Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
1Anas Habib
Topic: Computer Ethics & Society
Presented by: Anas Habib
2Anas Habib
Ethics
As with any powerful technology, computer
can be use for both good or bad intentions.
The standard that determine w...
History
Norbert Wiener
The concept of computer ethics originated in
1950 when Norbert Wiener, an MIT
professor and invento...
Area of Computer Ethics
• Unauthorized use of Computer and network
• Software theft
• Information accuracy
• Intellectual ...
Unauthorized use of computer and networks
 Unauthorized access is the use of computer or
network without permission.
 Un...
Software Theft
Steal
Software
Media
Intentionally
Erases
Programs
Illegally
Copied a
Program
Illegally
register or
activat...
Information Accuracy
Information accuracy is concern:
Not all information on the web is correct
because it is maintained b...
Intellectual property rights
• Intellectual property:
It is a unique and original work such as ideas,
inventions, art, wri...
Code of conduct
• An IT code of conduct is a written guideline that helps
determine whether a specific computer action is ...
Information Piracy
• Information Piracy refers to the right of
individuals and companies to deny or restrict
the collectio...
Green Computing
• Green computing involves reducing electricity and
environmental waste while using a computer.
Green Comp...
Anas Habib 13
Upcoming SlideShare
Loading in …5
×

Computer Ethics By Anas Habib

527 views

Published on

Published in: Internet, Business, Technology
  • Be the first to comment

  • Be the first to like this

Computer Ethics By Anas Habib

  1. 1. 1Anas Habib
  2. 2. Topic: Computer Ethics & Society Presented by: Anas Habib 2Anas Habib
  3. 3. Ethics As with any powerful technology, computer can be use for both good or bad intentions. The standard that determine whether an action is good or bad are known as ethics. Computer Ethics are the moral guideline that govern the use of computer and information system. 3Anas Habib
  4. 4. History Norbert Wiener The concept of computer ethics originated in 1950 when Norbert Wiener, an MIT professor and inventor of an information feedback system called "cybernetics", published a book called "The Human Use of Human Beings" which laid out the basic foundations of computer ethics and made Norbert Wiener the father of computer ethics. 4Anas Habib
  5. 5. Area of Computer Ethics • Unauthorized use of Computer and network • Software theft • Information accuracy • Intellectual property rights • Code of conduct • Information piracy • Green computing 5Anas Habib
  6. 6. Unauthorized use of computer and networks  Unauthorized access is the use of computer or network without permission.  Unauthorized use is the use of computer or its data for unapproved or possibly illegal activities. 6Anas Habib
  7. 7. Software Theft Steal Software Media Intentionally Erases Programs Illegally Copied a Program Illegally register or activates a Program 7Anas Habib
  8. 8. Information Accuracy Information accuracy is concern: Not all information on the web is correct because it is maintained by other people and companies. User should evaluate the webpage before relying on its content. Be aware that the organization providing access to the information may not be the creator of the information. 8Anas Habib
  9. 9. Intellectual property rights • Intellectual property: It is a unique and original work such as ideas, inventions, art, writing, processes, company and product names, and logos. • Intellectual property rights are the rights to which creator are entitle for their work. • Copyright law issues led to the development of Digital right management (DRM), a strategy designed to prevent illegal distribution of movies, music and other digital content. 9Anas Habib
  10. 10. Code of conduct • An IT code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical. 1. Thou shalt not use a computer in ways that may harm people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. 10Anas Habib
  11. 11. Information Piracy • Information Piracy refers to the right of individuals and companies to deny or restrict the collection and use of information about them. • It is important to safeguard your information. 11Anas Habib
  12. 12. Green Computing • Green computing involves reducing electricity and environmental waste while using a computer. Green Computing Suggestion: 1. Use computer and devices that comply with ENERGY STAR program. 2. Don’t leave the computer running overnight. 3. Turn off the monitor, printer, and other devices when not in use. 4. Use LCD instead of CRT monitor. 5. Use paper less methods of communicating. 6. Recycle papers. 7. Buy recycled papers. 8. Recycle toner cartridges. 9. Recycle old computers, printer, and other devices. 10. Telecommute to save gas. 11. Use video conferencing and VoIP for meetings. 12Anas Habib
  13. 13. Anas Habib 13

×