SlideShare a Scribd company logo
1 of 25
GLORY K S
2019520202
INTRODUCTION
 Ethics is a set of moral principles that govern (control) the
behavior of a group or individual, likewise, computer
ethics is set of moral principles that regulate (control) the
use of computers.
Explanation
 Ethic refers to the standards and rules that "should" be
followed and it helps us to regulate our conduct in a
group or with a set of individuals. Since the term
Ethics is a relative term, it is branched under
philosophy, which states how users of World Wide
Web should make decisions regarding their conduct.
 Computer ethics is a new branch of ethics that is
growing and changing rapidly as computer technology
also grows anddevelops.
The Ten Commandments On Computer Ethics
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you
have not paid.
7. Thou shalt not use other people's computer resources without
authorization or proper compensation.
8. Thou shalt not appropriate other people's intellectual(idea of
others) output.
9. Thou shalt think about the social consequences of the program
you are writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure
consideration (attention) and respect for your fellow humans.
Why do we need computer ethics?
 The growth of the WWW has created several novel
legal issues
 The existence of new questions that older laws
cannot answer
 Traditional laws are outdated/anachronistic in this
world
 A more coherent (clear) body of law is needed to
govern Internet and computers
Code of Ethics
 Information stored on the computer should be treated as
seriously as written or spoken word.
 Privacy should not be violated. In case of academic use, it is
known. plagiarism
 Information from public viewing should not be modified
or deleted or inaccessible since these are considered as
destructive acts.
 Intrusive (unpleasant) software such as "worms" and
"viruses" which are destructive to the computer system is also
illegal.
 Congesting (blocking) somebody’s system with a lot of
unwanted information is also unethical.
 Sending obscene and crude (indecent) messages through mail or
chat is also forbidden.
INTELLECTUAL PROPERTY
• Intellectual property refers to creations of the intellect
(hence, the name): inventions, literary and artistic works,
symbols, names, images, and designs used in commerce
are a part ofit.
• Intellectual property is usually divided into two
branches, namely industrial property which broadly
speaking protects inventions and copyright, which
protectsliterary and artistic works.
Categorizing Intellectual Property
 Intellectual property is divided into twocategories:
 Industrial property, which includes inventions(patents),
trademarks, industrial designs, commercial
designations and geographic indications
names,
(location
specific brands) etc.
 Copyright, which includes literary and artistic works such
as novels, poems and plays, films, musical works, artistic
works such as drawings, paintings, photographs,
sculptures, and architecturaldesigns.
Copy rights
Copyright is a legal concept, enacted by most
governments, giving thecreatorof an original
work exclusive rights to it, usually fora limited time.
COPY RIGHT ON INTERNET
 But what of works made available to the public on the
Internet? Are they at all protected by copyright? Once
communications network (such as the Internet),
again, yes! For works made available over a
the
copyright protects originalauthorship.
 But, according to the Copyright Law, it does not protect
ideas, procedures, systems, or methods of operation. This
means that once such an online work has been made
public, nothing in the copyright laws prevents others
from developing another work based on similar
principles, or ideas.
NETIQUETTES
Netiquette are about the various risks related to using
the Internet.
It is about proper ways in which to use a network and to
determine whether information is reliable, while
emphasizing four important pointsgiven in nextslides.
REAL PEPOLE EXIST BEHIND THE
COMPUTERS
• You are dealing with people,not machines.So think twice
before you click on Send button in the mail/chat window
• You are not the only one using the network
• Keep these other people in mind when you say something on a
network.
Ethical rules for computer users
 Do not use computer to harm other users.
 Do not use computers to steal other's information.
 Do not access files without the permission of owner.
Do not copy copyrighted software's without the authors
permission.
 Always respect copyright laws and policies.
 Respect the privacy of others, just as you expect the same from
 Do not use other user's computer resources with out their
permission.
.
• Use Internet ethically.
• Complain about illegal communication and activities, if
found, to Internet service Providers and local law enforcement
authorities
• Users are responsible for safeguarding their User Id and
passwords
• They should not write them on paper or anywhere else for
remembrance.
• Users should not intentionally use the computers to retrieve or
modify the information of others which may include password
information, files etc.
PROTECT YOUR PRIVACY
 Just as you would in the real world, be aware of risks, fraud
and false information which exists on the Internet. Use
common sense when deciding whether information is
valid. Don't trust or spread further any information about
which you are in doubt. Always try to obtain reliable
information.
 Protect your personal information to keep someone from
using it in an unethical way. (For example, when you enter a
prize contest, your name, address, and phone number may
be given toa dealerof personal information.)
AVOID SPAMMING
 Spamming is sending unsolicited bulk and/or
commercial messages over the Internet.
 Spamming is morally bad if it is intended to destroy and
done by infringing on the right of privacy of others.
 It could be good if the message sent benefits the
recipients, like giving out warnings or useful information
to others.
SOFTWARE PRIVACY
 Software piracy is morally bad when someone
reproduces a copy of the software and sells it for
profit, produces exactly the same or similar version
without giving proper credit to the original author, or
simply produces it and distributes it toothers.
 It is not immoral to copy the software if someone who has
a licensed copy of the software and simply makes a
backup copy of the original. One back-up copy of the
commercial software can be made, but the back-up copy
cannot be used except when the original package fails or
is destroyed.
CREATION OF WORMS AND
COMPUTER VIRUS
 Creation of worms and computer viruses is morally bad
when it is intended for malicious purposes like to steal
information or destroying ofdata.
 However, it could be used like a vaccine – poison to kill
another poison – to cure or prevent a potentially
destructive system from wreaking havoc in the network.
The way some worms and viruses work could be used to
gather information that could help protect the majority of
computerusers.
PLAGIARISM
 Plagiarism is copying someone else's work and then
passing it off as one's own. It is morally bad because it is
an act of stealing.
 Copying programs written by other programmers and
claiming it as your own could be an act of plagiarism. It
involves lying, cheating, theft, anddishonesty.
FILE PRIVACY
• Any computer document produced either by an individual
in his private home or in his office should remain private.
No one has should open any document unless authorized
by the individual who created the filehimself.
Computer ethical hacking
• An ethical hacker is usually employed by an
organization who trusts him or her to attempt to
penetrate networks and/or computer systems, using
the same methods as a hacker, for the purpose of
finding and fixing computer security vulnerabilities.
• Unauthorized hacking (i.e., gaining access to
computer systems without prior authorization from
the owner) is a crime in most countries, but
penetration testing done by request of the owner of
thevictim system or network is not.
Contd..
• A Certified Ethical Hacker has obtained a
certification in how to look for the weaknesses and
vulnerabilities in target systems and uses the same
knowledge and tools as a hacker.
CONCLUSION
• As technology advances, computers continue to
have a greater impact on society. Therefore,
computer ethics promotes the discussion of how
much influence computers should have in areas
such as artificial intelligence and human
communication.
• As the world of computers evolves, computer
ethics continues to create ethical standards that
address new issues raised by new technologies.
THANK YOU!

More Related Content

What's hot

Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
computer ethics
computer ethicscomputer ethics
computer ethicsHoney jose
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsDyuti Islam
 
The ten commandments of computer ethics
The ten commandments of computer ethicsThe ten commandments of computer ethics
The ten commandments of computer ethicssalj_16
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 

What's hot (20)

Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
The ten commandments of computer ethics
The ten commandments of computer ethicsThe ten commandments of computer ethics
The ten commandments of computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Netiquette
NetiquetteNetiquette
Netiquette
 

Similar to computer ethics.pptx

Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxhenrysales6
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxAnnMarieTAquinoII
 
Ten commandments
Ten commandmentsTen commandments
Ten commandmentslsanford84
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 

Similar to computer ethics.pptx (20)

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 

Recently uploaded

{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxFurkanTasci3
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Spark3's new memory model/management
Spark3's new memory model/managementSpark3's new memory model/management
Spark3's new memory model/managementakshesh doshi
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Data Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health ClassificationData Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health ClassificationBoston Institute of Analytics
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 

Recently uploaded (20)

{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptx
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Spark3's new memory model/management
Spark3's new memory model/managementSpark3's new memory model/management
Spark3's new memory model/management
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Data Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health ClassificationData Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health Classification
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 

computer ethics.pptx

  • 2. INTRODUCTION  Ethics is a set of moral principles that govern (control) the behavior of a group or individual, likewise, computer ethics is set of moral principles that regulate (control) the use of computers.
  • 3. Explanation  Ethic refers to the standards and rules that "should" be followed and it helps us to regulate our conduct in a group or with a set of individuals. Since the term Ethics is a relative term, it is branched under philosophy, which states how users of World Wide Web should make decisions regarding their conduct.  Computer ethics is a new branch of ethics that is growing and changing rapidly as computer technology also grows anddevelops.
  • 4.
  • 5. The Ten Commandments On Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual(idea of others) output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration (attention) and respect for your fellow humans.
  • 6. Why do we need computer ethics?  The growth of the WWW has created several novel legal issues  The existence of new questions that older laws cannot answer  Traditional laws are outdated/anachronistic in this world  A more coherent (clear) body of law is needed to govern Internet and computers
  • 7. Code of Ethics  Information stored on the computer should be treated as seriously as written or spoken word.  Privacy should not be violated. In case of academic use, it is known. plagiarism  Information from public viewing should not be modified or deleted or inaccessible since these are considered as destructive acts.  Intrusive (unpleasant) software such as "worms" and "viruses" which are destructive to the computer system is also illegal.  Congesting (blocking) somebody’s system with a lot of unwanted information is also unethical.  Sending obscene and crude (indecent) messages through mail or chat is also forbidden.
  • 8. INTELLECTUAL PROPERTY • Intellectual property refers to creations of the intellect (hence, the name): inventions, literary and artistic works, symbols, names, images, and designs used in commerce are a part ofit. • Intellectual property is usually divided into two branches, namely industrial property which broadly speaking protects inventions and copyright, which protectsliterary and artistic works.
  • 9. Categorizing Intellectual Property  Intellectual property is divided into twocategories:  Industrial property, which includes inventions(patents), trademarks, industrial designs, commercial designations and geographic indications names, (location specific brands) etc.  Copyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs, sculptures, and architecturaldesigns.
  • 10. Copy rights Copyright is a legal concept, enacted by most governments, giving thecreatorof an original work exclusive rights to it, usually fora limited time.
  • 11. COPY RIGHT ON INTERNET  But what of works made available to the public on the Internet? Are they at all protected by copyright? Once communications network (such as the Internet), again, yes! For works made available over a the copyright protects originalauthorship.  But, according to the Copyright Law, it does not protect ideas, procedures, systems, or methods of operation. This means that once such an online work has been made public, nothing in the copyright laws prevents others from developing another work based on similar principles, or ideas.
  • 12. NETIQUETTES Netiquette are about the various risks related to using the Internet. It is about proper ways in which to use a network and to determine whether information is reliable, while emphasizing four important pointsgiven in nextslides.
  • 13. REAL PEPOLE EXIST BEHIND THE COMPUTERS • You are dealing with people,not machines.So think twice before you click on Send button in the mail/chat window • You are not the only one using the network • Keep these other people in mind when you say something on a network.
  • 14. Ethical rules for computer users  Do not use computer to harm other users.  Do not use computers to steal other's information.  Do not access files without the permission of owner. Do not copy copyrighted software's without the authors permission.  Always respect copyright laws and policies.  Respect the privacy of others, just as you expect the same from  Do not use other user's computer resources with out their permission. .
  • 15. • Use Internet ethically. • Complain about illegal communication and activities, if found, to Internet service Providers and local law enforcement authorities • Users are responsible for safeguarding their User Id and passwords • They should not write them on paper or anywhere else for remembrance. • Users should not intentionally use the computers to retrieve or modify the information of others which may include password information, files etc.
  • 16. PROTECT YOUR PRIVACY  Just as you would in the real world, be aware of risks, fraud and false information which exists on the Internet. Use common sense when deciding whether information is valid. Don't trust or spread further any information about which you are in doubt. Always try to obtain reliable information.  Protect your personal information to keep someone from using it in an unethical way. (For example, when you enter a prize contest, your name, address, and phone number may be given toa dealerof personal information.)
  • 17. AVOID SPAMMING  Spamming is sending unsolicited bulk and/or commercial messages over the Internet.  Spamming is morally bad if it is intended to destroy and done by infringing on the right of privacy of others.  It could be good if the message sent benefits the recipients, like giving out warnings or useful information to others.
  • 18. SOFTWARE PRIVACY  Software piracy is morally bad when someone reproduces a copy of the software and sells it for profit, produces exactly the same or similar version without giving proper credit to the original author, or simply produces it and distributes it toothers.  It is not immoral to copy the software if someone who has a licensed copy of the software and simply makes a backup copy of the original. One back-up copy of the commercial software can be made, but the back-up copy cannot be used except when the original package fails or is destroyed.
  • 19. CREATION OF WORMS AND COMPUTER VIRUS  Creation of worms and computer viruses is morally bad when it is intended for malicious purposes like to steal information or destroying ofdata.  However, it could be used like a vaccine – poison to kill another poison – to cure or prevent a potentially destructive system from wreaking havoc in the network. The way some worms and viruses work could be used to gather information that could help protect the majority of computerusers.
  • 20. PLAGIARISM  Plagiarism is copying someone else's work and then passing it off as one's own. It is morally bad because it is an act of stealing.  Copying programs written by other programmers and claiming it as your own could be an act of plagiarism. It involves lying, cheating, theft, anddishonesty.
  • 21. FILE PRIVACY • Any computer document produced either by an individual in his private home or in his office should remain private. No one has should open any document unless authorized by the individual who created the filehimself.
  • 22. Computer ethical hacking • An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. • Unauthorized hacking (i.e., gaining access to computer systems without prior authorization from the owner) is a crime in most countries, but penetration testing done by request of the owner of thevictim system or network is not.
  • 23. Contd.. • A Certified Ethical Hacker has obtained a certification in how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a hacker.
  • 24. CONCLUSION • As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. • As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies.