SlideShare a Scribd company logo
1 of 42
COMPUTER APPLICATIONS
Dr. Arti Parab
School of Allied Healthcare & Sciences, Jain Deemed-to-be University, Bangalore
CONTENTS: MODULE 5
• Computer Ethics and Emerging Technologies:
• Computer Ethics:
• Ethical considerations in computer usage, intellectual property rights,
and plagiarism.
• Emerging Technologies:
• Artificial Intelligence (AI), Internet of Things (IoT), Blockchain
Technology.
COMPUTER ETHICS
• Ethical considerations in computer usage
• Intellectual Property Rights (IPR)
• Plagiarism
What is Computer Ethics?
Computer ethics refers to the moral principles and guidelines
that govern the use of computers and technology.
It involves understanding and adhering to ethical principles
while using, developing, and managing technology.
Computer ethics is crucial because computers and technology
have a significant impact on various aspects of our lives,
including privacy, security, intellectual property, and social
interactions.
KEY ASPECTS OF COMPUTER ETHICS
• Privacy: Respecting individuals' right to privacy and ensuring that their personal information is handled securely and responsibly.
This includes obtaining proper consent before collecting and using personal data.
• Security: Taking measures to protect computer systems and data from unauthorized access, hacking, or other malicious activities.
This involves using strong passwords, implementing encryption, and regularly updating software to prevent security breaches.
• Intellectual Property: Respecting copyright laws and intellectual property rights when using and sharing information, software,
and digital content. Avoiding plagiarism and giving credit to the original creators of the content is essential.
• Cyberbullying and Online Harassment: Avoiding engaging in cyberbullying or harassing others online. Treating others with
respect and being mindful of the impact of online actions on others.
• Software Piracy: Not using or distributing unauthorized copies of software. Respect for software licensing and copyright laws is
crucial in computer ethics.
• Accessibility: Ensuring that technology is accessible to all individuals, including those with disabilities. Designing websites,
applications, and software with accessibility in mind.
• Social Media and Online Behavior: Being responsible and ethical in our online interactions, including avoiding hate speech,
spreading false information, or engaging in harmful behavior.
• Artificial Intelligence and Automation: Ensuring that AI and automation technologies are designed and used ethically,
considering their potential impact on society and human welfare.
• Digital Divide: Addressing the disparities in access to technology and ensuring that everyone has equal opportunities to benefit
from technological advancements.
• Environmental Impact: Considering the environmental impact of technology and adopting eco-friendly practices in computing.
TEN COMMANDMENTS OF COMPUTER ETHICS
1. Do not use the computer in ways that may harm other people.
2. Do not use computer technology to cause interference in other users’ work.
3. Do not spy on another person’s computer data.
4. Do not use computer technology to steal information.
5. Do not contribute to the spread of misinformation using computer technology.
6. Refrain from copying software or buying pirated copies. Pay for software unless it is
free.
7. Do not use someone else’s computer resources unless authorized to.
8. It is wrong to claim ownership on a work which is the output of someone else’s
intellect.
9. Before developing a software, think about the social impact it can have.
10. In using computers for communication, be respectful and courteous with the fellow
members.
TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 1
• Do not use the computer in ways that may harm other people.
• Explanation: This commandment says that it is unethical to use a computer to harm another user. It is
not limited to physical injury. It includes harming or corrupting other users’ data or files. The
commandment states that it is wrong to use a computer to steal someone’s personal information.
Manipulating or destroying files of other users is ethically wrong. It is unethical to write programs,
which on execution lead to stealing, copying or gaining unauthorized access to other users’ data. Being
involved in practices like hacking, spamming, or cyber bullying does not comform computer ethics. It is
illegal to use the power of the computer to harm others and getting the will to do negative things to
others.
TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 2
• Do not use computer technology to cause interference in other users’ work.
• Explanation: Computer software can be used in ways that disturb other users or disrupt their work.
Viruses, for example, are programs meant to harm useful computer programs or interfere with the
normal functioning of a computer. Malicious software can disrupt the functioning of computers in more
ways than one. It may overload computer memory through excessive consumption of computer
resources, thus slowing its functioning. It may cause a computer to function wrongly or even stop
working. Using malicious software to attack a computer is unethical. It will also be able to delete
important documents and data which the user creates on the software.
TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 3
• Do not spy on another person’s computer data.
• Explanation: We know it is wrong to read someone’s personal letters. On the same lines, it is wrong to
read someone else’s email messages or files. Obtaining data from another person’s private files is
nothing less than breaking into someone’s room. Snooping around in another person’s files or reading
someone else’s personal messages is the invasion of his privacy. There are exceptions to this. For
example, spying is necessary and cannot be called unethical when it is done against illegitimate use of
computers. For example, intelligence agencies working on cybercrime cases need to spy on the internet
activity of suspects. Giving privacy to others is a must and spy on others original.
TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 4
• Do not use computer technology to steal information.
• Explanation: Stealing sensitive information or leaking confidential information is as good as robbery. It
is wrong to acquire personal information of employees from an employee database or patient history
from a hospital database or other such information that is meant to be confidential. Similarly, breaking
into a bank account to collect information about the account or account holder is wrong. Illegal
electronic transfer of funds is a type of fraud. With the use of technology, stealing of information is
much easier. Computer can be used to store stolen information. It’s not unethical to steal other’s
information especially if it’s a data that is authentic and being used for big business purposes.
TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 5
• Do not contribute to the spread of misinformation using computer technology.
• Explanation: Spread of information has become viral today, because of the Internet. This also means
that false news or rumors can spread speedily through social networking sites or emails. Being involved
in the circulation of incorrect information is unethical. Mails and pop-ups are commonly used to spread
the wrong information or give false alerts with the only intent of selling products. Mails from untrusted
sources advertising certain products or spreading some hard-to-believe information, are not
uncommon. Direct or indirect involvement in the circulation of false information is ethically wrong.
Giving wrong information can hurt other parties or organizations that are affected on that particular
theme.
TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 6
• Refrain from copying software or buying pirated copies. Pay for software unless it is free.
• Explanation: Like any other artistic or literary work, software is copyrighted. A piece of code is the
original work of the individual who created it. It is copyrighted in his name. In case of a developer
writing software for the organization he works for, the organization holds the copyright for it. Copyright
holds the true unless its creator announce if is not. Obtaining illegal copies of copyright software is
unethical. It is not easy to do such things and in the end it will just be copied illegally.
TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 7
• Do not use someone else’s computer resources unless authorized to.
• Explanation: Multi-user systems have user specific passwords. Breaking into some other user’s
password, thus intruding his private space is unethical. It is not ethical to hack passwords for gaining
unauthorized access to a password-protected computer system. Accessing data that you are not
authorized to access or gaining access to another user’s computer without his permission is not ethical.
Privacy will always be applied to such resources and were not supposed to get exposed and hack in such
ways that is not yours. Do not intentionally use other’s resources without any permission to the original
user or creator as it will be unethical.
TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 8
• It is wrong to claim ownership on a work which is the output of someone else’s intellect.
• Explanation: Programs developed by a software developer are his/her property. If he is working with
an organization, they are the organization’s property. Copying them and propagating them in one’s own
name is unethical. This applies to any creative work, program or design. Establishing ownership on a
work which is not yours is ethically wrong. Originality of any software/programs are to be keep safe and
trying to claim ownership will cause a viral dispute.
TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 9
• Before developing a software, think about the social impact it can have.
• Explanation: Looking at the social consequences that a program can have, describes a broader
perspective of looking at technology. A computer software on release, reaches millions. Software like
video games and animations or educational software can have a social impact on their users. When
working on animation films or designing video games, for example, it is the programmer’s responsibility
to understand his target audience/users and the effect it may have on them. For example, a computer
game for kids should not have content that can influence them negatively. Similarly, writing malicious
software is ethically wrong. A software developer/development firm should consider the influence their
code can have on the society at large. Simply having a good topic on either computer gaming or
animation films will be a good impact with case to case basis and studying it before the production.
TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 10
• In using computers for communication, be respectful and courteous with the fellow
members.
• Explanation: The communication etiquette we follow in the real world applies to communication over
computers as well. While communicating over the Internet, one should treat others with respect. One
should not intrude others’ private space, use abusive language, make false statements or pass
irresponsible remarks about others. One should be courteous while communicating over the web and
should respect others’ time and resources. Also, one should be considerate with a novice computer
user. Do not use false words for communicate others to avoid disputes.
INTELLECTUAL PROPERTY RIGHTS (IPR)
• World Intellectual Property Organization defines Intellectual property (IP) as creations of the mind. They
may be inventions, literary and artistic works, designs and symbols, names and images used in
commerce.
• WHAT ARE THE TYPES OF INTELLECTUAL PROPERTY IN INDIA?
1.Patents
2.Trademarks
3.Copyrights
4.Industrial Designs
5.Geographical Indications
6.Trade Secrets
7.Plant Varieties
INTELLECTUAL PROPERTY RIGHTS (IPR)
1. Patents: Patents protect inventions, which are new and non-obvious solutions to technical problems. They grant the inventor exclusive
rights to make, use, and sell the invention for a limited period (usually 20 years) in India.
2. Trademarks:Trademarks protect brand names, logos, symbols, and other distinctive signs that distinguish goods and services of one
business from another. Trademark registration grants exclusive rights and prevents others from using a similar mark for similar goods or
services.
3. Copyrights:Copyrights protect original literary, artistic, musical, and dramatic works, as well as computer software and databases. The
owner of a copyright has the exclusive right to reproduce, distribute, perform, and display the work.
4. Industrial Designs: Industrial designs protect the visual appearance of a product, including its shape, pattern, or ornamentation.
Registration of an industrial design gives the owner exclusive rights to prevent others from using the design.
5. Geographical Indications: Geographical indications protect goods originating from a specific geographical location that possess
certain qualities, reputation, or characteristics attributable to that location. Registration prevents unauthorized use of the geographical
indication.
6. Trade Secrets: Trade secrets refer to confidential business information that provides a competitive advantage. Unlike patents or
copyrights, trade secrets are not publicly disclosed. They are protected as long as they are kept confidential.
7. Plant Varieties: Plant variety protection grants exclusive rights to the breeder of a new plant variety to produce, sell, and market that
variety for a limited period.
PLAGIARISM
• Plagiarism is not a type of intellectual
property; rather, it is an act of using
someone else's work, ideas, or intellectual
property without giving them proper credit
or permission. It involves presenting
someone else's work as one's own, whether
it is written content, artwork, music, or any
other creative work. Plagiarism is considered
unethical and is subject to legal
consequences in cases of copyright
infringement.
FREQUENTLY ASKED QUESTIONS ABOUT PLAGIARISM
• What is plagiarism? At its root, plagiarism is the overt act of attempting to pass off someone else’s work as
your own.
• What’s the difference between plagiarism and paraphrasing? The line between plagiarism and paraphrasing
is very thin. It all depends on if and how you cite your sources. When your content lacks proper citation,
paraphrasing quickly and easily turns into plagiarism.
• What are the common types of plagiarism seen in content writing? There are many types of plagiarism, but
the most commonly seen in content writing include global plagiarism, verbatim plagiarism, paraphrasing
plagiarism, patchwork plagiarism, and self-plagiarism.
• How can I detect plagiarism? While prior to the Internet, it was difficult to check your or others’ work for
plagiarism, now you can easily check for plagiarism with free and easy-to-use plagiarism checker software. A
quick Google search will bring up several software options.
• Can you accidentally plagiarize? Yes, you can accidentally plagiarize. One of the most common forms of
accidental plagiarism is paraphrasing plagiarism, which is when you reword someone else’s work without
giving credit or properly citing the source.
FAQS
• Question 1. Which of the following best describes ethical considerations in computer
usage?
• a) Respecting privacy and data confidentiality.
• b) Using unauthorized software for personal use.
• c) Hacking into someone else's computer system.
• d) Disseminating false information online.
Answer: a) Respecting privacy and data confidentiality.
FAQS
• Question 2. What do Intellectual Property Rights (IPR) protect?
• a) Personal information on social media.
• b) Ideas and concepts in the public domain.
• c) Creative works and inventions of individuals.
• d) Internet service provider's network infrastructure.
Answer: c) Creative works and inventions of individuals.
FAQS
• Question 3. Plagiarism is the act of:
• a) Respecting the copyright of creative works.
• b) Giving proper credit to the original author.
• c) Using someone else's work without permission.
• d) Creating new and original content.
Answer: c) Using someone else's work without permission.
FAQS
• Question 4. What is one of the key reasons to promote ethical behavior in computer
usage?
• a) To avoid getting caught by law enforcement.
• b) To prevent accidental data loss.
• c) To foster a positive online community.
• d) To increase internet download speed.
Answer: c) To foster a positive online community.
EMERGING TECHNOLOGIES
• Artificial Intelligence (AI)
• Internet of Things (IoT)
• Blockchain Technology
ARTIFICIAL INTELLIGENCE (AI)
• Artificial Intelligence (AI) is a rapidly advancing technology
that aims to create intelligent machines capable of
performing tasks that typically require human intelligence.
• The ultimate goal of AI is to develop machines that can
reason, learn from experience, and adapt to new situations,
just like humans.
• AI encompasses a broad range of techniques and approaches
that allow computers and machines to simulate human-like
cognitive functions.
• These functions include problem-solving, speech recognition,
learning, planning, and decision-making. AI systems can
process large amounts of data, identify patterns, and make
predictions or recommendations based on that data.
HOW ARTIFICIAL INTELLIGENCE IS BEING USED TO
RUN BUSINESS PROCESSES TODAY
• Predicting Consumer Behavior and Making Product Recommendations.
• This is one of the fields that is growing increasingly today. Businesses need to market and
advertise. But just spending a lot of money will not guarantee more leads and sales.
Businesses need to be able to identify, understand and know their target consumers and
know what kind of product they will need at a particular point in time. Using big data and
artificial intelligence, businesses can now forecast consumer behavior and run data-based
campaigns that yield remarkable results.
HOW ARTIFICIAL INTELLIGENCE IS BEING USED TO
RUN BUSINESS PROCESSES TODAY
• Automated Customer Service through Telephone and Online Chabot
• To maintain and keep customers, customer service has to be a primary
function of a business. However, this does that mean a business should
employ a huge customer service staff to handle all customer enquiries and
provide support With the help of customer chatbots, all customer enquiries
can be handled on time and appropriately, based on the needs of the user.
HOW ARTIFICIAL INTELLIGENCE IS BEING USED TO
RUN BUSINESS PROCESSES TODAY
• Automating Workloads and Managing Processes
• Some clerical duties can just be boring to do. Your people might even be
ignoring these tasks or making mistakes while getting them done. Through
robotic process automation, many of these mundane tasks can be automated
and outsourced to robots so that your human staff can focus on what really
needs to be done. This has current applications in banking, insurance,
healthcare, manufacturing and many other forms of industries.
HOW ARTIFICIAL INTELLIGENCE IS BEING USED TO
RUN BUSINESS PROCESSES TODAY
• Data Management
• Every business relies on data to make critical business decisions. First, data is
collected, stored, processed and then transferred to the relevant department
of the organization for usage. Artificial intelligence, in this case, can be
deployed fill forms, update files, transfer and cross-reference files as the need
arises. With this functionality, many businesses can use AI-empowered data
management system to detect fraud, prevent cybersecurity threats and
improve their overall business operations.
INTERNET OF THINGS (IOT)
• Today mobile device contains GPS Tracking, Mobile
Gyroscope, Adaptive brightness, Voice detection, Face
detection etc. These components have their own
individual features, but what about if these all
communicate with each other to provide a better
environment? For example, the phone brightness is
adjusted based on my GPS location or my direction.
• Connecting everyday things embedded with
electronics, software, and sensors to internet enabling
to collect and exchange data without human
interaction called as the Internet of Things (IoT).
• The term "Things" in the Internet of Things refers to
anything and everything in day to day life which is
accessed or connected through the internet.
HOW DOES INTERNET OF THING (IOT) WORK?
• The working of IoT is different for different IoT echo
system (architecture). However, the key concept of there
working are similar.
• The entire working process of IoT starts with the device
themselves, such as smartphones, digital watches,
electronic appliances, which securely communicate with
the IoT platform.
• The platforms collect and analyze the data from all
multiple devices and platforms and transfer the most
valuable data with applications to devices.
FEATURES OF IOT
• The most important features of IoT on which it works are connectivity, analyzing, integrating, active engagement, and many more. Some
of them are listed below:
• Connectivity: Connectivity refers to establish a proper connection between all the things of IoT to IoT platform it may be server or cloud.
After connecting the IoT devices, it needs a high speed messaging between the devices and cloud to enable reliable, secure and bi-
directional communication.
• Analyzing: After connecting all the relevant things, it comes to real-time analyzing the data collected and use them to build effective
business intelligence. If we have a good insight into data gathered from all these things, then we call our system has a smart system.
• Integrating: IoT integrating the various models to improve the user experience as well.
• Artificial Intelligence: IoT makes things smart and enhances life through the use of data. For example, if we have a coffee machine whose
beans have going to end, then the coffee machine itself order the coffee beans of your choice from the retailer.
• Sensing: The sensor devices used in IoT technologies detect and measure any change in the environment and report on their status. IoT
technology brings passive networks to active networks. Without sensors, there could not hold an effective or true IoT environment.
• Active Engagement: IoT makes the connected technology, product, or services to active engagement between each other.
• Endpoint Management: It is important to be the endpoint management of all the IoT system otherwise, it makes the complete failure of the
system. For example, if a coffee machine itself order the coffee beans when it goes to end but what happens when it orders the beans from
a retailer and we are not present at home for a few days, it leads to the failure of the IoT system. So, there must be a need for endpoint
management.
BLOCKCHAIN TECHNOLOGY
• Blockchain technology is a transaction ledger on
a massive scale. Fortified by strong encryption
and advanced security protocols, this ledger can
serve as the basis for many different types of
financial systems and cloud-computing
networks.
• Blockchain systems rely on a peer-to-peer
network of computers that analyze a shared
digital ledger at regular intervals. New
transactions must be confirmed by a
predetermined number of computer nodes.
When a new block of transactions gets the
stamp of approval from enough nodes, the new
data is written in stone and the blockchain
moves on to considering another list of new
transactions.
WHAT IS BLOCKCHAIN USED FOR?
• Smart contracts are self-executing contracts written in
programming languages like Solidity. They are deployed
on the blockchain through a transaction. Once deployed,
they become immutable and transparent to all parties
involved. Smart contracts are automatically executed
when predefined conditions are met, and this execution
is validated by the blockchain's consensus mechanism,
ensuring the integrity of the process.
• Digital currency in the context of blockchain refers to a
form of currency that exists purely in digital form and
operates on a blockchain network. Unlike traditional fiat
currencies issued and controlled by governments, digital
currencies are decentralized and rely on cryptographic
techniques for secure transactions and the creation of
new units.
https://youtu.be/E2JRnFgrztM
FAQS
• Question 1. What is Artificial Intelligence (AI)?
• a) A type of computer hardware
• b) A branch of science that studies plants and animals
• c) A field of computer science that simulates human-like intelligence
• d) A popular video game
Answer: c) A field of computer science that simulates human-like intelligence
FAQS
• Question 2. Which of the following is an example of AI technology?
• a) Smartphones
• b) Microwave ovens
• c) Virtual assistants like Siri and Alexa
• d) Bicycles
Answer: c) Virtual assistants like Siri and Alexa
FAQS
• Question 3. Which of the following is a characteristic of IoT devices?
• a) They are powered by magic
• b) They can communicate with each other over the internet
• c) They can predict the future
• d) They only work in space
Answer: b) They can communicate with each other over the internet
FAQS
• Question 4. What is Blockchain?
• a) A type of building material
• b) A digital currency
• c) A decentralized and secure technology for recording transactions
• d) A popular dance move
Answer: c) A decentralized and secure technology for recording transactions
FAQS
• Question 5. What is the main benefit of using Blockchain for transactions?
• a) It is slow and inefficient
• b) It requires a lot of paperwork
• c) It provides transparency and immutability
• d) It is easily hackable
Answer: c) It provides transparency and immutability
THANK YOU!

More Related Content

Similar to COMPUTER APPLICATIONS Module 5.pptx

Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your futuresuperb11b
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
computer ethics
computer ethicscomputer ethics
computer ethicssdrhr
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.rizwanshafique4321
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxjennyJey2
 
Computer Ethics By Anas Habib
Computer Ethics By Anas HabibComputer Ethics By Anas Habib
Computer Ethics By Anas HabibAnasHabib23
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Protect computer from malware
Protect computer from malwareProtect computer from malware
Protect computer from malwareShouaQureshi
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challengesCRM
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challengesSilvia Afrima Chandra
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 

Similar to COMPUTER APPLICATIONS Module 5.pptx (20)

Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
Computer Ethics By Anas Habib
Computer Ethics By Anas HabibComputer Ethics By Anas Habib
Computer Ethics By Anas Habib
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Protect computer from malware
Protect computer from malwareProtect computer from malware
Protect computer from malware
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challenges
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 

More from Arti Parab Academics

COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxCOMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxArti Parab Academics
 
COMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptxCOMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptxArti Parab Academics
 
Health Informatics- Module 5-Chapter 2.pptx
Health Informatics- Module 5-Chapter 2.pptxHealth Informatics- Module 5-Chapter 2.pptx
Health Informatics- Module 5-Chapter 2.pptxArti Parab Academics
 
Health Informatics- Module 5-Chapter 3.pptx
Health Informatics- Module 5-Chapter 3.pptxHealth Informatics- Module 5-Chapter 3.pptx
Health Informatics- Module 5-Chapter 3.pptxArti Parab Academics
 
Health Informatics- Module 4-Chapter 3.pptx
Health Informatics- Module 4-Chapter 3.pptxHealth Informatics- Module 4-Chapter 3.pptx
Health Informatics- Module 4-Chapter 3.pptxArti Parab Academics
 
Health Informatics- Module 3-Chapter 2.pptx
Health Informatics- Module 3-Chapter 2.pptxHealth Informatics- Module 3-Chapter 2.pptx
Health Informatics- Module 3-Chapter 2.pptxArti Parab Academics
 
Health Informatics- Module 4-Chapter 1.pptx
Health Informatics- Module 4-Chapter 1.pptxHealth Informatics- Module 4-Chapter 1.pptx
Health Informatics- Module 4-Chapter 1.pptxArti Parab Academics
 
Health Informatics- Module 4-Chapter 2.pptx
Health Informatics- Module 4-Chapter 2.pptxHealth Informatics- Module 4-Chapter 2.pptx
Health Informatics- Module 4-Chapter 2.pptxArti Parab Academics
 
Health Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptxHealth Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptxArti Parab Academics
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
Health Informatics- Module 3-Chapter 1.pptx
Health Informatics- Module 3-Chapter 1.pptxHealth Informatics- Module 3-Chapter 1.pptx
Health Informatics- Module 3-Chapter 1.pptxArti Parab Academics
 
Health Informatics- Module 2-Chapter 2.pptx
Health Informatics- Module 2-Chapter 2.pptxHealth Informatics- Module 2-Chapter 2.pptx
Health Informatics- Module 2-Chapter 2.pptxArti Parab Academics
 
Health Informatics- Module 1-Chapter 1.pptx
Health Informatics- Module 1-Chapter 1.pptxHealth Informatics- Module 1-Chapter 1.pptx
Health Informatics- Module 1-Chapter 1.pptxArti Parab Academics
 
Health Informatics- Module 2-Chapter 3.pptx
Health Informatics- Module 2-Chapter 3.pptxHealth Informatics- Module 2-Chapter 3.pptx
Health Informatics- Module 2-Chapter 3.pptxArti Parab Academics
 
Health Informatics- Module 2-Chapter 1.pptx
Health Informatics- Module 2-Chapter 1.pptxHealth Informatics- Module 2-Chapter 1.pptx
Health Informatics- Module 2-Chapter 1.pptxArti Parab Academics
 
Health Informatics- Module 1-Chapter 2.pptx
Health Informatics- Module 1-Chapter 2.pptxHealth Informatics- Module 1-Chapter 2.pptx
Health Informatics- Module 1-Chapter 2.pptxArti Parab Academics
 
Health Informatics- Module 1-Chapter 3.pptx
Health Informatics- Module 1-Chapter 3.pptxHealth Informatics- Module 1-Chapter 3.pptx
Health Informatics- Module 1-Chapter 3.pptxArti Parab Academics
 

More from Arti Parab Academics (20)

COMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptxCOMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptx
 
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxCOMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
 
COMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptxCOMPUTER APPLICATIONS Module 1 CAH.pptx
COMPUTER APPLICATIONS Module 1 CAH.pptx
 
COMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptxCOMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptx
 
COMPUTER APPLICATIONS Module 2.pptx
COMPUTER APPLICATIONS Module 2.pptxCOMPUTER APPLICATIONS Module 2.pptx
COMPUTER APPLICATIONS Module 2.pptx
 
Health Informatics- Module 5-Chapter 2.pptx
Health Informatics- Module 5-Chapter 2.pptxHealth Informatics- Module 5-Chapter 2.pptx
Health Informatics- Module 5-Chapter 2.pptx
 
Health Informatics- Module 5-Chapter 3.pptx
Health Informatics- Module 5-Chapter 3.pptxHealth Informatics- Module 5-Chapter 3.pptx
Health Informatics- Module 5-Chapter 3.pptx
 
Health Informatics- Module 4-Chapter 3.pptx
Health Informatics- Module 4-Chapter 3.pptxHealth Informatics- Module 4-Chapter 3.pptx
Health Informatics- Module 4-Chapter 3.pptx
 
Health Informatics- Module 3-Chapter 2.pptx
Health Informatics- Module 3-Chapter 2.pptxHealth Informatics- Module 3-Chapter 2.pptx
Health Informatics- Module 3-Chapter 2.pptx
 
Health Informatics- Module 4-Chapter 1.pptx
Health Informatics- Module 4-Chapter 1.pptxHealth Informatics- Module 4-Chapter 1.pptx
Health Informatics- Module 4-Chapter 1.pptx
 
Health Informatics- Module 4-Chapter 2.pptx
Health Informatics- Module 4-Chapter 2.pptxHealth Informatics- Module 4-Chapter 2.pptx
Health Informatics- Module 4-Chapter 2.pptx
 
Health Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptxHealth Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptx
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
Health Informatics- Module 3-Chapter 1.pptx
Health Informatics- Module 3-Chapter 1.pptxHealth Informatics- Module 3-Chapter 1.pptx
Health Informatics- Module 3-Chapter 1.pptx
 
Health Informatics- Module 2-Chapter 2.pptx
Health Informatics- Module 2-Chapter 2.pptxHealth Informatics- Module 2-Chapter 2.pptx
Health Informatics- Module 2-Chapter 2.pptx
 
Health Informatics- Module 1-Chapter 1.pptx
Health Informatics- Module 1-Chapter 1.pptxHealth Informatics- Module 1-Chapter 1.pptx
Health Informatics- Module 1-Chapter 1.pptx
 
Health Informatics- Module 2-Chapter 3.pptx
Health Informatics- Module 2-Chapter 3.pptxHealth Informatics- Module 2-Chapter 3.pptx
Health Informatics- Module 2-Chapter 3.pptx
 
Health Informatics- Module 2-Chapter 1.pptx
Health Informatics- Module 2-Chapter 1.pptxHealth Informatics- Module 2-Chapter 1.pptx
Health Informatics- Module 2-Chapter 1.pptx
 
Health Informatics- Module 1-Chapter 2.pptx
Health Informatics- Module 1-Chapter 2.pptxHealth Informatics- Module 1-Chapter 2.pptx
Health Informatics- Module 1-Chapter 2.pptx
 
Health Informatics- Module 1-Chapter 3.pptx
Health Informatics- Module 1-Chapter 3.pptxHealth Informatics- Module 1-Chapter 3.pptx
Health Informatics- Module 1-Chapter 3.pptx
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

COMPUTER APPLICATIONS Module 5.pptx

  • 1. COMPUTER APPLICATIONS Dr. Arti Parab School of Allied Healthcare & Sciences, Jain Deemed-to-be University, Bangalore
  • 2. CONTENTS: MODULE 5 • Computer Ethics and Emerging Technologies: • Computer Ethics: • Ethical considerations in computer usage, intellectual property rights, and plagiarism. • Emerging Technologies: • Artificial Intelligence (AI), Internet of Things (IoT), Blockchain Technology.
  • 3. COMPUTER ETHICS • Ethical considerations in computer usage • Intellectual Property Rights (IPR) • Plagiarism
  • 5. Computer ethics refers to the moral principles and guidelines that govern the use of computers and technology. It involves understanding and adhering to ethical principles while using, developing, and managing technology. Computer ethics is crucial because computers and technology have a significant impact on various aspects of our lives, including privacy, security, intellectual property, and social interactions.
  • 6. KEY ASPECTS OF COMPUTER ETHICS • Privacy: Respecting individuals' right to privacy and ensuring that their personal information is handled securely and responsibly. This includes obtaining proper consent before collecting and using personal data. • Security: Taking measures to protect computer systems and data from unauthorized access, hacking, or other malicious activities. This involves using strong passwords, implementing encryption, and regularly updating software to prevent security breaches. • Intellectual Property: Respecting copyright laws and intellectual property rights when using and sharing information, software, and digital content. Avoiding plagiarism and giving credit to the original creators of the content is essential. • Cyberbullying and Online Harassment: Avoiding engaging in cyberbullying or harassing others online. Treating others with respect and being mindful of the impact of online actions on others. • Software Piracy: Not using or distributing unauthorized copies of software. Respect for software licensing and copyright laws is crucial in computer ethics. • Accessibility: Ensuring that technology is accessible to all individuals, including those with disabilities. Designing websites, applications, and software with accessibility in mind. • Social Media and Online Behavior: Being responsible and ethical in our online interactions, including avoiding hate speech, spreading false information, or engaging in harmful behavior. • Artificial Intelligence and Automation: Ensuring that AI and automation technologies are designed and used ethically, considering their potential impact on society and human welfare. • Digital Divide: Addressing the disparities in access to technology and ensuring that everyone has equal opportunities to benefit from technological advancements. • Environmental Impact: Considering the environmental impact of technology and adopting eco-friendly practices in computing.
  • 7. TEN COMMANDMENTS OF COMPUTER ETHICS 1. Do not use the computer in ways that may harm other people. 2. Do not use computer technology to cause interference in other users’ work. 3. Do not spy on another person’s computer data. 4. Do not use computer technology to steal information. 5. Do not contribute to the spread of misinformation using computer technology. 6. Refrain from copying software or buying pirated copies. Pay for software unless it is free. 7. Do not use someone else’s computer resources unless authorized to. 8. It is wrong to claim ownership on a work which is the output of someone else’s intellect. 9. Before developing a software, think about the social impact it can have. 10. In using computers for communication, be respectful and courteous with the fellow members.
  • 8. TEN COMMANDMENTS OF COMPUTER ETHICS • Commandment 1 • Do not use the computer in ways that may harm other people. • Explanation: This commandment says that it is unethical to use a computer to harm another user. It is not limited to physical injury. It includes harming or corrupting other users’ data or files. The commandment states that it is wrong to use a computer to steal someone’s personal information. Manipulating or destroying files of other users is ethically wrong. It is unethical to write programs, which on execution lead to stealing, copying or gaining unauthorized access to other users’ data. Being involved in practices like hacking, spamming, or cyber bullying does not comform computer ethics. It is illegal to use the power of the computer to harm others and getting the will to do negative things to others.
  • 9. TEN COMMANDMENTS OF COMPUTER ETHICS • Commandment 2 • Do not use computer technology to cause interference in other users’ work. • Explanation: Computer software can be used in ways that disturb other users or disrupt their work. Viruses, for example, are programs meant to harm useful computer programs or interfere with the normal functioning of a computer. Malicious software can disrupt the functioning of computers in more ways than one. It may overload computer memory through excessive consumption of computer resources, thus slowing its functioning. It may cause a computer to function wrongly or even stop working. Using malicious software to attack a computer is unethical. It will also be able to delete important documents and data which the user creates on the software.
  • 10. TEN COMMANDMENTS OF COMPUTER ETHICS • Commandment 3 • Do not spy on another person’s computer data. • Explanation: We know it is wrong to read someone’s personal letters. On the same lines, it is wrong to read someone else’s email messages or files. Obtaining data from another person’s private files is nothing less than breaking into someone’s room. Snooping around in another person’s files or reading someone else’s personal messages is the invasion of his privacy. There are exceptions to this. For example, spying is necessary and cannot be called unethical when it is done against illegitimate use of computers. For example, intelligence agencies working on cybercrime cases need to spy on the internet activity of suspects. Giving privacy to others is a must and spy on others original.
  • 11. TEN COMMANDMENTS OF COMPUTER ETHICS • Commandment 4 • Do not use computer technology to steal information. • Explanation: Stealing sensitive information or leaking confidential information is as good as robbery. It is wrong to acquire personal information of employees from an employee database or patient history from a hospital database or other such information that is meant to be confidential. Similarly, breaking into a bank account to collect information about the account or account holder is wrong. Illegal electronic transfer of funds is a type of fraud. With the use of technology, stealing of information is much easier. Computer can be used to store stolen information. It’s not unethical to steal other’s information especially if it’s a data that is authentic and being used for big business purposes.
  • 12. TEN COMMANDMENTS OF COMPUTER ETHICS • Commandment 5 • Do not contribute to the spread of misinformation using computer technology. • Explanation: Spread of information has become viral today, because of the Internet. This also means that false news or rumors can spread speedily through social networking sites or emails. Being involved in the circulation of incorrect information is unethical. Mails and pop-ups are commonly used to spread the wrong information or give false alerts with the only intent of selling products. Mails from untrusted sources advertising certain products or spreading some hard-to-believe information, are not uncommon. Direct or indirect involvement in the circulation of false information is ethically wrong. Giving wrong information can hurt other parties or organizations that are affected on that particular theme.
  • 13. TEN COMMANDMENTS OF COMPUTER ETHICS • Commandment 6 • Refrain from copying software or buying pirated copies. Pay for software unless it is free. • Explanation: Like any other artistic or literary work, software is copyrighted. A piece of code is the original work of the individual who created it. It is copyrighted in his name. In case of a developer writing software for the organization he works for, the organization holds the copyright for it. Copyright holds the true unless its creator announce if is not. Obtaining illegal copies of copyright software is unethical. It is not easy to do such things and in the end it will just be copied illegally.
  • 14. TEN COMMANDMENTS OF COMPUTER ETHICS • Commandment 7 • Do not use someone else’s computer resources unless authorized to. • Explanation: Multi-user systems have user specific passwords. Breaking into some other user’s password, thus intruding his private space is unethical. It is not ethical to hack passwords for gaining unauthorized access to a password-protected computer system. Accessing data that you are not authorized to access or gaining access to another user’s computer without his permission is not ethical. Privacy will always be applied to such resources and were not supposed to get exposed and hack in such ways that is not yours. Do not intentionally use other’s resources without any permission to the original user or creator as it will be unethical.
  • 15. TEN COMMANDMENTS OF COMPUTER ETHICS • Commandment 8 • It is wrong to claim ownership on a work which is the output of someone else’s intellect. • Explanation: Programs developed by a software developer are his/her property. If he is working with an organization, they are the organization’s property. Copying them and propagating them in one’s own name is unethical. This applies to any creative work, program or design. Establishing ownership on a work which is not yours is ethically wrong. Originality of any software/programs are to be keep safe and trying to claim ownership will cause a viral dispute.
  • 16. TEN COMMANDMENTS OF COMPUTER ETHICS • Commandment 9 • Before developing a software, think about the social impact it can have. • Explanation: Looking at the social consequences that a program can have, describes a broader perspective of looking at technology. A computer software on release, reaches millions. Software like video games and animations or educational software can have a social impact on their users. When working on animation films or designing video games, for example, it is the programmer’s responsibility to understand his target audience/users and the effect it may have on them. For example, a computer game for kids should not have content that can influence them negatively. Similarly, writing malicious software is ethically wrong. A software developer/development firm should consider the influence their code can have on the society at large. Simply having a good topic on either computer gaming or animation films will be a good impact with case to case basis and studying it before the production.
  • 17. TEN COMMANDMENTS OF COMPUTER ETHICS • Commandment 10 • In using computers for communication, be respectful and courteous with the fellow members. • Explanation: The communication etiquette we follow in the real world applies to communication over computers as well. While communicating over the Internet, one should treat others with respect. One should not intrude others’ private space, use abusive language, make false statements or pass irresponsible remarks about others. One should be courteous while communicating over the web and should respect others’ time and resources. Also, one should be considerate with a novice computer user. Do not use false words for communicate others to avoid disputes.
  • 18. INTELLECTUAL PROPERTY RIGHTS (IPR) • World Intellectual Property Organization defines Intellectual property (IP) as creations of the mind. They may be inventions, literary and artistic works, designs and symbols, names and images used in commerce. • WHAT ARE THE TYPES OF INTELLECTUAL PROPERTY IN INDIA? 1.Patents 2.Trademarks 3.Copyrights 4.Industrial Designs 5.Geographical Indications 6.Trade Secrets 7.Plant Varieties
  • 19. INTELLECTUAL PROPERTY RIGHTS (IPR) 1. Patents: Patents protect inventions, which are new and non-obvious solutions to technical problems. They grant the inventor exclusive rights to make, use, and sell the invention for a limited period (usually 20 years) in India. 2. Trademarks:Trademarks protect brand names, logos, symbols, and other distinctive signs that distinguish goods and services of one business from another. Trademark registration grants exclusive rights and prevents others from using a similar mark for similar goods or services. 3. Copyrights:Copyrights protect original literary, artistic, musical, and dramatic works, as well as computer software and databases. The owner of a copyright has the exclusive right to reproduce, distribute, perform, and display the work. 4. Industrial Designs: Industrial designs protect the visual appearance of a product, including its shape, pattern, or ornamentation. Registration of an industrial design gives the owner exclusive rights to prevent others from using the design. 5. Geographical Indications: Geographical indications protect goods originating from a specific geographical location that possess certain qualities, reputation, or characteristics attributable to that location. Registration prevents unauthorized use of the geographical indication. 6. Trade Secrets: Trade secrets refer to confidential business information that provides a competitive advantage. Unlike patents or copyrights, trade secrets are not publicly disclosed. They are protected as long as they are kept confidential. 7. Plant Varieties: Plant variety protection grants exclusive rights to the breeder of a new plant variety to produce, sell, and market that variety for a limited period.
  • 20. PLAGIARISM • Plagiarism is not a type of intellectual property; rather, it is an act of using someone else's work, ideas, or intellectual property without giving them proper credit or permission. It involves presenting someone else's work as one's own, whether it is written content, artwork, music, or any other creative work. Plagiarism is considered unethical and is subject to legal consequences in cases of copyright infringement.
  • 21. FREQUENTLY ASKED QUESTIONS ABOUT PLAGIARISM • What is plagiarism? At its root, plagiarism is the overt act of attempting to pass off someone else’s work as your own. • What’s the difference between plagiarism and paraphrasing? The line between plagiarism and paraphrasing is very thin. It all depends on if and how you cite your sources. When your content lacks proper citation, paraphrasing quickly and easily turns into plagiarism. • What are the common types of plagiarism seen in content writing? There are many types of plagiarism, but the most commonly seen in content writing include global plagiarism, verbatim plagiarism, paraphrasing plagiarism, patchwork plagiarism, and self-plagiarism. • How can I detect plagiarism? While prior to the Internet, it was difficult to check your or others’ work for plagiarism, now you can easily check for plagiarism with free and easy-to-use plagiarism checker software. A quick Google search will bring up several software options. • Can you accidentally plagiarize? Yes, you can accidentally plagiarize. One of the most common forms of accidental plagiarism is paraphrasing plagiarism, which is when you reword someone else’s work without giving credit or properly citing the source.
  • 22. FAQS • Question 1. Which of the following best describes ethical considerations in computer usage? • a) Respecting privacy and data confidentiality. • b) Using unauthorized software for personal use. • c) Hacking into someone else's computer system. • d) Disseminating false information online. Answer: a) Respecting privacy and data confidentiality.
  • 23. FAQS • Question 2. What do Intellectual Property Rights (IPR) protect? • a) Personal information on social media. • b) Ideas and concepts in the public domain. • c) Creative works and inventions of individuals. • d) Internet service provider's network infrastructure. Answer: c) Creative works and inventions of individuals.
  • 24. FAQS • Question 3. Plagiarism is the act of: • a) Respecting the copyright of creative works. • b) Giving proper credit to the original author. • c) Using someone else's work without permission. • d) Creating new and original content. Answer: c) Using someone else's work without permission.
  • 25. FAQS • Question 4. What is one of the key reasons to promote ethical behavior in computer usage? • a) To avoid getting caught by law enforcement. • b) To prevent accidental data loss. • c) To foster a positive online community. • d) To increase internet download speed. Answer: c) To foster a positive online community.
  • 26. EMERGING TECHNOLOGIES • Artificial Intelligence (AI) • Internet of Things (IoT) • Blockchain Technology
  • 27. ARTIFICIAL INTELLIGENCE (AI) • Artificial Intelligence (AI) is a rapidly advancing technology that aims to create intelligent machines capable of performing tasks that typically require human intelligence. • The ultimate goal of AI is to develop machines that can reason, learn from experience, and adapt to new situations, just like humans. • AI encompasses a broad range of techniques and approaches that allow computers and machines to simulate human-like cognitive functions. • These functions include problem-solving, speech recognition, learning, planning, and decision-making. AI systems can process large amounts of data, identify patterns, and make predictions or recommendations based on that data.
  • 28. HOW ARTIFICIAL INTELLIGENCE IS BEING USED TO RUN BUSINESS PROCESSES TODAY • Predicting Consumer Behavior and Making Product Recommendations. • This is one of the fields that is growing increasingly today. Businesses need to market and advertise. But just spending a lot of money will not guarantee more leads and sales. Businesses need to be able to identify, understand and know their target consumers and know what kind of product they will need at a particular point in time. Using big data and artificial intelligence, businesses can now forecast consumer behavior and run data-based campaigns that yield remarkable results.
  • 29. HOW ARTIFICIAL INTELLIGENCE IS BEING USED TO RUN BUSINESS PROCESSES TODAY • Automated Customer Service through Telephone and Online Chabot • To maintain and keep customers, customer service has to be a primary function of a business. However, this does that mean a business should employ a huge customer service staff to handle all customer enquiries and provide support With the help of customer chatbots, all customer enquiries can be handled on time and appropriately, based on the needs of the user.
  • 30. HOW ARTIFICIAL INTELLIGENCE IS BEING USED TO RUN BUSINESS PROCESSES TODAY • Automating Workloads and Managing Processes • Some clerical duties can just be boring to do. Your people might even be ignoring these tasks or making mistakes while getting them done. Through robotic process automation, many of these mundane tasks can be automated and outsourced to robots so that your human staff can focus on what really needs to be done. This has current applications in banking, insurance, healthcare, manufacturing and many other forms of industries.
  • 31. HOW ARTIFICIAL INTELLIGENCE IS BEING USED TO RUN BUSINESS PROCESSES TODAY • Data Management • Every business relies on data to make critical business decisions. First, data is collected, stored, processed and then transferred to the relevant department of the organization for usage. Artificial intelligence, in this case, can be deployed fill forms, update files, transfer and cross-reference files as the need arises. With this functionality, many businesses can use AI-empowered data management system to detect fraud, prevent cybersecurity threats and improve their overall business operations.
  • 32. INTERNET OF THINGS (IOT) • Today mobile device contains GPS Tracking, Mobile Gyroscope, Adaptive brightness, Voice detection, Face detection etc. These components have their own individual features, but what about if these all communicate with each other to provide a better environment? For example, the phone brightness is adjusted based on my GPS location or my direction. • Connecting everyday things embedded with electronics, software, and sensors to internet enabling to collect and exchange data without human interaction called as the Internet of Things (IoT). • The term "Things" in the Internet of Things refers to anything and everything in day to day life which is accessed or connected through the internet.
  • 33. HOW DOES INTERNET OF THING (IOT) WORK? • The working of IoT is different for different IoT echo system (architecture). However, the key concept of there working are similar. • The entire working process of IoT starts with the device themselves, such as smartphones, digital watches, electronic appliances, which securely communicate with the IoT platform. • The platforms collect and analyze the data from all multiple devices and platforms and transfer the most valuable data with applications to devices.
  • 34. FEATURES OF IOT • The most important features of IoT on which it works are connectivity, analyzing, integrating, active engagement, and many more. Some of them are listed below: • Connectivity: Connectivity refers to establish a proper connection between all the things of IoT to IoT platform it may be server or cloud. After connecting the IoT devices, it needs a high speed messaging between the devices and cloud to enable reliable, secure and bi- directional communication. • Analyzing: After connecting all the relevant things, it comes to real-time analyzing the data collected and use them to build effective business intelligence. If we have a good insight into data gathered from all these things, then we call our system has a smart system. • Integrating: IoT integrating the various models to improve the user experience as well. • Artificial Intelligence: IoT makes things smart and enhances life through the use of data. For example, if we have a coffee machine whose beans have going to end, then the coffee machine itself order the coffee beans of your choice from the retailer. • Sensing: The sensor devices used in IoT technologies detect and measure any change in the environment and report on their status. IoT technology brings passive networks to active networks. Without sensors, there could not hold an effective or true IoT environment. • Active Engagement: IoT makes the connected technology, product, or services to active engagement between each other. • Endpoint Management: It is important to be the endpoint management of all the IoT system otherwise, it makes the complete failure of the system. For example, if a coffee machine itself order the coffee beans when it goes to end but what happens when it orders the beans from a retailer and we are not present at home for a few days, it leads to the failure of the IoT system. So, there must be a need for endpoint management.
  • 35. BLOCKCHAIN TECHNOLOGY • Blockchain technology is a transaction ledger on a massive scale. Fortified by strong encryption and advanced security protocols, this ledger can serve as the basis for many different types of financial systems and cloud-computing networks. • Blockchain systems rely on a peer-to-peer network of computers that analyze a shared digital ledger at regular intervals. New transactions must be confirmed by a predetermined number of computer nodes. When a new block of transactions gets the stamp of approval from enough nodes, the new data is written in stone and the blockchain moves on to considering another list of new transactions.
  • 36. WHAT IS BLOCKCHAIN USED FOR? • Smart contracts are self-executing contracts written in programming languages like Solidity. They are deployed on the blockchain through a transaction. Once deployed, they become immutable and transparent to all parties involved. Smart contracts are automatically executed when predefined conditions are met, and this execution is validated by the blockchain's consensus mechanism, ensuring the integrity of the process. • Digital currency in the context of blockchain refers to a form of currency that exists purely in digital form and operates on a blockchain network. Unlike traditional fiat currencies issued and controlled by governments, digital currencies are decentralized and rely on cryptographic techniques for secure transactions and the creation of new units. https://youtu.be/E2JRnFgrztM
  • 37. FAQS • Question 1. What is Artificial Intelligence (AI)? • a) A type of computer hardware • b) A branch of science that studies plants and animals • c) A field of computer science that simulates human-like intelligence • d) A popular video game Answer: c) A field of computer science that simulates human-like intelligence
  • 38. FAQS • Question 2. Which of the following is an example of AI technology? • a) Smartphones • b) Microwave ovens • c) Virtual assistants like Siri and Alexa • d) Bicycles Answer: c) Virtual assistants like Siri and Alexa
  • 39. FAQS • Question 3. Which of the following is a characteristic of IoT devices? • a) They are powered by magic • b) They can communicate with each other over the internet • c) They can predict the future • d) They only work in space Answer: b) They can communicate with each other over the internet
  • 40. FAQS • Question 4. What is Blockchain? • a) A type of building material • b) A digital currency • c) A decentralized and secure technology for recording transactions • d) A popular dance move Answer: c) A decentralized and secure technology for recording transactions
  • 41. FAQS • Question 5. What is the main benefit of using Blockchain for transactions? • a) It is slow and inefficient • b) It requires a lot of paperwork • c) It provides transparency and immutability • d) It is easily hackable Answer: c) It provides transparency and immutability