SlideShare une entreprise Scribd logo
1  sur  7
Görkem PULCU
115400
SOFTWARE ENG.
Information about the
ethics of hacking, file
sharing, the Internet is the
lack of a democratic,
licensing schemes
frequently discussed
issues.
 The computer can not be used to harm other
people.
 Other people's computer work can not be
mixed.
 Other people's files can not be mixed in a
computer environment.
 The computer can not be used to make a
theft.
 The computer can not be used to
disseminate information to lie.
 Add unpaid copied and used software.
 Other people's computer resources can not
be used without permission.
 Other people's intellectual property
information can not be someone else.
 People should take into account the effects
of his program's social life.
 Contact your computer, taking into account
and respect other people use.
 Computer software is protected under
copyright laws in the capacity of intellectual
works. Copy any software to use, subject to
the permission to change the owner of that
software.
 unauthorized downloading of music
 share the film
 software sharing
 unlicensed software use
they made ​​the most of copyright violations.

Contenu connexe

Tendances

International Journal Of Information And Network Security
International Journal Of Information And Network SecurityInternational Journal Of Information And Network Security
International Journal Of Information And Network Security
Shaun Mc Brearty
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital Divide
Deniz Cengiz
 

Tendances (20)

International Journal Of Information And Network Security
International Journal Of Information And Network SecurityInternational Journal Of Information And Network Security
International Journal Of Information And Network Security
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Piracy
PiracyPiracy
Piracy
 
Multimedia digital piracy
Multimedia digital piracyMultimedia digital piracy
Multimedia digital piracy
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
 
9 ethics in it space
9 ethics in it space9 ethics in it space
9 ethics in it space
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Safety And Security Of Data Student Work
Safety And Security Of Data Student WorkSafety And Security Of Data Student Work
Safety And Security Of Data Student Work
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital Divide
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 

En vedette

ممنوع التدخين
ممنوع التدخينممنوع التدخين
ممنوع التدخين
afraa777
 
Copy of p pt. materi ipa.1 enzim-2
Copy of p pt. materi ipa.1 enzim-2Copy of p pt. materi ipa.1 enzim-2
Copy of p pt. materi ipa.1 enzim-2
Aisyah Fitri
 
Trade Finance Basics
Trade Finance BasicsTrade Finance Basics
Trade Finance Basics
maheshpadwal
 

En vedette (14)

Uso de procesos de alcance de consenso para mejorar la recomendación a grupos
Uso de procesos de alcance de consenso para mejorar la recomendación a gruposUso de procesos de alcance de consenso para mejorar la recomendación a grupos
Uso de procesos de alcance de consenso para mejorar la recomendación a grupos
 
Jornada nac educar_en_igualdad_orientaciones
Jornada nac educar_en_igualdad_orientacionesJornada nac educar_en_igualdad_orientaciones
Jornada nac educar_en_igualdad_orientaciones
 
ممنوع التدخين
ممنوع التدخينممنوع التدخين
ممنوع التدخين
 
Computacion
ComputacionComputacion
Computacion
 
Copy of p pt. materi ipa.1 enzim-2
Copy of p pt. materi ipa.1 enzim-2Copy of p pt. materi ipa.1 enzim-2
Copy of p pt. materi ipa.1 enzim-2
 
Professionals - Storms - Response
Professionals - Storms - ResponseProfessionals - Storms - Response
Professionals - Storms - Response
 
Classified2
Classified2Classified2
Classified2
 
Acuerdo dejación de armas y cese al fuego bilateral FARC EP Gobierno Nacional
Acuerdo dejación de armas y cese al fuego bilateral FARC EP Gobierno NacionalAcuerdo dejación de armas y cese al fuego bilateral FARC EP Gobierno Nacional
Acuerdo dejación de armas y cese al fuego bilateral FARC EP Gobierno Nacional
 
Classified1
Classified1Classified1
Classified1
 
Bovie Medical Exhibit 10.12
Bovie Medical Exhibit 10.12Bovie Medical Exhibit 10.12
Bovie Medical Exhibit 10.12
 
Professionals - Storms - Prevention
Professionals - Storms - PreventionProfessionals - Storms - Prevention
Professionals - Storms - Prevention
 
Ayuda hipermedial didáctica inteligencias multiples
Ayuda hipermedial didáctica inteligencias multiplesAyuda hipermedial didáctica inteligencias multiples
Ayuda hipermedial didáctica inteligencias multiples
 
Professionals - Wildfires - Preparedness part 1
Professionals - Wildfires - Preparedness part 1Professionals - Wildfires - Preparedness part 1
Professionals - Wildfires - Preparedness part 1
 
Trade Finance Basics
Trade Finance BasicsTrade Finance Basics
Trade Finance Basics
 

Similaire à Görkem pulcu

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Computer ethics and copyright 282607 hasbi dişlen
Computer ethics and copyright 282607 hasbi dişlenComputer ethics and copyright 282607 hasbi dişlen
Computer ethics and copyright 282607 hasbi dişlen
hasbidislen
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorent
Altacit Global
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
aamatya
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
Amplephi
 

Similaire à Görkem pulcu (20)

TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Computer ethics and copyright 282607 hasbi dişlen
Computer ethics and copyright 282607 hasbi dişlenComputer ethics and copyright 282607 hasbi dişlen
Computer ethics and copyright 282607 hasbi dişlen
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorent
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Chapter5 freesoftware
Chapter5 freesoftwareChapter5 freesoftware
Chapter5 freesoftware
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringement
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Software piracy
Software piracySoftware piracy
Software piracy
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
 
Digital law
Digital lawDigital law
Digital law
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Görkem pulcu

  • 2. Information about the ethics of hacking, file sharing, the Internet is the lack of a democratic, licensing schemes frequently discussed issues.
  • 3.
  • 4.  The computer can not be used to harm other people.  Other people's computer work can not be mixed.  Other people's files can not be mixed in a computer environment.  The computer can not be used to make a theft.  The computer can not be used to disseminate information to lie.
  • 5.  Add unpaid copied and used software.  Other people's computer resources can not be used without permission.  Other people's intellectual property information can not be someone else.  People should take into account the effects of his program's social life.  Contact your computer, taking into account and respect other people use.
  • 6.  Computer software is protected under copyright laws in the capacity of intellectual works. Copy any software to use, subject to the permission to change the owner of that software.
  • 7.  unauthorized downloading of music  share the film  software sharing  unlicensed software use they made ​​the most of copyright violations.