SlideShare a Scribd company logo
THE LSPU MISSION AND VISION
MISSION “The University shall serve a center of excellence in agriculture, fisheries, forestry, science, engineering and industrial technology, teacher education, information technology and other related fields in arts and sciences. It also serves as research and extension services centers in its fields of expertise.”
VISION “A premier university in CALABARZON, offering academic programs and related services designed to respond to the requirements of the Philippines and the global economy particularly Asian countries”
COMPUTER            ETHICS
What is a Computer Ethics: …………..Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct..
Introduction:	             A computer system consists not only of software , hardware, data/information and procedures, but also people (the users of computer system). Because computers systems are the products of human efforts, we cannot trust them anymore than we trust people. People can use computer systems for both good and bad purposes, and they may appreciate them or be suspicious of them when they use them.
…..…….But regardless of how they use them or how they feel about them, most people realize that computers have changed the way we live.
What are the consequences of the widespread presence of the computer technology??
.…..The threats to computers and communication systems…….
Introduction:              Information technology can be disabled by a number of occurrences. It may be harmed by people, procedural, and software errors; by electromechanical problems; and by “dirty data”. It may be threatened by natural hazards and by civil strife and terrorism. Criminal acts perpetrated against computers include theft of hardware, software, time and services, and information; and crimes of malice and destruction…
….Computers may be harmed by viruses. Computers can also be used as instruments of crime. Criminals may be employees, outside users, hackers, crackers, and professional criminals…
Is computer technology creating more problems than its solving??
The threats to computers and communications systems… Errors and Accidents Natural and Other Hazards Crimes Against Information Technology Crimes Using Information Technology Virus
Errors and Accidents
…….In general, errors and accidents in computer systems may be classified as People Errors, Procedural Errors, Software Errors, Electromechanical Problems, and “Dirty Data” problems….
People Errors            Recall that one part of computer system is the people who manage it or run it…
Procedural Errors           Some spectacular computer failures have occurred because someone didn’t follow procedures..
Software Errors  		We are forever hearing about “Software Glitches” or software bugs. A Software Bug is an error in a program that causes it to malfunction..
Electromechanical Problems 		 Absence of Electricity or power failure causing the system not to work ..
Dirty Data 		Is Data that is incomplete, outdated or otherwise inaccurate that causes errors in the computer  system..
Natural and Other Hazards
Natural Hazards 		  What ever is harmful to property and to people, is harmful to computers and communication system. This certainly includes natural disasters… 	………Natural Hazards can disable all the electronic systems we take for granted…
Civil Strife and Terrorism
Crimes Against Computers and Communications
Information-technology Crime can be of two types: Illegal act perpetrated against computers or telecommunications.. Use of computers or telecommunications to accomplish an illegal act..
Crimes against information technology include theft…. Theft of Hardware Theft of Software Theft of Time and Services Theft of Information Theft of Malice and Destruction
Crimes Using Computers and   Communications…… 		Computers and communications or information technology has also been used to solve crimes…. 	……..Just as a car can be used to assist  	in a crime, so can a computer or communication system..
VIRUSES
Viruses 		Viruses are a form of high-tech maliciousness. Computer Viruses are “Deviant” programs that can cause destruction to computers that contract them…
They are passed in two ways……. Via an Infected Diskette Via a Network
Some common forms of Viruses… Boot-sector Virus File Virus Worm Logic Bomb Trojan Horse Polymorphic Virus Virus Mutation Engines
Antivirus Software Scans a computer’s hard disk, diskettes, and main memory to detect viruses, and sometimes, to destroythem…..
Computer Criminals
What kind of people are perpetrating most of the Information Technology??? Employees Outside Users Hackers Crackers Professional Criminals
COMPUTER ETHICS

More Related Content

What's hot

Computer ethics
Computer ethicsComputer ethics
Computer ethics
Benjamin Sangalang
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
badak sumbu
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
SKS
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
Vehitaltinci
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
Aglaia Connect
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
thothakhail
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
muhammad-Sulaiman
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
Abdullah Khosa
 
7 computer ethics
7 computer ethics7 computer ethics
7 computer ethics
Rheigh Henley Calderon
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
Fizaril Amzari Omar
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
nurulafifa_matsaleh
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
RanaAbuHuraira
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
afolabidare
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
Kak Yong
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Kodok Ngorex
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
Al Forte
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
b5thom
 

What's hot (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
7 computer ethics
7 computer ethics7 computer ethics
7 computer ethics
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
 

Similar to COMPUTER ETHICS

Computers
ComputersComputers
Computers
Jessica Finson
 
Computer
ComputerComputer
Computer
faisalbhatti
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
theijes
 
Cyber Crime
Cyber CrimeCyber Crime
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
Tanvi Jindal
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
AMOSOGAGAH
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
Tracy Berry
 
Speech on Computers a boon or a bane.pdf
Speech on Computers a boon or a bane.pdfSpeech on Computers a boon or a bane.pdf
Speech on Computers a boon or a bane.pdf
Home
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Anna Gomez
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
meisaina
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
meisaina
 
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Audrey Britton
 
Essay About Computers
Essay About ComputersEssay About Computers
Essay About Computers
OnlinePaperWritingSe
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
Suad 00
 
Computers a boon or a bane.pdf
Computers a boon or a bane.pdfComputers a boon or a bane.pdf
Computers a boon or a bane.pdf
Home
 
Information Technology
Information TechnologyInformation Technology
Information Technology
Ulduz Sadiq
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
Aten Kecik
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
Sumama Shakir
 
Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...
ijaia
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17

Similar to COMPUTER ETHICS (20)

Computers
ComputersComputers
Computers
 
Computer
ComputerComputer
Computer
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
 
Speech on Computers a boon or a bane.pdf
Speech on Computers a boon or a bane.pdfSpeech on Computers a boon or a bane.pdf
Speech on Computers a boon or a bane.pdf
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
 
Essay About Computers
Essay About ComputersEssay About Computers
Essay About Computers
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
 
Computers a boon or a bane.pdf
Computers a boon or a bane.pdfComputers a boon or a bane.pdf
Computers a boon or a bane.pdf
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17
Beekman5 std ppt_17
 

Recently uploaded

Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Vivekanand Anglo Vedic Academy
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 

Recently uploaded (20)

Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 

COMPUTER ETHICS

  • 1.
  • 2. THE LSPU MISSION AND VISION
  • 3. MISSION “The University shall serve a center of excellence in agriculture, fisheries, forestry, science, engineering and industrial technology, teacher education, information technology and other related fields in arts and sciences. It also serves as research and extension services centers in its fields of expertise.”
  • 4. VISION “A premier university in CALABARZON, offering academic programs and related services designed to respond to the requirements of the Philippines and the global economy particularly Asian countries”
  • 5.
  • 6. COMPUTER ETHICS
  • 7. What is a Computer Ethics: …………..Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct..
  • 8. Introduction: A computer system consists not only of software , hardware, data/information and procedures, but also people (the users of computer system). Because computers systems are the products of human efforts, we cannot trust them anymore than we trust people. People can use computer systems for both good and bad purposes, and they may appreciate them or be suspicious of them when they use them.
  • 9. …..…….But regardless of how they use them or how they feel about them, most people realize that computers have changed the way we live.
  • 10.
  • 11. What are the consequences of the widespread presence of the computer technology??
  • 12. .…..The threats to computers and communication systems…….
  • 13. Introduction: Information technology can be disabled by a number of occurrences. It may be harmed by people, procedural, and software errors; by electromechanical problems; and by “dirty data”. It may be threatened by natural hazards and by civil strife and terrorism. Criminal acts perpetrated against computers include theft of hardware, software, time and services, and information; and crimes of malice and destruction…
  • 14. ….Computers may be harmed by viruses. Computers can also be used as instruments of crime. Criminals may be employees, outside users, hackers, crackers, and professional criminals…
  • 15.
  • 16. Is computer technology creating more problems than its solving??
  • 17. The threats to computers and communications systems… Errors and Accidents Natural and Other Hazards Crimes Against Information Technology Crimes Using Information Technology Virus
  • 19. …….In general, errors and accidents in computer systems may be classified as People Errors, Procedural Errors, Software Errors, Electromechanical Problems, and “Dirty Data” problems….
  • 20. People Errors Recall that one part of computer system is the people who manage it or run it…
  • 21. Procedural Errors Some spectacular computer failures have occurred because someone didn’t follow procedures..
  • 22. Software Errors We are forever hearing about “Software Glitches” or software bugs. A Software Bug is an error in a program that causes it to malfunction..
  • 23. Electromechanical Problems Absence of Electricity or power failure causing the system not to work ..
  • 24. Dirty Data Is Data that is incomplete, outdated or otherwise inaccurate that causes errors in the computer system..
  • 25. Natural and Other Hazards
  • 26. Natural Hazards What ever is harmful to property and to people, is harmful to computers and communication system. This certainly includes natural disasters… ………Natural Hazards can disable all the electronic systems we take for granted…
  • 27. Civil Strife and Terrorism
  • 28. Crimes Against Computers and Communications
  • 29. Information-technology Crime can be of two types: Illegal act perpetrated against computers or telecommunications.. Use of computers or telecommunications to accomplish an illegal act..
  • 30. Crimes against information technology include theft…. Theft of Hardware Theft of Software Theft of Time and Services Theft of Information Theft of Malice and Destruction
  • 31. Crimes Using Computers and Communications…… Computers and communications or information technology has also been used to solve crimes…. ……..Just as a car can be used to assist in a crime, so can a computer or communication system..
  • 33. Viruses Viruses are a form of high-tech maliciousness. Computer Viruses are “Deviant” programs that can cause destruction to computers that contract them…
  • 34. They are passed in two ways……. Via an Infected Diskette Via a Network
  • 35. Some common forms of Viruses… Boot-sector Virus File Virus Worm Logic Bomb Trojan Horse Polymorphic Virus Virus Mutation Engines
  • 36.
  • 37. Antivirus Software Scans a computer’s hard disk, diskettes, and main memory to detect viruses, and sometimes, to destroythem…..
  • 39. What kind of people are perpetrating most of the Information Technology??? Employees Outside Users Hackers Crackers Professional Criminals