SlideShare a Scribd company logo
Introduction of Computing Ethics
• Ethics is a set of moral principles that
govern the behavior of an individual
or group of people.
• Computer ethics is the application of
moral principles to the use of
computers and the Internet.
Examples include intellectual
property rights, privacy policies, and
online etiquette, or "netiquette".
Common issues of Computer Ethics
Some common issues of computer ethics include:
Intellectual property rights
Privacy concerns
How computers affect society
Intellectual Property Rights
• Copyright – is a form of intellectual
property that gives proprietary
publication, distribution and usage
rights for the author. This means that
whatever idea the author created
cannot be employed or disseminated
by anyone else without the permission
of the author.
• Plagiarism – is an act of copying and
publishing another person’s work
without proper citation. It’s like stealing
someone else’s work and releasing it
as your own work.
Intellectual Property Rights
• Cracking – is a way of breaking into a
system by getting past the security
features of the system. It’s a way of
skipping the registration and
authentication steps when installing a
software.
• Software License – allows the use of
digital material by following the license
agreement. Ownership remains with
the original copyright owner, users are
just granted licenses to use the
material based on the agreement.
Privacy Concerns
• Hacking – is unlawful intrusion into a
computer or a network. A hacker can
intrude through the security levels of a
computer system or network and can
acquire unauthorised access to other
computers.
• Malware – means malicious software
which is created to impair a computer
system. Common malware are
viruses, spyware, worms and trojan
horses. A virus can delete files from a
hard drive while a spyware can collect
data from a computer.
Privacy Concerns
• Data Protection – also known as
information privacy or data privacy is
the process of safeguarding data
which intends to influence a balance
between individual privacy rights
while still authorising data to be used
for business purposes.
• Anonymity – is a way of keeping a
user’s identity masked through
various applications.
Effects on Society
• Environmental Impact – Environment has been affected by
computers and the internet since so much time spent using
increases energy usage which in turn increases the
greenhouse gases.
• There are ways where we can save energy like limiting computer
turning off the computer or putting on sleep mode when not in
energy efficient computers with Energy Star label can also help
environment.
• Social Impact – Computers and the internet help people stay
in touch with family and friends. Social media has been very
nowadays.
• Computer gaming influenced society both positively and
effects are improved hand-eye coordination, stress relief and
strategic thinking. Negative effects are addiction of gamers,
real world and exposure to violence.
• Computer technology helps the government in improving services to its
citizens. Advanced database can hold huge data being collected and
analysed by the government.
• Computer technology aids businesses by automating processes, reports and
analysis.
Thank You

More Related Content

What's hot

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
MILANOP1
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
jvonschilling
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
Mbradber
 

What's hot (20)

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 

Similar to Computer ethics

Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
bodo-con
 

Similar to Computer ethics (20)

Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
L2 COMPUTER ETHICS PPT [Autosaved].pptx
L2 COMPUTER  ETHICS  PPT [Autosaved].pptxL2 COMPUTER  ETHICS  PPT [Autosaved].pptx
L2 COMPUTER ETHICS PPT [Autosaved].pptx
 
cyberhygiene regular hygien of computer at office
cyberhygiene regular hygien of computer at officecyberhygiene regular hygien of computer at office
cyberhygiene regular hygien of computer at office
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
impact.pptx
impact.pptximpact.pptx
impact.pptx
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
parmarsneha2
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

Computer ethics

  • 1.
  • 2. Introduction of Computing Ethics • Ethics is a set of moral principles that govern the behavior of an individual or group of people. • Computer ethics is the application of moral principles to the use of computers and the Internet. Examples include intellectual property rights, privacy policies, and online etiquette, or "netiquette".
  • 3. Common issues of Computer Ethics Some common issues of computer ethics include: Intellectual property rights Privacy concerns How computers affect society
  • 4. Intellectual Property Rights • Copyright – is a form of intellectual property that gives proprietary publication, distribution and usage rights for the author. This means that whatever idea the author created cannot be employed or disseminated by anyone else without the permission of the author. • Plagiarism – is an act of copying and publishing another person’s work without proper citation. It’s like stealing someone else’s work and releasing it as your own work.
  • 5. Intellectual Property Rights • Cracking – is a way of breaking into a system by getting past the security features of the system. It’s a way of skipping the registration and authentication steps when installing a software. • Software License – allows the use of digital material by following the license agreement. Ownership remains with the original copyright owner, users are just granted licenses to use the material based on the agreement.
  • 6. Privacy Concerns • Hacking – is unlawful intrusion into a computer or a network. A hacker can intrude through the security levels of a computer system or network and can acquire unauthorised access to other computers. • Malware – means malicious software which is created to impair a computer system. Common malware are viruses, spyware, worms and trojan horses. A virus can delete files from a hard drive while a spyware can collect data from a computer.
  • 7. Privacy Concerns • Data Protection – also known as information privacy or data privacy is the process of safeguarding data which intends to influence a balance between individual privacy rights while still authorising data to be used for business purposes. • Anonymity – is a way of keeping a user’s identity masked through various applications.
  • 8. Effects on Society • Environmental Impact – Environment has been affected by computers and the internet since so much time spent using increases energy usage which in turn increases the greenhouse gases. • There are ways where we can save energy like limiting computer turning off the computer or putting on sleep mode when not in energy efficient computers with Energy Star label can also help environment. • Social Impact – Computers and the internet help people stay in touch with family and friends. Social media has been very nowadays. • Computer gaming influenced society both positively and effects are improved hand-eye coordination, stress relief and strategic thinking. Negative effects are addiction of gamers, real world and exposure to violence.
  • 9. • Computer technology helps the government in improving services to its citizens. Advanced database can hold huge data being collected and analysed by the government. • Computer technology aids businesses by automating processes, reports and analysis.