SlideShare a Scribd company logo
1 of 8
COMPUTER ETHICS AND COPYRIGHT
 GÖKÇE KAÇMAZ
 282482
 COMPUTER ENGINEERING
 COMPUTER ETHICS AND COPYRIGHT
 KAREN HOWELLS
COMPUTER ETHICS
 Email
 Check your email as much as possible and respond quickly to messages you receive;
 your input may be critical to someone else.
 Never send anything that you wouldn’t want someone other than the recipient to
 read.
 Get good virus protection software and make sure it scans your incoming emails.
 Don’t open an attachment in an email if:
 You don’t know the sender,
 The subject line doesn’t make sense or is suspicious in any way,
 The attachment name is suspicious, or
 The attachment or message text doesn’t make sense or you aren’t expecting them.
 Don’t type in all capital letters; it looks like you are screaming.
 Try not to use sarcasm or humor, it doesn’t always come across well.
 When you’re subscribed to a listproc make sure you reply to one person and not the
 whole list, unless you want the whole list to read what you have to say
CONTINUE
SOME QUESTIONS TO ASK YOURSELF WHEN USING
COMPUTERS AND THE INTERNET:
 If everyone acted the same way you did, would society as a whole benefit?
 Would an impartial observer judge that your actions are fair to all parties
involved?
 Would you be proud to tell your parents/significant other what you are
doing?
 If you were in another person’s place would you have to admit that what
you are doing is
 fair? If you did this at work would your employers/customers agree that you
did the right
 thing? Would you mind reading about your actions on the front page of the
Blade?
CONTINUE
THE TEN COMMANDMENTS FOR COMPUTER ETHICS
(CARE OF THE COMPUTER ETHICS INSTITUTE OF THE
BROOKINGS INSTITUTION)
 1. Thou shall not use a computer to harm other people.
 2. Thou shall not interfere with other people’s computer work.
 3. Thou shall not snoop around in other people’s files.
 4. Thou shall not use a computer to steal.
 5. Thou shall not use a computer to bear false witness.
 6. Thou shall not copy or use proprietary software for which you have not paid.
 7. Thou shall not use other people’s computer resources without authorization
 or proper compensation.
 8. Thou shall not appropriate other people’s intellectual output.
 9. Thou shall think about the social consequences of the program you write or
 the system you design.Computer Ethics 3
 10. Thou shall use a computer in ways that show consideration and respect for
 your fellow humans.
CONTINUE
SEVEN ESSENTIAL COMPONENTS OF A PERSONAL CODE OF
COMPUTER ETHICS:
 1. Honesty
 2. Respect
 3. Confidentiality
 4. Professionalism
 5. Responsibility
 6. Communication
 7. Obeying the law
COPYRIGTH
 • Public domain
Some software is free to use, copy, and/or change, but only do so if there
is written notice that the software is in the public domain. Look for this
notice in the “read me” files that accompany programs.
 • General Public License
GPL software has the same restrictions as public domain software, but
cannot be sold for profit.
 • Shareware
Using shareware programs is free, but it is illegal to copy or modify them
without permission since they are copyrighted. Most shareware programs
are really trial versions of the software, which must be paid for after the
trial period has expired.
When you purchase a copy of a software program you are actually buying a software
license, or in the case of an organization that needs many copies, a site license. A
software license can only be copied for backup purposes while site licenses let the
organization make a specific number of copies to be used within that organization only.
Although it seems common, software piracy is a felony and shouldn’t be taken lightly.
CONTINUE
 MP3'S
Downloading and/or uploading music is a violation of copyright laws. It
is not true that
keeping the file for less than 24 hours is legal and it is a myth that
uploading is legal if
you have paid for the original work.
“Fair use” permits the use of a small section of a work if the copyright
holder is
reimbursed or has given permission for the use of his or her work. If you
use more than
10 percent or 30 seconds of the original work you are participating in
copyright
infringement.
Downloading music and other media also makes unfair use of the
University’s bandwidth
and can deprive others of Internet access.

More Related Content

What's hot

Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
6 easy steps to get started learning artificial intelligence
6 easy steps to get started learning artificial intelligence6 easy steps to get started learning artificial intelligence
6 easy steps to get started learning artificial intelligenceManju Nath
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetDaniel Owens
 
Internet Security Comp Refurb
Internet Security  Comp RefurbInternet Security  Comp Refurb
Internet Security Comp RefurbLuis Terron
 
Instagram account hack
Instagram account hackInstagram account hack
Instagram account hackInstagramhacks
 
Liberteks Security Advisory002
Liberteks Security Advisory002Liberteks Security Advisory002
Liberteks Security Advisory002Liberteks
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTBenandro Palor
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
DOES15 - Justin Collins - Rise of the Machines Security Automation at TwitterDOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
DOES15 - Justin Collins - Rise of the Machines Security Automation at TwitterGene Kim
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Everything you wanted to know about email
Everything you wanted to know about emailEverything you wanted to know about email
Everything you wanted to know about emailgladsteins
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware QuizPEC
 

What's hot (20)

Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Cyber security
Cyber securityCyber security
Cyber security
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Computer safety
Computer safetyComputer safety
Computer safety
 
R@1n
R@1nR@1n
R@1n
 
Netiquette
NetiquetteNetiquette
Netiquette
 
6 easy steps to get started learning artificial intelligence
6 easy steps to get started learning artificial intelligence6 easy steps to get started learning artificial intelligence
6 easy steps to get started learning artificial intelligence
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
Internet Security Comp Refurb
Internet Security  Comp RefurbInternet Security  Comp Refurb
Internet Security Comp Refurb
 
R@1n
R@1nR@1n
R@1n
 
Instagram account hack
Instagram account hackInstagram account hack
Instagram account hack
 
Liberteks Security Advisory002
Liberteks Security Advisory002Liberteks Security Advisory002
Liberteks Security Advisory002
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
DOES15 - Justin Collins - Rise of the Machines Security Automation at TwitterDOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
DOES15 - Justin Collins - Rise of the Machines Security Automation at Twitter
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Everything you wanted to know about email
Everything you wanted to know about emailEverything you wanted to know about email
Everything you wanted to know about email
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 

Similar to Computer Ethics and Copyright Guide

computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxhenrysales6
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptxMuruganS82
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYChano Alfornon
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technologylcnemedez
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxFroilan Cantillo
 
Ten commandments
Ten commandmentsTen commandments
Ten commandmentslsanford84
 

Similar to Computer Ethics and Copyright Guide (20)

computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptx
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Ethics By ZAK
Ethics By ZAKEthics By ZAK
Ethics By ZAK
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Computer Ethics and Copyright Guide

  • 2.  GÖKÇE KAÇMAZ  282482  COMPUTER ENGINEERING  COMPUTER ETHICS AND COPYRIGHT  KAREN HOWELLS
  • 3. COMPUTER ETHICS  Email  Check your email as much as possible and respond quickly to messages you receive;  your input may be critical to someone else.  Never send anything that you wouldn’t want someone other than the recipient to  read.  Get good virus protection software and make sure it scans your incoming emails.  Don’t open an attachment in an email if:  You don’t know the sender,  The subject line doesn’t make sense or is suspicious in any way,  The attachment name is suspicious, or  The attachment or message text doesn’t make sense or you aren’t expecting them.  Don’t type in all capital letters; it looks like you are screaming.  Try not to use sarcasm or humor, it doesn’t always come across well.  When you’re subscribed to a listproc make sure you reply to one person and not the  whole list, unless you want the whole list to read what you have to say
  • 4. CONTINUE SOME QUESTIONS TO ASK YOURSELF WHEN USING COMPUTERS AND THE INTERNET:  If everyone acted the same way you did, would society as a whole benefit?  Would an impartial observer judge that your actions are fair to all parties involved?  Would you be proud to tell your parents/significant other what you are doing?  If you were in another person’s place would you have to admit that what you are doing is  fair? If you did this at work would your employers/customers agree that you did the right  thing? Would you mind reading about your actions on the front page of the Blade?
  • 5. CONTINUE THE TEN COMMANDMENTS FOR COMPUTER ETHICS (CARE OF THE COMPUTER ETHICS INSTITUTE OF THE BROOKINGS INSTITUTION)  1. Thou shall not use a computer to harm other people.  2. Thou shall not interfere with other people’s computer work.  3. Thou shall not snoop around in other people’s files.  4. Thou shall not use a computer to steal.  5. Thou shall not use a computer to bear false witness.  6. Thou shall not copy or use proprietary software for which you have not paid.  7. Thou shall not use other people’s computer resources without authorization  or proper compensation.  8. Thou shall not appropriate other people’s intellectual output.  9. Thou shall think about the social consequences of the program you write or  the system you design.Computer Ethics 3  10. Thou shall use a computer in ways that show consideration and respect for  your fellow humans.
  • 6. CONTINUE SEVEN ESSENTIAL COMPONENTS OF A PERSONAL CODE OF COMPUTER ETHICS:  1. Honesty  2. Respect  3. Confidentiality  4. Professionalism  5. Responsibility  6. Communication  7. Obeying the law
  • 7. COPYRIGTH  • Public domain Some software is free to use, copy, and/or change, but only do so if there is written notice that the software is in the public domain. Look for this notice in the “read me” files that accompany programs.  • General Public License GPL software has the same restrictions as public domain software, but cannot be sold for profit.  • Shareware Using shareware programs is free, but it is illegal to copy or modify them without permission since they are copyrighted. Most shareware programs are really trial versions of the software, which must be paid for after the trial period has expired. When you purchase a copy of a software program you are actually buying a software license, or in the case of an organization that needs many copies, a site license. A software license can only be copied for backup purposes while site licenses let the organization make a specific number of copies to be used within that organization only. Although it seems common, software piracy is a felony and shouldn’t be taken lightly.
  • 8. CONTINUE  MP3'S Downloading and/or uploading music is a violation of copyright laws. It is not true that keeping the file for less than 24 hours is legal and it is a myth that uploading is legal if you have paid for the original work. “Fair use” permits the use of a small section of a work if the copyright holder is reimbursed or has given permission for the use of his or her work. If you use more than 10 percent or 30 seconds of the original work you are participating in copyright infringement. Downloading music and other media also makes unfair use of the University’s bandwidth and can deprive others of Internet access.