SlideShare une entreprise Scribd logo
1  sur  37
ONLINE 
ETHICS 
iPad Introduction Class 
Faculty of Creative Technology and Heritage 
Universiti Malaysia Kelantan
• What is Ethics and Information Technology? 
• Ethical issues relating to computer application 
• Security Threats 
– Computer Viruses 
– Cyber Crime 
– Software piracy and Hacking 
– Computer crime prevention 
– Ethical dilemmas and consideration 
• Ethics in using the internet 
Topics
• Derived from the Greek word “ethos”, which means 
“custom”, “habit”, and “way of living” 
• Definition: "the discipline and practice of applying 
value to human behavior, resulting in meaningful 
conduct.“ 
Ethics?
• Computer ethics defined as the application of 
classical ethical principles to the use of computer 
technology. 
• Ethical problems related to computers: 
– Privacy 
• Computers create a false sense of security 
• People do not realize how vulnerable 
information stored on computers are 
– Property 
• Physical property 
• Intellectual property 
• Data as property 
Computer ethics?
Computer ethics? 
• Access 
– Access to computing technology 
– Access to data 
• Accuracy 
– Accuracy of information stored 
• Hacking, cracking and virus creation 
• Software piracy
Computer 
ETHICS
As Defined by Computer Ethics Institute. 
1. Do not use a computer to harm other people. 
2. Do not interfere with other people's computer 
work. 
3. Do not snoop around in other people's files. 
4. Do not use a computer to steal. 
5. Do not use a computer to bear false witness. 
The Ten Commandments of Computer Ethics
6. Do not use or copy software for which you have 
not paid. 
7. Do not use other people's computer resources 
without authorization. 
8. Do not use other people's intellectual output. 
9. Think about the social consequences of the 
program you write. 
10. Use a computer in ways that show consideration 
and respect. 
The Ten Commandments of Computer Ethics
Security 
THREATS 
THE PRECAUTION
Computer viruses are small 
software programs that are 
designed to spread from one 
computer to another and to 
interfere with computer operation. 
Computer Virus?
• Virus are most easily spread, 
• Spread through E-mail Attachments, 
– Instant Messaging messages, 
– Funny Images, 
– Audio and Videos files, 
– Downloading files from Internet, 
– Greeting cards and many more. 
Spreading of Virus
• Use an Internet firewall 
• Subscribe to industry standard antivirus software 
• Never open an e-mail attachment from someone you 
don't know 
• Scan each and every attachment 
• Rules to be followed, while surfing net 
• Always update the databases 
• Avoid copying folder(s),untrusted files like keygen, 
crack files etc 
Steps to Avoid Viruses
• IT Infrastructure 
• Illegal access 
• Illegal Interruption 
• Data Interfere 
• System Interference 
• Misuse Of Devices 
• Electronic Fraud 
Computer Crime
• Target of the crime 
• Medium of the Attack 
• Tool 
• Intimidate or Deceive 
Type Computer Crimes
• Outsiders 
• Insiders 
Type Computer Crimes
• Economic 
• Ideological 
• Psychological 
• Egocentric 
Reason for Computer Crime
• Data tempering 
• Programming techniques 
• Other method 
Methods od Attack
• Reselling media 
• Downloading from a website without permission 
• Taping songs 
• Buying a used book or CD 
• Watching broadcast television but skipping 
commercials 
What is Piracy
• End User Piracy 
• Client – Server Piracy 
• Internet Piracy 
• Hard-Disk Piracy 
• Software Counterfeiting 
Reason for Computer Crime
• Some one who bypasses the system’s access 
controls by taking advantage of security 
weaknesses left in the system by developers 
• System penetration 
• Access confidential information 
• Threaten someone from your computer 
• Broadcast your confidential letters or materials . 
• Store illegal material 
• Stalking privacy or personal data 
Hacker
Compromise the security of system 
without permission from an 
authorized party, usually with the 
intent of accessing computers 
connected to the network. 
Evils of Hacking
• To determine problem and weakness for program 
• Creation of firewall 
• Useful for military purpose and spying 
• Better computer security 
Advantages of Hacking
Dilemmas are discussed in relation to four areas- 
• Privacy 
• Information accuracy 
• Access to information 
• Intellectual property rights 
Ethical Dilemmas in it…
• PLAGIARISM-The taking of ideas, writing and 
drawings or other similar intellectual property 
created by others and presenting it as your own. 
• NETIQUETTE-A set of rules (mainly unwritten) to 
follow while you are online. 
Ethical Dilemmas in It…
• Internet crime prevention. 
• Prevention of cyber crime 
• Prevention of computer crime in banking 
• IT security 
• Computer crime prevention law 
• Hi tech crime prevention law 
• Computer crime preventing on line fraud 
• World risk investigation and terrorist prevention 
How can We Stop It
ETHICS in using 
INTERNET 
BEHAVE WHEN ONLINE
Internet ethics means acceptable behavior for using 
internet. 
We should be honest, respect the rights and 
property of others on the internet 
Internet Ethics
Internet Ethics 
Acceptance 
One has to accept that Internet is not a value free-zone. 
It means World Wide Web is a place where values are 
considered in the broadest sense so we must take 
care while shaping content and services and we 
should recognize that internet is not apart from 
universal society but it is a primary component of it.
Sensitivity to National and Local cultures 
It belongs to all and there is no barrier of national and 
local cultures. It cannot be subject to one set of values 
like the local TV channel or the local newspaper we 
have to accommodate multiplicity of usage. 
Internet Ethics
Internet Ethics 
While using e-mail and chatting 
Internet must be used for communication with family 
and friends. Avoid chatting with strangers and 
forwarding e-mails from unknown people /strangers. 
We must be aware of risks involved in chatting and 
forwarding e-mails to strangers.
Internet Ethics 
Pretending to be someone else 
We must not use internet to fool others by pretending 
to be someone else. 
Hiding our own identity to fool others in the Internet 
world is a crime and may also be a risk to others.
Internet Ethics 
Avoid Bad language 
We must not use rude or bad language while using e- 
Mail, chatting, blogging and social networking, 
We need to respect their views and should not 
criticize anyone on the internet.
Internet Ethics 
Hide personal information 
We should not give personal details like home 
address, phone numbers, interests, passwords. 
No photographs should be sent to strangers because it 
might be misused and shared with others without 
their knowledge.
Internet Ethics 
While Downloading 
Internet is used to listen and learn about music. 
It is also used to watch videos and play games we 
must not use it to download them or share 
copyrighted material. 
We must be aware of the importance of copyrights 
and issues of copyright.
Internet Ethics 
Access to Internet 
The internet is a time-efficient tool for everyone that 
enlarges the possibilities for curriculum growth. 
Learning depends on the ability to find relevant and 
reliable information quickly and easily, and to select, 
understand and assess that information. Searching for 
information on the internet can help to develop these 
skills.
Internet Ethics 
Access to Internet 
Classroom exercises and take-home assessment tasks, 
where students are required to compare website 
content, are ideal for alerting students to the 
requirements of writing for different audiences, the 
purpose of particular content, identifying and judging 
accuracy and reliability. Since many sites adopt 
particular views about issues, the internet is a useful 
tool for developing the skills of distinguishing fact 
from opinion and exploring subjectivity and 
objectivity.
THANK YOU 
iPad Introduction Class

Contenu connexe

Tendances

Tendances (20)

Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 
Copyright Protection for Philippine Publications
Copyright Protection for Philippine PublicationsCopyright Protection for Philippine Publications
Copyright Protection for Philippine Publications
 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdf
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Webpage Design Using Templates and Online WYSIWYG Platforms
Webpage Design Using Templates and Online WYSIWYG PlatformsWebpage Design Using Templates and Online WYSIWYG Platforms
Webpage Design Using Templates and Online WYSIWYG Platforms
 

En vedette

Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 
Chapter 1 Ethics
Chapter 1  EthicsChapter 1  Ethics
Chapter 1 Ethics
wraithxjmin
 
Social Networks Hc1
Social Networks Hc1Social Networks Hc1
Social Networks Hc1
Ernst Phaff
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
Matthew Momney
 
Islamic ethics of using the internet
Islamic ethics of using the internetIslamic ethics of using the internet
Islamic ethics of using the internet
Momina Mateen
 

En vedette (20)

Ethics online
Ethics onlineEthics online
Ethics online
 
Illegal downloading
Illegal downloadingIllegal downloading
Illegal downloading
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Chapter 1 Ethics
Chapter 1  EthicsChapter 1  Ethics
Chapter 1 Ethics
 
Social Networks Hc1
Social Networks Hc1Social Networks Hc1
Social Networks Hc1
 
Customer Media & Social Networks
Customer Media & Social NetworksCustomer Media & Social Networks
Customer Media & Social Networks
 
Social Networks Sjors Timmer
Social Networks Sjors TimmerSocial Networks Sjors Timmer
Social Networks Sjors Timmer
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
Audio&Video
Audio&VideoAudio&Video
Audio&Video
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Ethics & Etiquette Online
Ethics & Etiquette OnlineEthics & Etiquette Online
Ethics & Etiquette Online
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Islamic ethics of using the internet
Islamic ethics of using the internetIslamic ethics of using the internet
Islamic ethics of using the internet
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Chapter 2: Ethics
Chapter 2: EthicsChapter 2: Ethics
Chapter 2: Ethics
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 

Similaire à Online ethics

NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
CatherineBagaan
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
CRM
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 

Similaire à Online ethics (20)

Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptx
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Online ethics

  • 1. ONLINE ETHICS iPad Introduction Class Faculty of Creative Technology and Heritage Universiti Malaysia Kelantan
  • 2. • What is Ethics and Information Technology? • Ethical issues relating to computer application • Security Threats – Computer Viruses – Cyber Crime – Software piracy and Hacking – Computer crime prevention – Ethical dilemmas and consideration • Ethics in using the internet Topics
  • 3. • Derived from the Greek word “ethos”, which means “custom”, “habit”, and “way of living” • Definition: "the discipline and practice of applying value to human behavior, resulting in meaningful conduct.“ Ethics?
  • 4. • Computer ethics defined as the application of classical ethical principles to the use of computer technology. • Ethical problems related to computers: – Privacy • Computers create a false sense of security • People do not realize how vulnerable information stored on computers are – Property • Physical property • Intellectual property • Data as property Computer ethics?
  • 5. Computer ethics? • Access – Access to computing technology – Access to data • Accuracy – Accuracy of information stored • Hacking, cracking and virus creation • Software piracy
  • 7. As Defined by Computer Ethics Institute. 1. Do not use a computer to harm other people. 2. Do not interfere with other people's computer work. 3. Do not snoop around in other people's files. 4. Do not use a computer to steal. 5. Do not use a computer to bear false witness. The Ten Commandments of Computer Ethics
  • 8. 6. Do not use or copy software for which you have not paid. 7. Do not use other people's computer resources without authorization. 8. Do not use other people's intellectual output. 9. Think about the social consequences of the program you write. 10. Use a computer in ways that show consideration and respect. The Ten Commandments of Computer Ethics
  • 9. Security THREATS THE PRECAUTION
  • 10. Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. Computer Virus?
  • 11. • Virus are most easily spread, • Spread through E-mail Attachments, – Instant Messaging messages, – Funny Images, – Audio and Videos files, – Downloading files from Internet, – Greeting cards and many more. Spreading of Virus
  • 12. • Use an Internet firewall • Subscribe to industry standard antivirus software • Never open an e-mail attachment from someone you don't know • Scan each and every attachment • Rules to be followed, while surfing net • Always update the databases • Avoid copying folder(s),untrusted files like keygen, crack files etc Steps to Avoid Viruses
  • 13. • IT Infrastructure • Illegal access • Illegal Interruption • Data Interfere • System Interference • Misuse Of Devices • Electronic Fraud Computer Crime
  • 14. • Target of the crime • Medium of the Attack • Tool • Intimidate or Deceive Type Computer Crimes
  • 15. • Outsiders • Insiders Type Computer Crimes
  • 16. • Economic • Ideological • Psychological • Egocentric Reason for Computer Crime
  • 17. • Data tempering • Programming techniques • Other method Methods od Attack
  • 18. • Reselling media • Downloading from a website without permission • Taping songs • Buying a used book or CD • Watching broadcast television but skipping commercials What is Piracy
  • 19. • End User Piracy • Client – Server Piracy • Internet Piracy • Hard-Disk Piracy • Software Counterfeiting Reason for Computer Crime
  • 20. • Some one who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers • System penetration • Access confidential information • Threaten someone from your computer • Broadcast your confidential letters or materials . • Store illegal material • Stalking privacy or personal data Hacker
  • 21. Compromise the security of system without permission from an authorized party, usually with the intent of accessing computers connected to the network. Evils of Hacking
  • 22. • To determine problem and weakness for program • Creation of firewall • Useful for military purpose and spying • Better computer security Advantages of Hacking
  • 23. Dilemmas are discussed in relation to four areas- • Privacy • Information accuracy • Access to information • Intellectual property rights Ethical Dilemmas in it…
  • 24. • PLAGIARISM-The taking of ideas, writing and drawings or other similar intellectual property created by others and presenting it as your own. • NETIQUETTE-A set of rules (mainly unwritten) to follow while you are online. Ethical Dilemmas in It…
  • 25. • Internet crime prevention. • Prevention of cyber crime • Prevention of computer crime in banking • IT security • Computer crime prevention law • Hi tech crime prevention law • Computer crime preventing on line fraud • World risk investigation and terrorist prevention How can We Stop It
  • 26. ETHICS in using INTERNET BEHAVE WHEN ONLINE
  • 27. Internet ethics means acceptable behavior for using internet. We should be honest, respect the rights and property of others on the internet Internet Ethics
  • 28. Internet Ethics Acceptance One has to accept that Internet is not a value free-zone. It means World Wide Web is a place where values are considered in the broadest sense so we must take care while shaping content and services and we should recognize that internet is not apart from universal society but it is a primary component of it.
  • 29. Sensitivity to National and Local cultures It belongs to all and there is no barrier of national and local cultures. It cannot be subject to one set of values like the local TV channel or the local newspaper we have to accommodate multiplicity of usage. Internet Ethics
  • 30. Internet Ethics While using e-mail and chatting Internet must be used for communication with family and friends. Avoid chatting with strangers and forwarding e-mails from unknown people /strangers. We must be aware of risks involved in chatting and forwarding e-mails to strangers.
  • 31. Internet Ethics Pretending to be someone else We must not use internet to fool others by pretending to be someone else. Hiding our own identity to fool others in the Internet world is a crime and may also be a risk to others.
  • 32. Internet Ethics Avoid Bad language We must not use rude or bad language while using e- Mail, chatting, blogging and social networking, We need to respect their views and should not criticize anyone on the internet.
  • 33. Internet Ethics Hide personal information We should not give personal details like home address, phone numbers, interests, passwords. No photographs should be sent to strangers because it might be misused and shared with others without their knowledge.
  • 34. Internet Ethics While Downloading Internet is used to listen and learn about music. It is also used to watch videos and play games we must not use it to download them or share copyrighted material. We must be aware of the importance of copyrights and issues of copyright.
  • 35. Internet Ethics Access to Internet The internet is a time-efficient tool for everyone that enlarges the possibilities for curriculum growth. Learning depends on the ability to find relevant and reliable information quickly and easily, and to select, understand and assess that information. Searching for information on the internet can help to develop these skills.
  • 36. Internet Ethics Access to Internet Classroom exercises and take-home assessment tasks, where students are required to compare website content, are ideal for alerting students to the requirements of writing for different audiences, the purpose of particular content, identifying and judging accuracy and reliability. Since many sites adopt particular views about issues, the internet is a useful tool for developing the skills of distinguishing fact from opinion and exploring subjectivity and objectivity.
  • 37. THANK YOU iPad Introduction Class