SlideShare a Scribd company logo
1 of 8
Download to read offline
Computer Ethics: Some Case Study
Dr. Varun Kumar
Dr. Varun Kumar (IIIT Surat) Lecture-3 1 / 8
Outlines
1 Computer Ethics: Case Study
Should I Copy Software ?
Should a Company Data Mine ?
Freedom of Expression
Professional Responsibility
Dr. Varun Kumar (IIIT Surat) Lecture-3 2 / 8
Computer Ethics: Scenario
A Should I copy software ?
⇒ Ramesh invests a small amounts on the stock market.
⇒ Last year he bought and successfully employed a software package to
help him with his investments.
⇒ Recently, he met Suresh who was also interested in using the software.
⇒ Suresh borrowed the package, copied it and then returns it. Both
vaguely knew that the software was proprietary but did not read up
the details.
Q Did Ramesh and Suresh do anything wrong, if so what?
Ans Something to consider:
Should software package be lent?
When is it justifiable to break the law? Bad law, inappropriate law or if
the law is easy to break?
Dr. Varun Kumar (IIIT Surat) Lecture-3 3 / 8
B Should a company data mine ?
⇒ Data mining is a process of exploration and analysis of large
quantities of data, by automatic or semi-automatic means.
⇒ This is done in order to discover meaningful patterns and rules.
⇒ In many cases, the data was not collected primarily for the purpose of
Data Mining.
Case study:
⇒ Mr. Vijay sells hardware and software to over 100 000 customers per
year.
⇒ He has 10 years experience.
⇒ As part of the billing process he keeps information on customers.
⇒ He buys and uses a data mining tool to derive useful information
about her clients information such as zip codes, credit card numbers,
ID numbers etc.
Dr. Varun Kumar (IIIT Surat) Lecture-3 4 / 8
Continued-
⇒ Most of this information identifies groups and not individuals.
⇒ He can then use the information to market his wares more efficiently.
Q Is this ethical since customers did not give her the information
for this purpose?
Something to consider:
Should customer be notified?
Is there a need for establishment of a policy?
What should this policy looks like?
Professional responsibility (professional Ethics):
Do professionals have a responsibility to ensure computing serves
humanity well?
Dr. Varun Kumar (IIIT Surat) Lecture-3 5 / 8
C Freedom of expression
⇒ In the US, a student JB posted sex fantasies on the Internet called
Pamela’s ordeal.
⇒ The story was fictional, but JB named the main character, Pamela ,
after a REAL student.
⇒ In it, he described the rape, torture and murder of Pamela.
⇒ He also exchanged e-mails with other people in the newsgroups,
discussing sex acts.
⇒ An alumnus saw this and reported it to the University.
⇒ JB was then arrested and held in custody.
⇒ He was charged with transmitting interstate communication of threat
to injure another person.
⇒ The charges were eventually dropped, but did JB really do anything
wrong?
Dr. Varun Kumar (IIIT Surat) Lecture-3 6 / 8
D Professional responsibility
Something to consider:
Should self-censorship be enforced.
Who decides what is acceptable?
Is there a need for a public policy?
Professional responsibility
⇒ Mike works for a Software development company which develops
computer games for children aged 8-14.
⇒ The latest game that Mike worked on, uses inferential reasoning and
allows players to choose different characters, primarily macho man
and sexy woman.
⇒ The game is used mainly by boys.
⇒ Recently Mike attended a conference on gender and minorities, where
he described the above.
Dr. Varun Kumar (IIIT Surat) Lecture-3 7 / 8
Continued–
⇒ The conference delegates discussed the issue of lower participation of
women in computing and how to make the industry more attractive
to women.
⇒ Back at work, Mike realised that his production team is all male.
Should he refuse to work on this team?
⇒ Should he ask for the team to be reviewed?
⇒ Will the game sell as well if different message was given?
⇒ What is his responsibility?
Something to consider:
Should software package be lent?
When is it justifiable to break the law? Bad law, inappropriate law or
if the law is easy to break?
Dr. Varun Kumar (IIIT Surat) Lecture-3 8 / 8

More Related Content

What's hot

Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1Temesgen Berhanu
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computingUc Man
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Netiquette powerpointbooth
Netiquette powerpointboothNetiquette powerpointbooth
Netiquette powerpointboothkabooth
 

What's hot (20)

Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer crime
Computer crimeComputer crime
Computer crime
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Netiquette powerpointbooth
Netiquette powerpointboothNetiquette powerpointbooth
Netiquette powerpointbooth
 

Similar to Computer Ethics: Some Case Study

Understanding the computer and privacy issues
Understanding the computer and privacy issuesUnderstanding the computer and privacy issues
Understanding the computer and privacy issuesVARUN KUMAR
 
Informative Essay Examples 5Th Grade - Google Search
Informative Essay Examples 5Th Grade - Google SearchInformative Essay Examples 5Th Grade - Google Search
Informative Essay Examples 5Th Grade - Google SearchAngie Willis
 
Case Study on Computer Privacy
Case Study on Computer PrivacyCase Study on Computer Privacy
Case Study on Computer PrivacyVARUN KUMAR
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship VARUN KUMAR
 
New Possibility in Computing
New Possibility in ComputingNew Possibility in Computing
New Possibility in ComputingVARUN KUMAR
 
Are Computer Ethical Issues Unique ?
Are Computer Ethical Issues Unique ?Are Computer Ethical Issues Unique ?
Are Computer Ethical Issues Unique ?VARUN KUMAR
 
Importance Of Sports Essay In English Write An Essa
Importance Of Sports Essay In English Write An EssaImportance Of Sports Essay In English Write An Essa
Importance Of Sports Essay In English Write An EssaSharon Price
 
Gingerbread Writing Paper
Gingerbread Writing PaperGingerbread Writing Paper
Gingerbread Writing PaperAlyssa Schulte
 
Energy Crisis In Pakistan Essay Free. Online assignment writing service.
Energy Crisis In Pakistan Essay Free. Online assignment writing service.Energy Crisis In Pakistan Essay Free. Online assignment writing service.
Energy Crisis In Pakistan Essay Free. Online assignment writing service.Lisa Long
 
Persuasive Essay On Benefits Of Video Games
Persuasive Essay On Benefits Of Video GamesPersuasive Essay On Benefits Of Video Games
Persuasive Essay On Benefits Of Video GamesSamantha Hall
 
Ap Biology Essay Questions Rubrics
Ap Biology Essay Questions RubricsAp Biology Essay Questions Rubrics
Ap Biology Essay Questions RubricsMelissa Bailey
 
Software as a Property
Software as a PropertySoftware as a Property
Software as a PropertyVARUN KUMAR
 
How To Write Scholarship Essay Pd
How To Write Scholarship Essay PdHow To Write Scholarship Essay Pd
How To Write Scholarship Essay PdShannon Sand
 
How Do You Begin A College Application Essay
How Do You Begin A College Application EssayHow Do You Begin A College Application Essay
How Do You Begin A College Application EssayAmanda Cote
 
How To Write A Research Paper Example-Follow Fou
How To Write A Research Paper Example-Follow FouHow To Write A Research Paper Example-Follow Fou
How To Write A Research Paper Example-Follow FouCarla Potier
 
How To Write A Biography Essay
How To Write A Biography EssayHow To Write A Biography Essay
How To Write A Biography EssayJennifer Gutierrez
 
Commercial Law Essay Help. Commercial Law Essay Help
Commercial Law Essay Help. Commercial Law Essay HelpCommercial Law Essay Help. Commercial Law Essay Help
Commercial Law Essay Help. Commercial Law Essay HelpSandra Acirbal
 

Similar to Computer Ethics: Some Case Study (20)

Understanding the computer and privacy issues
Understanding the computer and privacy issuesUnderstanding the computer and privacy issues
Understanding the computer and privacy issues
 
Informative Essay Examples 5Th Grade - Google Search
Informative Essay Examples 5Th Grade - Google SearchInformative Essay Examples 5Th Grade - Google Search
Informative Essay Examples 5Th Grade - Google Search
 
Case Study on Computer Privacy
Case Study on Computer PrivacyCase Study on Computer Privacy
Case Study on Computer Privacy
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship
 
New Possibility in Computing
New Possibility in ComputingNew Possibility in Computing
New Possibility in Computing
 
Are Computer Ethical Issues Unique ?
Are Computer Ethical Issues Unique ?Are Computer Ethical Issues Unique ?
Are Computer Ethical Issues Unique ?
 
Importance Of Sports Essay In English Write An Essa
Importance Of Sports Essay In English Write An EssaImportance Of Sports Essay In English Write An Essa
Importance Of Sports Essay In English Write An Essa
 
Gingerbread Writing Paper
Gingerbread Writing PaperGingerbread Writing Paper
Gingerbread Writing Paper
 
Energy Crisis In Pakistan Essay Free. Online assignment writing service.
Energy Crisis In Pakistan Essay Free. Online assignment writing service.Energy Crisis In Pakistan Essay Free. Online assignment writing service.
Energy Crisis In Pakistan Essay Free. Online assignment writing service.
 
Persuasive Essay On Benefits Of Video Games
Persuasive Essay On Benefits Of Video GamesPersuasive Essay On Benefits Of Video Games
Persuasive Essay On Benefits Of Video Games
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Ap Biology Essay Questions Rubrics
Ap Biology Essay Questions RubricsAp Biology Essay Questions Rubrics
Ap Biology Essay Questions Rubrics
 
Software as a Property
Software as a PropertySoftware as a Property
Software as a Property
 
How To Write Scholarship Essay Pd
How To Write Scholarship Essay PdHow To Write Scholarship Essay Pd
How To Write Scholarship Essay Pd
 
How Do You Begin A College Application Essay
How Do You Begin A College Application EssayHow Do You Begin A College Application Essay
How Do You Begin A College Application Essay
 
How To Write A Research Paper Example-Follow Fou
How To Write A Research Paper Example-Follow FouHow To Write A Research Paper Example-Follow Fou
How To Write A Research Paper Example-Follow Fou
 
How To Write A Biography Essay
How To Write A Biography EssayHow To Write A Biography Essay
How To Write A Biography Essay
 
Commercial Law Essay Help. Commercial Law Essay Help
Commercial Law Essay Help. Commercial Law Essay HelpCommercial Law Essay Help. Commercial Law Essay Help
Commercial Law Essay Help. Commercial Law Essay Help
 

More from VARUN KUMAR

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc ModelVARUN KUMAR
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire ModelVARUN KUMAR
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignVARUN KUMAR
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI DesignVARUN KUMAR
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO SystemVARUN KUMAR
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital DemocracyVARUN KUMAR
 
Ethics of Parasitic Computing
Ethics of Parasitic ComputingEthics of Parasitic Computing
Ethics of Parasitic ComputingVARUN KUMAR
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionVARUN KUMAR
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of ActionVARUN KUMAR
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic AgeVARUN KUMAR
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal PolynomialVARUN KUMAR
 
Patent Protection
Patent ProtectionPatent Protection
Patent ProtectionVARUN KUMAR
 
Copyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawCopyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawVARUN KUMAR
 
Property Right and Software
Property Right and SoftwareProperty Right and Software
Property Right and SoftwareVARUN KUMAR
 
Investigating Data Trials
Investigating Data TrialsInvestigating Data Trials
Investigating Data TrialsVARUN KUMAR
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical IntegrationVARUN KUMAR
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and ControversyVARUN KUMAR
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's IntegrationVARUN KUMAR
 
Protect your online privacy-2
Protect your online privacy-2Protect your online privacy-2
Protect your online privacy-2VARUN KUMAR
 
Interception Act vs Privacy Act
Interception Act vs Privacy ActInterception Act vs Privacy Act
Interception Act vs Privacy ActVARUN KUMAR
 

More from VARUN KUMAR (20)

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc Model
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire Model
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI Design
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI Design
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO System
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital Democracy
 
Ethics of Parasitic Computing
Ethics of Parasitic ComputingEthics of Parasitic Computing
Ethics of Parasitic Computing
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of Action
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of Action
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic Age
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal Polynomial
 
Patent Protection
Patent ProtectionPatent Protection
Patent Protection
 
Copyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawCopyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy Law
 
Property Right and Software
Property Right and SoftwareProperty Right and Software
Property Right and Software
 
Investigating Data Trials
Investigating Data TrialsInvestigating Data Trials
Investigating Data Trials
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical Integration
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and Controversy
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's Integration
 
Protect your online privacy-2
Protect your online privacy-2Protect your online privacy-2
Protect your online privacy-2
 
Interception Act vs Privacy Act
Interception Act vs Privacy ActInterception Act vs Privacy Act
Interception Act vs Privacy Act
 

Recently uploaded

HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsmeharikiros2
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxhublikarsn
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessorAshwiniTodkar4
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 

Recently uploaded (20)

HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 

Computer Ethics: Some Case Study

  • 1. Computer Ethics: Some Case Study Dr. Varun Kumar Dr. Varun Kumar (IIIT Surat) Lecture-3 1 / 8
  • 2. Outlines 1 Computer Ethics: Case Study Should I Copy Software ? Should a Company Data Mine ? Freedom of Expression Professional Responsibility Dr. Varun Kumar (IIIT Surat) Lecture-3 2 / 8
  • 3. Computer Ethics: Scenario A Should I copy software ? ⇒ Ramesh invests a small amounts on the stock market. ⇒ Last year he bought and successfully employed a software package to help him with his investments. ⇒ Recently, he met Suresh who was also interested in using the software. ⇒ Suresh borrowed the package, copied it and then returns it. Both vaguely knew that the software was proprietary but did not read up the details. Q Did Ramesh and Suresh do anything wrong, if so what? Ans Something to consider: Should software package be lent? When is it justifiable to break the law? Bad law, inappropriate law or if the law is easy to break? Dr. Varun Kumar (IIIT Surat) Lecture-3 3 / 8
  • 4. B Should a company data mine ? ⇒ Data mining is a process of exploration and analysis of large quantities of data, by automatic or semi-automatic means. ⇒ This is done in order to discover meaningful patterns and rules. ⇒ In many cases, the data was not collected primarily for the purpose of Data Mining. Case study: ⇒ Mr. Vijay sells hardware and software to over 100 000 customers per year. ⇒ He has 10 years experience. ⇒ As part of the billing process he keeps information on customers. ⇒ He buys and uses a data mining tool to derive useful information about her clients information such as zip codes, credit card numbers, ID numbers etc. Dr. Varun Kumar (IIIT Surat) Lecture-3 4 / 8
  • 5. Continued- ⇒ Most of this information identifies groups and not individuals. ⇒ He can then use the information to market his wares more efficiently. Q Is this ethical since customers did not give her the information for this purpose? Something to consider: Should customer be notified? Is there a need for establishment of a policy? What should this policy looks like? Professional responsibility (professional Ethics): Do professionals have a responsibility to ensure computing serves humanity well? Dr. Varun Kumar (IIIT Surat) Lecture-3 5 / 8
  • 6. C Freedom of expression ⇒ In the US, a student JB posted sex fantasies on the Internet called Pamela’s ordeal. ⇒ The story was fictional, but JB named the main character, Pamela , after a REAL student. ⇒ In it, he described the rape, torture and murder of Pamela. ⇒ He also exchanged e-mails with other people in the newsgroups, discussing sex acts. ⇒ An alumnus saw this and reported it to the University. ⇒ JB was then arrested and held in custody. ⇒ He was charged with transmitting interstate communication of threat to injure another person. ⇒ The charges were eventually dropped, but did JB really do anything wrong? Dr. Varun Kumar (IIIT Surat) Lecture-3 6 / 8
  • 7. D Professional responsibility Something to consider: Should self-censorship be enforced. Who decides what is acceptable? Is there a need for a public policy? Professional responsibility ⇒ Mike works for a Software development company which develops computer games for children aged 8-14. ⇒ The latest game that Mike worked on, uses inferential reasoning and allows players to choose different characters, primarily macho man and sexy woman. ⇒ The game is used mainly by boys. ⇒ Recently Mike attended a conference on gender and minorities, where he described the above. Dr. Varun Kumar (IIIT Surat) Lecture-3 7 / 8
  • 8. Continued– ⇒ The conference delegates discussed the issue of lower participation of women in computing and how to make the industry more attractive to women. ⇒ Back at work, Mike realised that his production team is all male. Should he refuse to work on this team? ⇒ Should he ask for the team to be reviewed? ⇒ Will the game sell as well if different message was given? ⇒ What is his responsibility? Something to consider: Should software package be lent? When is it justifiable to break the law? Bad law, inappropriate law or if the law is easy to break? Dr. Varun Kumar (IIIT Surat) Lecture-3 8 / 8