SlideShare a Scribd company logo
Computer Ethics
ATIQ UR REHMAN
Computer Ethics
“Computer ethics is set of moral principles that regulate the use of computers”
Moral issue such as free speech, privacy, respect for property, informed consent,
and harm.
Computers have become the technological backbone of society due their
complexity, range of applications, and sheer numbers which continue to increase.
Electronic computers are still only a few decades old, and it is difficult to foresee
all the moral issues that will eventually surround them.
Computer ethics has special importance for professionals working as designers of
computers, programmers, systems analysts, and operators.
“Computer abuse” is unethical or illegal conduct of computers.
Internet
Internet is the global system of interconnected computer networks that uses
the Internet protocol suite (TCP/IP) to communicate between networks and
devices.
Internet which is now a global network of networks, initially using the
infrastructure of the telephone system and now carried by many
telecommunication systems by wire, fiber, or wireless systems.
The Internet has magnified all issues in computer ethics.
Internet has brought forward issues of free speech, including hate speech, control
of obscene forms of pornography, spam (unwanted commercial speech), and
defamation(libel).
Internet Free Speech Issues
Hate speech, speech or expression that unfairly criticizes a person or persons on
the basis of (alleged) membership in a social group identified by attributes such as
race, ethnicity, gender, sexual orientation, religion, age, physical or mental
disability, and others.
Pornography is representation of sexual behavior in books, pictures, statues,
motion pictures, and other media that is intended to cause sexual excitement.
Spamming is the use of messaging systems to send an unsolicited message to
large numbers of recipients for the purpose of commercial advertising, non-
commercial conversions, or for any prohibited purpose.
Defamation is the oral or written communication of a false statement about
another that unjustly harms their reputation and usually constitutes a tort or crime.
Combating Internet Free Speech
Two types of control of pornography and hate speech have been attempted:
Top-down control by governments, and bottom-up controls by individuals and
groups in the marketplace.
Web sites that provide rating services for screening material should avoid hidden
political agendas.
Some enthusiasts however, argue that controlling free speech on the Internet
would undermine principles of freedom, equality, and opportunity power of
tyrants who have blocked democratic freedoms in their country.
Power RelationshipsEarlier it was thought computers would concentrate power in a few centralized
bureaucracies, however with advent of microcomputers small size with high power,
economically competitive with larger models, remote access and time-sharing made it
decentralized.
A few moral issues about power relationships are;
Job Elimination computers continue to lead to the elimination of some jobs.
Customer Relations public accountability of businesses using computer-based
services.
Biased Software programs can be biased like any form of communication or way of
doing things.
Stock Trading Programmed trading is the automatic, hands off, computer trading of
stocks, futures, and options on the stock market.
Military Weapons autonomous weapons that can be aimed and fired by onboard
computers that make all necessary decisions, including enemy identification.
Property
There are two critical issues regarding property rights in computers
1. Embezzlement
2. Theft of software and information
Privacy
Storage, retrieval, and transmission of information using computers as data processors has
revolutionized communication. Yet this very benefit poses moral threats to the right to privacy.
Related issues are;
Inappropriate Access
Hackers
Legal Responses
Additional Issues
Computer Failures
Computer Implementation
Health Conditions
Computer ethics

More Related Content

What's hot

PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
Kashif Sohail
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanSVS College
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
FaHaD .H. NooR
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology
AlyssaSingleterry
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
Kashif Sohail
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Faraz Ahmed
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
Kashif Sohail
 
Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.
Joel D'souza
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
Atul Kumar Pandey
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
Kashif Sohail
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
kelly kusmulyono
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Use
university of education,Lahore
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethics
kelseybee316
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
Sammer Qader
 
Should Government Control the Internet and its contents
Should Government Control the Internet and its contentsShould Government Control the Internet and its contents
Should Government Control the Internet and its contents
Anirban Roy
 

What's hot (19)

PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandan
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Shak taha
Shak tahaShak taha
Shak taha
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Use
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethics
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Should Government Control the Internet and its contents
Should Government Control the Internet and its contentsShould Government Control the Internet and its contents
Should Government Control the Internet and its contents
 

Similar to Computer ethics

Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
Academic Research Paper Writing Services
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
Academic Research Paper Writing Services
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
COMPUTER_ETHICS presentation for Engineer
COMPUTER_ETHICS presentation for EngineerCOMPUTER_ETHICS presentation for Engineer
COMPUTER_ETHICS presentation for Engineer
iqamin1122
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
Ethics
EthicsEthics
Ethics
EthicsEthics
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
Adyns
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3Suad 00
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
JIEMS Akkalkuwa
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
manisha9kathuria
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
meisaina
 

Similar to Computer ethics (20)

Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
COMPUTER_ETHICS presentation for Engineer
COMPUTER_ETHICS presentation for EngineerCOMPUTER_ETHICS presentation for Engineer
COMPUTER_ETHICS presentation for Engineer
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
E commerce
E commerceE commerce
E commerce
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 

More from AtiqurRehman129

Team work and professional rights
Team work and professional rightsTeam work and professional rights
Team work and professional rights
AtiqurRehman129
 
Technology transfer
Technology transferTechnology transfer
Technology transfer
AtiqurRehman129
 
Environmental ethics
Environmental ethicsEnvironmental ethics
Environmental ethics
AtiqurRehman129
 
Conflict of interests
Conflict of interestsConflict of interests
Conflict of interests
AtiqurRehman129
 
Confidentiality in professions
Confidentiality in professionsConfidentiality in professions
Confidentiality in professions
AtiqurRehman129
 
Safety and risk
Safety and riskSafety and risk
Safety and risk
AtiqurRehman129
 
Honesty and research integrity
Honesty and research integrityHonesty and research integrity
Honesty and research integrity
AtiqurRehman129
 

More from AtiqurRehman129 (7)

Team work and professional rights
Team work and professional rightsTeam work and professional rights
Team work and professional rights
 
Technology transfer
Technology transferTechnology transfer
Technology transfer
 
Environmental ethics
Environmental ethicsEnvironmental ethics
Environmental ethics
 
Conflict of interests
Conflict of interestsConflict of interests
Conflict of interests
 
Confidentiality in professions
Confidentiality in professionsConfidentiality in professions
Confidentiality in professions
 
Safety and risk
Safety and riskSafety and risk
Safety and risk
 
Honesty and research integrity
Honesty and research integrityHonesty and research integrity
Honesty and research integrity
 

Recently uploaded

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 

Recently uploaded (20)

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 

Computer ethics

  • 2. Computer Ethics “Computer ethics is set of moral principles that regulate the use of computers” Moral issue such as free speech, privacy, respect for property, informed consent, and harm. Computers have become the technological backbone of society due their complexity, range of applications, and sheer numbers which continue to increase. Electronic computers are still only a few decades old, and it is difficult to foresee all the moral issues that will eventually surround them. Computer ethics has special importance for professionals working as designers of computers, programmers, systems analysts, and operators. “Computer abuse” is unethical or illegal conduct of computers.
  • 3. Internet Internet is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. Internet which is now a global network of networks, initially using the infrastructure of the telephone system and now carried by many telecommunication systems by wire, fiber, or wireless systems. The Internet has magnified all issues in computer ethics. Internet has brought forward issues of free speech, including hate speech, control of obscene forms of pornography, spam (unwanted commercial speech), and defamation(libel).
  • 4. Internet Free Speech Issues Hate speech, speech or expression that unfairly criticizes a person or persons on the basis of (alleged) membership in a social group identified by attributes such as race, ethnicity, gender, sexual orientation, religion, age, physical or mental disability, and others. Pornography is representation of sexual behavior in books, pictures, statues, motion pictures, and other media that is intended to cause sexual excitement. Spamming is the use of messaging systems to send an unsolicited message to large numbers of recipients for the purpose of commercial advertising, non- commercial conversions, or for any prohibited purpose. Defamation is the oral or written communication of a false statement about another that unjustly harms their reputation and usually constitutes a tort or crime.
  • 5. Combating Internet Free Speech Two types of control of pornography and hate speech have been attempted: Top-down control by governments, and bottom-up controls by individuals and groups in the marketplace. Web sites that provide rating services for screening material should avoid hidden political agendas. Some enthusiasts however, argue that controlling free speech on the Internet would undermine principles of freedom, equality, and opportunity power of tyrants who have blocked democratic freedoms in their country.
  • 6. Power RelationshipsEarlier it was thought computers would concentrate power in a few centralized bureaucracies, however with advent of microcomputers small size with high power, economically competitive with larger models, remote access and time-sharing made it decentralized. A few moral issues about power relationships are; Job Elimination computers continue to lead to the elimination of some jobs. Customer Relations public accountability of businesses using computer-based services. Biased Software programs can be biased like any form of communication or way of doing things. Stock Trading Programmed trading is the automatic, hands off, computer trading of stocks, futures, and options on the stock market. Military Weapons autonomous weapons that can be aimed and fired by onboard computers that make all necessary decisions, including enemy identification.
  • 7. Property There are two critical issues regarding property rights in computers 1. Embezzlement 2. Theft of software and information
  • 8. Privacy Storage, retrieval, and transmission of information using computers as data processors has revolutionized communication. Yet this very benefit poses moral threats to the right to privacy. Related issues are; Inappropriate Access Hackers Legal Responses
  • 9. Additional Issues Computer Failures Computer Implementation Health Conditions