SlideShare a Scribd company logo
Computer Ethics
 Privacy
 Security and accuracy
 Ownership of property
 Environmental issues
 Equity in access
 Artificial intelligence
 Unemployment and displacement
 Computer misuse
 Internal control integrity
Computer Ethics
 Computer fraud:
 Theft, misuse and misappropriation by altering
computer data
 Theft, misuse and misappropriation by altering
software programming
 Theft or illegal use of computer data/info
 Illegal copying or destruction of software or
hardware
 Misappropriation of computer hardware
Computer Ethics
 Computer fraud:
 Input violation (Data Diddling)
 Altering programs to allow illegal access
 Destroy programs/data by virus injection
 Misusing computers for personal use/business
 Output violation:

Encoding falsified information at the back of
credit cards

Salami technique
Computer Ethics
 Hard drives full with Music and videos
 Downloading of music from the web without
paying
 Software Piracy
 Formatted your hard drive prior to leaving your
company because you were angry about leaving
Information Technology Ethics
 Prior to IT, it may have been easier to know
whether the activity was right or wrong
 Virtual world:
•A student uses the copy and paste
commands to place large parts of an
electronic article into an assigned paper and
turns the paper in as own work
Information Technology Ethics
 Some users view their computing actions as less
serious than their actions in the “real world”
•Stealing software from a store – no way!.......
However, SW piracy costs businesses
billions of dollars per year
•Picking a lock to someone’s house – no;
However, guessing passwords to gain
access to a website, information, or
programs is a common
•Do it to demonstrate 'technical heroism'
IT Ethics: Challenges
 Workplace:
 Customer and vendor relationships
 Outsourcing issues
 Should the employer has the right to monitor
private email messages
•Two most popular websites visited by US
workers: ESPN and Playboy
Computer Crimes
 Financial Frauds
 Laptop theft
 Virus/trojan/worm infection
 Insider computer system abuse
 Telecommunication fraud
 Unauthorised privileged access
 Outsider system penetration (Hacking)
 Website defacement
Computer Security Expenditure
 Prioratised sectorwise
 Transportation
 Government
 Telecommunication
 High-tech
 Financial
 Legal
 Medical
Computer Security Expenditure
 Prioratised sectorwise
 Transportation
 Government
 Telecommunication
 High-tech
 Financial
 Legal
 Medical

More Related Content

What's hot

Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challengesVishakha Joshi
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
tushki92
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
Prabesh Shrestha
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation
Jonathan Ezor
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
Abdullah Khosa
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The LawSaimaRafiq
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterpriseAbha Damani
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Adeel Rasheed
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
Upekha Vandebona
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
amiable_indian
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice
Jonathan Ezor
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
Dangers of Computer devices
Dangers of Computer devices Dangers of Computer devices
Dangers of Computer devices
Siphamandla Benedict
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
Ei-Dyei Diata
 
Computer security
Computer securityComputer security
Computer security
RoshanMaharjan13
 

What's hot (20)

Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challenges
 
Computer
ComputerComputer
Computer
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterprise
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Dangers of Computer devices
Dangers of Computer devices Dangers of Computer devices
Dangers of Computer devices
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Computer security
Computer securityComputer security
Computer security
 

Viewers also liked

Modelo ACS de geração de startups
Modelo ACS de geração de startupsModelo ACS de geração de startups
Modelo ACS de geração de startups
Kleber Teraoka
 
Modelos de negócios inovadores para startups
Modelos de negócios inovadores para startupsModelos de negócios inovadores para startups
Modelos de negócios inovadores para startups
Marcelo Pimenta (menta90)
 
Flávio Almeida MEAN Stack "to be or not to be mean"
Flávio Almeida MEAN Stack "to be or not to be mean"Flávio Almeida MEAN Stack "to be or not to be mean"
Flávio Almeida MEAN Stack "to be or not to be mean"
flaviohalmeida
 
9 fórum iNOVAção @daniel_egger
9 fórum iNOVAção  @daniel_egger9 fórum iNOVAção  @daniel_egger
9 fórum iNOVAção @daniel_egger
Daniel Egger
 
Semana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startups
Semana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startupsSemana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startups
Semana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startups
Marcelo Pimenta (menta90)
 
Criar modelos de negócios através da geração de ideias
Criar modelos de negócios através da geração de ideiasCriar modelos de negócios através da geração de ideias
Criar modelos de negócios através da geração de ideiasUserSanti
 
Startups - Ideias que viram negócios milionários
Startups - Ideias que viram negócios milionáriosStartups - Ideias que viram negócios milionários
Startups - Ideias que viram negócios milionários
Renzo Colnago
 
Métricas para Startups
Métricas para StartupsMétricas para Startups
Métricas para Startups
Thiago Paiva
 
MERCADO DE STARTUPS
MERCADO DE STARTUPSMERCADO DE STARTUPS
MERCADO DE STARTUPS
Renato Melo
 
Plano de negócio para startups
Plano de negócio para startupsPlano de negócio para startups
Plano de negócio para startups
Felipe Perlino
 

Viewers also liked (10)

Modelo ACS de geração de startups
Modelo ACS de geração de startupsModelo ACS de geração de startups
Modelo ACS de geração de startups
 
Modelos de negócios inovadores para startups
Modelos de negócios inovadores para startupsModelos de negócios inovadores para startups
Modelos de negócios inovadores para startups
 
Flávio Almeida MEAN Stack "to be or not to be mean"
Flávio Almeida MEAN Stack "to be or not to be mean"Flávio Almeida MEAN Stack "to be or not to be mean"
Flávio Almeida MEAN Stack "to be or not to be mean"
 
9 fórum iNOVAção @daniel_egger
9 fórum iNOVAção  @daniel_egger9 fórum iNOVAção  @daniel_egger
9 fórum iNOVAção @daniel_egger
 
Semana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startups
Semana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startupsSemana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startups
Semana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startups
 
Criar modelos de negócios através da geração de ideias
Criar modelos de negócios através da geração de ideiasCriar modelos de negócios através da geração de ideias
Criar modelos de negócios através da geração de ideias
 
Startups - Ideias que viram negócios milionários
Startups - Ideias que viram negócios milionáriosStartups - Ideias que viram negócios milionários
Startups - Ideias que viram negócios milionários
 
Métricas para Startups
Métricas para StartupsMétricas para Startups
Métricas para Startups
 
MERCADO DE STARTUPS
MERCADO DE STARTUPSMERCADO DE STARTUPS
MERCADO DE STARTUPS
 
Plano de negócio para startups
Plano de negócio para startupsPlano de negócio para startups
Plano de negócio para startups
 

Similar to 9 ethics in it space

Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItSonali Srivastava
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
RitikaSharma238
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
Kirti Verma
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
Cyber_security_.pdf
Cyber_security_.pdfCyber_security_.pdf
Cyber_security_.pdf
AaradhyaPandey4
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threadsLeena Reddy
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Sanjeev Kumar Jaiswal
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Accenture
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
Abdul Manaf Vellakodath
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
Net at Work
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
Vicky Shah
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
dilahkmpk
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
Dibyesh1
 
Hackers
HackersHackers

Similar to 9 ethics in it space (20)

Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber_security_.pdf
Cyber_security_.pdfCyber_security_.pdf
Cyber_security_.pdf
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
Hackers
HackersHackers
Hackers
 

More from Alwyn Dalmeida

11 business and social responsiveness
11 business and social responsiveness11 business and social responsiveness
11 business and social responsivenessAlwyn Dalmeida
 
8 advertising and ethics
8 advertising and ethics8 advertising and ethics
8 advertising and ethicsAlwyn Dalmeida
 
7 ethics and marketing
7 ethics and marketing7 ethics and marketing
7 ethics and marketingAlwyn Dalmeida
 
6 individualism v collectivism
6 individualism v collectivism6 individualism v collectivism
6 individualism v collectivismAlwyn Dalmeida
 
5 utilitarianism cognitivism and consequentialism
5 utilitarianism cognitivism and consequentialism5 utilitarianism cognitivism and consequentialism
5 utilitarianism cognitivism and consequentialismAlwyn Dalmeida
 
4 types & codes of ethics
4 types & codes of ethics4 types & codes of ethics
4 types & codes of ethicsAlwyn Dalmeida
 

More from Alwyn Dalmeida (8)

12 csr & cg
12 csr & cg12 csr & cg
12 csr & cg
 
11 business and social responsiveness
11 business and social responsiveness11 business and social responsiveness
11 business and social responsiveness
 
10 ethics in hrm
10 ethics in hrm10 ethics in hrm
10 ethics in hrm
 
8 advertising and ethics
8 advertising and ethics8 advertising and ethics
8 advertising and ethics
 
7 ethics and marketing
7 ethics and marketing7 ethics and marketing
7 ethics and marketing
 
6 individualism v collectivism
6 individualism v collectivism6 individualism v collectivism
6 individualism v collectivism
 
5 utilitarianism cognitivism and consequentialism
5 utilitarianism cognitivism and consequentialism5 utilitarianism cognitivism and consequentialism
5 utilitarianism cognitivism and consequentialism
 
4 types & codes of ethics
4 types & codes of ethics4 types & codes of ethics
4 types & codes of ethics
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

9 ethics in it space

  • 1. Computer Ethics  Privacy  Security and accuracy  Ownership of property  Environmental issues  Equity in access  Artificial intelligence  Unemployment and displacement  Computer misuse  Internal control integrity
  • 2. Computer Ethics  Computer fraud:  Theft, misuse and misappropriation by altering computer data  Theft, misuse and misappropriation by altering software programming  Theft or illegal use of computer data/info  Illegal copying or destruction of software or hardware  Misappropriation of computer hardware
  • 3. Computer Ethics  Computer fraud:  Input violation (Data Diddling)  Altering programs to allow illegal access  Destroy programs/data by virus injection  Misusing computers for personal use/business  Output violation:  Encoding falsified information at the back of credit cards  Salami technique
  • 4. Computer Ethics  Hard drives full with Music and videos  Downloading of music from the web without paying  Software Piracy  Formatted your hard drive prior to leaving your company because you were angry about leaving
  • 5. Information Technology Ethics  Prior to IT, it may have been easier to know whether the activity was right or wrong  Virtual world: •A student uses the copy and paste commands to place large parts of an electronic article into an assigned paper and turns the paper in as own work
  • 6. Information Technology Ethics  Some users view their computing actions as less serious than their actions in the “real world” •Stealing software from a store – no way!....... However, SW piracy costs businesses billions of dollars per year •Picking a lock to someone’s house – no; However, guessing passwords to gain access to a website, information, or programs is a common •Do it to demonstrate 'technical heroism'
  • 7. IT Ethics: Challenges  Workplace:  Customer and vendor relationships  Outsourcing issues  Should the employer has the right to monitor private email messages •Two most popular websites visited by US workers: ESPN and Playboy
  • 8. Computer Crimes  Financial Frauds  Laptop theft  Virus/trojan/worm infection  Insider computer system abuse  Telecommunication fraud  Unauthorised privileged access  Outsider system penetration (Hacking)  Website defacement
  • 9. Computer Security Expenditure  Prioratised sectorwise  Transportation  Government  Telecommunication  High-tech  Financial  Legal  Medical
  • 10. Computer Security Expenditure  Prioratised sectorwise  Transportation  Government  Telecommunication  High-tech  Financial  Legal  Medical