SlideShare a Scribd company logo
1 of 9
Download to read offline
Introduction to Computer Ethics
Dr. Varun Kumar
Dr. Varun Kumar (IIIT Surat) Unit-1 1 / 9
Outlines
1 Introduction to Ethics
2 History of Computer Ethics
3 Unethical Behavior of a Student or a Teacher
Dr. Varun Kumar (IIIT Surat) Unit-1 2 / 9
Introduction to Ethics
⇒ Ethics is a part of philosophy, not science.
1 Involves systematizing
2 Defending
3 Recommending concepts of right and wrong behavior
⇒ Ethics seeks to resolve questions of human morality by
Defining concepts such as good and evil
Right and wrong
Virtue and vice
Justice and crime
⇒ It is a field of intellectual inquiry.
⇒ Ethics as “a set of concepts and principles that guide us in
determining what behavior helps or harms sentient creatures”.
⇒ Ethics is the synonyms of ’morality’.
⇒ Ethics is the moral principles of a particular tradition, group or
individual.
Dr. Varun Kumar (IIIT Surat) Unit-1 3 / 9
Continued–
Essential components of ethics
⇒ Values
⇒ Standard
⇒ Rules
⇒ Agreements
Domain of computer ethics
1 Computer crime
2 Privacy
3 Intellectual property
4 Computer abuse
5 Responsibility
Dr. Varun Kumar (IIIT Surat) Unit-1 4 / 9
Common issues while using a computer
⇒ Copyright issues
Duplicating the copyrighted content without the author’s approval.
⇒ Accessing personal information of others.
Ingradient of computer ethics
⇒ Acceptable use policy
⇒ Copyright law
⇒ Information privacy
Dr. Varun Kumar (IIIT Surat) Unit-1 5 / 9
History of computer ethics
⇒ In 1976, Walter Maner coins the term “Computer Ethics”.
Privacy issues in various domain
(a) Phishing :
⇒ Phishing is a type of social engineering attack often used to steal user
data, including login credentials and credit card numbers.
(b) Spamming:
Dr. Varun Kumar (IIIT Surat) Unit-1 6 / 9
Continued–
(c) Malware
⇒ Malware (short for malicious software) is a file or code, typically
delivered over a network, that infects, explores, steals or conducts
virtually any behavior an attacker wants.
(d) Fraud
(e) Chatting
(f) Virus
(g) Hacking
Dr. Varun Kumar (IIIT Surat) Unit-1 7 / 9
Continued–
Computer ethics 1
⇒ Philosophical aspects
⇒ Psychological interpretations
⇒ Sociological interpretations
Applied ethics (1970):
Q What computers would bring to the society ?
⇒ Computers would create more ethical issues.
Computer ethics 2
⇒ Computers in the work place.
⇒ Computer crime
⇒ Professional responsibility
⇒ Privacy and anonymity
Dr. Varun Kumar (IIIT Surat) Unit-1 8 / 9
Unethical behavior of students/teachers
⇒ Breaking copyright and software theft
Downloading copyrighted software, games/book etc without owner’s
permission is not only unethical but it can have the major legal
implications.
⇒ Digital plagiarism
The act of representing another’s or ideas as your own.
Submission of assignment in academics
Project or report writing
⇒ Improper use of computer resources
Download, view or store content which is against the organization
policy.
Student use the student account for internet business.
Open up a popular website or services that generates much traffic
Dr. Varun Kumar (IIIT Surat) Unit-1 9 / 9

More Related Content

Similar to Introduction to computer ethics

New Possibility in Computing
New Possibility in ComputingNew Possibility in Computing
New Possibility in ComputingVARUN KUMAR
 
Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2VARUN KUMAR
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
 
Computer hacking – Is it Ethical
Computer hacking – Is it EthicalComputer hacking – Is it Ethical
Computer hacking – Is it EthicalVivekanandan M
 
Lecture 1 introduction to course
Lecture 1 introduction to courseLecture 1 introduction to course
Lecture 1 introduction to courseGC University Fsd
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional EthicsFaraz Ahmed
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
computer ethics
computer ethicscomputer ethics
computer ethicssdrhr
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf503SaranyaS
 
Presentation computer ethics
Presentation computer ethicsPresentation computer ethics
Presentation computer ethicsYuyul Yieyien
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfManishKarki12
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Ethics my own effort
Ethics my own effortEthics my own effort
Ethics my own effortHina Honey
 
Security & Privacy - Lecture A
Security & Privacy - Lecture ASecurity & Privacy - Lecture A
Security & Privacy - Lecture ACMDLearning
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment Jenny Coloma
 

Similar to Introduction to computer ethics (20)

New Possibility in Computing
New Possibility in ComputingNew Possibility in Computing
New Possibility in Computing
 
Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Computer hacking – Is it Ethical
Computer hacking – Is it EthicalComputer hacking – Is it Ethical
Computer hacking – Is it Ethical
 
Lecture 1 introduction to course
Lecture 1 introduction to courseLecture 1 introduction to course
Lecture 1 introduction to course
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
P.p lect1-
P.p lect1-P.p lect1-
P.p lect1-
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
Presentation computer ethics
Presentation computer ethicsPresentation computer ethics
Presentation computer ethics
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Ethics my own effort
Ethics my own effortEthics my own effort
Ethics my own effort
 
Security & Privacy - Lecture A
Security & Privacy - Lecture ASecurity & Privacy - Lecture A
Security & Privacy - Lecture A
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 

More from VARUN KUMAR

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc ModelVARUN KUMAR
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire ModelVARUN KUMAR
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignVARUN KUMAR
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI DesignVARUN KUMAR
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO SystemVARUN KUMAR
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital DemocracyVARUN KUMAR
 
Ethics of Parasitic Computing
Ethics of Parasitic ComputingEthics of Parasitic Computing
Ethics of Parasitic ComputingVARUN KUMAR
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionVARUN KUMAR
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of ActionVARUN KUMAR
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic AgeVARUN KUMAR
 
Software as a Property
Software as a PropertySoftware as a Property
Software as a PropertyVARUN KUMAR
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal PolynomialVARUN KUMAR
 
Patent Protection
Patent ProtectionPatent Protection
Patent ProtectionVARUN KUMAR
 
Copyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawCopyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawVARUN KUMAR
 
Property Right and Software
Property Right and SoftwareProperty Right and Software
Property Right and SoftwareVARUN KUMAR
 
Investigating Data Trials
Investigating Data TrialsInvestigating Data Trials
Investigating Data TrialsVARUN KUMAR
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical IntegrationVARUN KUMAR
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and ControversyVARUN KUMAR
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's IntegrationVARUN KUMAR
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship VARUN KUMAR
 

More from VARUN KUMAR (20)

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc Model
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire Model
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI Design
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI Design
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO System
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital Democracy
 
Ethics of Parasitic Computing
Ethics of Parasitic ComputingEthics of Parasitic Computing
Ethics of Parasitic Computing
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of Action
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of Action
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic Age
 
Software as a Property
Software as a PropertySoftware as a Property
Software as a Property
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal Polynomial
 
Patent Protection
Patent ProtectionPatent Protection
Patent Protection
 
Copyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawCopyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy Law
 
Property Right and Software
Property Right and SoftwareProperty Right and Software
Property Right and Software
 
Investigating Data Trials
Investigating Data TrialsInvestigating Data Trials
Investigating Data Trials
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical Integration
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and Controversy
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's Integration
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship
 

Recently uploaded

Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashidFaiyazSheikh
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Toolssoginsider
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Databricks Generative AI Fundamentals .pdf
Databricks Generative AI Fundamentals  .pdfDatabricks Generative AI Fundamentals  .pdf
Databricks Generative AI Fundamentals .pdfVinayVadlagattu
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
 
Databricks Generative AI FoundationCertified.pdf
Databricks Generative AI FoundationCertified.pdfDatabricks Generative AI FoundationCertified.pdf
Databricks Generative AI FoundationCertified.pdfVinayVadlagattu
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docxrahulmanepalli02
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfJNTUA
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfJNTUA
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...IJECEIAES
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...mikehavy0
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxMustafa Ahmed
 
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Christo Ananth
 

Recently uploaded (20)

Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Databricks Generative AI Fundamentals .pdf
Databricks Generative AI Fundamentals  .pdfDatabricks Generative AI Fundamentals  .pdf
Databricks Generative AI Fundamentals .pdf
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
Databricks Generative AI FoundationCertified.pdf
Databricks Generative AI FoundationCertified.pdfDatabricks Generative AI FoundationCertified.pdf
Databricks Generative AI FoundationCertified.pdf
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
 

Introduction to computer ethics

  • 1. Introduction to Computer Ethics Dr. Varun Kumar Dr. Varun Kumar (IIIT Surat) Unit-1 1 / 9
  • 2. Outlines 1 Introduction to Ethics 2 History of Computer Ethics 3 Unethical Behavior of a Student or a Teacher Dr. Varun Kumar (IIIT Surat) Unit-1 2 / 9
  • 3. Introduction to Ethics ⇒ Ethics is a part of philosophy, not science. 1 Involves systematizing 2 Defending 3 Recommending concepts of right and wrong behavior ⇒ Ethics seeks to resolve questions of human morality by Defining concepts such as good and evil Right and wrong Virtue and vice Justice and crime ⇒ It is a field of intellectual inquiry. ⇒ Ethics as “a set of concepts and principles that guide us in determining what behavior helps or harms sentient creatures”. ⇒ Ethics is the synonyms of ’morality’. ⇒ Ethics is the moral principles of a particular tradition, group or individual. Dr. Varun Kumar (IIIT Surat) Unit-1 3 / 9
  • 4. Continued– Essential components of ethics ⇒ Values ⇒ Standard ⇒ Rules ⇒ Agreements Domain of computer ethics 1 Computer crime 2 Privacy 3 Intellectual property 4 Computer abuse 5 Responsibility Dr. Varun Kumar (IIIT Surat) Unit-1 4 / 9
  • 5. Common issues while using a computer ⇒ Copyright issues Duplicating the copyrighted content without the author’s approval. ⇒ Accessing personal information of others. Ingradient of computer ethics ⇒ Acceptable use policy ⇒ Copyright law ⇒ Information privacy Dr. Varun Kumar (IIIT Surat) Unit-1 5 / 9
  • 6. History of computer ethics ⇒ In 1976, Walter Maner coins the term “Computer Ethics”. Privacy issues in various domain (a) Phishing : ⇒ Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. (b) Spamming: Dr. Varun Kumar (IIIT Surat) Unit-1 6 / 9
  • 7. Continued– (c) Malware ⇒ Malware (short for malicious software) is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants. (d) Fraud (e) Chatting (f) Virus (g) Hacking Dr. Varun Kumar (IIIT Surat) Unit-1 7 / 9
  • 8. Continued– Computer ethics 1 ⇒ Philosophical aspects ⇒ Psychological interpretations ⇒ Sociological interpretations Applied ethics (1970): Q What computers would bring to the society ? ⇒ Computers would create more ethical issues. Computer ethics 2 ⇒ Computers in the work place. ⇒ Computer crime ⇒ Professional responsibility ⇒ Privacy and anonymity Dr. Varun Kumar (IIIT Surat) Unit-1 8 / 9
  • 9. Unethical behavior of students/teachers ⇒ Breaking copyright and software theft Downloading copyrighted software, games/book etc without owner’s permission is not only unethical but it can have the major legal implications. ⇒ Digital plagiarism The act of representing another’s or ideas as your own. Submission of assignment in academics Project or report writing ⇒ Improper use of computer resources Download, view or store content which is against the organization policy. Student use the student account for internet business. Open up a popular website or services that generates much traffic Dr. Varun Kumar (IIIT Surat) Unit-1 9 / 9