SlideShare a Scribd company logo
1 of 10
What is computer ethics?
    Ethics is a set of moral principles that govern the behavior of

    a group or individual. Therefore, computer ethics is set of
    moral principles that regulate the use of computers. Some
    common issues of computer ethics include intellectual
    property rights (such as copyrighted electronic content),
    privacy concerns, and how computers affect society.
    As technology advances, computers continue to have a

    greater impact on society. Therefore, computer ethics
    promotes the discussion of how much influence computers
    should have in areas such as artificial intelligence and
    human communication. As the world of computers evolves,
    computer ethics continues to create ethical standards that
    address new issues raised by new technologies.
What are some issues?

     Identifying ethical issues as they arise, as well as
     defining how to deal with them, has traditionally been
     problematic in computer ethics. Some have argued
     against the idea of computer ethics as a whole.
     However, a new proposed of a method of identifying
     issues in computer ethics in their Paramedic Ethics
     model. The model is a data-centered view of judging
     ethical issues, involving the gathering, analysis,
     negotiation, and judging of data about the issue.
What is the ethic standards?


    iLink Edge was founded by Michael Stankiewicz in order to
    provide Computer Forensic consulting services to legal
    and corporate entities. The goal of the relationship with the
    client is to provide the utmost professional service
    establishing a confidential line of communication in order
    to meet the client's expectations of data discovery and
    analysis.

    One of the most definitive sets of ethical standards is the Association

    for Computing Machinery Code of Ethics. The code is a four-point
    standard governing ethical behavior among computing professionals. It
    covers the core set of computer ethics from professional responsibility
    to the consequences of technology in society.
Continu
  es
One of the most definitive sets
of ethical standards is the
Association for Computing
Machinery Code of Ethics. The
code is a four-point standard
governing ethical behavior
among computing
professionals. It covers the
core set of computer ethics
from professional responsibility
to the consequences of
technology in society.
Computer
crime
When computers first began to be used in society
at large, the absence of ethical standards about
their use and related issues caused some
problems. However, as their use became
widespread in every facet of our lives, discussions
in computer ethics resulted in some kind of a
consensus. Computer crime and computer fraud
the law is against them.
TEN COMMAND OF
COMPUTER ETHICS.
    Those shall not use a computer to harm other people.

    Those shall not interfere with other people's computer work.

    Those shall not snoop around in other peoples files.

    Those shall not use a computer to steal.

    Those shall not use a computer to bear false witness.

    Those shall not use or copy software for which you have not paid.

    Those shall not use other people's computer resources without

    authorization.
    Those shall not appropriate other people's intellectual output.

    Those shall think about the social consequences of the program

    you write.
    Those shall use a computer in ways that show consideration and

    respect.
ALERT INFORM
     Be careful about talking to strangers on a
    computer network.
     Who are these people anyway? Remember that people

    online may not be who they seem at first.

  Never respond to messages or bulletin board items that

  are:
 Suggestive of something improper or indecent.


    Obscene, filthy, or offensive to accepted standards of

    decency.

    Belligerent, hostile, combative, very aggressive.

Continues
    Threaten to do harm or danger towards you or

    another
    Introduction to computer ethics the world of

    worldwide wed is growing on the past of yeas and
    today as unprecedented rate as this one grown is
    not only increasing the rate and the amount
    available knowledge but also increase the problem
    inherent to it usage and distribution.
 All  of these are recently common on
    an everyday life.
. Criminals Can Operate Anonymously
Over the Computer Networks
  Respect PRIVACY Do not repost a

  message that was sent to you privately
  without permission.
 Do not send information using
  someone else name.
 Personal rights.
 Illegal acts.
 Remember that the internet is access is
  a privilege not a right.

More Related Content

What's hot

PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
Scøtt Lıgøckı
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
Kak Yong
 

What's hot (20)

Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

Viewers also liked (8)

Are Personal Ethics Enough
Are Personal Ethics EnoughAre Personal Ethics Enough
Are Personal Ethics Enough
 
Role of Ethics in Personal Finance
Role of Ethics in Personal FinanceRole of Ethics in Personal Finance
Role of Ethics in Personal Finance
 
Ethic02
Ethic02Ethic02
Ethic02
 
Intro to Ethical Decision Making: Ethics and Moral Values
Intro to Ethical Decision Making: Ethics and Moral ValuesIntro to Ethical Decision Making: Ethics and Moral Values
Intro to Ethical Decision Making: Ethics and Moral Values
 
Business ethics C1 -moral_ethics_ethical_dilemma
Business ethics C1  -moral_ethics_ethical_dilemmaBusiness ethics C1  -moral_ethics_ethical_dilemma
Business ethics C1 -moral_ethics_ethical_dilemma
 
Ethics and Moral Value
Ethics and Moral ValueEthics and Moral Value
Ethics and Moral Value
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Ethics
EthicsEthics
Ethics
 

Similar to Computer Ethics Final Work

Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)
Maria Obaidi
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 

Similar to Computer Ethics Final Work (20)

Nfwordle
NfwordleNfwordle
Nfwordle
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computing
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Computer Research Papers
Computer Research PapersComputer Research Papers
Computer Research Papers
 
P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Computer Ethics Final Work

  • 1.
  • 2. What is computer ethics? Ethics is a set of moral principles that govern the behavior of  a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. As technology advances, computers continue to have a  greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies.
  • 3. What are some issues? Identifying ethical issues as they arise, as well as defining how to deal with them, has traditionally been problematic in computer ethics. Some have argued against the idea of computer ethics as a whole. However, a new proposed of a method of identifying issues in computer ethics in their Paramedic Ethics model. The model is a data-centered view of judging ethical issues, involving the gathering, analysis, negotiation, and judging of data about the issue.
  • 4. What is the ethic standards? iLink Edge was founded by Michael Stankiewicz in order to provide Computer Forensic consulting services to legal and corporate entities. The goal of the relationship with the client is to provide the utmost professional service establishing a confidential line of communication in order to meet the client's expectations of data discovery and analysis. One of the most definitive sets of ethical standards is the Association  for Computing Machinery Code of Ethics. The code is a four-point standard governing ethical behavior among computing professionals. It covers the core set of computer ethics from professional responsibility to the consequences of technology in society.
  • 5. Continu es One of the most definitive sets of ethical standards is the Association for Computing Machinery Code of Ethics. The code is a four-point standard governing ethical behavior among computing professionals. It covers the core set of computer ethics from professional responsibility to the consequences of technology in society.
  • 6. Computer crime When computers first began to be used in society at large, the absence of ethical standards about their use and related issues caused some problems. However, as their use became widespread in every facet of our lives, discussions in computer ethics resulted in some kind of a consensus. Computer crime and computer fraud the law is against them.
  • 7. TEN COMMAND OF COMPUTER ETHICS. Those shall not use a computer to harm other people.  Those shall not interfere with other people's computer work.  Those shall not snoop around in other peoples files.  Those shall not use a computer to steal.  Those shall not use a computer to bear false witness.  Those shall not use or copy software for which you have not paid.  Those shall not use other people's computer resources without  authorization. Those shall not appropriate other people's intellectual output.  Those shall think about the social consequences of the program  you write. Those shall use a computer in ways that show consideration and  respect.
  • 8. ALERT INFORM Be careful about talking to strangers on a computer network. Who are these people anyway? Remember that people  online may not be who they seem at first. Never respond to messages or bulletin board items that  are:  Suggestive of something improper or indecent. Obscene, filthy, or offensive to accepted standards of  decency. Belligerent, hostile, combative, very aggressive. 
  • 9. Continues Threaten to do harm or danger towards you or  another Introduction to computer ethics the world of  worldwide wed is growing on the past of yeas and today as unprecedented rate as this one grown is not only increasing the rate and the amount available knowledge but also increase the problem inherent to it usage and distribution.  All of these are recently common on an everyday life.
  • 10. . Criminals Can Operate Anonymously Over the Computer Networks Respect PRIVACY Do not repost a  message that was sent to you privately without permission.  Do not send information using someone else name.  Personal rights.  Illegal acts.  Remember that the internet is access is a privilege not a right.