SlideShare a Scribd company logo
1 of 10
Computer Ethics
ATIQ UR REHMAN
Computer Ethics
“Computer ethics is set of moral principles that regulate the use of computers”
Moral issue such as free speech, privacy, respect for property, informed consent,
and harm.
Computers have become the technological backbone of society due their
complexity, range of applications, and sheer numbers which continue to increase.
Electronic computers are still only a few decades old, and it is difficult to foresee
all the moral issues that will eventually surround them.
Computer ethics has special importance for professionals working as designers of
computers, programmers, systems analysts, and operators.
“Computer abuse” is unethical or illegal conduct of computers.
Internet
Internet is the global system of interconnected computer networks that uses
the Internet protocol suite (TCP/IP) to communicate between networks and
devices.
Internet which is now a global network of networks, initially using the
infrastructure of the telephone system and now carried by many
telecommunication systems by wire, fiber, or wireless systems.
The Internet has magnified all issues in computer ethics.
Internet has brought forward issues of free speech, including hate speech, control
of obscene forms of pornography, spam (unwanted commercial speech), and
defamation(libel).
Internet Free Speech Issues
Hate speech, speech or expression that unfairly criticizes a person or persons on
the basis of (alleged) membership in a social group identified by attributes such as
race, ethnicity, gender, sexual orientation, religion, age, physical or mental
disability, and others.
Pornography is representation of sexual behavior in books, pictures, statues,
motion pictures, and other media that is intended to cause sexual excitement.
Spamming is the use of messaging systems to send an unsolicited message to
large numbers of recipients for the purpose of commercial advertising, non-
commercial conversions, or for any prohibited purpose.
Defamation is the oral or written communication of a false statement about
another that unjustly harms their reputation and usually constitutes a tort or crime.
Combating Internet Free Speech
Two types of control of pornography and hate speech have been attempted:
Top-down control by governments, and bottom-up controls by individuals and
groups in the marketplace.
Web sites that provide rating services for screening material should avoid hidden
political agendas.
Some enthusiasts however, argue that controlling free speech on the Internet
would undermine principles of freedom, equality, and opportunity power of
tyrants who have blocked democratic freedoms in their country.
Power RelationshipsEarlier it was thought computers would concentrate power in a few centralized
bureaucracies, however with advent of microcomputers small size with high power,
economically competitive with larger models, remote access and time-sharing made it
decentralized.
A few moral issues about power relationships are;
Job Elimination computers continue to lead to the elimination of some jobs.
Customer Relations public accountability of businesses using computer-based
services.
Biased Software programs can be biased like any form of communication or way of
doing things.
Stock Trading Programmed trading is the automatic, hands off, computer trading of
stocks, futures, and options on the stock market.
Military Weapons autonomous weapons that can be aimed and fired by onboard
computers that make all necessary decisions, including enemy identification.
Property
There are two critical issues regarding property rights in computers
1. Embezzlement
2. Theft of software and information
Privacy
Storage, retrieval, and transmission of information using computers as data processors has
revolutionized communication. Yet this very benefit poses moral threats to the right to privacy.
Related issues are;
Inappropriate Access
Hackers
Legal Responses
Additional Issues
Computer Failures
Computer Implementation
Health Conditions
Computer ethics

More Related Content

What's hot

Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandan
SVS College
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
FaHaD .H. NooR
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
UMaine
 

What's hot (19)

PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandan
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Shak taha
Shak tahaShak taha
Shak taha
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Use
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethics
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Should Government Control the Internet and its contents
Should Government Control the Internet and its contentsShould Government Control the Internet and its contents
Should Government Control the Internet and its contents
 

Similar to Computer ethics

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
Aten Kecik
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
Suad 00
 

Similar to Computer ethics (20)

Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
COMPUTER_ETHICS presentation for Engineer
COMPUTER_ETHICS presentation for EngineerCOMPUTER_ETHICS presentation for Engineer
COMPUTER_ETHICS presentation for Engineer
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
E commerce
E commerceE commerce
E commerce
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 

More from AtiqurRehman129

More from AtiqurRehman129 (7)

Team work and professional rights
Team work and professional rightsTeam work and professional rights
Team work and professional rights
 
Technology transfer
Technology transferTechnology transfer
Technology transfer
 
Environmental ethics
Environmental ethicsEnvironmental ethics
Environmental ethics
 
Conflict of interests
Conflict of interestsConflict of interests
Conflict of interests
 
Confidentiality in professions
Confidentiality in professionsConfidentiality in professions
Confidentiality in professions
 
Safety and risk
Safety and riskSafety and risk
Safety and risk
 
Honesty and research integrity
Honesty and research integrityHonesty and research integrity
Honesty and research integrity
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Recently uploaded (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 

Computer ethics

  • 2. Computer Ethics “Computer ethics is set of moral principles that regulate the use of computers” Moral issue such as free speech, privacy, respect for property, informed consent, and harm. Computers have become the technological backbone of society due their complexity, range of applications, and sheer numbers which continue to increase. Electronic computers are still only a few decades old, and it is difficult to foresee all the moral issues that will eventually surround them. Computer ethics has special importance for professionals working as designers of computers, programmers, systems analysts, and operators. “Computer abuse” is unethical or illegal conduct of computers.
  • 3. Internet Internet is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. Internet which is now a global network of networks, initially using the infrastructure of the telephone system and now carried by many telecommunication systems by wire, fiber, or wireless systems. The Internet has magnified all issues in computer ethics. Internet has brought forward issues of free speech, including hate speech, control of obscene forms of pornography, spam (unwanted commercial speech), and defamation(libel).
  • 4. Internet Free Speech Issues Hate speech, speech or expression that unfairly criticizes a person or persons on the basis of (alleged) membership in a social group identified by attributes such as race, ethnicity, gender, sexual orientation, religion, age, physical or mental disability, and others. Pornography is representation of sexual behavior in books, pictures, statues, motion pictures, and other media that is intended to cause sexual excitement. Spamming is the use of messaging systems to send an unsolicited message to large numbers of recipients for the purpose of commercial advertising, non- commercial conversions, or for any prohibited purpose. Defamation is the oral or written communication of a false statement about another that unjustly harms their reputation and usually constitutes a tort or crime.
  • 5. Combating Internet Free Speech Two types of control of pornography and hate speech have been attempted: Top-down control by governments, and bottom-up controls by individuals and groups in the marketplace. Web sites that provide rating services for screening material should avoid hidden political agendas. Some enthusiasts however, argue that controlling free speech on the Internet would undermine principles of freedom, equality, and opportunity power of tyrants who have blocked democratic freedoms in their country.
  • 6. Power RelationshipsEarlier it was thought computers would concentrate power in a few centralized bureaucracies, however with advent of microcomputers small size with high power, economically competitive with larger models, remote access and time-sharing made it decentralized. A few moral issues about power relationships are; Job Elimination computers continue to lead to the elimination of some jobs. Customer Relations public accountability of businesses using computer-based services. Biased Software programs can be biased like any form of communication or way of doing things. Stock Trading Programmed trading is the automatic, hands off, computer trading of stocks, futures, and options on the stock market. Military Weapons autonomous weapons that can be aimed and fired by onboard computers that make all necessary decisions, including enemy identification.
  • 7. Property There are two critical issues regarding property rights in computers 1. Embezzlement 2. Theft of software and information
  • 8. Privacy Storage, retrieval, and transmission of information using computers as data processors has revolutionized communication. Yet this very benefit poses moral threats to the right to privacy. Related issues are; Inappropriate Access Hackers Legal Responses
  • 9. Additional Issues Computer Failures Computer Implementation Health Conditions