2. Computer ethics has its roots in the work of Norbert
Wiener during World War II. Wiener’s book included
An account of the purpose of a human life
Four principles of justice
A powerful method for doing applied ethics
Discussions of the fundamental questions of computer
ethics, and
Examples of key computer ethics topics.
3.
4.
5. One of the highest profiled banking computer
crime occurred during a course of three years
beginning in 1970. The chief teller at the Park
Avenue branch of New York's Union Dime Savings
Bank embezzled over $1.5 million from hundreds
of accounts.
On April 23, 2013, the Associated Press' Twitter
account was hacked to release a hoax tweet
about fictional attacks in the White House that
left President Obama injured. This erroneous
tweet resulted in a brief plunge of 130 points
from the Dow Jones Industrial Average, removal
of $136 billion from S&P 500 index, and the
temporary suspension of their Twitter account.
The Dow Jones later restored its session gains.
6. Ethical Standards
Various national and international professional societies
and organizations have produced code of ethics
documents to give basic behavioral guidelines to
computing professionals and users. They include:
Association for Computing Machinery: ACM Code of
Ethics and Professional Conduct
British Computer Society: BCS Code of Conduct & Code
of Good Practice
Australian Computer Society: ACS Code of
Ethics and ACS Code of Professional Conduct
IEEE: IEEE Code of Ethics
Computer Ethics Institute: Ten Commandments of
Computer Ethics
7.
8.
9.
10.
11.
12. Physical Security:
Physical security refers to the protection of hardware,
facilities, magnetic disks, and other items that could be
illegally accessed, stolen, damaged or destroyed. This
is usually provided by restricting the people who can
access the resources.
Personal Security:
Personal security refers to software setups that permit
only authorized access to the system. User Ids and
passwords are common tools for such purpose. Only
those with a need to know have Ids and password for
access.
Personnel Security:
Personnel security refers to protecting data and
computer system against dishonesty or negligence of
employees.
13.
14.
15.
16. Computer Crime
Common crimes include:
Crimes related to money transfer on the
internet
Making long distance calls illegally using
computers
Illegal access to confidential files
Stealing hardware
Selling or misusing personal
Hardware and software piracy
Virus
Cracking
Theft of computer time
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27. We tend to pirate because:
We like free things
Why pay for something when we can get it for
free?
Our thinking and actions are self-serving
If we have the opportunity to get away with
something, benefit financially, and minimal
risk is involved, the way in which we’ve been
conditioned by our capitalist society to do it.
28. A Virus is a self-replicating program that can
cause damage to data and files stored on
your computer.
These are programs written by programmers
with great programming skills who are
motivated by the need for a challenge or to
cause destruction.
57000 known virus programs are in
existence. 6 new viruses are found each
day.
29.
30. SEVEN ESSENTIAL COMPONENTS OF A
PERSONAL CODE OF COMPUTER
ETHICS:
1. Honesty
2. Respect
3. Confidentiality
4. Professionalism
5. Responsibility
6. Communication
7. Obeying the law
31. 10 Commandments
Thou shalt not use a computer to harm other people.
Thou shalt not interfere with other people’s computer work.
Thou shalt not snoop around in other people’s computer files.
Thou shalt not use a computer to steal.
Thou shalt not use a computer to bear false witness.
Thou shalt not copy or use proprietary software for which you
have not paid.
Thou shalt not use other people’s computer resources without
authorization or proper compensation.
Thou shalt not appropriate other people’s intellectual output.
Thou shalt think about the social consequences of the
program you are writing or the system you are designing.
Thou shalt always use a computer in ways that insure
consideration and respect for your fellow humans.
32. Hacker’s Ethics
The idea of a "hacker ethic" is perhaps best formulated in
Steven Levy's 1984 book, Hackers: Heroes of the
Computer Revolution. Levy came up with six tenets:
Access to computers - and anything which might teach
you something about the way the world works - should be
unlimited and total. Always yield to the Hands-On
imperative!
All information should be free.
Mistrust authority - promote decentralization.
Hackers should be judged by their hacking, not bogus
criteria such as degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.
35. Cracking is the illegal access to the
network or computer system.
Illegal use of special resources in the
system is the key reason for cracking. The
resources may be hardware, software, files
or system information. Revenge, business
reasons and thrill are other common
reasons for committing this crime.
36. #1 – Protect your computer
Your computer might be in access of multiple users, thus compromising your privacy and security.
If that’s the case with you, then you must set up a separate user profile for yourself that is
password protected. While doing this, you must ensure that all the files and folders you use
must not be accessible by other users through their profiles.
#2 – Use Updated Softwares and Antivirus
Always use the most recent and updated versions of all your softwares and anti viruses. This will
eradicate the probabilities of your computer getting crashed due to outdated and virus infected
apps and softwares that will ultimately lead to data loss.
#3 – Password Protected Files
It happens quite often when a file containing crucial data is misused by some other person who
somehow gets an access to it. Some applications like adobe reader and Microsoft office apps
have a built in feature of password protection that once activated, gets locked.
#4 – Regular Backup
The most important step one should take data protection to create a back up of it. It depends on
you, how often you feel like backing up your files and folders. It may be on an hourly, daily or
weekly basis or some prefer doing it manually whenever they feel the need arises. The backed
up data protection is the copy of the original data stored in your hard disk drive.
#5 – Off-Site Backup (Online Backup)
Another important step you must take is to store a copy of your data offsite by running the
backup process using a third party application. The files and folders are stored in an off-site
location ensuring easy recovery in an event of fire, natural disaster or a cyber attack. If in such
an event, your storage devices and computer gets destroyed, you will still have the option to
recover the data from online servers. There are various online backup solutions providers
available in the market offering different features and pricing plans. You can choose any of
them as per your need. Here you can find a list of some renowned online backup services with
their features highlighted.