SlideShare a Scribd company logo
1 of 23
1
Social, Legal & Ethical
Aspects of Computing.
Group # 6
 Faizan-u-Rehman 57
 Arbaz Mateen 66
 Hafiz Sohaib 86
 Kashif Razzaq 58
 Tariq Ali 98
2
Contents
Social Computing.
Legal & Ethical Aspects.
Cyber Law.
First Cyber Crime.
Cyber Ethics.
IP (Intellectual Property).
Slander.
Plagiarism.
Copyright Law.
NR3C.
10 Notorious Cyber Crimes.
3
Social Computing.
Social computing is an area of computer science
that is concerned with the
intersection of social
behavior and
computational
systems. Social
computing is the
collaborative and
interactive aspect of online behavior.
4
Legal and Ethical Aspects
Of Computing.
 Legal aspects of computing are related to the
overlapping areas of law and computing.
 Computer Ethics is a system of moral standards
or moral values used as a guide line of computer
users.
5
Privacy, Computer Crimes.
Privacy refers to the right of individuals and
companies to deny or restrict the collection and
use of information about them.
Computer Crime is any illegal acts involving
computers.
6
Ethics.
As a Guideline to computer user.
Computer users are free to follow or ignore the code of ethics.
Universal, can be applied to any
ware, all over the world.
To produced ethical computer
users.
Not follow ethics are
called immoral.
7
Computer Law.
As a Rule to control computer user.
Computer users must follow the regulations and law.
Depend on country where the crime is committed.
To prevent misuse of computer.
Not obeying law are
called crime.
8
Cyber Law.
Cyber Law: any laws relating to protect the internet and
other online communication technologies.
9
Cyber Law.
Why we need Cyber Law?
Cyber law are made to force people to be good.
To give protections against the misuse of computers and
computer criminal activities.
Internet are being used every day by billions of people
around the globe.
Growth rate in mobile and computer devices.
Technology allows the user to bully from an unknown
location, 24 hours a day, 7 days a week.
10
Example of Cyber abuse on the users:
Sending a computer virus via E-Mail.
Harassment through E-Mail or social media.
Hacking into your School’s database to change your exam
results.
Fake Accounts.
Cyber Law.
11
Cyber Ethics.
The most common problem isn’t hacking (illegally accessing
web sites or other computers) or cracking. It’s the unauthorized
downloading of games and software.
13
Computer Crime.
Computer Fraud is the crime of obtaining money by
deceiving (to trick) people through the use of computer
such as E-Mail, program fraud, Investment schemes and
claim of expertise on certain fields.
Copying is a violation of the rights secured by a
copyright law. It occurs when you break the copyright laws
such as copying software or CD’s illegally.
14
Computer Crime. (cont.)
Computer theft is defined as the unauthorized used of
another person’s property such as transfer of payment to
the wrong accounts, get online material with no cost and
tap into the data transmission lines.
Computer Attack is defined as any activities taken to
disrupt the equipment's of computers system, change
processing controls and corrupt stored data.
15
Intellectual Property (IP).
Unique product of the human intellect that has
commercial value.
e.g.
Books, Songs, Movies, Paintings,
Formulas, Computers and programs
etc.
16
Intellectual Property Laws.
Intellectual
Property
Patents
Trademark Design
Copyright
 Patents for Inventions.
 Trademark for brand identity.
 Design for product appearance.
 Copyright for material.
17
Privacy.
Way of making personal data more private.
Install personal firewall.
Purchases goods with cash, rather then credit card.
Online public recode.
 Less use of Facebook.
Avoid GPS tags in photo.
18
Addiction.
Internet Addiction.
Social Media Addiction.
Facebook.
Twitter.
Google +.
Game addiction.
General Computer
Addiction.
19
Slander.
Slander is the action or crime of making a false
spoken statement damaging to a person's reputation.
Can develop society that disregards on honesty and
truth.
Can lead to bad
habits of spreading
rumors and untruth.
Can cause people
to have negative
attitude towards
another person.
20
Plagiarism.
Plagiarism is copying someone else’s work and then
passing it off as one’s own. It is morally bad because it is
an act of stealing.
Copying programs written by other programmers and
claiming it as your own could be an act of plagiarism. It
involves laying, cheating, theft and dishonesty.
21
Copyright Law.
Copyright law are designed to protect the intellectual
property of authors, artists, filmmakers, web designers
etc. so that their own work isn’t stolen for someone else
profit.
23
Computer Viruses.
Creation of worms and computer viruses is morally
bad when it is intended for malicious purpose like to
steal information or destroying of data.
24
Thank you 
If you have any Question, you may ask NOW!

More Related Content

What's hot

What's hot (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Similar to Social, Legal & Ethical Aspects of Computing.

Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computingMichael Jarata
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Chapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxChapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxnorwinadriatico
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 

Similar to Social, Legal & Ethical Aspects of Computing. (20)

Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computing
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Chapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxChapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptx
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 

More from muhammad-Sulaiman

Foundations of Electronic Commerce
Foundations of Electronic CommerceFoundations of Electronic Commerce
Foundations of Electronic Commercemuhammad-Sulaiman
 
Latest technologies in computer system AI(Artificial Intelligence) Knowledg...
Latest technologies in computer system  AI(Artificial Intelligence)  Knowledg...Latest technologies in computer system  AI(Artificial Intelligence)  Knowledg...
Latest technologies in computer system AI(Artificial Intelligence) Knowledg...muhammad-Sulaiman
 
Computer Scientific Applications
Computer Scientific ApplicationsComputer Scientific Applications
Computer Scientific Applicationsmuhammad-Sulaiman
 
Social Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our SociatySocial Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our Sociatymuhammad-Sulaiman
 

More from muhammad-Sulaiman (6)

Foundations of Electronic Commerce
Foundations of Electronic CommerceFoundations of Electronic Commerce
Foundations of Electronic Commerce
 
Digital Library 
Digital Library Digital Library 
Digital Library 
 
Privacy And Copyrights
Privacy And CopyrightsPrivacy And Copyrights
Privacy And Copyrights
 
Latest technologies in computer system AI(Artificial Intelligence) Knowledg...
Latest technologies in computer system  AI(Artificial Intelligence)  Knowledg...Latest technologies in computer system  AI(Artificial Intelligence)  Knowledg...
Latest technologies in computer system AI(Artificial Intelligence) Knowledg...
 
Computer Scientific Applications
Computer Scientific ApplicationsComputer Scientific Applications
Computer Scientific Applications
 
Social Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our SociatySocial Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our Sociaty
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Social, Legal & Ethical Aspects of Computing.

  • 1. 1
  • 2. Social, Legal & Ethical Aspects of Computing. Group # 6  Faizan-u-Rehman 57  Arbaz Mateen 66  Hafiz Sohaib 86  Kashif Razzaq 58  Tariq Ali 98 2
  • 3. Contents Social Computing. Legal & Ethical Aspects. Cyber Law. First Cyber Crime. Cyber Ethics. IP (Intellectual Property). Slander. Plagiarism. Copyright Law. NR3C. 10 Notorious Cyber Crimes. 3
  • 4. Social Computing. Social computing is an area of computer science that is concerned with the intersection of social behavior and computational systems. Social computing is the collaborative and interactive aspect of online behavior. 4
  • 5. Legal and Ethical Aspects Of Computing.  Legal aspects of computing are related to the overlapping areas of law and computing.  Computer Ethics is a system of moral standards or moral values used as a guide line of computer users. 5
  • 6. Privacy, Computer Crimes. Privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them. Computer Crime is any illegal acts involving computers. 6
  • 7. Ethics. As a Guideline to computer user. Computer users are free to follow or ignore the code of ethics. Universal, can be applied to any ware, all over the world. To produced ethical computer users. Not follow ethics are called immoral. 7
  • 8. Computer Law. As a Rule to control computer user. Computer users must follow the regulations and law. Depend on country where the crime is committed. To prevent misuse of computer. Not obeying law are called crime. 8
  • 9. Cyber Law. Cyber Law: any laws relating to protect the internet and other online communication technologies. 9
  • 10. Cyber Law. Why we need Cyber Law? Cyber law are made to force people to be good. To give protections against the misuse of computers and computer criminal activities. Internet are being used every day by billions of people around the globe. Growth rate in mobile and computer devices. Technology allows the user to bully from an unknown location, 24 hours a day, 7 days a week. 10
  • 11. Example of Cyber abuse on the users: Sending a computer virus via E-Mail. Harassment through E-Mail or social media. Hacking into your School’s database to change your exam results. Fake Accounts. Cyber Law. 11
  • 12. Cyber Ethics. The most common problem isn’t hacking (illegally accessing web sites or other computers) or cracking. It’s the unauthorized downloading of games and software. 13
  • 13. Computer Crime. Computer Fraud is the crime of obtaining money by deceiving (to trick) people through the use of computer such as E-Mail, program fraud, Investment schemes and claim of expertise on certain fields. Copying is a violation of the rights secured by a copyright law. It occurs when you break the copyright laws such as copying software or CD’s illegally. 14
  • 14. Computer Crime. (cont.) Computer theft is defined as the unauthorized used of another person’s property such as transfer of payment to the wrong accounts, get online material with no cost and tap into the data transmission lines. Computer Attack is defined as any activities taken to disrupt the equipment's of computers system, change processing controls and corrupt stored data. 15
  • 15. Intellectual Property (IP). Unique product of the human intellect that has commercial value. e.g. Books, Songs, Movies, Paintings, Formulas, Computers and programs etc. 16
  • 16. Intellectual Property Laws. Intellectual Property Patents Trademark Design Copyright  Patents for Inventions.  Trademark for brand identity.  Design for product appearance.  Copyright for material. 17
  • 17. Privacy. Way of making personal data more private. Install personal firewall. Purchases goods with cash, rather then credit card. Online public recode.  Less use of Facebook. Avoid GPS tags in photo. 18
  • 18. Addiction. Internet Addiction. Social Media Addiction. Facebook. Twitter. Google +. Game addiction. General Computer Addiction. 19
  • 19. Slander. Slander is the action or crime of making a false spoken statement damaging to a person's reputation. Can develop society that disregards on honesty and truth. Can lead to bad habits of spreading rumors and untruth. Can cause people to have negative attitude towards another person. 20
  • 20. Plagiarism. Plagiarism is copying someone else’s work and then passing it off as one’s own. It is morally bad because it is an act of stealing. Copying programs written by other programmers and claiming it as your own could be an act of plagiarism. It involves laying, cheating, theft and dishonesty. 21
  • 21. Copyright Law. Copyright law are designed to protect the intellectual property of authors, artists, filmmakers, web designers etc. so that their own work isn’t stolen for someone else profit. 23
  • 22. Computer Viruses. Creation of worms and computer viruses is morally bad when it is intended for malicious purpose like to steal information or destroying of data. 24
  • 23. Thank you  If you have any Question, you may ask NOW!

Editor's Notes

  1. Ethics: person's behavior or the conducting of an activity. (iklakqi) morality: principles concerning the distinction between right and wrong or good and bad behavior.
  2. Harassment synonyms irritation.
  3. intellect: a person's mental powers.
  4. Rumors: story or report of uncertain or doubtful truth.
  5. Intended: planning Malicious: evil , bad, harmful