Ethics in computing

2,146 views

Published on

Published in: Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,146
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
82
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Ethics in computing

  1. 1. Ethics In Computing<br />By:- Lakshan Dinuka Bamunusinghe<br /> (IDM-Dip ICT)<br />
  2. 2. What is ethics?<br />Ethics is a set of moral principles that govern the behavior of a group or individual. <br />
  3. 3. What is Computer ethics?<br />Computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society.<br />
  4. 4. Ten Commandments of Computer Ethics.<br />should not use a computer to harm other people.<br />should not interfere with other people's computer work.<br />should not snoop around in other people's files.<br />should not use a computer to steal. <br />should not use a computer to bear false witness.<br />should not use or copy software for which you have not paid. <br />should not use other people's computer resources without authorization.<br />should not appropriate other people's intellectual output. <br />should think about the social consequences of the program you write.<br />should use a computer in ways that show consideration and respect.<br />
  5. 5. 1). Should not use a computer to harm other people.<br />This commandment makes clear that it is unethical to use a computer to harm another user. It Includes,<br /><ul><li> Harming or corrupting some other user's data or files.
  6. 6. Wrong to steal someone's personal information by means of a computer.
  7. 7. Manipulate or destroy the files of other people through the use of a computer.
  8. 8. Writing a programs intended to bring perform . </li></li></ul><li>2). Should not interfere with other people's computer work.<br />Under this category, discussing about the viruses, because viruses are small programs built with intent to harm or disrupt the useful computer programs.<br /><ul><li> Some viruses aim at overloading the computer memory by an excessive use of computer resources.
  9. 9. These viruses tend to fail a computer in executing the desired tasks.
  10. 10. They lead to the dysfunction of a computer.</li></li></ul><li>3).should not snoop around in other people's files.<br />We know that it is wrong to read another person’s letters or documents. In computing,<br /><ul><li>Reading another person’s e-mail.
  11. 11. Obtaining another persons private files.
  12. 12. Snooping around in another person's files or reading someone else's personal messages</li></li></ul><li>4).should not use a computer to steal.<br />If some one using computers to steal using the network connections it is illegal.<br /><ul><li>Stealing of an employee database from a company data base.
  13. 13. Breaking into a bank and retrieving confidential information.
  14. 14. Illegal transfer of money or funds through the computers.</li></li></ul><li>5). Should not use a computer to bear false witness.<br />Computer are the easiest way to spread information by using internet.<br /><ul><li> Spreading the wrong information without any responsibility.
  15. 15. Involving to provide the incorrect information to someone using internet. </li></li></ul><li>6).should not use or copy software for which you have not paid.<br />Software is result of a person or a group. <br /><ul><li>software is also subject to copyrights, like any other literary book or something created by a person.
  16. 16. Obtaining a copy of software without paying or illegally.
  17. 17. Downloading a software from any other web sites without paying.</li></li></ul><li>CD sale in America from 1995 to 2005..<br />
  18. 18. 7).should not use other people's computer resources without authorization.<br />Most of the computers or programs are secured by using IDs or passwords. <br /><ul><li> Breaking into a some other’s passwords.
  19. 19. hack passwords for gaining an unauthorized access to a pass worded computer system.
  20. 20. Hacking other personal computers using internet and getting the information illegally.</li></li></ul><li>8).should not appropriate other people's intellectual output.<br />Every programme has a creator.<br /><ul><li>Programs developed by a programmer in an organization are his/her property.
  21. 21. Copying them and propagating them in one's own name is unethical.
  22. 22. Copying it with selfish intentions is indeed not ethical.</li></li></ul><li>9).should think about the social consequences of the program you write.<br />Before creating programme, everyone must think how it will be effective for the society.<br /><ul><li>Writing a virus, when one knows that it is going to serve as a malware, is indeed unethical.
  23. 23. If a particular content is intended for children or when children are prone to gain access to the content, it is necessary for the creator of such content to be careful about the social consequences it is bound to have.</li></li></ul><li>10).should use a computer in ways that show consideration and respect.<br />When we are doing something we must consider and respect to others.<br /><ul><li>In the real world, we face situation wherein we need to be courteous to our fellow mates.
  24. 24. Many times, we need to cooperate with them and give each of the fellow individuals the consideration due.
  25. 25. On similar lines, while interacting through a computer, a person needs to be nice to the ones he/she interacts with.</li></li></ul><li>The commandments are a way to make people understand the ethics involved in the use of technology.<br />
  26. 26. Thank You!<br />

×