SlideShare a Scribd company logo
1 of 11
COMPUTER
ETHICS
PRESENTED BY
AGLAIA
What are Ethics?
Ethics are a structure of standards and practices
that influence how people lead their lives. It is
not strictly implemented to follow these ethics,
but it is basically for the benefit of everyone that
we do.
Ethics are unlike laws that legally mandate what
is right or wrong. Ethics illustrate society’s
views about what is right and what is wrong.
Computer Ethics
Computer ethics are a set of moral standards that
govern the use of computers. It is society’s
views about the use of computers, both hardware
and software. Privacy concerns, intellectual
property rights and effects on the society are
some of the common issues of computer ethics.
Privacy Concerns
Hacking – is unlawful intrusion into a computer or a
network. A hacker can intrude through the security
levels of a computer system or network and can
acquire unauthorised access to other computers.
Malware – means malicious software which is
created to impair a computer system. Common
malware are viruses, spyware, worms and trojan
horses. A virus can delete files from a hard drive
while a spyware can collect data from a computer.
Data Protection – also known as information
privacy or data privacy is the process of
safeguarding data which intends to influence a
balance between individual privacy rights while
still authorising data to be used for business
purposes.
Anonymity – is a way of keeping a user’s
identity masked through various applications.
Intellectual Property Rights
Copyright – is a form of intellectual property that
gives proprietary publication, distribution and usage
rights for the author. This means that whatever idea
the author created cannot be employed or
disseminated by anyone else without the permission
of the author.
Plagiarism – is an act of copying and publishing
another person’s work without proper citation. It’s
like stealing someone else’s work and releasing it as
your own work.
Cracking – is a way of breaking into a system by
getting past the security features of the system.
It’s a way of skipping the registration and
authentication steps when installing a software.
Software License – allows the use of digital
material by following the license agreement.
Ownership remains with the original copyright
owner, users are just granted licenses to use the
material based on the agreement.
Effects on Society
Jobs – Some jobs have been abolished while some jobs
have become simpler as computers have taken over
companies and businesses. Things can now be done in just
one click whereas before it takes multiple steps to perform
a task. This change may be considered unethical as it
limits the skills of the employees.
There are also ethical concerns on health and safety of
employees getting sick from constant sitting, staring at
computer screens and typing on the keyboard or clicking
on the mouse.
Environmental Impact – Environment has been
affected by computers and the internet since so
much time spent using computers increases energy
usage which in turn increases the emission of
greenhouse gases.
There are ways where we can save energy like
limiting computer time and turning off the computer
or putting on sleep mode when not in use. Buying
energy efficient computers with Energy Star label
can also help save the environment.
Social Impact – Computers and the internet help people stay in
touch with family and friends. Social media has been very
popular nowadays.
Computer gaming influenced society both positively and
negatively. Positive effects are improved hand-eye
coordination, stress relief and improved strategic thinking.
Negative effects are addiction of gamers, isolation from the
real world and exposure to violence.
Computer technology helps the government in improving
services to its citizens. Advanced database can hold huge data
being collected and analysed by the government.
Computer technology aids businesses by automating processes,
reports and analysis.
Thank you
For more…. Mail to
aglaiaconnect2018@gmail.com

More Related Content

What's hot

Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Software Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEESoftware Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEESamsuddoha Sams
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsMichael Heron
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing professionshahmansoor109
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 

What's hot (20)

Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Software Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEESoftware Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEE
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering  Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Similar to Computer ethics

Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics pptWulax37
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitysuperb11b
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Alexander Decker
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)ChristopherAntonius
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment Jenny Coloma
 

Similar to Computer ethics (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment
 

More from Aglaia Connect

Underground construction
Underground constructionUnderground construction
Underground constructionAglaia Connect
 
Reactive powder-concrete
Reactive powder-concreteReactive powder-concrete
Reactive powder-concreteAglaia Connect
 
Self healing-material-bacterial-concrete
Self healing-material-bacterial-concreteSelf healing-material-bacterial-concrete
Self healing-material-bacterial-concreteAglaia Connect
 
Structural behavious-of-high-strength-concrete
Structural behavious-of-high-strength-concreteStructural behavious-of-high-strength-concrete
Structural behavious-of-high-strength-concreteAglaia Connect
 
Aerated autoclaved-concrete
Aerated autoclaved-concreteAerated autoclaved-concrete
Aerated autoclaved-concreteAglaia Connect
 
Transatlantic tunnel-floating-tunnel
Transatlantic tunnel-floating-tunnelTransatlantic tunnel-floating-tunnel
Transatlantic tunnel-floating-tunnelAglaia Connect
 
Marble and-quarry-dust-as-additives-in-concrete
Marble and-quarry-dust-as-additives-in-concrete Marble and-quarry-dust-as-additives-in-concrete
Marble and-quarry-dust-as-additives-in-concrete Aglaia Connect
 
Plastic waste into fuel using pyrolysis process
Plastic waste into fuel using pyrolysis processPlastic waste into fuel using pyrolysis process
Plastic waste into fuel using pyrolysis processAglaia Connect
 
Geotextile for soil stabilization
Geotextile for soil stabilizationGeotextile for soil stabilization
Geotextile for soil stabilizationAglaia Connect
 
Corrosion control of underwater piles
Corrosion control of underwater pilesCorrosion control of underwater piles
Corrosion control of underwater pilesAglaia Connect
 
Constucted wetlands for waste water treatment
Constucted wetlands for waste water treatmentConstucted wetlands for waste water treatment
Constucted wetlands for waste water treatmentAglaia Connect
 
Coconut shell as coarse aggregate in the concrete
Coconut shell as coarse aggregate in the concreteCoconut shell as coarse aggregate in the concrete
Coconut shell as coarse aggregate in the concreteAglaia Connect
 
Usage of geogrids in flexible pavement
Usage of geogrids in flexible pavementUsage of geogrids in flexible pavement
Usage of geogrids in flexible pavementAglaia Connect
 
Usage of geogrids in flexible pavement
Usage of geogrids in flexible pavementUsage of geogrids in flexible pavement
Usage of geogrids in flexible pavementAglaia Connect
 
Waste water purification using cnstructed wetlands
Waste water purification using cnstructed wetlandsWaste water purification using cnstructed wetlands
Waste water purification using cnstructed wetlandsAglaia Connect
 

More from Aglaia Connect (20)

Underground construction
Underground constructionUnderground construction
Underground construction
 
Self curing-concrete-
Self curing-concrete-Self curing-concrete-
Self curing-concrete-
 
Trenchless technology
Trenchless technologyTrenchless technology
Trenchless technology
 
Reactive powder-concrete
Reactive powder-concreteReactive powder-concrete
Reactive powder-concrete
 
Stress ribbon-bridges
Stress ribbon-bridgesStress ribbon-bridges
Stress ribbon-bridges
 
Self healing-material-bacterial-concrete
Self healing-material-bacterial-concreteSelf healing-material-bacterial-concrete
Self healing-material-bacterial-concrete
 
Structural behavious-of-high-strength-concrete
Structural behavious-of-high-strength-concreteStructural behavious-of-high-strength-concrete
Structural behavious-of-high-strength-concrete
 
Aerated autoclaved-concrete
Aerated autoclaved-concreteAerated autoclaved-concrete
Aerated autoclaved-concrete
 
Transatlantic tunnel-floating-tunnel
Transatlantic tunnel-floating-tunnelTransatlantic tunnel-floating-tunnel
Transatlantic tunnel-floating-tunnel
 
Tube structures
Tube structuresTube structures
Tube structures
 
Marble and-quarry-dust-as-additives-in-concrete
Marble and-quarry-dust-as-additives-in-concrete Marble and-quarry-dust-as-additives-in-concrete
Marble and-quarry-dust-as-additives-in-concrete
 
Plastic waste into fuel using pyrolysis process
Plastic waste into fuel using pyrolysis processPlastic waste into fuel using pyrolysis process
Plastic waste into fuel using pyrolysis process
 
Geotextile for soil stabilization
Geotextile for soil stabilizationGeotextile for soil stabilization
Geotextile for soil stabilization
 
Corrosion control of underwater piles
Corrosion control of underwater pilesCorrosion control of underwater piles
Corrosion control of underwater piles
 
Constucted wetlands for waste water treatment
Constucted wetlands for waste water treatmentConstucted wetlands for waste water treatment
Constucted wetlands for waste water treatment
 
Coconut shell as coarse aggregate in the concrete
Coconut shell as coarse aggregate in the concreteCoconut shell as coarse aggregate in the concrete
Coconut shell as coarse aggregate in the concrete
 
Usage of geogrids in flexible pavement
Usage of geogrids in flexible pavementUsage of geogrids in flexible pavement
Usage of geogrids in flexible pavement
 
Pervious concrete
Pervious concretePervious concrete
Pervious concrete
 
Usage of geogrids in flexible pavement
Usage of geogrids in flexible pavementUsage of geogrids in flexible pavement
Usage of geogrids in flexible pavement
 
Waste water purification using cnstructed wetlands
Waste water purification using cnstructed wetlandsWaste water purification using cnstructed wetlands
Waste water purification using cnstructed wetlands
 

Recently uploaded

Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentationmintusiprd
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixCIToolkit
 
self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...afaqsaeed463
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)jennyeacort
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insightWayne Abrahams
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchRashtriya Kisan Manch
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsCIToolkit
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingCIToolkit
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentationcraig524401
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Reviewthomas851723
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证jdkhjh
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineeringthomas851723
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sectorthomas851723
 
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...AgileNetwork
 

Recently uploaded (17)

Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentation
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
 
self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
 
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Servicesauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insight
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield Metrics
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentation
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Review
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineering
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sector
 
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
 

Computer ethics

  • 2. What are Ethics? Ethics are a structure of standards and practices that influence how people lead their lives. It is not strictly implemented to follow these ethics, but it is basically for the benefit of everyone that we do. Ethics are unlike laws that legally mandate what is right or wrong. Ethics illustrate society’s views about what is right and what is wrong.
  • 3. Computer Ethics Computer ethics are a set of moral standards that govern the use of computers. It is society’s views about the use of computers, both hardware and software. Privacy concerns, intellectual property rights and effects on the society are some of the common issues of computer ethics.
  • 4. Privacy Concerns Hacking – is unlawful intrusion into a computer or a network. A hacker can intrude through the security levels of a computer system or network and can acquire unauthorised access to other computers. Malware – means malicious software which is created to impair a computer system. Common malware are viruses, spyware, worms and trojan horses. A virus can delete files from a hard drive while a spyware can collect data from a computer.
  • 5. Data Protection – also known as information privacy or data privacy is the process of safeguarding data which intends to influence a balance between individual privacy rights while still authorising data to be used for business purposes. Anonymity – is a way of keeping a user’s identity masked through various applications.
  • 6. Intellectual Property Rights Copyright – is a form of intellectual property that gives proprietary publication, distribution and usage rights for the author. This means that whatever idea the author created cannot be employed or disseminated by anyone else without the permission of the author. Plagiarism – is an act of copying and publishing another person’s work without proper citation. It’s like stealing someone else’s work and releasing it as your own work.
  • 7. Cracking – is a way of breaking into a system by getting past the security features of the system. It’s a way of skipping the registration and authentication steps when installing a software. Software License – allows the use of digital material by following the license agreement. Ownership remains with the original copyright owner, users are just granted licenses to use the material based on the agreement.
  • 8. Effects on Society Jobs – Some jobs have been abolished while some jobs have become simpler as computers have taken over companies and businesses. Things can now be done in just one click whereas before it takes multiple steps to perform a task. This change may be considered unethical as it limits the skills of the employees. There are also ethical concerns on health and safety of employees getting sick from constant sitting, staring at computer screens and typing on the keyboard or clicking on the mouse.
  • 9. Environmental Impact – Environment has been affected by computers and the internet since so much time spent using computers increases energy usage which in turn increases the emission of greenhouse gases. There are ways where we can save energy like limiting computer time and turning off the computer or putting on sleep mode when not in use. Buying energy efficient computers with Energy Star label can also help save the environment.
  • 10. Social Impact – Computers and the internet help people stay in touch with family and friends. Social media has been very popular nowadays. Computer gaming influenced society both positively and negatively. Positive effects are improved hand-eye coordination, stress relief and improved strategic thinking. Negative effects are addiction of gamers, isolation from the real world and exposure to violence. Computer technology helps the government in improving services to its citizens. Advanced database can hold huge data being collected and analysed by the government. Computer technology aids businesses by automating processes, reports and analysis.
  • 11. Thank you For more…. Mail to aglaiaconnect2018@gmail.com