SlideShare a Scribd company logo
Technology and Ethics
When and How to
Use Technology?
Group
members:
Zeeshan Iqbal
Tahha
What is
ethics of
technology
?
 Ethics of technology is a sub-
field of ethics addressing the
ethical questions specific to
our current Technological
Age. It is often said that
technology itself is incapable
of processing or void of
ethical qualities, since
“technology” is merely tool
making.
Internet Ethics
IT DESCRIBES A CODE OF
CONDUCT FOR THE USERS OF THE
INTERNET.
Ethical and moral issues associated with
internet
 Cyberbullying
 Copyrightissues
 Plagiarism
 Useofphotoeditorstodistortreality
 Privacy
 Hacking
 Inappropriatewebsiteswithillicitmaterial
 ViolationofConsumerprivacylaws
What is cyber bullying?
Electronic Aggression
Online Rumors
Posting pictures without consent /Harassment
HACKING
OnlineBankHacking
WebsiteHacking
Computer Hacking
UserCredentialsHackingandsoon.
Copyright issues
 Anydigitalitemcanbeexpensivetoproducethe firsttime
around. Yet, onceitisproduced, thatinformation hasthe
illusivequality ofbeingeasytoreproduceandtosharewith
others.Wecurrentlyhaveseveralimperfectinstitutions that
trytoprotect intellectual property rights.Copyrights, patents,
encryption,oathsofconfidentiality, andsucholdfashioned
valuesastrustworthiness andloyalty arethemostcommonly
usedprotectorsofourintellectual property.
User data
Due to the advent of online
shopping, personal details of
individuals are prone to
misuse
• Personal information being
sold to telemarketing firms
without consent
Technoethics In Education
Plagiarism
Unequal distribution of digital
resources among institutes
Plagiarism
Users/students
can download
anything from
the internet.
They can access any
information, copy paste
it and use it as their own
information.
Research papers are
easily available that
are prone to
plagiarism
Technology and Ethics During Coronavirus Pandemic
Persons Tracking
Online rumors on Social Media
Privacy Violation
Common Unethical Technology Use
Genetically
modified
organisms
Pregnancy
screening
technology
pet cloning
Drones
Conclusion:
 The objectives of technological ethics are to
ensure the privacy and safety of its users, to keep
people from misusing it, and to guarantee that
someone’s work isn’t plagiarized.

More Related Content

Similar to Technology and Ethics project (1).pptx

hackers
hackershackers
hackers
Aya Eltayed
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
ShailendraPandey96
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
Aten Kecik
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Hajar Len
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
talhaabid
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Hajar Len
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
stephanieprovitt
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
stephanieprovitt
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
2011 4-define-ethics-and-law
2011 4-define-ethics-and-law2011 4-define-ethics-and-law
2011 4-define-ethics-and-law
cikgushaharizan
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
RobertBhattarai
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
Academic Research Paper Writing Services
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
Academic Research Paper Writing Services
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
larkinsa
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
Suad 00
 
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docxSumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
deanmtaylor1545
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
Gregory Barnes
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
glorysunny
 
Ethics
EthicsEthics

Similar to Technology and Ethics project (1).pptx (20)

hackers
hackershackers
hackers
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
2011 4-define-ethics-and-law
2011 4-define-ethics-and-law2011 4-define-ethics-and-law
2011 4-define-ethics-and-law
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
 
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docxSumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Ethics
EthicsEthics
Ethics
 

Recently uploaded

Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 

Recently uploaded (20)

Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 

Technology and Ethics project (1).pptx