SlideShare a Scribd company logo
1 of 6
by Scott M. Ligocki Jr.   Computer Ethics
Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct online.   Ethical decisions related to computer technology and usage can typically be categorized into 3 primary influences:  The individual’s own personal code.   Any informal code of ethical behavior that exists in the work place.   Exposure to formal code of ethics.  The Beginning
To understand the foundation of Computer Ethics, it is important to examine the different schools of ethical theory.   Relativism - the understanding that there are no universal moral norms of right and wrong.   Kantianism - the belief that people’s actions are to be guided by moral laws, and that these moral laws are universal.  Utilitarianism - the belief that an action is good if it benefits someone and an action is bad if it harms someone.   Social contract - the concept that for a society to arise and maintain order, a morality based set of rules must be agreed upon.   The Foundation
In 1950 Norbert Weiner, an MIT professor and inventor of an information feedback system called “Cybernetics", published a book called: The Human Use of Human Beings,which laid out the basic foundations of computer ethics and made Norbert Weiner the father of computer ethics.   The 1990's were a time when computers were reaching their pinnacle.  The combination of computers, with telecommunication, the internet and other media meant that many new ethical issues were being raised.   In the year 1992, the Association for Computing Machinery adopted a new set of ethical rules called: ACM Code of Ethics and Professional Conduct, which consisted of 24 statements of personal responsibility.  The History
With the increase in social networking, more and more people are allowing their private information to be shared publicly.  The power struggles of the real world have easily transferred onto the internet.  Independent users, businesses, and search engines are subject to manipulation, bias and censorship, whether they realize it or not.  This gives views to certain issues or events that may or may not be modified, which could easily bend public opinion in frightening ways. International news can spread across the globe in very little time.  The internet can easily be controlled by companies or organizations trying to get the public to buy in to certain things.   In reference to Computer Ethics, there is a lot to be said about Internet Privacy.  The Internet
Computer Ethics Identifying ethical issues as they arise, as well as defining how to deal with them.

More Related Content

What's hot

Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
Kak Yong
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
UMaine
 

What's hot (20)

Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 

Viewers also liked

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)
Rana Muhammad Asif
 
Ethical vs non ethical marketing
Ethical vs non ethical marketingEthical vs non ethical marketing
Ethical vs non ethical marketing
Sayali Pange
 
Computer Generations
Computer GenerationsComputer Generations
Computer Generations
Aris Santos
 
Sears Subject Headings
Sears Subject HeadingsSears Subject Headings
Sears Subject Headings
Erica Findley
 
Collection development: selection Context, criteria on selection and electron...
Collection development: selection Context, criteria on selection and electron...Collection development: selection Context, criteria on selection and electron...
Collection development: selection Context, criteria on selection and electron...
Jennifer Laluna
 
Dealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizationsDealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizations
Kenny Nguyen
 
Ranganathan and Reference Service in the Modern Library
Ranganathan and Reference Service in the Modern LibraryRanganathan and Reference Service in the Modern Library
Ranganathan and Reference Service in the Modern Library
Jenna Kammer
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software Engineering
Lemi Orhan Ergin
 

Viewers also liked (20)

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And Computing
 
Sis 2008
Sis 2008Sis 2008
Sis 2008
 
Utility Players: A Library's Research Services Easily Integrate into Translat...
Utility Players: A Library's Research Services Easily Integrate into Translat...Utility Players: A Library's Research Services Easily Integrate into Translat...
Utility Players: A Library's Research Services Easily Integrate into Translat...
 
Five laws of Library Science by S R Ranganathan
Five laws of Library Science by S R RanganathanFive laws of Library Science by S R Ranganathan
Five laws of Library Science by S R Ranganathan
 
Ethical vs non ethical marketing
Ethical vs non ethical marketingEthical vs non ethical marketing
Ethical vs non ethical marketing
 
S R Ranganathan Powerpoint
S R  Ranganathan PowerpointS R  Ranganathan Powerpoint
S R Ranganathan Powerpoint
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Computer Generations
Computer GenerationsComputer Generations
Computer Generations
 
Importance of Ethics
Importance of EthicsImportance of Ethics
Importance of Ethics
 
Laws of library science
Laws of library scienceLaws of library science
Laws of library science
 
Sears Subject Headings
Sears Subject HeadingsSears Subject Headings
Sears Subject Headings
 
Collection development: selection Context, criteria on selection and electron...
Collection development: selection Context, criteria on selection and electron...Collection development: selection Context, criteria on selection and electron...
Collection development: selection Context, criteria on selection and electron...
 
Dealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizationsDealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizations
 
Comparative study of major classification schemes
Comparative study of major classification schemesComparative study of major classification schemes
Comparative study of major classification schemes
 
Library Types & Personnel Roles
Library Types & Personnel RolesLibrary Types & Personnel Roles
Library Types & Personnel Roles
 
Ranganathan and Reference Service in the Modern Library
Ranganathan and Reference Service in the Modern LibraryRanganathan and Reference Service in the Modern Library
Ranganathan and Reference Service in the Modern Library
 
The Role of Libraries and Librarians in Information Literacy
The Role of Libraries and Librarians in Information LiteracyThe Role of Libraries and Librarians in Information Literacy
The Role of Libraries and Librarians in Information Literacy
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software Engineering
 

Similar to PPT Lab Assignment - Computers - Computer Ethics

Ict2 somehistoricalmilestone-ja barrientos
Ict2 somehistoricalmilestone-ja barrientosIct2 somehistoricalmilestone-ja barrientos
Ict2 somehistoricalmilestone-ja barrientos
Jonnalyn Barrientos
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
johniemcm5zt
 

Similar to PPT Lab Assignment - Computers - Computer Ethics (20)

Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppt
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ict2 somehistoricalmilestone-ja barrientos
Ict2 somehistoricalmilestone-ja barrientosIct2 somehistoricalmilestone-ja barrientos
Ict2 somehistoricalmilestone-ja barrientos
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Some Historical Milestone
Some Historical MilestoneSome Historical Milestone
Some Historical Milestone
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
a.pptx
a.pptxa.pptx
a.pptx
 
Ijetcas14 345
Ijetcas14 345Ijetcas14 345
Ijetcas14 345
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
 
INT 1010 05-2.pdf
INT 1010 05-2.pdfINT 1010 05-2.pdf
INT 1010 05-2.pdf
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
 
Computer Research Papers
Computer Research PapersComputer Research Papers
Computer Research Papers
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

PPT Lab Assignment - Computers - Computer Ethics

  • 1. by Scott M. Ligocki Jr. Computer Ethics
  • 2. Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct online. Ethical decisions related to computer technology and usage can typically be categorized into 3 primary influences: The individual’s own personal code. Any informal code of ethical behavior that exists in the work place. Exposure to formal code of ethics. The Beginning
  • 3. To understand the foundation of Computer Ethics, it is important to examine the different schools of ethical theory. Relativism - the understanding that there are no universal moral norms of right and wrong. Kantianism - the belief that people’s actions are to be guided by moral laws, and that these moral laws are universal. Utilitarianism - the belief that an action is good if it benefits someone and an action is bad if it harms someone. Social contract - the concept that for a society to arise and maintain order, a morality based set of rules must be agreed upon. The Foundation
  • 4. In 1950 Norbert Weiner, an MIT professor and inventor of an information feedback system called “Cybernetics", published a book called: The Human Use of Human Beings,which laid out the basic foundations of computer ethics and made Norbert Weiner the father of computer ethics. The 1990's were a time when computers were reaching their pinnacle. The combination of computers, with telecommunication, the internet and other media meant that many new ethical issues were being raised. In the year 1992, the Association for Computing Machinery adopted a new set of ethical rules called: ACM Code of Ethics and Professional Conduct, which consisted of 24 statements of personal responsibility. The History
  • 5. With the increase in social networking, more and more people are allowing their private information to be shared publicly. The power struggles of the real world have easily transferred onto the internet. Independent users, businesses, and search engines are subject to manipulation, bias and censorship, whether they realize it or not. This gives views to certain issues or events that may or may not be modified, which could easily bend public opinion in frightening ways. International news can spread across the globe in very little time. The internet can easily be controlled by companies or organizations trying to get the public to buy in to certain things. In reference to Computer Ethics, there is a lot to be said about Internet Privacy. The Internet
  • 6. Computer Ethics Identifying ethical issues as they arise, as well as defining how to deal with them.