Your SlideShare is downloading. ×
0
Law 483 cyberethics
Law 483 cyberethics
Law 483 cyberethics
Law 483 cyberethics
Law 483 cyberethics
Law 483 cyberethics
Law 483 cyberethics
Law 483 cyberethics
Law 483 cyberethics
Law 483 cyberethics
Law 483 cyberethics
Law 483 cyberethics
Law 483 cyberethics
Law 483 cyberethics
Law 483 cyberethics
Law 483 cyberethics
Law 483 cyberethics
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Law 483 cyberethics

954

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
954
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
34
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. LAW 483CYBERETHICS 1
  • 2. What is Ethics?If we are going to examine ethical issues on the Internet, it is first necessary to define ethics.Today, we regard ethics as a “rational process founded on certain principles.”However, definition that is more applicable is the ethical theory that existed in ancient Greece.There, ethics was the study of what was good for both the individual and the society.Here, we will look at some online issues and how they may be good and/ or bad for society.Cyberethics is the study of ethics on the Internet. 2
  • 3. PRIVACY PROPERTY FOUR MAIN ETHICAL ISSUESACCURACY ACCESS 3
  • 4. PRIVACY The technology around us increase so does the threatA few years ago, Florida lawmakers to our privacy.gave the go ahead to have monitors stationed in bathrooms at Tallahassee Community College to determine if the facilities were being underutilized. Students and faculties strongly protested that the monitors violated their privacy. State officials said that the value of information gained through the study was more important than the threat to the privacy. 4
  • 5. ACCURACY•Information educates.•Misinformation effaces.•A wealth of information resides on the Net.•However, sometimes it is difficult to discern/distinguish thetruth from the trash, the nugget of valuable information fromthe hearsay, supposition, inference and opinion.•A poignant illustration of this is the Drudge Report. Matt Drudge often reports on rumors and speculation and rarely reinforces his stories with specific sources. 5
  • 6. PROPERTY•WHO has the rights to intellectual property on the internet? Issue : When one is constructing his Web page, whether it is ethical to lift an image from someone’s homepage and use it on his webpage without crediting the source. 6
  • 7. Access•One reason that topics such as online gambling andpornography have become such firestorms of controversy incyberspace is the simple fact that so many people have access tothe Web sites.•Obviously, pervasive societal issues warrant more attentionsurreptitious issues.•Simply put, if no one had access to online pornography no onewould care. 7
  • 8. Identify the Elements of Malaysian Cyber Law i. Computer Ethics ii. Code of Ethics iii. Intellectual Property Ethics is the branch of philosophy concerned with: a. what is right. b. What is wrong. 8
  • 9. Computer Ethics for ComputerProfessionals• The field of computer ethics specifies ethical codes for computing professionals.• The core of a computer professional’s code of ethics is to preserve and protect human life from harm.Computer causes new ethical problems and issues:Computer ethics also deals with the ethical principles associated with thoseproblems. 9
  • 10. What is code of ethics? code of ethics A group of ethical Developed by behavior rules organizations or by a professional society 10
  • 11. Code of Ethics Act with integrity, competence, diligence, respect and on an ethical manner with the public, clients, employers, employees and colleagues. Interest in profession and clients above personal interest. Practice and encourage others to practice in an ethical manner. Promote integrity of ethical markets. Improve professional competence. 11
  • 12. Computer Ethics for Computer Users Respect yourself Respect others When using the college’s computers Respect academic integrity 12
  • 13. Respect yourselfIf you obtain an account and password to use the campus computer system, don’t give your password to others. They could do something that gets you in trouble.In addition, don’t say or do anything on the internet that could reflect poorly on you, even if you think no one will ever found out. 13
  • 14. Ten Commandments of Computer Ethics1. Don’t use a computer to harm other people.2. Don’t interfere with other people’s computer work.3. Don’t snoop around in other people’s files.4. Don’t use a computer to steal.5. Don’t use a computer to bear false witness.6. Don’t copy or use proprietary software for which you have not paid. 14
  • 15. 7. Don’t use other people’s computer resources without authorization or proper compensation.8. Don’t appropriate other people’s intellectual output.9. Do think about the social consequences of the program you write or the system you design.10. Do use a computer in ways that show consideration and respect for your fellow humans. 15
  • 16. Respect OthersYou shouldn’t use a computer to threaten or harass anyone.Avoid using more than your share of computing resources, such as disk space.If you publish a Web page on your college’s computers, remember that your page’s content affects the college’s public image. 16
  • 17. Respect academic integrityAlways give credit for text you’ve copied from the internet.Obtain permission before you copy pictures.Don’t copy or distribute software unless the license specifically says you can. 17

×