SlideShare a Scribd company logo
COMPUTER ETHICS
COMPUTER ETHICS
Computer Ethics is defined as
 Study and analysis of natural and social impact of computer
technology.
 Formulation and justification policies, or ethical use of
computers.
 This subject has become relevant to the professional such as
designers of computers, programmers, system analysts,
system managers and operators.
COMPUTER ETHICS
 The use of computers have raised a host of moral
concerns such as free speech, privacy, intellectual
property right, and physical as well as mental harm.
 There appears to be no conceptual framework available
on ethics, to study and understand and resolve the
problems in computer technology.
Types of Issues
1. Computer as the instrument of Unethical Acts
2. Computer as the object of Unethical Acts
3. Problems Related to the Autonomous Nature of
Computer
Computer as the instrument of Unethical Acts
a) The usage of computer replaces the job positions. This has
been overcome to a large extent by readjusting work
assignments, and processing , editing, and graphics.
b) Breaking privacy. Information or data of the individuals
accessed or erased or the ownership changed.
c) Defraud a bank or a client, by accessing and withdrawing
money from other’s bank account.
Computer as the object of Unethical Acts
 The data are accessed and deleted or changed.
 (a) Hacking: The software is stolen or information is
accessed from other computers. This may cause financial
loss to the business or violation of privacy rights of the
individuals or business. In case of defense information
being hacked, this may endanger the security of the nation.
 (b) Spreading virus: Through mail or otherwise, other computers
are accessed and the files are erased or contents changed
altogether. 'Trojan horses’ are implanted to distort the messages
and files beyond recovery. This again causes financial loss or mental
torture to the individuals . Some hackers feel that they have justified
their right of free information or they do it for fun. However, these
acts are certainly unethical.
 (c)Health hazard: the computers pose threat during their use as well
as during disposal.
Problems Related to the Autonomous Nature of
Computer
a) Security risk: Recently the Tokyo Stock Exchange faced
major embarrassment. A seemingly casual mistake by
junior trader of a security hose led to huge losses
including that of reputation. The order through the
exchange’s trading system was to sell one share for
600,000 Yen. Instead the trader keyed in a sale order for
600,000 shares at the rate of one Yen each. Naturally the
shares on offer at the ridiculously low price were lapped
up.
• And only a few buyers agreed to reverse the deal! The loss
to the securities firm was said to be huge, running into
several hundred thousands. More important to note, such
an obvious mistake could not be corrected by some of the
advanced technology advanced countries like japan who
have imbibed the latest technology, this would be a new
kind of learning experience.
b) Loss of human lives: Risk and loss of human lives lost by
computer , in the operational control of military weapons.
There is a dangerous instability in automated defense system.
An unexpected error in the software or hardware or a conflict
during interfacing between the two, may trigger a serious
attack and cause irreparable human loss before the error is
traced. The Chinese embassy was bombed by U.S. military in
Iraq a few years back, but enquires revealed that the building
was shown in a previous map as the building where insurgents
stayed.
c) In flexible manufacturing systems, the autonomous computer
is beneficial in obtaining continuous monitoring and automatic
control.
Computers in Workplace
• There ethical problems initiated by computers in the workplace
are:
• 1. Elimination of routine and manual jobs. The leads to
unemployment, but the creation of skilled and IT- enabled
service jobs are more advantages for the people.
• 2.Health and safety: The ill-effects due to electromagnetic
radiation, especially on woman and pregnant employees,
mental stress, wrist problem known as Carpel Tunnel
Syndrome, and back pain due to poor ergonomic seating
designs, and eye strain due to poor lighting and flickers in the
display and long exposure , have been reported worldwide.
• 3. Computer failure: Failure in computers may be due to errors
in the hardware or software. Hardware errors are rare and
they can be solved easily and quickly. But software errors are
very serious as they can be solved easily and quickly. But the
software are very serious as they can stop the entire network.
Property issues
The property issues concerned with the computers are:
1. Computers have been used to extort money through
anonymous telephone calls.
2. Computers are used to cheat and steal by current as well as
previous calls.
3. Cheating of and stealing from the customers and clients.
4. Violation of contracts on computers sales and services.
5. Conspiracy as a group, especially with the internet, to defraud
the gullible, stealing the identity and to forge documents.
6. Violation of property rights: Is the software a property? The
software could be either a Program ( an algorithm, indicating
the steps in solving a problem) or a source code ( the algorithm,
indicating the steps in solving a problem) or a Source code( the
algorithm in a general computer language such as FORTAN, C
and COBOL or an Object code( to translate the source code into
the machine language). How do we apply the concept of
property here? This demands a framework for ethical
judgments.
Computer crime
The ethical features involved in computer crime are:
1. Physical Security
The computers are to be protected against theft, fire, and
physical damage. This can be achieved by proper insurance
on the assets.
2. Logical Security
The aspects related are (a) the privacy of the individuals or
organizations,(b) confidentially,(c) integrity, to ensure that
the modification of data or program are done only by the
authorized persons,(d) uninterrupted service. This is
achieved by installing appropriate uninterrupted power
supply or back-up provisions, and (e) protection against
hacking that causes dislocation or distortion.
Computer Crime
Major weaknesses in this direction are:
a) The difficulty in tracing the evidence involved and
b) Absence of stringent punishment againt the crime
 The origin of a threat to the central government posted
from an obscure browsing center, remained unsolved for
quite a long time.
 Many times, such crimes have been traced, but there are
no clear cyber laws to punish and deter the criminals.
Privacy and Anonymity
The data transmission and accessibility have improved
tremendously by using the computers, but the right to privacy
has been threatened to a great extent. Some issues concerned
with the privacy are listed hereunder:
1. Records of Evidence:
Service records or criminal records and the details of people can
be stored and accessed to prove the innocence or guilty.
Records on psychiatric treatment by medical practitioners
or hospital, or records of membership of organizations may
sometime embarrass the persons in later years.
Privacy and Anonymity
2. Hacking:
There are computers enthusiasts who willfully or for un, plant virus or
'Trojan horses’ that may fill the disc space, falsify information, erase
files, and even harm the hardware . They breakdown the functioning of
computers and can be treated as violation of property rights.
Privacy and Anonymity
3. Legal Response:
In the Indian scene, the right to information Act 2005 14
provides the right to the citizens to secure access to
information under the control of public authorities, including
the departments the central government, state government,
government bodies, public sector companies and public sector
companies and public sector banks, to promote transparency
and accountability of public authorities.
Privacy and Anonymity
4. Right to information:
Under the Act, section 2 , the right to information includes the
right to (1) inspect works, documents, records,(2) take notes,
extracts or certified copies of documents or records, (3) take
certified samples of material , and (4) obtain information in
the form of printouts, diskettes, floppies, tapes, video
cassettes or in any other electronic mode.
Privacy and Anonymity
5. Anonymity:
Anonymity in the computer communication has some merits as
well as demerits .While seeking medical and psychological
counseling or discussion (chat) on topics, such as AIDS ,
abortion, gay rights, the anonymity offers protection (against
revealing their identity). But frequently, anonymity is misused
by some people for money laundering, drug trafficking and
preying upon the vulnerable.
Computer  ethics

More Related Content

What's hot

Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
muhammad-Sulaiman
 
Unit I Human Values (GE8076 Professional Ethics in Engineering)
Unit I Human Values (GE8076 Professional Ethics in Engineering)Unit I Human Values (GE8076 Professional Ethics in Engineering)
Unit I Human Values (GE8076 Professional Ethics in Engineering)
Dr. SELVAGANESAN S
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
Atul Kumar Pandey
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
Joanna Dimitrova
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rights
Hamza Cheema
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
Middle East International School
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
WonderingAriana
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Ramki M
 
Unit-4 Professional Ethics in Engineering
Unit-4 Professional Ethics in EngineeringUnit-4 Professional Ethics in Engineering
Unit-4 Professional Ethics in Engineering
Nandakumar P
 
Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)
Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)
Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)
Dr. SELVAGANESAN S
 
Professional Practices Week1.pptx
Professional Practices Week1.pptxProfessional Practices Week1.pptx
Professional Practices Week1.pptx
TechBasti
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
shahmansoor109
 

What's hot (20)

Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Unit I Human Values (GE8076 Professional Ethics in Engineering)
Unit I Human Values (GE8076 Professional Ethics in Engineering)Unit I Human Values (GE8076 Professional Ethics in Engineering)
Unit I Human Values (GE8076 Professional Ethics in Engineering)
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rights
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Engineering Ethics
Engineering EthicsEngineering Ethics
Engineering Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Unit-4 Professional Ethics in Engineering
Unit-4 Professional Ethics in EngineeringUnit-4 Professional Ethics in Engineering
Unit-4 Professional Ethics in Engineering
 
Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)
Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)
Unit II Engineering Ethics (GE8076 Professional Ethics in Engineering)
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Professional Practices Week1.pptx
Professional Practices Week1.pptxProfessional Practices Week1.pptx
Professional Practices Week1.pptx
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 

Similar to Computer ethics

Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
AMOSOGAGAH
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
JIEMS Akkalkuwa
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
GFI Software
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
VighneshMGopal
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Information communication technology and cyber law
Information communication technology and cyber lawInformation communication technology and cyber law
Information communication technology and cyber law
Er Hari Prasad Ghimire
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docx
mckerliejonelle
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
ShailendraPandey96
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
ikmalsham
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
RobertBhattarai
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
Fizaril Amzari Omar
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
Fizaril Amzari Omar
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
smile790243
 
security_threats.pdf and control mechanisms
security_threats.pdf and control mechanismssecurity_threats.pdf and control mechanisms
security_threats.pdf and control mechanisms
ronoelias98
 
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptxFUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
PaulRomanoBenavidesR
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information Systems
Simeon Ogao
 

Similar to Computer ethics (20)

Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Network security
Network securityNetwork security
Network security
 
Information communication technology and cyber law
Information communication technology and cyber lawInformation communication technology and cyber law
Information communication technology and cyber law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docx
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
security_threats.pdf and control mechanisms
security_threats.pdf and control mechanismssecurity_threats.pdf and control mechanisms
security_threats.pdf and control mechanisms
 
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptxFUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information Systems
 

More from SKS

Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar report
SKS
 
Uses of ethical theories in professional ethics
Uses of ethical theories in professional ethicsUses of ethical theories in professional ethics
Uses of ethical theories in professional ethics
SKS
 
Deep learning seminar report
Deep learning seminar reportDeep learning seminar report
Deep learning seminar report
SKS
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar report
SKS
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
SKS
 
Reinforcement learning
Reinforcement  learningReinforcement  learning
Reinforcement learning
SKS
 
Variety of moral issues
Variety of moral issuesVariety of moral issues
Variety of moral issues
SKS
 
Research ethics
Research ethicsResearch ethics
Research ethics
SKS
 
Industrial standards
Industrial standardsIndustrial standards
Industrial standards
SKS
 
Engineers are responsible experimenters
Engineers are responsible experimentersEngineers are responsible experimenters
Engineers are responsible experimenters
SKS
 
Engineering as experimentation
Engineering as experimentationEngineering as experimentation
Engineering as experimentation
SKS
 
Controversy and consensus
Controversy and consensusControversy and consensus
Controversy and consensus
SKS
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
SKS
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
SKS
 
A balanced outlook on the law
A balanced outlook on  the lawA balanced outlook on  the law
A balanced outlook on the law
SKS
 
Theories about the right decision
Theories about the right decision Theories about the right decision
Theories about the right decision
SKS
 
Safety and risk
Safety and riskSafety and risk
Safety and risk
SKS
 
Risk-benefit analysis
Risk-benefit analysisRisk-benefit analysis
Risk-benefit analysis
SKS
 
Reducing risk
Reducing riskReducing risk
Reducing risk
SKS
 
Chernobyl case study
Chernobyl case studyChernobyl case study
Chernobyl case study
SKS
 

More from SKS (20)

Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar report
 
Uses of ethical theories in professional ethics
Uses of ethical theories in professional ethicsUses of ethical theories in professional ethics
Uses of ethical theories in professional ethics
 
Deep learning seminar report
Deep learning seminar reportDeep learning seminar report
Deep learning seminar report
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar report
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Reinforcement learning
Reinforcement  learningReinforcement  learning
Reinforcement learning
 
Variety of moral issues
Variety of moral issuesVariety of moral issues
Variety of moral issues
 
Research ethics
Research ethicsResearch ethics
Research ethics
 
Industrial standards
Industrial standardsIndustrial standards
Industrial standards
 
Engineers are responsible experimenters
Engineers are responsible experimentersEngineers are responsible experimenters
Engineers are responsible experimenters
 
Engineering as experimentation
Engineering as experimentationEngineering as experimentation
Engineering as experimentation
 
Controversy and consensus
Controversy and consensusControversy and consensus
Controversy and consensus
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 
A balanced outlook on the law
A balanced outlook on  the lawA balanced outlook on  the law
A balanced outlook on the law
 
Theories about the right decision
Theories about the right decision Theories about the right decision
Theories about the right decision
 
Safety and risk
Safety and riskSafety and risk
Safety and risk
 
Risk-benefit analysis
Risk-benefit analysisRisk-benefit analysis
Risk-benefit analysis
 
Reducing risk
Reducing riskReducing risk
Reducing risk
 
Chernobyl case study
Chernobyl case studyChernobyl case study
Chernobyl case study
 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

Computer ethics

  • 2. COMPUTER ETHICS Computer Ethics is defined as  Study and analysis of natural and social impact of computer technology.  Formulation and justification policies, or ethical use of computers.  This subject has become relevant to the professional such as designers of computers, programmers, system analysts, system managers and operators.
  • 3. COMPUTER ETHICS  The use of computers have raised a host of moral concerns such as free speech, privacy, intellectual property right, and physical as well as mental harm.  There appears to be no conceptual framework available on ethics, to study and understand and resolve the problems in computer technology.
  • 4. Types of Issues 1. Computer as the instrument of Unethical Acts 2. Computer as the object of Unethical Acts 3. Problems Related to the Autonomous Nature of Computer
  • 5. Computer as the instrument of Unethical Acts a) The usage of computer replaces the job positions. This has been overcome to a large extent by readjusting work assignments, and processing , editing, and graphics. b) Breaking privacy. Information or data of the individuals accessed or erased or the ownership changed. c) Defraud a bank or a client, by accessing and withdrawing money from other’s bank account.
  • 6. Computer as the object of Unethical Acts  The data are accessed and deleted or changed.  (a) Hacking: The software is stolen or information is accessed from other computers. This may cause financial loss to the business or violation of privacy rights of the individuals or business. In case of defense information being hacked, this may endanger the security of the nation.
  • 7.  (b) Spreading virus: Through mail or otherwise, other computers are accessed and the files are erased or contents changed altogether. 'Trojan horses’ are implanted to distort the messages and files beyond recovery. This again causes financial loss or mental torture to the individuals . Some hackers feel that they have justified their right of free information or they do it for fun. However, these acts are certainly unethical.  (c)Health hazard: the computers pose threat during their use as well as during disposal.
  • 8. Problems Related to the Autonomous Nature of Computer a) Security risk: Recently the Tokyo Stock Exchange faced major embarrassment. A seemingly casual mistake by junior trader of a security hose led to huge losses including that of reputation. The order through the exchange’s trading system was to sell one share for 600,000 Yen. Instead the trader keyed in a sale order for 600,000 shares at the rate of one Yen each. Naturally the shares on offer at the ridiculously low price were lapped up.
  • 9. • And only a few buyers agreed to reverse the deal! The loss to the securities firm was said to be huge, running into several hundred thousands. More important to note, such an obvious mistake could not be corrected by some of the advanced technology advanced countries like japan who have imbibed the latest technology, this would be a new kind of learning experience.
  • 10. b) Loss of human lives: Risk and loss of human lives lost by computer , in the operational control of military weapons. There is a dangerous instability in automated defense system. An unexpected error in the software or hardware or a conflict during interfacing between the two, may trigger a serious attack and cause irreparable human loss before the error is traced. The Chinese embassy was bombed by U.S. military in Iraq a few years back, but enquires revealed that the building was shown in a previous map as the building where insurgents stayed. c) In flexible manufacturing systems, the autonomous computer is beneficial in obtaining continuous monitoring and automatic control.
  • 11. Computers in Workplace • There ethical problems initiated by computers in the workplace are: • 1. Elimination of routine and manual jobs. The leads to unemployment, but the creation of skilled and IT- enabled service jobs are more advantages for the people. • 2.Health and safety: The ill-effects due to electromagnetic radiation, especially on woman and pregnant employees, mental stress, wrist problem known as Carpel Tunnel Syndrome, and back pain due to poor ergonomic seating designs, and eye strain due to poor lighting and flickers in the display and long exposure , have been reported worldwide.
  • 12. • 3. Computer failure: Failure in computers may be due to errors in the hardware or software. Hardware errors are rare and they can be solved easily and quickly. But software errors are very serious as they can be solved easily and quickly. But the software are very serious as they can stop the entire network.
  • 13. Property issues The property issues concerned with the computers are: 1. Computers have been used to extort money through anonymous telephone calls. 2. Computers are used to cheat and steal by current as well as previous calls. 3. Cheating of and stealing from the customers and clients. 4. Violation of contracts on computers sales and services.
  • 14. 5. Conspiracy as a group, especially with the internet, to defraud the gullible, stealing the identity and to forge documents. 6. Violation of property rights: Is the software a property? The software could be either a Program ( an algorithm, indicating the steps in solving a problem) or a source code ( the algorithm, indicating the steps in solving a problem) or a Source code( the algorithm in a general computer language such as FORTAN, C and COBOL or an Object code( to translate the source code into the machine language). How do we apply the concept of property here? This demands a framework for ethical judgments.
  • 15. Computer crime The ethical features involved in computer crime are: 1. Physical Security The computers are to be protected against theft, fire, and physical damage. This can be achieved by proper insurance on the assets. 2. Logical Security The aspects related are (a) the privacy of the individuals or organizations,(b) confidentially,(c) integrity, to ensure that the modification of data or program are done only by the authorized persons,(d) uninterrupted service. This is achieved by installing appropriate uninterrupted power supply or back-up provisions, and (e) protection against hacking that causes dislocation or distortion.
  • 16. Computer Crime Major weaknesses in this direction are: a) The difficulty in tracing the evidence involved and b) Absence of stringent punishment againt the crime  The origin of a threat to the central government posted from an obscure browsing center, remained unsolved for quite a long time.  Many times, such crimes have been traced, but there are no clear cyber laws to punish and deter the criminals.
  • 17. Privacy and Anonymity The data transmission and accessibility have improved tremendously by using the computers, but the right to privacy has been threatened to a great extent. Some issues concerned with the privacy are listed hereunder: 1. Records of Evidence: Service records or criminal records and the details of people can be stored and accessed to prove the innocence or guilty. Records on psychiatric treatment by medical practitioners or hospital, or records of membership of organizations may sometime embarrass the persons in later years.
  • 18. Privacy and Anonymity 2. Hacking: There are computers enthusiasts who willfully or for un, plant virus or 'Trojan horses’ that may fill the disc space, falsify information, erase files, and even harm the hardware . They breakdown the functioning of computers and can be treated as violation of property rights.
  • 19. Privacy and Anonymity 3. Legal Response: In the Indian scene, the right to information Act 2005 14 provides the right to the citizens to secure access to information under the control of public authorities, including the departments the central government, state government, government bodies, public sector companies and public sector companies and public sector banks, to promote transparency and accountability of public authorities.
  • 20. Privacy and Anonymity 4. Right to information: Under the Act, section 2 , the right to information includes the right to (1) inspect works, documents, records,(2) take notes, extracts or certified copies of documents or records, (3) take certified samples of material , and (4) obtain information in the form of printouts, diskettes, floppies, tapes, video cassettes or in any other electronic mode.
  • 21. Privacy and Anonymity 5. Anonymity: Anonymity in the computer communication has some merits as well as demerits .While seeking medical and psychological counseling or discussion (chat) on topics, such as AIDS , abortion, gay rights, the anonymity offers protection (against revealing their identity). But frequently, anonymity is misused by some people for money laundering, drug trafficking and preying upon the vulnerable.