SlideShare a Scribd company logo
1 of 10
A New Paradigm  In Education INFORMATION Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya COMMUNICATION TECHNOLOGY AND 1
6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya Review for last topic ,[object Object],[object Object],[object Object],2
[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya i. What is computer ethic 3
[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya ii. Computer Ethics 4
[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya iii. Computer Law 5
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya iii. Differences between computer ethic and law ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],6
[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya iv. Intellectual Property Rights 7
[object Object],[object Object],[object Object],[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya v. Intellectual Property Protection 8
[object Object],[object Object],[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya Homework / Group work 9
A New Paradigm  In Education Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya Let continue … our lesson for today ,[object Object],[object Object],[object Object],10

More Related Content

What's hot

Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
Md Shihab
 
ch01-Internet & Web Basics &.ppt
ch01-Internet & Web Basics &.pptch01-Internet & Web Basics &.ppt
ch01-Internet & Web Basics &.ppt
GmachImen
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 

What's hot (20)

Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using them
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
world wide web
world wide webworld wide web
world wide web
 
Addressing in Computer Networks
Addressing in Computer NetworksAddressing in Computer Networks
Addressing in Computer Networks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Computer communication
Computer communicationComputer communication
Computer communication
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Rj 45 connector
Rj 45 connectorRj 45 connector
Rj 45 connector
 
Introduction to Computer & ICT
Introduction to Computer & ICTIntroduction to Computer & ICT
Introduction to Computer & ICT
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
ch01-Internet & Web Basics &.ppt
ch01-Internet & Web Basics &.pptch01-Internet & Web Basics &.ppt
ch01-Internet & Web Basics &.ppt
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Classes of ip addresses
Classes of ip addressesClasses of ip addresses
Classes of ip addresses
 

Similar to Ict - Computer Ethics

Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
MohammedAish
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
Chantial
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
salehnia
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
wtidwell
 

Similar to Ict - Computer Ethics (20)

Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
 
Gr 3 ethical implication of it
Gr 3   ethical implication of itGr 3   ethical implication of it
Gr 3 ethical implication of it
 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 
Course Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docxCourse Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docx
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPR
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
 
EC358-CH8.ppt
EC358-CH8.pptEC358-CH8.ppt
EC358-CH8.ppt
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 

More from aleeya91

~History Of Malaysia~
~History Of Malaysia~~History Of Malaysia~
~History Of Malaysia~
aleeya91
 
How To Use Anti Spyware
How To Use Anti SpywareHow To Use Anti Spyware
How To Use Anti Spyware
aleeya91
 
Ict - Motherboard
Ict - MotherboardIct - Motherboard
Ict - Motherboard
aleeya91
 
Ict - Computer Security
Ict - Computer SecurityIct - Computer Security
Ict - Computer Security
aleeya91
 
Ict - Programming
Ict - ProgrammingIct - Programming
Ict - Programming
aleeya91
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 

More from aleeya91 (6)

~History Of Malaysia~
~History Of Malaysia~~History Of Malaysia~
~History Of Malaysia~
 
How To Use Anti Spyware
How To Use Anti SpywareHow To Use Anti Spyware
How To Use Anti Spyware
 
Ict - Motherboard
Ict - MotherboardIct - Motherboard
Ict - Motherboard
 
Ict - Computer Security
Ict - Computer SecurityIct - Computer Security
Ict - Computer Security
 
Ict - Programming
Ict - ProgrammingIct - Programming
Ict - Programming
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Ict - Computer Ethics

  • 1. A New Paradigm In Education INFORMATION Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya COMMUNICATION TECHNOLOGY AND 1
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.