SlideShare a Scribd company logo
1 of 5
GÜVEN KORKMAZ
282672
MANAGMENT INFORMATION
SYSTEMS
What is Computer Ethics ?
• Computer ethics, computer technology, and
an analysis of the effect of the natural and
social policies for the use of ethical
considerable reasons for such a technology.
Major Computer Ethics Rules
• Who can use the system
• Who has the authority to grant access to that
• How to create and how to retain the stored passwords
• Limitation of the system can be used only for business purposes and for
personal gain kullanılamayacağının specified. Spending time and resources
are limited in the use of the system for personal purpose or that it is
completely forbidden issues brought about limitations.
• Girilemeyeceği the system or if the system is sparse and the available
resources, authority, or can not be intentionally interfere with the
functioning of the system yapılamayacağı changes.
• Other users can not be deliberately harassed and their rights can not be
violated.
• Internet download or send material unsuitable for minors. And often
sexually explicit material may be unsuitable material covers a very wide
definition.
Major Computer Ethics Rules
• Authorized someone with a valid reason will not be done without the
consent of the trial subjects related to safety. (Such trials encryption and
security systems in the university setting, but you are allowed to work on
the course.)
• Due to system maintenance, system administrators, the circumstances
under which the files, mail messages, enter data, and the BASIC lists. To
protect the confidentiality of users' activities are limited to such activities.
• System administrators and other authorized personnel to maintain the
system, in order to limit the circumstances under which the use of the
system at any time, or changed at the end erdirebilecekleri. This
permission is not unlimited, but is in danger of sudden intervention may
be necessary in some cases, if the security of the system.
• About software copyrights and licenses principles (guidelines). The system
should not be used to create copies of unlicensed copyrighted material.
The same principle applies to photographs and they can not be copied
without license a vehicle such as a browser
What is Copyright ?
Products caused by the labor of every kind of
person on the idea of ​​rights provided by law.

More Related Content

Viewers also liked

스마트큐 발표자료 김재우
스마트큐 발표자료 김재우스마트큐 발표자료 김재우
스마트큐 발표자료 김재우JaeWoo Kim
 
Inspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for CorrosionInspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for CorrosionEddyfi
 
JLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine ManualJLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine ManualJLL Fitness
 
Inspecting Laser Welds in Component Manufacturing
Inspecting Laser Welds in Component ManufacturingInspecting Laser Welds in Component Manufacturing
Inspecting Laser Welds in Component ManufacturingEddyfi
 
Trainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers TestimoniesTrainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers TestimoniesTrainerDavid
 
Factors affecting lls usage
Factors affecting lls usageFactors affecting lls usage
Factors affecting lls usageEvelyn Estrella
 
Texture Powerpoint Final
Texture Powerpoint FinalTexture Powerpoint Final
Texture Powerpoint Finalkphan22
 
State-of-the-Art RFT— Meeting the Ferromagnetic Tube Challenge
State-of-the-Art RFT— Meeting the Ferromagnetic Tube ChallengeState-of-the-Art RFT— Meeting the Ferromagnetic Tube Challenge
State-of-the-Art RFT— Meeting the Ferromagnetic Tube ChallengeEddyfi
 
Detecting Cracks and Corrosion in Aircraft Longerons
Detecting Cracks and Corrosion in Aircraft LongeronsDetecting Cracks and Corrosion in Aircraft Longerons
Detecting Cracks and Corrosion in Aircraft LongeronsEddyfi
 
EE 305 Project_1 The Effective External Defibrillators
EE 305 Project_1 The Effective External Defibrillators EE 305 Project_1 The Effective External Defibrillators
EE 305 Project_1 The Effective External Defibrillators kehali Haileselassie
 
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger Tubes
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger TubesAssessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger Tubes
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger TubesEddyfi
 
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)Looking for Cracks in Control Rod Drive Mechanisms (CRDM)
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)Eddyfi
 
JLL JF 100 Excercise Bike Manual
JLL JF 100 Excercise Bike ManualJLL JF 100 Excercise Bike Manual
JLL JF 100 Excercise Bike ManualJLL Fitness
 
The avanti group sharp turn for electronics company
The avanti group sharp turn for electronics companyThe avanti group sharp turn for electronics company
The avanti group sharp turn for electronics companyApplecherr McDougal
 
что такое Smm в 2013 году на примере
что такое Smm в 2013 году на примеречто такое Smm в 2013 году на примере
что такое Smm в 2013 году на примереАнтон Чернятин
 
Defect Detection & Prevention in Cast Turbine Wheels
Defect Detection & Prevention in Cast Turbine WheelsDefect Detection & Prevention in Cast Turbine Wheels
Defect Detection & Prevention in Cast Turbine WheelsEddyfi
 
Alejandra Ortiz bibliography
Alejandra Ortiz bibliographyAlejandra Ortiz bibliography
Alejandra Ortiz bibliographyAlejandrita Ortiz
 

Viewers also liked (17)

스마트큐 발표자료 김재우
스마트큐 발표자료 김재우스마트큐 발표자료 김재우
스마트큐 발표자료 김재우
 
Inspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for CorrosionInspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for Corrosion
 
JLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine ManualJLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine Manual
 
Inspecting Laser Welds in Component Manufacturing
Inspecting Laser Welds in Component ManufacturingInspecting Laser Welds in Component Manufacturing
Inspecting Laser Welds in Component Manufacturing
 
Trainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers TestimoniesTrainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers Testimonies
 
Factors affecting lls usage
Factors affecting lls usageFactors affecting lls usage
Factors affecting lls usage
 
Texture Powerpoint Final
Texture Powerpoint FinalTexture Powerpoint Final
Texture Powerpoint Final
 
State-of-the-Art RFT— Meeting the Ferromagnetic Tube Challenge
State-of-the-Art RFT— Meeting the Ferromagnetic Tube ChallengeState-of-the-Art RFT— Meeting the Ferromagnetic Tube Challenge
State-of-the-Art RFT— Meeting the Ferromagnetic Tube Challenge
 
Detecting Cracks and Corrosion in Aircraft Longerons
Detecting Cracks and Corrosion in Aircraft LongeronsDetecting Cracks and Corrosion in Aircraft Longerons
Detecting Cracks and Corrosion in Aircraft Longerons
 
EE 305 Project_1 The Effective External Defibrillators
EE 305 Project_1 The Effective External Defibrillators EE 305 Project_1 The Effective External Defibrillators
EE 305 Project_1 The Effective External Defibrillators
 
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger Tubes
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger TubesAssessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger Tubes
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger Tubes
 
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)Looking for Cracks in Control Rod Drive Mechanisms (CRDM)
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)
 
JLL JF 100 Excercise Bike Manual
JLL JF 100 Excercise Bike ManualJLL JF 100 Excercise Bike Manual
JLL JF 100 Excercise Bike Manual
 
The avanti group sharp turn for electronics company
The avanti group sharp turn for electronics companyThe avanti group sharp turn for electronics company
The avanti group sharp turn for electronics company
 
что такое Smm в 2013 году на примере
что такое Smm в 2013 году на примеречто такое Smm в 2013 году на примере
что такое Smm в 2013 году на примере
 
Defect Detection & Prevention in Cast Turbine Wheels
Defect Detection & Prevention in Cast Turbine WheelsDefect Detection & Prevention in Cast Turbine Wheels
Defect Detection & Prevention in Cast Turbine Wheels
 
Alejandra Ortiz bibliography
Alejandra Ortiz bibliographyAlejandra Ortiz bibliography
Alejandra Ortiz bibliography
 

Similar to Assigment 6

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptDrBasemMohamedElomda
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network designnephtalie
 
BTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical IssuesBTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical Issuesmrcox
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Sreekanth Narendran
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7limsh
 
C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptshanthishyam
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptxdotco
 
IntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxIntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxnormanibarber20063
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10APSU
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROLshinydey
 
IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxpriestmanmable
 
6.12 expert systems
6.12 expert systems6.12 expert systems
6.12 expert systemsDave Smith
 

Similar to Assigment 6 (20)

Shak taha
Shak tahaShak taha
Shak taha
 
Socio technical system
Socio technical systemSocio technical system
Socio technical system
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
 
Network Security of Windows Servers
Network Security of Windows ServersNetwork Security of Windows Servers
Network Security of Windows Servers
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
 
Cyber ethics.pptx
Cyber ethics.pptxCyber ethics.pptx
Cyber ethics.pptx
 
BTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical IssuesBTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical Issues
 
auditing-190520092523.pdf
auditing-190520092523.pdfauditing-190520092523.pdf
auditing-190520092523.pdf
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.ppt
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptx
 
IntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxIntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docx
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic ProceduresPACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic Procedures
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docx
 
6.12 expert systems
6.12 expert systems6.12 expert systems
6.12 expert systems
 

Recently uploaded

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Assigment 6

  • 2. What is Computer Ethics ? • Computer ethics, computer technology, and an analysis of the effect of the natural and social policies for the use of ethical considerable reasons for such a technology.
  • 3. Major Computer Ethics Rules • Who can use the system • Who has the authority to grant access to that • How to create and how to retain the stored passwords • Limitation of the system can be used only for business purposes and for personal gain kullanılamayacağının specified. Spending time and resources are limited in the use of the system for personal purpose or that it is completely forbidden issues brought about limitations. • Girilemeyeceği the system or if the system is sparse and the available resources, authority, or can not be intentionally interfere with the functioning of the system yapılamayacağı changes. • Other users can not be deliberately harassed and their rights can not be violated. • Internet download or send material unsuitable for minors. And often sexually explicit material may be unsuitable material covers a very wide definition.
  • 4. Major Computer Ethics Rules • Authorized someone with a valid reason will not be done without the consent of the trial subjects related to safety. (Such trials encryption and security systems in the university setting, but you are allowed to work on the course.) • Due to system maintenance, system administrators, the circumstances under which the files, mail messages, enter data, and the BASIC lists. To protect the confidentiality of users' activities are limited to such activities. • System administrators and other authorized personnel to maintain the system, in order to limit the circumstances under which the use of the system at any time, or changed at the end erdirebilecekleri. This permission is not unlimited, but is in danger of sudden intervention may be necessary in some cases, if the security of the system. • About software copyrights and licenses principles (guidelines). The system should not be used to create copies of unlicensed copyrighted material. The same principle applies to photographs and they can not be copied without license a vehicle such as a browser
  • 5. What is Copyright ? Products caused by the labor of every kind of person on the idea of ​​rights provided by law.