SlideShare une entreprise Scribd logo
1  sur  8
Cyber Ethics NurulFifiAmalinabtMohdHashim ASD4T PuanHjhFazilah
Definition  Cyber ethics is the ethics applied to the online environment. The treatment of what is and is not cyber-ethical behavior may vary from place to place. Cyber ethics is a code of behavior for using the Internet. One easy way to think about cyber ethics and to address the subject with children is this: acceptable behavior on the Internet is very much the same as acceptable behavior in everyday life.  Cyber-Ethics is the Ethics applied to the online environment. The treatment of what is and is not cyber-ethical behavior may vary from place to place Manners applied to the Internet and the use of technology in everyday situations
Do & don’t in cyber ethics
Do & don’t in cyber ethics
Rules of cyber Do not use rude or offensive language.  Don’t be a bully on the Internet. Do not call people names, lie about them, send embarrassing pictures of them, or do anything else to try to hurt them.  Do not copy information from the Internet and claim it as yours. That is called plagiarism.  Adhere to copyright restrictions when downloading material including software, games, movies, or music from the Internet.  Do not break into someone else’s computer.  Do not use someone else’s password.  Do not attempt to infect or in any way try to make someone else’s computer unusable. 
Faults in cyber  Appropriate other people’s intellectual property (IP)  Ignore the social and legal consequences related to the software program one is writing or the computer system one is designing  Illegally copy or use proprietary software that has not been paid for or for which credit has not been given  Interfere with others computer or online work  Snoop into or alter others computer files or data  Use a computer to bear false witness  Use a computer to cause harm to others  Use others computer resources without prior authorization  Use the computer in ways that ignore the consideration of and respect for fellow human beings
Conclusion Cyber ethics is important in cyber life. Although cyber world is not in reality life, but we have to follow the ethics. For example, don’t take other people work and make it like your own work. You should credit to them. Moreover, when people follow the rules, there is no misunderstood in cyber world. People will respect each other even in cyber world.
References http://us.norton.com/library/familyresource/article.jsp?aid=pr_cyberethics http://iris.nyit.edu/~mtehrani/Week2_assignment1_MTehrani.pdf http://computer.yourdictionary.com/cyber-etiquette

Contenu connexe

Tendances

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
 

Tendances (20)

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 

En vedette

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
katespeach
 

En vedette (19)

Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Ethical issues in cyberspace
Ethical issues in cyberspaceEthical issues in cyberspace
Ethical issues in cyberspace
 
Cyber law
Cyber lawCyber law
Cyber law
 
Inpage presentation
Inpage presentationInpage presentation
Inpage presentation
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
In-page Urdu Features
In-page Urdu FeaturesIn-page Urdu Features
In-page Urdu Features
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
 
Inpage
InpageInpage
Inpage
 
Inpage
InpageInpage
Inpage
 
Ethics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesEthics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage rates
 
A Journey Into Cyberspace
A Journey Into CyberspaceA Journey Into Cyberspace
A Journey Into Cyberspace
 
Cs106 professional-ethics
Cs106 professional-ethicsCs106 professional-ethics
Cs106 professional-ethics
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 

Similaire à Cyber ethics

Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
opiedog1
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
lahill16
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
lsanford84
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)
Maria Obaidi
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
dhabyahalk
 

Similaire à Cyber ethics (20)

Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 

Dernier

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Dernier (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Cyber ethics

  • 2. Definition Cyber ethics is the ethics applied to the online environment. The treatment of what is and is not cyber-ethical behavior may vary from place to place. Cyber ethics is a code of behavior for using the Internet. One easy way to think about cyber ethics and to address the subject with children is this: acceptable behavior on the Internet is very much the same as acceptable behavior in everyday life.  Cyber-Ethics is the Ethics applied to the online environment. The treatment of what is and is not cyber-ethical behavior may vary from place to place Manners applied to the Internet and the use of technology in everyday situations
  • 3. Do & don’t in cyber ethics
  • 4. Do & don’t in cyber ethics
  • 5. Rules of cyber Do not use rude or offensive language.  Don’t be a bully on the Internet. Do not call people names, lie about them, send embarrassing pictures of them, or do anything else to try to hurt them.  Do not copy information from the Internet and claim it as yours. That is called plagiarism.  Adhere to copyright restrictions when downloading material including software, games, movies, or music from the Internet.  Do not break into someone else’s computer.  Do not use someone else’s password.  Do not attempt to infect or in any way try to make someone else’s computer unusable. 
  • 6. Faults in cyber Appropriate other people’s intellectual property (IP) Ignore the social and legal consequences related to the software program one is writing or the computer system one is designing Illegally copy or use proprietary software that has not been paid for or for which credit has not been given Interfere with others computer or online work Snoop into or alter others computer files or data Use a computer to bear false witness Use a computer to cause harm to others Use others computer resources without prior authorization Use the computer in ways that ignore the consideration of and respect for fellow human beings
  • 7. Conclusion Cyber ethics is important in cyber life. Although cyber world is not in reality life, but we have to follow the ethics. For example, don’t take other people work and make it like your own work. You should credit to them. Moreover, when people follow the rules, there is no misunderstood in cyber world. People will respect each other even in cyber world.