SlideShare a Scribd company logo
1 of 12
Download to read offline
r
HMR
INSTITUTE
OF
TECHNOLOGY
AND
MANAGEMENT
Hamidpur,
Delhi-11036
(Affiliated
to
Guru
Gobind
Singh
Indraprastha
University
Sector-
16C
Dwarka,
Delhi-110078)
Submitted
in
partial
fulfilment
of
the
requirements
For
the
award
of
the
degree
of
Bachelor
of
Technology
in
Computer
Science
and
Engineering
2022-2026
HVPE
CASE
STUDY
TOPIC:
COMPUTER
ETHICS
SUBMITTED
TO:
SUBMITTED
BY:
Mr.
ABHISHEK
JAISWAL
SANTOSH
KUMAR
,121
RAGHAV
MEHTA
,081
(CSE-3)
TABLE OF CONTENT
1. Introduction
2. Common issues and contradictions with computer ethics
3. Advantages and disadvantages of computer ethics
4. Ten commandments of computer ethics:
5. Information Privacy
6. General steps to protect our system from risks:
7. Unethical computing practices
8. CYBERBULLYING /How to protect yourself from cyberbullying
9. PHISHING/How to protect yourself from phishing
10.HACKING/How to protect yourself from hacking
11.SPAM/How to protect yourself from spam
12.PLAGIARISM/How to protect yourself from plagiarism
13.REFERENCES
COMPUTER ETHICS
INTRODUCTION
Computer ethics is the set of commonly agreed principles that govern the use of computers.
Like ethics more generally, computer ethics is essentially a set of philosophical guidelines or
moral standards that aim to influence behaviour and prevent harm.
COMMON ISSUES WITH
COMPUTER ETHICS
Some common issues of computer ethics include intellectual
property rights such as copyrighted electronic content ,
privacy concerns , and how computers affect society
Contradictions
For example , while it is easy to duplicate copyrighted electronic
or digital content , computer ethics would suggest that it is
wrong to do so without the author’s approval
And while it may be possible to access someone’s personal
information on a computer system , computer ethics would
advise that such an action is unethical
Advantages of using the internet:
•The Internet offers the facility to communicate with a person in any
part of the world.
•We can easily collect information related to any topic from the
world wide web on the internet.
•Various types of business are carried out through Internet, which is
referred to as e-commerce. From booking railway tickets and flight
tickets or tickets for movies to purchasing any type of merchandise
or commodities, are possible via the Internet.
•The Internet allows social networking, that is, it provides the ability
to share our information, emotions, and feelings with our friends
and relatives.
Advantages of using the internet:
•The Internet offers the facility to communicate with a person in any part of the world.
•We can easily collect information related to any topic from the world wide web on the internet.
•Various types of business are carried out through Internet, which is referred to as e-commerce. From
booking railway tickets and flight tickets or tickets for movies to purchasing any type of merchandise
or commodities, are possible via the Internet.
•The Internet allows social networking, that is, it provides the ability to share our information,
emotions, and feelings with our friends and relatives.
Disadvantages of using the internet:
•A group of people is trying to get personal information (like bank detail, address, contact
details, etc,) over the Internet and uses that for unethical benefits.
•Malware or viruses are becoming quick access to different networks and ultimately are causing
harm to personal computers(PC) or computers connected to the network.
•Some people run deceitful businesses over the Internet, and the common people very often
become victims of them.
•People use the internet for cyberbullying, trolling, etc.
Ten commandments of computer ethics:
Commandment 1: Do not use the computer to harm other people’s data.
Commandment 2: Do not use a computer to cause interference in other people’s
work.
Commandment 3: Do not spy on another person’s personal data.
Commandment 4: Do not use technology to steal personal information.
Commandment 5: Do not spread misinformation using computer technology.
Commandment 6: Do not use the software unless you pay for this software.
Commandment 7: Do not use someone else’s computer resources unless he
authorized to use them.
Commandment 8: It is wrong to claim ownership of a work that is the output of
someone else’s intellect.
Commandment 9: Before developing software, think about the social impact it can of
that software.
Commandment 10: While computers for communication, always respectful with fellow
members.
Information Privacy: Information privacy is the privacy or
protection of personal information and refers to the personal data stored on a
computer. It is an important aspect of information sharing. Information privacy is also
known as data privacy or online privacy. Some Internet privacy involves the right of
personal privacy and deals with the storing and displaying of personal information
on the internet. In any exchange of personal information over the internet, there is
always a risk involved with the safety of personal information. Internet privacy may
be a cause for concern especially when online purchases, visiting social networking
sites, participating in online games or attending forums. Privacy issues can arise in
response to information from a good range of sources, such as:
•Healthcare records
•Financial institution
•transactions
•Biological traits
•Residence records
•Location-based service
The risk involved in internet privacy is sometimes dangerous. In the process of data transfer over the
internet, if a password is revealed, a victim’s identity may be deceitfully used.
Some important terms:
1.Spyware: An application that obtains data without the user’s consent.
2.Malware: An application used to illegally harm online and offline computer users
3.Virus: It is a small program or software which is embedded with a legitimate program and designed to
harm your system.
4.Worms: It is a self-replicating program that spread across networks due to the poor security of the
infected computers.
5.Trojan horse: Trojan horse is a program that allows the hackers to gain remote access to a target
system.
General steps to protect our system from risks:
To minimize internet privacy violation risks, the following measures need to be taken:
1.Always use preventive software applications, like anti-virus, anti-malware, etc,
2.Avoid exposing personal data on websites with low-security levels.
3.Avoid shopping from unreliable websites
4.Always use strong passwords consisting of letters, numerals, and special characters.
5.Always keep your operating system updated.
6.Always on the firewall.
Unethical computing practices:
Now we discuss some unethical computing practices:
1. Cyberbullying: When people bully other people by the use of electronic communication ( like the
web, telephone, etc). it’s referred to as cyberbullying. Cyberbullying has been done by friends,
classmates, relatives, any other unknown persons. Sending harmful emails to a person creates fake
websites to make fun of or to make harm a person by distributing the same fake information about a
person posting and distributing fake images of a person. These are some common ways of
cyberbullying.
In most cyberbullying cases, they do not reveal their identities. Due to cyberbullying, some bullied
persons are affected emotionally or mentally. Even if those are fake information, the bullied person may
become depressed or it may affect their day-to-day life. In the case of the students or kids, it may affect
their study or they may lose self-esteem.
How to protect yourself from cyberbullying:
•Not to respond to cyberbullying.
•Never open e-mails received from unknown senders.
•Keep your password secret.
•Be careful, when you are posting something on a social site.
2. Phishing:An internet hacking activity used to steal user data. In this activity, an email is sent to the user wh
misleads him/her to believe that it is from a trusted organization. After sending the email, the attacker asks the user to
website, and on their website, they will ask for the personal information of the user like password, credit card informatio
this is how the attacker steals the personal information of the user.
How to protect yourself from phishing:
•Never open a link, attachment, etc in an email that is sent by some unknown person.
•Never share your personal information in an email that is asked by an unknown person.
•Always on the firewall of the computer system.
•Always check your bank statements regularly to ensure that no unauthorized transactions are made. If
unauthorized transactions are made in your account, then immediately report this issue to your bank.
3. Hacking: It is an unethical activity in which a highly skilled technical person(or commonly known
as a hacker) enters another person’s computer without the permission of the user and steals important
data/project/applications from the computer or sometimes destroys the information from the system.
How to protect yourself from hacking:
•Never connect your system to free wifi or a free network.
•Always use strong passwords consisting of letters, numerals, and special characters.
•Before installing any application in your system, always check permission and authenticity.
•Always keep your operating system updated.
•Always use preventive software applications, like anti-virus, anti-malware, etc,
4. Spamming: It is an unethical activity in which bulk unwanted e-mail is set to you from a
strange or unknown source. Sometimes, due to bulk emails, your mail server gets full and mail bombing
activity happens. Spam mail is generally used to deliver viruses, worms, trojan horses, malware, spyware,
etc. to attack the user.
How to protect yourself from spam:
•To prevent spam mail, install filtering or blocking software.
•In your mailbox, if you find suspicious mail, then immediately delete that mail(without opening).
•Always keep your software updated.
•Never open the link that is sent by an unknown person.
5. Plagiarism: Plagiarism is stealing or copying someone else’s intellectual work (can be an idea,
literary work or academic work, etc.) and representing it as your own work without giving credit to the
creator or without citing the source of information.
How to protect yourself from plagiarism:
•While writing, always writes in your own words.
•Always use a plagiarism checker before the update.
•If you are taking someone else’s work, then always give the credit to the original author in an in-
text citation.
REFERENCE
1. https://www.geeksforgeeks.org/computer-ethics/
2. https://www.comptia.org/blog/ethical-problems-in-computing
3. https://www.slideshare.net/jagannath908/computer-ethics-27777740
4. RAGNAR SIR (Our subject teacher)
5. YOUTUBE
6. GOOGLE

More Related Content

Similar to COMPUTER ETHICS.pptx

Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxAnnMarieTAquinoII
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Internet security
Internet security Internet security
Internet security Ayesha Rana
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 

Similar to COMPUTER ETHICS.pptx (20)

Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Internet security
Internet security Internet security
Internet security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
techalpha07
techalpha07techalpha07
techalpha07
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 

Recently uploaded

Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...marjmae69
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)Basil Achie
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxJohnree4
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxaryanv1753
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸mathanramanathan2005
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptxBasil Achie
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 

Recently uploaded (20)

Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptx
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptx
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 

COMPUTER ETHICS.pptx

  • 2. TABLE OF CONTENT 1. Introduction 2. Common issues and contradictions with computer ethics 3. Advantages and disadvantages of computer ethics 4. Ten commandments of computer ethics: 5. Information Privacy 6. General steps to protect our system from risks: 7. Unethical computing practices 8. CYBERBULLYING /How to protect yourself from cyberbullying 9. PHISHING/How to protect yourself from phishing 10.HACKING/How to protect yourself from hacking 11.SPAM/How to protect yourself from spam 12.PLAGIARISM/How to protect yourself from plagiarism 13.REFERENCES
  • 3. COMPUTER ETHICS INTRODUCTION Computer ethics is the set of commonly agreed principles that govern the use of computers. Like ethics more generally, computer ethics is essentially a set of philosophical guidelines or moral standards that aim to influence behaviour and prevent harm.
  • 4. COMMON ISSUES WITH COMPUTER ETHICS Some common issues of computer ethics include intellectual property rights such as copyrighted electronic content , privacy concerns , and how computers affect society Contradictions For example , while it is easy to duplicate copyrighted electronic or digital content , computer ethics would suggest that it is wrong to do so without the author’s approval And while it may be possible to access someone’s personal information on a computer system , computer ethics would advise that such an action is unethical
  • 5. Advantages of using the internet: •The Internet offers the facility to communicate with a person in any part of the world. •We can easily collect information related to any topic from the world wide web on the internet. •Various types of business are carried out through Internet, which is referred to as e-commerce. From booking railway tickets and flight tickets or tickets for movies to purchasing any type of merchandise or commodities, are possible via the Internet. •The Internet allows social networking, that is, it provides the ability to share our information, emotions, and feelings with our friends and relatives. Advantages of using the internet: •The Internet offers the facility to communicate with a person in any part of the world. •We can easily collect information related to any topic from the world wide web on the internet. •Various types of business are carried out through Internet, which is referred to as e-commerce. From booking railway tickets and flight tickets or tickets for movies to purchasing any type of merchandise or commodities, are possible via the Internet. •The Internet allows social networking, that is, it provides the ability to share our information, emotions, and feelings with our friends and relatives. Disadvantages of using the internet: •A group of people is trying to get personal information (like bank detail, address, contact details, etc,) over the Internet and uses that for unethical benefits. •Malware or viruses are becoming quick access to different networks and ultimately are causing harm to personal computers(PC) or computers connected to the network. •Some people run deceitful businesses over the Internet, and the common people very often become victims of them. •People use the internet for cyberbullying, trolling, etc.
  • 6. Ten commandments of computer ethics: Commandment 1: Do not use the computer to harm other people’s data. Commandment 2: Do not use a computer to cause interference in other people’s work. Commandment 3: Do not spy on another person’s personal data. Commandment 4: Do not use technology to steal personal information. Commandment 5: Do not spread misinformation using computer technology. Commandment 6: Do not use the software unless you pay for this software. Commandment 7: Do not use someone else’s computer resources unless he authorized to use them. Commandment 8: It is wrong to claim ownership of a work that is the output of someone else’s intellect. Commandment 9: Before developing software, think about the social impact it can of that software. Commandment 10: While computers for communication, always respectful with fellow members.
  • 7. Information Privacy: Information privacy is the privacy or protection of personal information and refers to the personal data stored on a computer. It is an important aspect of information sharing. Information privacy is also known as data privacy or online privacy. Some Internet privacy involves the right of personal privacy and deals with the storing and displaying of personal information on the internet. In any exchange of personal information over the internet, there is always a risk involved with the safety of personal information. Internet privacy may be a cause for concern especially when online purchases, visiting social networking sites, participating in online games or attending forums. Privacy issues can arise in response to information from a good range of sources, such as: •Healthcare records •Financial institution •transactions •Biological traits •Residence records •Location-based service
  • 8. The risk involved in internet privacy is sometimes dangerous. In the process of data transfer over the internet, if a password is revealed, a victim’s identity may be deceitfully used. Some important terms: 1.Spyware: An application that obtains data without the user’s consent. 2.Malware: An application used to illegally harm online and offline computer users 3.Virus: It is a small program or software which is embedded with a legitimate program and designed to harm your system. 4.Worms: It is a self-replicating program that spread across networks due to the poor security of the infected computers. 5.Trojan horse: Trojan horse is a program that allows the hackers to gain remote access to a target system. General steps to protect our system from risks: To minimize internet privacy violation risks, the following measures need to be taken: 1.Always use preventive software applications, like anti-virus, anti-malware, etc, 2.Avoid exposing personal data on websites with low-security levels. 3.Avoid shopping from unreliable websites 4.Always use strong passwords consisting of letters, numerals, and special characters. 5.Always keep your operating system updated. 6.Always on the firewall.
  • 9. Unethical computing practices: Now we discuss some unethical computing practices: 1. Cyberbullying: When people bully other people by the use of electronic communication ( like the web, telephone, etc). it’s referred to as cyberbullying. Cyberbullying has been done by friends, classmates, relatives, any other unknown persons. Sending harmful emails to a person creates fake websites to make fun of or to make harm a person by distributing the same fake information about a person posting and distributing fake images of a person. These are some common ways of cyberbullying. In most cyberbullying cases, they do not reveal their identities. Due to cyberbullying, some bullied persons are affected emotionally or mentally. Even if those are fake information, the bullied person may become depressed or it may affect their day-to-day life. In the case of the students or kids, it may affect their study or they may lose self-esteem. How to protect yourself from cyberbullying: •Not to respond to cyberbullying. •Never open e-mails received from unknown senders. •Keep your password secret. •Be careful, when you are posting something on a social site.
  • 10. 2. Phishing:An internet hacking activity used to steal user data. In this activity, an email is sent to the user wh misleads him/her to believe that it is from a trusted organization. After sending the email, the attacker asks the user to website, and on their website, they will ask for the personal information of the user like password, credit card informatio this is how the attacker steals the personal information of the user. How to protect yourself from phishing: •Never open a link, attachment, etc in an email that is sent by some unknown person. •Never share your personal information in an email that is asked by an unknown person. •Always on the firewall of the computer system. •Always check your bank statements regularly to ensure that no unauthorized transactions are made. If unauthorized transactions are made in your account, then immediately report this issue to your bank. 3. Hacking: It is an unethical activity in which a highly skilled technical person(or commonly known as a hacker) enters another person’s computer without the permission of the user and steals important data/project/applications from the computer or sometimes destroys the information from the system. How to protect yourself from hacking: •Never connect your system to free wifi or a free network. •Always use strong passwords consisting of letters, numerals, and special characters. •Before installing any application in your system, always check permission and authenticity. •Always keep your operating system updated. •Always use preventive software applications, like anti-virus, anti-malware, etc,
  • 11. 4. Spamming: It is an unethical activity in which bulk unwanted e-mail is set to you from a strange or unknown source. Sometimes, due to bulk emails, your mail server gets full and mail bombing activity happens. Spam mail is generally used to deliver viruses, worms, trojan horses, malware, spyware, etc. to attack the user. How to protect yourself from spam: •To prevent spam mail, install filtering or blocking software. •In your mailbox, if you find suspicious mail, then immediately delete that mail(without opening). •Always keep your software updated. •Never open the link that is sent by an unknown person. 5. Plagiarism: Plagiarism is stealing or copying someone else’s intellectual work (can be an idea, literary work or academic work, etc.) and representing it as your own work without giving credit to the creator or without citing the source of information. How to protect yourself from plagiarism: •While writing, always writes in your own words. •Always use a plagiarism checker before the update. •If you are taking someone else’s work, then always give the credit to the original author in an in- text citation.
  • 12. REFERENCE 1. https://www.geeksforgeeks.org/computer-ethics/ 2. https://www.comptia.org/blog/ethical-problems-in-computing 3. https://www.slideshare.net/jagannath908/computer-ethics-27777740 4. RAGNAR SIR (Our subject teacher) 5. YOUTUBE 6. GOOGLE