Ict - Computer Ethics

12,653 views
12,340 views

Published on

Published in: Technology, Business
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
12,653
On SlideShare
0
From Embeds
0
Number of Embeds
118
Actions
Shares
0
Downloads
448
Comments
0
Likes
5
Embeds 0
No embeds

No notes for slide

Ict - Computer Ethics

  1. 1. A New Paradigm In Education INFORMATION Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya COMMUNICATION TECHNOLOGY AND 1
  2. 2. 6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya Review for last topic <ul><li>Computer Ethic </li></ul><ul><li>Differences between Ethic and Law </li></ul><ul><li>Intellectual Property Rights </li></ul>2
  3. 3. <ul><li>In general, ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. </li></ul><ul><li>On the other hand, ethics in computing means moral guidelines to refer to when using the computer and computer networks. This includes the Internet. </li></ul>6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya i. What is computer ethic 3
  4. 4. <ul><li>Computer ethics is a system of moral standards or values used as a guideline for computer users. </li></ul>6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya ii. Computer Ethics 4
  5. 5. <ul><li>Law is a legal system comprising of rules and principles that govern the affairs of community and controlled by a political authority. </li></ul><ul><li>Computer law refers to all areas in law that requires an understanding of computer technology such as hardware, software and Internet. </li></ul>6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya iii. Computer Law 5
  6. 6. <ul><li>Ethic </li></ul><ul><li>Guidelines </li></ul><ul><li>Moral standards </li></ul><ul><li>Free to follow </li></ul><ul><li>No punishments </li></ul><ul><li>Universals </li></ul><ul><li>Produce ethical computer users </li></ul><ul><li>Immoral </li></ul>6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya iii. Differences between computer ethic and law <ul><li>Law </li></ul><ul><li>Control </li></ul><ul><li>Judicial Standards </li></ul><ul><li>Must follow </li></ul><ul><li>Penalties, imprisonments and other punishments </li></ul><ul><li>Depends on country </li></ul><ul><li>Prevent misusing of computers </li></ul><ul><li>Crime </li></ul>6
  7. 7. <ul><li>Intellectual property (IP) refers to works by created by inventors, authors and artists. These works are unique and have value in the market place. </li></ul><ul><li>Intellectual property laws cover ideas, inventions, literary, creations, unique names, business models, industrial processes, computer program codes and more. </li></ul>6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya iv. Intellectual Property Rights 7
  8. 8. <ul><li>There are four types of Intellectual Property protection. </li></ul><ul><li>Patents for invention </li></ul><ul><li>Trademarks for brand identity </li></ul><ul><li>Designs for product appearance </li></ul><ul><li>Copyright for material. </li></ul>6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya v. Intellectual Property Protection 8
  9. 9. <ul><li>Patents for invention </li></ul><ul><li>Trademarks for brand identity </li></ul><ul><li>Designs for product appearance </li></ul><ul><li>Copyright for material. </li></ul>6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya Homework / Group work 9
  10. 10. A New Paradigm In Education Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya Let continue … our lesson for today <ul><li>Privacy In Computer Usage </li></ul><ul><li>Authentications </li></ul><ul><li>Verifications </li></ul>10

×