Computer Ethics and Emerging Technologies:
Computer Ethics: Ethical considerations in computer usage, intellectual property rights, and plagiarism.
Emerging Technologies: Artificial Intelligence (AI), Internet of Things (IoT), Blockchain Technology.
5. Computer ethics refers to the moral principles and guidelines
that govern the use of computers and technology.
It involves understanding and adhering to ethical principles
while using, developing, and managing technology.
Computer ethics is crucial because computers and technology
have a significant impact on various aspects of our lives,
including privacy, security, intellectual property, and social
interactions.
6. KEY ASPECTS OF COMPUTER ETHICS
• Privacy: Respecting individuals' right to privacy and ensuring that their personal information is handled securely and responsibly.
This includes obtaining proper consent before collecting and using personal data.
• Security: Taking measures to protect computer systems and data from unauthorized access, hacking, or other malicious activities.
This involves using strong passwords, implementing encryption, and regularly updating software to prevent security breaches.
• Intellectual Property: Respecting copyright laws and intellectual property rights when using and sharing information, software,
and digital content. Avoiding plagiarism and giving credit to the original creators of the content is essential.
• Cyberbullying and Online Harassment: Avoiding engaging in cyberbullying or harassing others online. Treating others with
respect and being mindful of the impact of online actions on others.
• Software Piracy: Not using or distributing unauthorized copies of software. Respect for software licensing and copyright laws is
crucial in computer ethics.
• Accessibility: Ensuring that technology is accessible to all individuals, including those with disabilities. Designing websites,
applications, and software with accessibility in mind.
• Social Media and Online Behavior: Being responsible and ethical in our online interactions, including avoiding hate speech,
spreading false information, or engaging in harmful behavior.
• Artificial Intelligence and Automation: Ensuring that AI and automation technologies are designed and used ethically,
considering their potential impact on society and human welfare.
• Digital Divide: Addressing the disparities in access to technology and ensuring that everyone has equal opportunities to benefit
from technological advancements.
• Environmental Impact: Considering the environmental impact of technology and adopting eco-friendly practices in computing.
7. TEN COMMANDMENTS OF COMPUTER ETHICS
1. Do not use the computer in ways that may harm other people.
2. Do not use computer technology to cause interference in other users’ work.
3. Do not spy on another person’s computer data.
4. Do not use computer technology to steal information.
5. Do not contribute to the spread of misinformation using computer technology.
6. Refrain from copying software or buying pirated copies. Pay for software unless it is
free.
7. Do not use someone else’s computer resources unless authorized to.
8. It is wrong to claim ownership on a work which is the output of someone else’s
intellect.
9. Before developing a software, think about the social impact it can have.
10. In using computers for communication, be respectful and courteous with the fellow
members.
8. TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 1
• Do not use the computer in ways that may harm other people.
• Explanation: This commandment says that it is unethical to use a computer to harm another user. It is
not limited to physical injury. It includes harming or corrupting other users’ data or files. The
commandment states that it is wrong to use a computer to steal someone’s personal information.
Manipulating or destroying files of other users is ethically wrong. It is unethical to write programs,
which on execution lead to stealing, copying or gaining unauthorized access to other users’ data. Being
involved in practices like hacking, spamming, or cyber bullying does not comform computer ethics. It is
illegal to use the power of the computer to harm others and getting the will to do negative things to
others.
9. TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 2
• Do not use computer technology to cause interference in other users’ work.
• Explanation: Computer software can be used in ways that disturb other users or disrupt their work.
Viruses, for example, are programs meant to harm useful computer programs or interfere with the
normal functioning of a computer. Malicious software can disrupt the functioning of computers in more
ways than one. It may overload computer memory through excessive consumption of computer
resources, thus slowing its functioning. It may cause a computer to function wrongly or even stop
working. Using malicious software to attack a computer is unethical. It will also be able to delete
important documents and data which the user creates on the software.
10. TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 3
• Do not spy on another person’s computer data.
• Explanation: We know it is wrong to read someone’s personal letters. On the same lines, it is wrong to
read someone else’s email messages or files. Obtaining data from another person’s private files is
nothing less than breaking into someone’s room. Snooping around in another person’s files or reading
someone else’s personal messages is the invasion of his privacy. There are exceptions to this. For
example, spying is necessary and cannot be called unethical when it is done against illegitimate use of
computers. For example, intelligence agencies working on cybercrime cases need to spy on the internet
activity of suspects. Giving privacy to others is a must and spy on others original.
11. TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 4
• Do not use computer technology to steal information.
• Explanation: Stealing sensitive information or leaking confidential information is as good as robbery. It
is wrong to acquire personal information of employees from an employee database or patient history
from a hospital database or other such information that is meant to be confidential. Similarly, breaking
into a bank account to collect information about the account or account holder is wrong. Illegal
electronic transfer of funds is a type of fraud. With the use of technology, stealing of information is
much easier. Computer can be used to store stolen information. It’s not unethical to steal other’s
information especially if it’s a data that is authentic and being used for big business purposes.
12. TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 5
• Do not contribute to the spread of misinformation using computer technology.
• Explanation: Spread of information has become viral today, because of the Internet. This also means
that false news or rumors can spread speedily through social networking sites or emails. Being involved
in the circulation of incorrect information is unethical. Mails and pop-ups are commonly used to spread
the wrong information or give false alerts with the only intent of selling products. Mails from untrusted
sources advertising certain products or spreading some hard-to-believe information, are not
uncommon. Direct or indirect involvement in the circulation of false information is ethically wrong.
Giving wrong information can hurt other parties or organizations that are affected on that particular
theme.
13. TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 6
• Refrain from copying software or buying pirated copies. Pay for software unless it is free.
• Explanation: Like any other artistic or literary work, software is copyrighted. A piece of code is the
original work of the individual who created it. It is copyrighted in his name. In case of a developer
writing software for the organization he works for, the organization holds the copyright for it. Copyright
holds the true unless its creator announce if is not. Obtaining illegal copies of copyright software is
unethical. It is not easy to do such things and in the end it will just be copied illegally.
14. TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 7
• Do not use someone else’s computer resources unless authorized to.
• Explanation: Multi-user systems have user specific passwords. Breaking into some other user’s
password, thus intruding his private space is unethical. It is not ethical to hack passwords for gaining
unauthorized access to a password-protected computer system. Accessing data that you are not
authorized to access or gaining access to another user’s computer without his permission is not ethical.
Privacy will always be applied to such resources and were not supposed to get exposed and hack in such
ways that is not yours. Do not intentionally use other’s resources without any permission to the original
user or creator as it will be unethical.
15. TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 8
• It is wrong to claim ownership on a work which is the output of someone else’s intellect.
• Explanation: Programs developed by a software developer are his/her property. If he is working with
an organization, they are the organization’s property. Copying them and propagating them in one’s own
name is unethical. This applies to any creative work, program or design. Establishing ownership on a
work which is not yours is ethically wrong. Originality of any software/programs are to be keep safe and
trying to claim ownership will cause a viral dispute.
16. TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 9
• Before developing a software, think about the social impact it can have.
• Explanation: Looking at the social consequences that a program can have, describes a broader
perspective of looking at technology. A computer software on release, reaches millions. Software like
video games and animations or educational software can have a social impact on their users. When
working on animation films or designing video games, for example, it is the programmer’s responsibility
to understand his target audience/users and the effect it may have on them. For example, a computer
game for kids should not have content that can influence them negatively. Similarly, writing malicious
software is ethically wrong. A software developer/development firm should consider the influence their
code can have on the society at large. Simply having a good topic on either computer gaming or
animation films will be a good impact with case to case basis and studying it before the production.
17. TEN COMMANDMENTS OF COMPUTER ETHICS
• Commandment 10
• In using computers for communication, be respectful and courteous with the fellow
members.
• Explanation: The communication etiquette we follow in the real world applies to communication over
computers as well. While communicating over the Internet, one should treat others with respect. One
should not intrude others’ private space, use abusive language, make false statements or pass
irresponsible remarks about others. One should be courteous while communicating over the web and
should respect others’ time and resources. Also, one should be considerate with a novice computer
user. Do not use false words for communicate others to avoid disputes.
18. INTELLECTUAL PROPERTY RIGHTS (IPR)
• World Intellectual Property Organization defines Intellectual property (IP) as creations of the mind. They
may be inventions, literary and artistic works, designs and symbols, names and images used in
commerce.
• WHAT ARE THE TYPES OF INTELLECTUAL PROPERTY IN INDIA?
1.Patents
2.Trademarks
3.Copyrights
4.Industrial Designs
5.Geographical Indications
6.Trade Secrets
7.Plant Varieties
19. INTELLECTUAL PROPERTY RIGHTS (IPR)
1. Patents: Patents protect inventions, which are new and non-obvious solutions to technical problems. They grant the inventor exclusive
rights to make, use, and sell the invention for a limited period (usually 20 years) in India.
2. Trademarks:Trademarks protect brand names, logos, symbols, and other distinctive signs that distinguish goods and services of one
business from another. Trademark registration grants exclusive rights and prevents others from using a similar mark for similar goods or
services.
3. Copyrights:Copyrights protect original literary, artistic, musical, and dramatic works, as well as computer software and databases. The
owner of a copyright has the exclusive right to reproduce, distribute, perform, and display the work.
4. Industrial Designs: Industrial designs protect the visual appearance of a product, including its shape, pattern, or ornamentation.
Registration of an industrial design gives the owner exclusive rights to prevent others from using the design.
5. Geographical Indications: Geographical indications protect goods originating from a specific geographical location that possess
certain qualities, reputation, or characteristics attributable to that location. Registration prevents unauthorized use of the geographical
indication.
6. Trade Secrets: Trade secrets refer to confidential business information that provides a competitive advantage. Unlike patents or
copyrights, trade secrets are not publicly disclosed. They are protected as long as they are kept confidential.
7. Plant Varieties: Plant variety protection grants exclusive rights to the breeder of a new plant variety to produce, sell, and market that
variety for a limited period.
20. PLAGIARISM
• Plagiarism is not a type of intellectual
property; rather, it is an act of using
someone else's work, ideas, or intellectual
property without giving them proper credit
or permission. It involves presenting
someone else's work as one's own, whether
it is written content, artwork, music, or any
other creative work. Plagiarism is considered
unethical and is subject to legal
consequences in cases of copyright
infringement.
21. FREQUENTLY ASKED QUESTIONS ABOUT PLAGIARISM
• What is plagiarism? At its root, plagiarism is the overt act of attempting to pass off someone else’s work as
your own.
• What’s the difference between plagiarism and paraphrasing? The line between plagiarism and paraphrasing
is very thin. It all depends on if and how you cite your sources. When your content lacks proper citation,
paraphrasing quickly and easily turns into plagiarism.
• What are the common types of plagiarism seen in content writing? There are many types of plagiarism, but
the most commonly seen in content writing include global plagiarism, verbatim plagiarism, paraphrasing
plagiarism, patchwork plagiarism, and self-plagiarism.
• How can I detect plagiarism? While prior to the Internet, it was difficult to check your or others’ work for
plagiarism, now you can easily check for plagiarism with free and easy-to-use plagiarism checker software. A
quick Google search will bring up several software options.
• Can you accidentally plagiarize? Yes, you can accidentally plagiarize. One of the most common forms of
accidental plagiarism is paraphrasing plagiarism, which is when you reword someone else’s work without
giving credit or properly citing the source.
22. FAQS
• Question 1. Which of the following best describes ethical considerations in computer
usage?
• a) Respecting privacy and data confidentiality.
• b) Using unauthorized software for personal use.
• c) Hacking into someone else's computer system.
• d) Disseminating false information online.
Answer: a) Respecting privacy and data confidentiality.
23. FAQS
• Question 2. What do Intellectual Property Rights (IPR) protect?
• a) Personal information on social media.
• b) Ideas and concepts in the public domain.
• c) Creative works and inventions of individuals.
• d) Internet service provider's network infrastructure.
Answer: c) Creative works and inventions of individuals.
24. FAQS
• Question 3. Plagiarism is the act of:
• a) Respecting the copyright of creative works.
• b) Giving proper credit to the original author.
• c) Using someone else's work without permission.
• d) Creating new and original content.
Answer: c) Using someone else's work without permission.
25. FAQS
• Question 4. What is one of the key reasons to promote ethical behavior in computer
usage?
• a) To avoid getting caught by law enforcement.
• b) To prevent accidental data loss.
• c) To foster a positive online community.
• d) To increase internet download speed.
Answer: c) To foster a positive online community.
27. ARTIFICIAL INTELLIGENCE (AI)
• Artificial Intelligence (AI) is a rapidly advancing technology
that aims to create intelligent machines capable of
performing tasks that typically require human intelligence.
• The ultimate goal of AI is to develop machines that can
reason, learn from experience, and adapt to new situations,
just like humans.
• AI encompasses a broad range of techniques and approaches
that allow computers and machines to simulate human-like
cognitive functions.
• These functions include problem-solving, speech recognition,
learning, planning, and decision-making. AI systems can
process large amounts of data, identify patterns, and make
predictions or recommendations based on that data.
28. HOW ARTIFICIAL INTELLIGENCE IS BEING USED TO
RUN BUSINESS PROCESSES TODAY
• Predicting Consumer Behavior and Making Product Recommendations.
• This is one of the fields that is growing increasingly today. Businesses need to market and
advertise. But just spending a lot of money will not guarantee more leads and sales.
Businesses need to be able to identify, understand and know their target consumers and
know what kind of product they will need at a particular point in time. Using big data and
artificial intelligence, businesses can now forecast consumer behavior and run data-based
campaigns that yield remarkable results.
29. HOW ARTIFICIAL INTELLIGENCE IS BEING USED TO
RUN BUSINESS PROCESSES TODAY
• Automated Customer Service through Telephone and Online Chabot
• To maintain and keep customers, customer service has to be a primary
function of a business. However, this does that mean a business should
employ a huge customer service staff to handle all customer enquiries and
provide support With the help of customer chatbots, all customer enquiries
can be handled on time and appropriately, based on the needs of the user.
30. HOW ARTIFICIAL INTELLIGENCE IS BEING USED TO
RUN BUSINESS PROCESSES TODAY
• Automating Workloads and Managing Processes
• Some clerical duties can just be boring to do. Your people might even be
ignoring these tasks or making mistakes while getting them done. Through
robotic process automation, many of these mundane tasks can be automated
and outsourced to robots so that your human staff can focus on what really
needs to be done. This has current applications in banking, insurance,
healthcare, manufacturing and many other forms of industries.
31. HOW ARTIFICIAL INTELLIGENCE IS BEING USED TO
RUN BUSINESS PROCESSES TODAY
• Data Management
• Every business relies on data to make critical business decisions. First, data is
collected, stored, processed and then transferred to the relevant department
of the organization for usage. Artificial intelligence, in this case, can be
deployed fill forms, update files, transfer and cross-reference files as the need
arises. With this functionality, many businesses can use AI-empowered data
management system to detect fraud, prevent cybersecurity threats and
improve their overall business operations.
32. INTERNET OF THINGS (IOT)
• Today mobile device contains GPS Tracking, Mobile
Gyroscope, Adaptive brightness, Voice detection, Face
detection etc. These components have their own
individual features, but what about if these all
communicate with each other to provide a better
environment? For example, the phone brightness is
adjusted based on my GPS location or my direction.
• Connecting everyday things embedded with
electronics, software, and sensors to internet enabling
to collect and exchange data without human
interaction called as the Internet of Things (IoT).
• The term "Things" in the Internet of Things refers to
anything and everything in day to day life which is
accessed or connected through the internet.
33. HOW DOES INTERNET OF THING (IOT) WORK?
• The working of IoT is different for different IoT echo
system (architecture). However, the key concept of there
working are similar.
• The entire working process of IoT starts with the device
themselves, such as smartphones, digital watches,
electronic appliances, which securely communicate with
the IoT platform.
• The platforms collect and analyze the data from all
multiple devices and platforms and transfer the most
valuable data with applications to devices.
34. FEATURES OF IOT
• The most important features of IoT on which it works are connectivity, analyzing, integrating, active engagement, and many more. Some
of them are listed below:
• Connectivity: Connectivity refers to establish a proper connection between all the things of IoT to IoT platform it may be server or cloud.
After connecting the IoT devices, it needs a high speed messaging between the devices and cloud to enable reliable, secure and bi-
directional communication.
• Analyzing: After connecting all the relevant things, it comes to real-time analyzing the data collected and use them to build effective
business intelligence. If we have a good insight into data gathered from all these things, then we call our system has a smart system.
• Integrating: IoT integrating the various models to improve the user experience as well.
• Artificial Intelligence: IoT makes things smart and enhances life through the use of data. For example, if we have a coffee machine whose
beans have going to end, then the coffee machine itself order the coffee beans of your choice from the retailer.
• Sensing: The sensor devices used in IoT technologies detect and measure any change in the environment and report on their status. IoT
technology brings passive networks to active networks. Without sensors, there could not hold an effective or true IoT environment.
• Active Engagement: IoT makes the connected technology, product, or services to active engagement between each other.
• Endpoint Management: It is important to be the endpoint management of all the IoT system otherwise, it makes the complete failure of the
system. For example, if a coffee machine itself order the coffee beans when it goes to end but what happens when it orders the beans from
a retailer and we are not present at home for a few days, it leads to the failure of the IoT system. So, there must be a need for endpoint
management.
35. BLOCKCHAIN TECHNOLOGY
• Blockchain technology is a transaction ledger on
a massive scale. Fortified by strong encryption
and advanced security protocols, this ledger can
serve as the basis for many different types of
financial systems and cloud-computing
networks.
• Blockchain systems rely on a peer-to-peer
network of computers that analyze a shared
digital ledger at regular intervals. New
transactions must be confirmed by a
predetermined number of computer nodes.
When a new block of transactions gets the
stamp of approval from enough nodes, the new
data is written in stone and the blockchain
moves on to considering another list of new
transactions.
36. WHAT IS BLOCKCHAIN USED FOR?
• Smart contracts are self-executing contracts written in
programming languages like Solidity. They are deployed
on the blockchain through a transaction. Once deployed,
they become immutable and transparent to all parties
involved. Smart contracts are automatically executed
when predefined conditions are met, and this execution
is validated by the blockchain's consensus mechanism,
ensuring the integrity of the process.
• Digital currency in the context of blockchain refers to a
form of currency that exists purely in digital form and
operates on a blockchain network. Unlike traditional fiat
currencies issued and controlled by governments, digital
currencies are decentralized and rely on cryptographic
techniques for secure transactions and the creation of
new units.
https://youtu.be/E2JRnFgrztM
37. FAQS
• Question 1. What is Artificial Intelligence (AI)?
• a) A type of computer hardware
• b) A branch of science that studies plants and animals
• c) A field of computer science that simulates human-like intelligence
• d) A popular video game
Answer: c) A field of computer science that simulates human-like intelligence
38. FAQS
• Question 2. Which of the following is an example of AI technology?
• a) Smartphones
• b) Microwave ovens
• c) Virtual assistants like Siri and Alexa
• d) Bicycles
Answer: c) Virtual assistants like Siri and Alexa
39. FAQS
• Question 3. Which of the following is a characteristic of IoT devices?
• a) They are powered by magic
• b) They can communicate with each other over the internet
• c) They can predict the future
• d) They only work in space
Answer: b) They can communicate with each other over the internet
40. FAQS
• Question 4. What is Blockchain?
• a) A type of building material
• b) A digital currency
• c) A decentralized and secure technology for recording transactions
• d) A popular dance move
Answer: c) A decentralized and secure technology for recording transactions
41. FAQS
• Question 5. What is the main benefit of using Blockchain for transactions?
• a) It is slow and inefficient
• b) It requires a lot of paperwork
• c) It provides transparency and immutability
• d) It is easily hackable
Answer: c) It provides transparency and immutability