2. Definition
Computer Ethics Is a system of moral standards or moral values
used as a guideline for computer users
Code of Ethics Is a guideline in ICT that help determine whether
a specific computer action is ethical or unethical
Intellectual Is works created by inventors, authors and artists
Property
Privacy Refers to the right of individuals and companies
to deny or restrict the collection and use of
information about them
Computer Crime Is any illegal acts involving computers
Cyber Law Is any laws relating to protect the Internet and
other online communication technologies
3. Differentiate between ethics and law
ETHICS LAW
As a guideline to computer As a rule to control computer
users users
Computers users are free to Computers users must follow
follow or ignore the code of the regulations and law
ethics
Universal, can be applied Depend on country and state
anywhere, all over the world where the crime is committed
To produced ethical computers To prevent misuse of
users computers
Not following ethics are called Not obeying laws are called
immoral crime
4. Intellectual Property Laws
Four types of Intellectual Property are:
• Patents for inventions
• Trademarks for brand identity
• Design for product appearance
• Copyright for materials
5. Privacy
Ways of making personal data more privates:
Install personal firewall
Clear your history file when you are browsing
Purchase goods with cash, rather than credit card
6. Authentication
Authentication is a process where user verifies their
identity. Authentication deals with the problem of
determining whether a user should be allowed
access to a particular system.
8. A) User identification
Is a unique combination of characters (letter,
number or symbol) that identify specific user
Examples:
pin number
password
9. B) Possessed object
Is a any item that you must carry to gain access to
computer of computer facility
Examples:
ATM card
credit card
smart card
10. C) Biometric device
Is a device that translates personal characteristics
into digital code that is compared with the digital
code stored in the database
Examples:
fingerprint reader
iris scanner
hand geometric scanner
signature verification system
11. Controversial Contents and Control
PORNOGRAPHY SLANDER
is any form media or material (like is a false spoken statement about
books, video or photos) that show erotic someone, intended to damage his or her
behavior and intended to cause sexual reputation
excitement
the effects of slander on society are:
the effects of pornography on society iv)Can develop society that disregards on
are: honesty and truth
iv)Can lead to criminal acts such as v)Can lead to bad habits of spreading
exploitation of women rumors and untruth
v)Can lead to sexual addiction vi)Can cause people to have nagative
vi)Can develop lower moral values attitudes toward another person
towards other people
vii)Can erode good religious, cultural,
behaviors and beliefs
12.
13. Computer Crimes
Why we need cyber law?
i) Cyber laws are made to force people to be good
ii) To give protection against the misuse of computers
and computer criminal activities
Examples of cyber abuse on the users:
i) Sending a computer virus via e-mail
ii) Harassment through e-mail
iii) Hacking into your school's database to change your
examination results
14. Malaysian Cyber Law
i) Computer Crime Act 1997
ii) Copyright (Amendment) Bill 1997
iii) Digital Signature Act 1997
iv) Telemedicine Bill 1997
v) Communication and Multimedia Act 1998
vi) Digital Signature Regulations 1998
15. 4 examples of computer crimes:
Computer fraud - is the crime of obtaining money
by deceiving (to trick) people through the use of
computers such as email hoaxes, program fraud,
investment schemes and claim of expertise on
certain fields
Copyright infringement - is a violation of the rights
secured by a copyright. It occurs when you break
the copyright laws such as copying movie, software
or CD’s illegally
16. Computer theft – is defined as the unauthorized
used of another person’s property such as transfer
of payment to the wrong accounts, get online
material with no cost and tap into the data
transmission lines
e Computer attack – is defined as any activities
taken to disrupt the equipments of computers
systems, change processing controls and corrupt
stored data