Cookies NEXT-> CLICK ON THE CORRECT ANSWER
  16. 16. QUESTION 2: Cyber criminals who crack the password to access information from the Internet are called? Sackers Hackers Virus NEXT-> CLICK ON THE CORRECT ANSWER
  17. 17. QUESTION 3: Set of moral values which regulate the use of computers are called? Cyber Law Computer Ethics Malicious Intent NEXT-> Privacy CLICK ON THE CORRECT ANSWER
  18. 18. QUESTION 4: The process of making duplicate copy of the original software illegally is known as? Malicious Code Software Piracy Cookies NEXT-> Hacking CLICK ON THE CORRECT ANSWER
  19. 19. QUESTION 5: There are 5 commandments of Computer Ethics? True NEXT-> False CLICK ON THE CORRECT ANSWER
  20. 20. Correct Answer! <-BACK
  21. 21. Wrong Answer! <-BACK

×