SlideShare une entreprise Scribd logo
1  sur  19
3.0COMPUTER ETHICS Understand the standards of conduct in computing code of ethics.
Define Ethics Ethic refers to the standards and rules that "should" be followed and it helps us to regulate our conduct in a group or with a set of individuals.  As computer and Internet or intranet has come big time in our lives and it is an interactive medium where we can directly or indirectly communicate with people. (buzzle.com)
Codes of Ethic The ACM Code of Ethics The ACM/IEEE Software Engineering Code of Ethics and Professional Practice The IEEE Code of Ethics
Cont.. Information stored on the computer should be treated as seriously as written or spoken word. Privacy should not be violated. In case of academic use, it is known plagiarism. Information fro public viewing should not be modified or deleted or inaccessible since these are considered as destructive acts.
Cont.. Intrusive software such as "worms" and "viruses" which are destructive to the computer system is also illegal. Congesting somebody’s system with a lot of unwanted information is also unethical.
Cont… Sending obscene and crude messages through mail or chat is also forbidden. Sending sexually explicit content, message or pictures is also forbidden.
Discuss the professional ethics, engineering ethics and computer ethics.
Professional Ethics Professional ethics are a code of conduct that govern how members of a profession deal with each other and with third parties. (Dr. David Sinclair)
Why should we have a Professional Code of Ethics? ,[object Object]
Symbolises the professionalism of the group.
Defines and promotes a standard for external relations with clients and employers.
Protects the group’s interests.
Codifies members’ rights.
Expresses ideals to aspire to.,[object Object]
We have pride in our work and want the work that we do to be given recognition and respect.
We want to protect our livelihood.,[object Object]
http://www.acm.org/constitution/code.html
Bitish Computer Society Code of Conduct
http://www1.bcs.org.uk/DocsRepository/03200/3224/default.htm

Contenu connexe

Tendances

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
katespeach
 

Tendances (20)

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 
7 computer ethics
7 computer ethics7 computer ethics
7 computer ethics
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics
EthicsEthics
Ethics
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Similaire à 3.0 computer ethic

Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
MohammedAish
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
Definition of ethics
Definition of ethicsDefinition of ethics
Definition of ethics
Venkat Rao
 
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxEthics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
SANSKAR20
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineering
jndatirwa
 

Similaire à 3.0 computer ethic (20)

P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
 
Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
 
Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering  Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering
 
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSISINVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
 
Professional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptxProfessional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptx
 
Ethics in IT
Ethics in ITEthics in IT
Ethics in IT
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 
Definition of ethics
Definition of ethicsDefinition of ethics
Definition of ethics
 
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxEthics and TechnologyACM Code of Ethics Project Guidelines.docx
Ethics and TechnologyACM Code of Ethics Project Guidelines.docx
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Ethics
EthicsEthics
Ethics
 
Codemaking
CodemakingCodemaking
Codemaking
 
Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppt
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineering
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

3.0 computer ethic

  • 1. 3.0COMPUTER ETHICS Understand the standards of conduct in computing code of ethics.
  • 2. Define Ethics Ethic refers to the standards and rules that "should" be followed and it helps us to regulate our conduct in a group or with a set of individuals. As computer and Internet or intranet has come big time in our lives and it is an interactive medium where we can directly or indirectly communicate with people. (buzzle.com)
  • 3. Codes of Ethic The ACM Code of Ethics The ACM/IEEE Software Engineering Code of Ethics and Professional Practice The IEEE Code of Ethics
  • 4. Cont.. Information stored on the computer should be treated as seriously as written or spoken word. Privacy should not be violated. In case of academic use, it is known plagiarism. Information fro public viewing should not be modified or deleted or inaccessible since these are considered as destructive acts.
  • 5. Cont.. Intrusive software such as "worms" and "viruses" which are destructive to the computer system is also illegal. Congesting somebody’s system with a lot of unwanted information is also unethical.
  • 6. Cont… Sending obscene and crude messages through mail or chat is also forbidden. Sending sexually explicit content, message or pictures is also forbidden.
  • 7. Discuss the professional ethics, engineering ethics and computer ethics.
  • 8. Professional Ethics Professional ethics are a code of conduct that govern how members of a profession deal with each other and with third parties. (Dr. David Sinclair)
  • 9.
  • 11. Defines and promotes a standard for external relations with clients and employers.
  • 14.
  • 15. We have pride in our work and want the work that we do to be given recognition and respect.
  • 16.
  • 18. Bitish Computer Society Code of Conduct
  • 20. IEEE-CS/ACM Software Engineering Code of Ethics and Professional Practice
  • 21.
  • 22. Vincenti Definition concludes that "(e)ngineering knowledge reflects the fact that design does not take place for its own sake and in isolation". Rather, it occurs as "a social activity directed at a practical set of goals intended to serve human beings in some direct way" (Vincenti 1990).
  • 23. Davis Definition Davis (1998) also alludes to this attribute of engineering when he refers to it as "sociological knowledge, a knowledge of how people and tools work together, but it is nonetheless engineering knowledge."
  • 24. McLean Definition McLean (1993), an engineer, utilizes three categories in discussing engineering ethics: technical ethics, dealing with technical decisions by engineers; professional ethics, dealing with interactions among managers, engineers and employers; and social ethics, dealing with sociopolitical decisions concerning technology. 
  • 25. Computer Ethics Computer Ethics is to determine what we should do in such cases, that is, formulate policies to guide our actions. . . .
  • 26. Albert Einstein It is not enough that you should understand about applied science in order that your work may increase man’s blessings. Concern for man himself and his fate must always form the chief interest of all technical endeavors.
  • 27. Moor’s Definition computer ethics as a field concerned with “policy vacuums” and “conceptual muddles” regarding the social and ethical use of information technology
  • 28. Bynum’s Definition computer ethics identifies and analyzes the impacts of information technology on such social and human values as health, wealth, work, opportunity, freedom, democracy, knowledge, privacy, security, self-fulfillment, etc.