SlideShare a Scribd company logo
Doing the Right Thing 
Computer Ethics
Plagiarism 
• Downloading somebody else’s works as if it were your 
own. 
• Plagiarism is a serious offense. The more famous you get, 
the more you’re at risk. 
• In college writing, it’s fine to make use of someone else’s 
effort as long as you use your own words and give credit. 
• Plagiarizing copyrighted materials is called copyright 
infringement
Privacy & Encryption 
• Privacy – refers to an individual’s ability to restrict or 
eliminate the collection, use, and sale of confidential 
personal information. 
• Encryption – refers to a coding or scrambling process by 
which a message is rendered unreadable by anyone except 
the intended recipient. Coded Message
Cipher text 
• Refers to a coded message 
Decode the message below 
V YBIR LBH 
ORYC BRX WRR 
A B C D E F J H I J K L M N O P Q R S T U V W X Y Z
Global Unique Identifiers (GUID) 
• A unique identification number that is generated by a computer 
hardware component or a program.
Privacy at Work. (Things to Remember) 
• Except in the case of an emergency, never use your employer’s 
telephone system for professional calls. Make all such calls from a 
pay telephone. 
• Never use the e-mail account your employer gives you for 
professional purposes. Get your own account with an Internet 
Service Provider (ISP), and be sure to send and receive all personal 
mail from your home computer. 
• Assume that everything you do while you’re at work – whether it’s 
talking on the phone, using your computer, taking a break, or 
chatting with co-workers is being monitored and recorded.
Protecting your Privacy Online 
To safeguard your privacy on the internet do the following: 
• Browse anonymously by surfing from sites such as “The Anonymizer” or “The-cloak” 
• Disable cookies on your Web browser or use cookie management software, such 
as Junkbuster. 
• Use a “throw-away” e-mail address on a free Web-based service such as 
Hotmail. 
• Tell children not to divulge any personal information to strangers online without 
first asking permision. 
• Don’t fill out site registration form unless you see a privacy policy statement 
indicating that the information you supply will not be sold to third parties.
Computer Crime: Tools and Techniques 
• Password guessing 
• Shoulder surfing 
• Packet sniffers 
• Dumpster diving 
• Social Engineering 
• Superuser status
SALAMI SHAVING AND DATA 
• Salami Shaving – a programmer alters a program so 
that it subtracts a very small amount of money from 
each account. 
• Data Diddling- insiders modify data so that it’s difficult 
or impossible to tell that they’ve stolen fund or 
equipment.
COMPUTER VIRUSES 
• Computer Virus - a computer program that can copy itself and 
infect a computer without permission or knowledge of the 
user. 
• File infectors – attached themselves to a program file. 
• Boot sector virus – propagates by means of in infected program, but 
it installs itself at the beginning of a hard drive. 
• Macro Virus – Take advantage of the automatic command 
execution capabilities 
• Executable File- program that can run on a given computer 
Platform. 
• E-mail Attachment-a computer file that is included with an e-mail 
message. 
Plain Text – safe file
MORE ROGUE PROGRAMS 
• Time bombs- also called logic bombs, are designed to sit harmlessly 
on a system until a certain event or set of circumstance causes the 
program to become active. 
• Worm – resembles a computer virus in that it can spread from one 
computer to another. Can propagate over a computer network. 
• Trojan Horse – is disguised as a useful program, but it contains hidden 
instructions to perform a malicious task instead. Sometimes a trojan 
horse is disguised as a game or a utility program that users will find 
appealing.
ATTACKERS 
• Hackers – computer hobbyist who enjoy pushing computer system to 
their limits 
• Crackers – obsessed with gaining entry to highly secure computer 
systems 
• Cyber Gang – bring crackers together by means of the internet and 
physical meetings. 
• Computer virus Author - Makers of Computer Viruses 
• Disgruntled Employees – Kick out employees 
• Fraud Artist - Swindlers & Shills
Cyberstalkers & Sexual Predators 
• Cyberstalking – define as the use of the internet e-mail, and other 
electronic communication media to harass or threaten a person 
repeatedly. 
• Cybersex - a virtual sex encounter in which two or more persons 
connected remotely via a computer network send one another sexually 
explicit messages describing a sexual experience. It is a form of role-playing 
in which the participants pretend they are having actual sexual 
relations
INFORMATION WARFARE 
• IW – the use of information technologies to corrupt or destroy 
an enemy’s information and industrial infrastructure. 
• Electronic Warfare – The use of electronic device to destroy 
or damage computer system. 
• Network Warfare – hacker-like attacks on the nation’s 
network infrastructure, including the electronic banking 
system. 
• Structural Sabotage – Attacks on information systems that 
support transportation, finance, energy and 
telecommunication.
Spotlight Ethics 
• Plagiarism – The presentation of Somebody else’s work as if 
it were your own. 
• At some colleges, plagiarism can get you thrown out of school on 
the first offense. 
• Copyright Infringement – Plagiarizing copyrighted material.
Ten Commandments for Computer Ethics 
1. Thou shalt not use computer to harm other people. 
2. Thou shalt not interfere with other people’s computer work. 
3. Thou shalt not snoop around in other people’s files. 
4. Thou shalt not use a computer to steal. 
5. Thou shalt not use a computer to bear false witness. 
6. Thou shalt not copy or use propriety software for which you have not paid. 
7. Thou shalt not use other people’s computer resources without authorization or proper 
compensation. 
8. Thou shalt not appropriate other people’s intellectual output. 
9. Thou shalt think about the social consequences of the program you write or the 
system you design. 
10. Thou shalt use a computer in ways that show consideration and respect for your 
fellow Humans.
Summary 
• Respecting yourself 
• Respecting Others 
• Respecting Academic Integrity

More Related Content

What's hot

Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
Dyuti Islam
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
RJ Khan
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
muhammad-Sulaiman
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
Vehitaltinci
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
RitikaSharma238
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
sohaildanish
 
computer ethics
computer ethicscomputer ethics
computer ethics
Honey jose
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
Maria Stella Solon
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Ramki M
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
Middle East International School
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
SKS
 
Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1
Junaid Qadir
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rights
Hamza Cheema
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
shahmansoor109
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
Abacheng Ghadafi
 

What's hot (20)

Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rights
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 

Similar to Computer ethics

Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
Ankit Malviya
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
tushki92
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
Cyber security
Cyber securityCyber security
Cyber security
SaurabhKaushik57
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Animesh Shaw
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Niraj Solanke
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
Roshan Kumar Bhattarai
 
Computer Security
Computer SecurityComputer Security
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
Kaushal Solanki
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
PrajktaGN
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
Dibyesh1
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 

Similar to Computer ethics (20)

Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 

Recently uploaded

678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 

Computer ethics

  • 1. Doing the Right Thing Computer Ethics
  • 2.
  • 3. Plagiarism • Downloading somebody else’s works as if it were your own. • Plagiarism is a serious offense. The more famous you get, the more you’re at risk. • In college writing, it’s fine to make use of someone else’s effort as long as you use your own words and give credit. • Plagiarizing copyrighted materials is called copyright infringement
  • 4. Privacy & Encryption • Privacy – refers to an individual’s ability to restrict or eliminate the collection, use, and sale of confidential personal information. • Encryption – refers to a coding or scrambling process by which a message is rendered unreadable by anyone except the intended recipient. Coded Message
  • 5. Cipher text • Refers to a coded message Decode the message below V YBIR LBH ORYC BRX WRR A B C D E F J H I J K L M N O P Q R S T U V W X Y Z
  • 6. Global Unique Identifiers (GUID) • A unique identification number that is generated by a computer hardware component or a program.
  • 7. Privacy at Work. (Things to Remember) • Except in the case of an emergency, never use your employer’s telephone system for professional calls. Make all such calls from a pay telephone. • Never use the e-mail account your employer gives you for professional purposes. Get your own account with an Internet Service Provider (ISP), and be sure to send and receive all personal mail from your home computer. • Assume that everything you do while you’re at work – whether it’s talking on the phone, using your computer, taking a break, or chatting with co-workers is being monitored and recorded.
  • 8. Protecting your Privacy Online To safeguard your privacy on the internet do the following: • Browse anonymously by surfing from sites such as “The Anonymizer” or “The-cloak” • Disable cookies on your Web browser or use cookie management software, such as Junkbuster. • Use a “throw-away” e-mail address on a free Web-based service such as Hotmail. • Tell children not to divulge any personal information to strangers online without first asking permision. • Don’t fill out site registration form unless you see a privacy policy statement indicating that the information you supply will not be sold to third parties.
  • 9. Computer Crime: Tools and Techniques • Password guessing • Shoulder surfing • Packet sniffers • Dumpster diving • Social Engineering • Superuser status
  • 10. SALAMI SHAVING AND DATA • Salami Shaving – a programmer alters a program so that it subtracts a very small amount of money from each account. • Data Diddling- insiders modify data so that it’s difficult or impossible to tell that they’ve stolen fund or equipment.
  • 11. COMPUTER VIRUSES • Computer Virus - a computer program that can copy itself and infect a computer without permission or knowledge of the user. • File infectors – attached themselves to a program file. • Boot sector virus – propagates by means of in infected program, but it installs itself at the beginning of a hard drive. • Macro Virus – Take advantage of the automatic command execution capabilities • Executable File- program that can run on a given computer Platform. • E-mail Attachment-a computer file that is included with an e-mail message. Plain Text – safe file
  • 12. MORE ROGUE PROGRAMS • Time bombs- also called logic bombs, are designed to sit harmlessly on a system until a certain event or set of circumstance causes the program to become active. • Worm – resembles a computer virus in that it can spread from one computer to another. Can propagate over a computer network. • Trojan Horse – is disguised as a useful program, but it contains hidden instructions to perform a malicious task instead. Sometimes a trojan horse is disguised as a game or a utility program that users will find appealing.
  • 13. ATTACKERS • Hackers – computer hobbyist who enjoy pushing computer system to their limits • Crackers – obsessed with gaining entry to highly secure computer systems • Cyber Gang – bring crackers together by means of the internet and physical meetings. • Computer virus Author - Makers of Computer Viruses • Disgruntled Employees – Kick out employees • Fraud Artist - Swindlers & Shills
  • 14. Cyberstalkers & Sexual Predators • Cyberstalking – define as the use of the internet e-mail, and other electronic communication media to harass or threaten a person repeatedly. • Cybersex - a virtual sex encounter in which two or more persons connected remotely via a computer network send one another sexually explicit messages describing a sexual experience. It is a form of role-playing in which the participants pretend they are having actual sexual relations
  • 15. INFORMATION WARFARE • IW – the use of information technologies to corrupt or destroy an enemy’s information and industrial infrastructure. • Electronic Warfare – The use of electronic device to destroy or damage computer system. • Network Warfare – hacker-like attacks on the nation’s network infrastructure, including the electronic banking system. • Structural Sabotage – Attacks on information systems that support transportation, finance, energy and telecommunication.
  • 16. Spotlight Ethics • Plagiarism – The presentation of Somebody else’s work as if it were your own. • At some colleges, plagiarism can get you thrown out of school on the first offense. • Copyright Infringement – Plagiarizing copyrighted material.
  • 17. Ten Commandments for Computer Ethics 1. Thou shalt not use computer to harm other people. 2. Thou shalt not interfere with other people’s computer work. 3. Thou shalt not snoop around in other people’s files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use propriety software for which you have not paid. 7. Thou shalt not use other people’s computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people’s intellectual output. 9. Thou shalt think about the social consequences of the program you write or the system you design. 10. Thou shalt use a computer in ways that show consideration and respect for your fellow Humans.
  • 18. Summary • Respecting yourself • Respecting Others • Respecting Academic Integrity