COMPUTER ETHICS
By
M.Ramki a.k.a cR@$#
12c
Computer ethics has its roots in the work of Norbert
Wiener during World War II. Wiener’s book included
 An account of the purpose of a human life
 Four principles of justice
 A powerful method for doing applied ethics
 Discussions of the fundamental questions of computer
ethics, and
 Examples of key computer ethics topics.
 One of the highest profiled banking computer
crime occurred during a course of three years
beginning in 1970. The chief teller at the Park
Avenue branch of New York's Union Dime Savings
Bank embezzled over $1.5 million from hundreds
of accounts.
 On April 23, 2013, the Associated Press' Twitter
account was hacked to release a hoax tweet
about fictional attacks in the White House that
left President Obama injured. This erroneous
tweet resulted in a brief plunge of 130 points
from the Dow Jones Industrial Average, removal
of $136 billion from S&P 500 index, and the
temporary suspension of their Twitter account.
The Dow Jones later restored its session gains.
Ethical Standards
Various national and international professional societies
and organizations have produced code of ethics
documents to give basic behavioral guidelines to
computing professionals and users. They include:
 Association for Computing Machinery: ACM Code of
Ethics and Professional Conduct
 British Computer Society: BCS Code of Conduct & Code
of Good Practice
 Australian Computer Society: ACS Code of
Ethics and ACS Code of Professional Conduct
 IEEE: IEEE Code of Ethics
 Computer Ethics Institute: Ten Commandments of
Computer Ethics
Physical Security:
Physical security refers to the protection of hardware,
facilities, magnetic disks, and other items that could be
illegally accessed, stolen, damaged or destroyed. This
is usually provided by restricting the people who can
access the resources.
Personal Security:
Personal security refers to software setups that permit
only authorized access to the system. User Ids and
passwords are common tools for such purpose. Only
those with a need to know have Ids and password for
access.
Personnel Security:
Personnel security refers to protecting data and
computer system against dishonesty or negligence of
employees.
Computer Crime
Common crimes include:
 Crimes related to money transfer on the
internet
 Making long distance calls illegally using
computers
 Illegal access to confidential files
 Stealing hardware
 Selling or misusing personal
 Hardware and software piracy
 Virus
 Cracking
 Theft of computer time
We tend to pirate because:
 We like free things
 Why pay for something when we can get it for
free?
 Our thinking and actions are self-serving
 If we have the opportunity to get away with
something, benefit financially, and minimal
risk is involved, the way in which we’ve been
conditioned by our capitalist society to do it.
A Virus is a self-replicating program that can
cause damage to data and files stored on
your computer.
These are programs written by programmers
with great programming skills who are
motivated by the need for a challenge or to
cause destruction.
57000 known virus programs are in
existence. 6 new viruses are found each
day.
SEVEN ESSENTIAL COMPONENTS OF A
PERSONAL CODE OF COMPUTER
ETHICS:
 1. Honesty
 2. Respect
 3. Confidentiality
 4. Professionalism
 5. Responsibility
 6. Communication
 7. Obeying the law
10 Commandments
 Thou shalt not use a computer to harm other people.
 Thou shalt not interfere with other people’s computer work.
 Thou shalt not snoop around in other people’s computer files.
 Thou shalt not use a computer to steal.
 Thou shalt not use a computer to bear false witness.
 Thou shalt not copy or use proprietary software for which you
have not paid.
 Thou shalt not use other people’s computer resources without
authorization or proper compensation.
 Thou shalt not appropriate other people’s intellectual output.
 Thou shalt think about the social consequences of the
program you are writing or the system you are designing.
 Thou shalt always use a computer in ways that insure
consideration and respect for your fellow humans.
Hacker’s Ethics
The idea of a "hacker ethic" is perhaps best formulated in
Steven Levy's 1984 book, Hackers: Heroes of the
Computer Revolution. Levy came up with six tenets:
 Access to computers - and anything which might teach
you something about the way the world works - should be
unlimited and total. Always yield to the Hands-On
imperative!
 All information should be free.
 Mistrust authority - promote decentralization.
 Hackers should be judged by their hacking, not bogus
criteria such as degrees, age, race, or position.
 You can create art and beauty on a computer.
 Computers can change your life for the better.
Song of hackers
Cracking is the illegal access to the
network or computer system.
Illegal use of special resources in the
system is the key reason for cracking. The
resources may be hardware, software, files
or system information. Revenge, business
reasons and thrill are other common
reasons for committing this crime.
#1 – Protect your computer
Your computer might be in access of multiple users, thus compromising your privacy and security.
If that’s the case with you, then you must set up a separate user profile for yourself that is
password protected. While doing this, you must ensure that all the files and folders you use
must not be accessible by other users through their profiles.
#2 – Use Updated Softwares and Antivirus
Always use the most recent and updated versions of all your softwares and anti viruses. This will
eradicate the probabilities of your computer getting crashed due to outdated and virus infected
apps and softwares that will ultimately lead to data loss.
#3 – Password Protected Files
It happens quite often when a file containing crucial data is misused by some other person who
somehow gets an access to it. Some applications like adobe reader and Microsoft office apps
have a built in feature of password protection that once activated, gets locked.
#4 – Regular Backup
The most important step one should take data protection to create a back up of it. It depends on
you, how often you feel like backing up your files and folders. It may be on an hourly, daily or
weekly basis or some prefer doing it manually whenever they feel the need arises. The backed
up data protection is the copy of the original data stored in your hard disk drive.
#5 – Off-Site Backup (Online Backup)
Another important step you must take is to store a copy of your data offsite by running the
backup process using a third party application. The files and folders are stored in an off-site
location ensuring easy recovery in an event of fire, natural disaster or a cyber attack. If in such
an event, your storage devices and computer gets destroyed, you will still have the option to
recover the data from online servers. There are various online backup solutions providers
available in the market offering different features and pricing plans. You can choose any of
them as per your need. Here you can find a list of some renowned online backup services with
their features highlighted.
8472657875 85

Computer Ethics

  • 1.
  • 2.
    Computer ethics hasits roots in the work of Norbert Wiener during World War II. Wiener’s book included  An account of the purpose of a human life  Four principles of justice  A powerful method for doing applied ethics  Discussions of the fundamental questions of computer ethics, and  Examples of key computer ethics topics.
  • 5.
     One ofthe highest profiled banking computer crime occurred during a course of three years beginning in 1970. The chief teller at the Park Avenue branch of New York's Union Dime Savings Bank embezzled over $1.5 million from hundreds of accounts.  On April 23, 2013, the Associated Press' Twitter account was hacked to release a hoax tweet about fictional attacks in the White House that left President Obama injured. This erroneous tweet resulted in a brief plunge of 130 points from the Dow Jones Industrial Average, removal of $136 billion from S&P 500 index, and the temporary suspension of their Twitter account. The Dow Jones later restored its session gains.
  • 6.
    Ethical Standards Various nationaland international professional societies and organizations have produced code of ethics documents to give basic behavioral guidelines to computing professionals and users. They include:  Association for Computing Machinery: ACM Code of Ethics and Professional Conduct  British Computer Society: BCS Code of Conduct & Code of Good Practice  Australian Computer Society: ACS Code of Ethics and ACS Code of Professional Conduct  IEEE: IEEE Code of Ethics  Computer Ethics Institute: Ten Commandments of Computer Ethics
  • 12.
    Physical Security: Physical securityrefers to the protection of hardware, facilities, magnetic disks, and other items that could be illegally accessed, stolen, damaged or destroyed. This is usually provided by restricting the people who can access the resources. Personal Security: Personal security refers to software setups that permit only authorized access to the system. User Ids and passwords are common tools for such purpose. Only those with a need to know have Ids and password for access. Personnel Security: Personnel security refers to protecting data and computer system against dishonesty or negligence of employees.
  • 16.
    Computer Crime Common crimesinclude:  Crimes related to money transfer on the internet  Making long distance calls illegally using computers  Illegal access to confidential files  Stealing hardware  Selling or misusing personal  Hardware and software piracy  Virus  Cracking  Theft of computer time
  • 27.
    We tend topirate because:  We like free things  Why pay for something when we can get it for free?  Our thinking and actions are self-serving  If we have the opportunity to get away with something, benefit financially, and minimal risk is involved, the way in which we’ve been conditioned by our capitalist society to do it.
  • 28.
    A Virus isa self-replicating program that can cause damage to data and files stored on your computer. These are programs written by programmers with great programming skills who are motivated by the need for a challenge or to cause destruction. 57000 known virus programs are in existence. 6 new viruses are found each day.
  • 30.
    SEVEN ESSENTIAL COMPONENTSOF A PERSONAL CODE OF COMPUTER ETHICS:  1. Honesty  2. Respect  3. Confidentiality  4. Professionalism  5. Responsibility  6. Communication  7. Obeying the law
  • 31.
    10 Commandments  Thoushalt not use a computer to harm other people.  Thou shalt not interfere with other people’s computer work.  Thou shalt not snoop around in other people’s computer files.  Thou shalt not use a computer to steal.  Thou shalt not use a computer to bear false witness.  Thou shalt not copy or use proprietary software for which you have not paid.  Thou shalt not use other people’s computer resources without authorization or proper compensation.  Thou shalt not appropriate other people’s intellectual output.  Thou shalt think about the social consequences of the program you are writing or the system you are designing.  Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans.
  • 32.
    Hacker’s Ethics The ideaof a "hacker ethic" is perhaps best formulated in Steven Levy's 1984 book, Hackers: Heroes of the Computer Revolution. Levy came up with six tenets:  Access to computers - and anything which might teach you something about the way the world works - should be unlimited and total. Always yield to the Hands-On imperative!  All information should be free.  Mistrust authority - promote decentralization.  Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.  You can create art and beauty on a computer.  Computers can change your life for the better.
  • 34.
  • 35.
    Cracking is theillegal access to the network or computer system. Illegal use of special resources in the system is the key reason for cracking. The resources may be hardware, software, files or system information. Revenge, business reasons and thrill are other common reasons for committing this crime.
  • 36.
    #1 – Protectyour computer Your computer might be in access of multiple users, thus compromising your privacy and security. If that’s the case with you, then you must set up a separate user profile for yourself that is password protected. While doing this, you must ensure that all the files and folders you use must not be accessible by other users through their profiles. #2 – Use Updated Softwares and Antivirus Always use the most recent and updated versions of all your softwares and anti viruses. This will eradicate the probabilities of your computer getting crashed due to outdated and virus infected apps and softwares that will ultimately lead to data loss. #3 – Password Protected Files It happens quite often when a file containing crucial data is misused by some other person who somehow gets an access to it. Some applications like adobe reader and Microsoft office apps have a built in feature of password protection that once activated, gets locked. #4 – Regular Backup The most important step one should take data protection to create a back up of it. It depends on you, how often you feel like backing up your files and folders. It may be on an hourly, daily or weekly basis or some prefer doing it manually whenever they feel the need arises. The backed up data protection is the copy of the original data stored in your hard disk drive. #5 – Off-Site Backup (Online Backup) Another important step you must take is to store a copy of your data offsite by running the backup process using a third party application. The files and folders are stored in an off-site location ensuring easy recovery in an event of fire, natural disaster or a cyber attack. If in such an event, your storage devices and computer gets destroyed, you will still have the option to recover the data from online servers. There are various online backup solutions providers available in the market offering different features and pricing plans. You can choose any of them as per your need. Here you can find a list of some renowned online backup services with their features highlighted.
  • 37.