SlideShare a Scribd company logo
1 of 37
COMPUTER ETHICS
By
M.Ramki a.k.a cR@$#
12c
Computer ethics has its roots in the work of Norbert
Wiener during World War II. Wiener’s book included
 An account of the purpose of a human life
 Four principles of justice
 A powerful method for doing applied ethics
 Discussions of the fundamental questions of computer
ethics, and
 Examples of key computer ethics topics.
 One of the highest profiled banking computer
crime occurred during a course of three years
beginning in 1970. The chief teller at the Park
Avenue branch of New York's Union Dime Savings
Bank embezzled over $1.5 million from hundreds
of accounts.
 On April 23, 2013, the Associated Press' Twitter
account was hacked to release a hoax tweet
about fictional attacks in the White House that
left President Obama injured. This erroneous
tweet resulted in a brief plunge of 130 points
from the Dow Jones Industrial Average, removal
of $136 billion from S&P 500 index, and the
temporary suspension of their Twitter account.
The Dow Jones later restored its session gains.
Ethical Standards
Various national and international professional societies
and organizations have produced code of ethics
documents to give basic behavioral guidelines to
computing professionals and users. They include:
 Association for Computing Machinery: ACM Code of
Ethics and Professional Conduct
 British Computer Society: BCS Code of Conduct & Code
of Good Practice
 Australian Computer Society: ACS Code of
Ethics and ACS Code of Professional Conduct
 IEEE: IEEE Code of Ethics
 Computer Ethics Institute: Ten Commandments of
Computer Ethics
Physical Security:
Physical security refers to the protection of hardware,
facilities, magnetic disks, and other items that could be
illegally accessed, stolen, damaged or destroyed. This
is usually provided by restricting the people who can
access the resources.
Personal Security:
Personal security refers to software setups that permit
only authorized access to the system. User Ids and
passwords are common tools for such purpose. Only
those with a need to know have Ids and password for
access.
Personnel Security:
Personnel security refers to protecting data and
computer system against dishonesty or negligence of
employees.
Computer Crime
Common crimes include:
 Crimes related to money transfer on the
internet
 Making long distance calls illegally using
computers
 Illegal access to confidential files
 Stealing hardware
 Selling or misusing personal
 Hardware and software piracy
 Virus
 Cracking
 Theft of computer time
We tend to pirate because:
 We like free things
 Why pay for something when we can get it for
free?
 Our thinking and actions are self-serving
 If we have the opportunity to get away with
something, benefit financially, and minimal
risk is involved, the way in which we’ve been
conditioned by our capitalist society to do it.
A Virus is a self-replicating program that can
cause damage to data and files stored on
your computer.
These are programs written by programmers
with great programming skills who are
motivated by the need for a challenge or to
cause destruction.
57000 known virus programs are in
existence. 6 new viruses are found each
day.
SEVEN ESSENTIAL COMPONENTS OF A
PERSONAL CODE OF COMPUTER
ETHICS:
 1. Honesty
 2. Respect
 3. Confidentiality
 4. Professionalism
 5. Responsibility
 6. Communication
 7. Obeying the law
10 Commandments
 Thou shalt not use a computer to harm other people.
 Thou shalt not interfere with other people’s computer work.
 Thou shalt not snoop around in other people’s computer files.
 Thou shalt not use a computer to steal.
 Thou shalt not use a computer to bear false witness.
 Thou shalt not copy or use proprietary software for which you
have not paid.
 Thou shalt not use other people’s computer resources without
authorization or proper compensation.
 Thou shalt not appropriate other people’s intellectual output.
 Thou shalt think about the social consequences of the
program you are writing or the system you are designing.
 Thou shalt always use a computer in ways that insure
consideration and respect for your fellow humans.
Hacker’s Ethics
The idea of a "hacker ethic" is perhaps best formulated in
Steven Levy's 1984 book, Hackers: Heroes of the
Computer Revolution. Levy came up with six tenets:
 Access to computers - and anything which might teach
you something about the way the world works - should be
unlimited and total. Always yield to the Hands-On
imperative!
 All information should be free.
 Mistrust authority - promote decentralization.
 Hackers should be judged by their hacking, not bogus
criteria such as degrees, age, race, or position.
 You can create art and beauty on a computer.
 Computers can change your life for the better.
Song of hackers
Cracking is the illegal access to the
network or computer system.
Illegal use of special resources in the
system is the key reason for cracking. The
resources may be hardware, software, files
or system information. Revenge, business
reasons and thrill are other common
reasons for committing this crime.
#1 – Protect your computer
Your computer might be in access of multiple users, thus compromising your privacy and security.
If that’s the case with you, then you must set up a separate user profile for yourself that is
password protected. While doing this, you must ensure that all the files and folders you use
must not be accessible by other users through their profiles.
#2 – Use Updated Softwares and Antivirus
Always use the most recent and updated versions of all your softwares and anti viruses. This will
eradicate the probabilities of your computer getting crashed due to outdated and virus infected
apps and softwares that will ultimately lead to data loss.
#3 – Password Protected Files
It happens quite often when a file containing crucial data is misused by some other person who
somehow gets an access to it. Some applications like adobe reader and Microsoft office apps
have a built in feature of password protection that once activated, gets locked.
#4 – Regular Backup
The most important step one should take data protection to create a back up of it. It depends on
you, how often you feel like backing up your files and folders. It may be on an hourly, daily or
weekly basis or some prefer doing it manually whenever they feel the need arises. The backed
up data protection is the copy of the original data stored in your hard disk drive.
#5 – Off-Site Backup (Online Backup)
Another important step you must take is to store a copy of your data offsite by running the
backup process using a third party application. The files and folders are stored in an off-site
location ensuring easy recovery in an event of fire, natural disaster or a cyber attack. If in such
an event, your storage devices and computer gets destroyed, you will still have the option to
recover the data from online servers. There are various online backup solutions providers
available in the market offering different features and pricing plans. You can choose any of
them as per your need. Here you can find a list of some renowned online backup services with
their features highlighted.
8472657875 85

More Related Content

What's hot

Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyrightAdyns
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing professionshahmansoor109
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Computer Science PowerPoint Presentation
Computer Science PowerPoint PresentationComputer Science PowerPoint Presentation
Computer Science PowerPoint PresentationAshna Rajput
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Computer Concepts
Computer ConceptsComputer Concepts
Computer ConceptsPhoebe Kim
 

What's hot (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Science PowerPoint Presentation
Computer Science PowerPoint PresentationComputer Science PowerPoint Presentation
Computer Science PowerPoint Presentation
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Impact of computers on society
Impact of computers on societyImpact of computers on society
Impact of computers on society
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Concepts
Computer ConceptsComputer Concepts
Computer Concepts
 

Viewers also liked

Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Kielentot Martinez
 
Autonomous robots report
Autonomous robots reportAutonomous robots report
Autonomous robots reportRamki M
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it usersBhanja Kishor Samudra
 
Ten commandments
Ten commandmentsTen commandments
Ten commandmentslsanford84
 
Professional ethical conduct
Professional ethical conductProfessional ethical conduct
Professional ethical conductMoatasem Mabrouk
 
Module 4 Spirituality Slides
Module 4   Spirituality SlidesModule 4   Spirituality Slides
Module 4 Spirituality Slidesguest7fd03f
 
Computers and the workplace
Computers and the workplaceComputers and the workplace
Computers and the workplacekmodasia
 
Personal Selling Chapter 3
Personal Selling Chapter 3Personal Selling Chapter 3
Personal Selling Chapter 3Muhammad Khan
 
Self Image. A positive and Negative Outlook
Self Image. A positive and Negative OutlookSelf Image. A positive and Negative Outlook
Self Image. A positive and Negative OutlookMignon Meiring
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Who am i ppt
Who am i pptWho am i ppt
Who am i pptasingh45
 
The Self: Understanding "Who Am I?"
The Self: Understanding "Who Am I?"The Self: Understanding "Who Am I?"
The Self: Understanding "Who Am I?"Christie Barakat
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 

Viewers also liked (20)

Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)
 
Autonomous robots report
Autonomous robots reportAutonomous robots report
Autonomous robots report
 
Lesson 10
Lesson 10Lesson 10
Lesson 10
 
Women empowerment
Women empowerment Women empowerment
Women empowerment
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Professional ethical conduct
Professional ethical conductProfessional ethical conduct
Professional ethical conduct
 
Module 4 Spirituality Slides
Module 4   Spirituality SlidesModule 4   Spirituality Slides
Module 4 Spirituality Slides
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 
Computers and the workplace
Computers and the workplaceComputers and the workplace
Computers and the workplace
 
Personal Selling Chapter 3
Personal Selling Chapter 3Personal Selling Chapter 3
Personal Selling Chapter 3
 
Self Image. A positive and Negative Outlook
Self Image. A positive and Negative OutlookSelf Image. A positive and Negative Outlook
Self Image. A positive and Negative Outlook
 
Environmental Ethics
Environmental EthicsEnvironmental Ethics
Environmental Ethics
 
Code of Ethics
Code of EthicsCode of Ethics
Code of Ethics
 
Environmental ethics
Environmental ethicsEnvironmental ethics
Environmental ethics
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Who am i ppt
Who am i pptWho am i ppt
Who am i ppt
 
The Self: Understanding "Who Am I?"
The Self: Understanding "Who Am I?"The Self: Understanding "Who Am I?"
The Self: Understanding "Who Am I?"
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Research ethics
Research ethicsResearch ethics
Research ethics
 

Similar to Computer Ethics

Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 

Similar to Computer Ethics (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Security issues ethics in education chapter 8
Security issues ethics in education chapter 8Security issues ethics in education chapter 8
Security issues ethics in education chapter 8
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Hamza
HamzaHamza
Hamza
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Network security
Network securityNetwork security
Network security
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Computer virus
Computer virusComputer virus
Computer virus
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 

More from Ramki M

Weapons used by french army
Weapons used by french armyWeapons used by french army
Weapons used by french armyRamki M
 
Stephen hawking report
Stephen hawking reportStephen hawking report
Stephen hawking reportRamki M
 
Technology
TechnologyTechnology
TechnologyRamki M
 
Titan tank
Titan tankTitan tank
Titan tankRamki M
 
Social media
Social mediaSocial media
Social mediaRamki M
 
Snappy surprises
Snappy surprisesSnappy surprises
Snappy surprisesRamki M
 
Snappy surprises story summaries
Snappy surprises story summariesSnappy surprises story summaries
Snappy surprises story summariesRamki M
 
Social awareness Hindi essay
Social awareness Hindi essaySocial awareness Hindi essay
Social awareness Hindi essayRamki M
 
Robotics and Technology
Robotics and TechnologyRobotics and Technology
Robotics and TechnologyRamki M
 
Robotics
RoboticsRobotics
RoboticsRamki M
 
Robots and Technology
Robots and TechnologyRobots and Technology
Robots and TechnologyRamki M
 
Robotics and Technology
Robotics and TechnologyRobotics and Technology
Robotics and TechnologyRamki M
 
Robotics
RoboticsRobotics
RoboticsRamki M
 
Robotics and Technology
Robotics and TechnologyRobotics and Technology
Robotics and TechnologyRamki M
 
Robotics
RoboticsRobotics
RoboticsRamki M
 
Robotics and Technology
Robotics and TechnologyRobotics and Technology
Robotics and TechnologyRamki M
 
Real numbers
Real numbersReal numbers
Real numbersRamki M
 
Real numbers
Real numbersReal numbers
Real numbersRamki M
 
Pen & ink technique paintings
Pen & ink technique paintingsPen & ink technique paintings
Pen & ink technique paintingsRamki M
 
Ramakrishna paramahamsar in Hindi
Ramakrishna paramahamsar in HindiRamakrishna paramahamsar in Hindi
Ramakrishna paramahamsar in HindiRamki M
 

More from Ramki M (20)

Weapons used by french army
Weapons used by french armyWeapons used by french army
Weapons used by french army
 
Stephen hawking report
Stephen hawking reportStephen hawking report
Stephen hawking report
 
Technology
TechnologyTechnology
Technology
 
Titan tank
Titan tankTitan tank
Titan tank
 
Social media
Social mediaSocial media
Social media
 
Snappy surprises
Snappy surprisesSnappy surprises
Snappy surprises
 
Snappy surprises story summaries
Snappy surprises story summariesSnappy surprises story summaries
Snappy surprises story summaries
 
Social awareness Hindi essay
Social awareness Hindi essaySocial awareness Hindi essay
Social awareness Hindi essay
 
Robotics and Technology
Robotics and TechnologyRobotics and Technology
Robotics and Technology
 
Robotics
RoboticsRobotics
Robotics
 
Robots and Technology
Robots and TechnologyRobots and Technology
Robots and Technology
 
Robotics and Technology
Robotics and TechnologyRobotics and Technology
Robotics and Technology
 
Robotics
RoboticsRobotics
Robotics
 
Robotics and Technology
Robotics and TechnologyRobotics and Technology
Robotics and Technology
 
Robotics
RoboticsRobotics
Robotics
 
Robotics and Technology
Robotics and TechnologyRobotics and Technology
Robotics and Technology
 
Real numbers
Real numbersReal numbers
Real numbers
 
Real numbers
Real numbersReal numbers
Real numbers
 
Pen & ink technique paintings
Pen & ink technique paintingsPen & ink technique paintings
Pen & ink technique paintings
 
Ramakrishna paramahamsar in Hindi
Ramakrishna paramahamsar in HindiRamakrishna paramahamsar in Hindi
Ramakrishna paramahamsar in Hindi
 

Recently uploaded

Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsaqsarehman5055
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardsticksaastr
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 

Recently uploaded (20)

Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 

Computer Ethics

  • 2. Computer ethics has its roots in the work of Norbert Wiener during World War II. Wiener’s book included  An account of the purpose of a human life  Four principles of justice  A powerful method for doing applied ethics  Discussions of the fundamental questions of computer ethics, and  Examples of key computer ethics topics.
  • 3.
  • 4.
  • 5.  One of the highest profiled banking computer crime occurred during a course of three years beginning in 1970. The chief teller at the Park Avenue branch of New York's Union Dime Savings Bank embezzled over $1.5 million from hundreds of accounts.  On April 23, 2013, the Associated Press' Twitter account was hacked to release a hoax tweet about fictional attacks in the White House that left President Obama injured. This erroneous tweet resulted in a brief plunge of 130 points from the Dow Jones Industrial Average, removal of $136 billion from S&P 500 index, and the temporary suspension of their Twitter account. The Dow Jones later restored its session gains.
  • 6. Ethical Standards Various national and international professional societies and organizations have produced code of ethics documents to give basic behavioral guidelines to computing professionals and users. They include:  Association for Computing Machinery: ACM Code of Ethics and Professional Conduct  British Computer Society: BCS Code of Conduct & Code of Good Practice  Australian Computer Society: ACS Code of Ethics and ACS Code of Professional Conduct  IEEE: IEEE Code of Ethics  Computer Ethics Institute: Ten Commandments of Computer Ethics
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Physical Security: Physical security refers to the protection of hardware, facilities, magnetic disks, and other items that could be illegally accessed, stolen, damaged or destroyed. This is usually provided by restricting the people who can access the resources. Personal Security: Personal security refers to software setups that permit only authorized access to the system. User Ids and passwords are common tools for such purpose. Only those with a need to know have Ids and password for access. Personnel Security: Personnel security refers to protecting data and computer system against dishonesty or negligence of employees.
  • 13.
  • 14.
  • 15.
  • 16. Computer Crime Common crimes include:  Crimes related to money transfer on the internet  Making long distance calls illegally using computers  Illegal access to confidential files  Stealing hardware  Selling or misusing personal  Hardware and software piracy  Virus  Cracking  Theft of computer time
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. We tend to pirate because:  We like free things  Why pay for something when we can get it for free?  Our thinking and actions are self-serving  If we have the opportunity to get away with something, benefit financially, and minimal risk is involved, the way in which we’ve been conditioned by our capitalist society to do it.
  • 28. A Virus is a self-replicating program that can cause damage to data and files stored on your computer. These are programs written by programmers with great programming skills who are motivated by the need for a challenge or to cause destruction. 57000 known virus programs are in existence. 6 new viruses are found each day.
  • 29.
  • 30. SEVEN ESSENTIAL COMPONENTS OF A PERSONAL CODE OF COMPUTER ETHICS:  1. Honesty  2. Respect  3. Confidentiality  4. Professionalism  5. Responsibility  6. Communication  7. Obeying the law
  • 31. 10 Commandments  Thou shalt not use a computer to harm other people.  Thou shalt not interfere with other people’s computer work.  Thou shalt not snoop around in other people’s computer files.  Thou shalt not use a computer to steal.  Thou shalt not use a computer to bear false witness.  Thou shalt not copy or use proprietary software for which you have not paid.  Thou shalt not use other people’s computer resources without authorization or proper compensation.  Thou shalt not appropriate other people’s intellectual output.  Thou shalt think about the social consequences of the program you are writing or the system you are designing.  Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans.
  • 32. Hacker’s Ethics The idea of a "hacker ethic" is perhaps best formulated in Steven Levy's 1984 book, Hackers: Heroes of the Computer Revolution. Levy came up with six tenets:  Access to computers - and anything which might teach you something about the way the world works - should be unlimited and total. Always yield to the Hands-On imperative!  All information should be free.  Mistrust authority - promote decentralization.  Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.  You can create art and beauty on a computer.  Computers can change your life for the better.
  • 33.
  • 35. Cracking is the illegal access to the network or computer system. Illegal use of special resources in the system is the key reason for cracking. The resources may be hardware, software, files or system information. Revenge, business reasons and thrill are other common reasons for committing this crime.
  • 36. #1 – Protect your computer Your computer might be in access of multiple users, thus compromising your privacy and security. If that’s the case with you, then you must set up a separate user profile for yourself that is password protected. While doing this, you must ensure that all the files and folders you use must not be accessible by other users through their profiles. #2 – Use Updated Softwares and Antivirus Always use the most recent and updated versions of all your softwares and anti viruses. This will eradicate the probabilities of your computer getting crashed due to outdated and virus infected apps and softwares that will ultimately lead to data loss. #3 – Password Protected Files It happens quite often when a file containing crucial data is misused by some other person who somehow gets an access to it. Some applications like adobe reader and Microsoft office apps have a built in feature of password protection that once activated, gets locked. #4 – Regular Backup The most important step one should take data protection to create a back up of it. It depends on you, how often you feel like backing up your files and folders. It may be on an hourly, daily or weekly basis or some prefer doing it manually whenever they feel the need arises. The backed up data protection is the copy of the original data stored in your hard disk drive. #5 – Off-Site Backup (Online Backup) Another important step you must take is to store a copy of your data offsite by running the backup process using a third party application. The files and folders are stored in an off-site location ensuring easy recovery in an event of fire, natural disaster or a cyber attack. If in such an event, your storage devices and computer gets destroyed, you will still have the option to recover the data from online servers. There are various online backup solutions providers available in the market offering different features and pricing plans. You can choose any of them as per your need. Here you can find a list of some renowned online backup services with their features highlighted.