SlideShare a Scribd company logo
1 of 12
HOLIDAY HOMEWORK
COMPUTE
R
COMPUTER ETHICS
Computer ethics is a part of practical philosophy concerned with how
computing professionals should make decisions regarding professional and
social conduct
History
 The concept of computer ethics originated in the 1940s with MIT
professor Norbert Wiener. While working on anti-aircraft artillery during World
War II, Wiener and his fellow engineers developed a system of communication
between the part of a cannon that tracked a warplane, the part that
performed calculations to estimate a trajectory, and the part responsible for
firing.
 Wiener termed the science of such information feedback systems
"cybernetics," and he discussed this new field with its related ethical concerns
in his 1948 book, Cybernetics
SOFTWARE ETHICS
Software makes a computer usable.without software, a computer remains just fine machinery.
Therefore,while using software, it becomes moral responsibility of users to ensure that their usage of
softwareis ethical or not.
Unliker other commodities, purchasing does not give you ownership rights for software; rather it gives
usage rights only, to the purchaser. They may not understand the implications of their actions or the
restrictions of copyright acts.
Foundation
 To understand the foundation of computer ethics, it is
important to look into the different schools of ethical theory.
 Each school of ethics influences a situation in a certain
direction and pushes the final outcome of ethical
theory Relativism is the belief that there are no universal
moral norms of right and wrong. In the school of relativistic
ethical belief, ethicists divide it into three connected but
different structures, subject (Moral) and culture
(Anthropological)
Internet privacy
 Privacy is one of the major issues that has emerged since the internet has
become part of many aspects of daily life. Internet users hand over personal
information in order to sign up or register for services without realizing that
they are potentially setting themselves up for invasions of privacy.
 Another example of privacy issues, with concern to Google, is tracking
searches. There is a feature within searching that allows Google to keep track
of searches so that advertisements will match your search criteria, which in
turn means using people as products. If you are not paying for a service
online, instead of being the consumer, you may very well be the product.
Identifying issues
 Identifying ethical issues as they arise, as well as defining how to deal with
them, has traditionally been problematic. In solving problems relating to
ethical issues, Michael Davis proposed a unique problem-solving method.
 In Davis's model, the ethical problem is stated, facts are checked, and a list
of options is generated by considering relevant factors relating to the
problem. The actual action taken is influenced by specific ethical standards
Individual’s Right to Privacy
1. Collecting information
2. Storing information
3. Distributing information
Margaret Anne Pierce, a professor in the Department of
Mathematics and Computers at Georgia Southern
University has categorized the ethical decisions related
to computer technology and usage into three primary
influences:
 The individual's own personal code.
 Any informal code of ethical conduct that exists in the work place.
 Exposure to formal codes of ethics.
Various national and international professional societies
and organizations have produced code of ethics
documents to give basic behavioral guidelines to
computing professionals and users. They include:
•Association for Computing
Machinery
•ACM Code of Ethics and Professional
Conduct
Computer Ethics Topics

More Related Content

What's hot

Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemFaHaD .H. NooR
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the WorkplaceTawny Brown
 
A short introduction to multimedia forensics the science discovering the hist...
A short introduction to multimedia forensics the science discovering the hist...A short introduction to multimedia forensics the science discovering the hist...
A short introduction to multimedia forensics the science discovering the hist...Sebastiano Battiato
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2manpreet04
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethicsKriscila Yumul
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...Tonmoy zahid Rishad
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technologyWish Mrt'xa
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical IssuesMISY
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 

What's hot (20)

Review questions
Review questionsReview questions
Review questions
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the Workplace
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
A short introduction to multimedia forensics the science discovering the hist...
A short introduction to multimedia forensics the science discovering the hist...A short introduction to multimedia forensics the science discovering the hist...
A short introduction to multimedia forensics the science discovering the hist...
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
Ethical and social issues in management information systems for BBA hons pro...
Ethical and social issues in management information systems  for BBA hons pro...Ethical and social issues in management information systems  for BBA hons pro...
Ethical and social issues in management information systems for BBA hons pro...
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
 
Mis ethical social
Mis ethical socialMis ethical social
Mis ethical social
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
 

Similar to Computer Ethics Topics

INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSISINVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSISijseajournal
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
Ethics of Computing in Pharmaceutical Research
Ethics of Computing in Pharmaceutical ResearchEthics of Computing in Pharmaceutical Research
Ethics of Computing in Pharmaceutical ResearchAshwani Dhingra
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsScøtt Lıgøckı
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.pptpixvilx
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
 
Ethics of computing in pharmaceutical research
Ethics of computing in pharmaceutical researchEthics of computing in pharmaceutical research
Ethics of computing in pharmaceutical researchsuresh gautam
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxjohniemcm5zt
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
For this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docxFor this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docxshanaeacklam
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxpatricke8
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxmccormicknadine86
 
Computer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyComputer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyLinaCovington707
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?IJCNCJournal
 
Ethics of computing in pharmaceutical research
Ethics of computing in pharmaceutical researchEthics of computing in pharmaceutical research
Ethics of computing in pharmaceutical researchDRx Amit Chaudhari
 

Similar to Computer Ethics Topics (20)

a.pptx
a.pptxa.pptx
a.pptx
 
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSISINVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Ethics of Computing in Pharmaceutical Research
Ethics of Computing in Pharmaceutical ResearchEthics of Computing in Pharmaceutical Research
Ethics of Computing in Pharmaceutical Research
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Ethics of computing in pharmaceutical research
Ethics of computing in pharmaceutical researchEthics of computing in pharmaceutical research
Ethics of computing in pharmaceutical research
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
For this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docxFor this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docx
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
 
Computer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyComputer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information Technology
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
 
Ethics of computing in pharmaceutical research
Ethics of computing in pharmaceutical researchEthics of computing in pharmaceutical research
Ethics of computing in pharmaceutical research
 
Ethics in IT
Ethics in ITEthics in IT
Ethics in IT
 

Recently uploaded

April 2024 - VBOUT Partners Meeting Group
April 2024 - VBOUT Partners Meeting GroupApril 2024 - VBOUT Partners Meeting Group
April 2024 - VBOUT Partners Meeting GroupVbout.com
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...aditipandeya
 
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Onlineanilsa9823
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxarsathsahil
 
9654467111 Call Girls In Mahipalpur Women Seeking Men
9654467111 Call Girls In Mahipalpur Women Seeking Men9654467111 Call Girls In Mahipalpur Women Seeking Men
9654467111 Call Girls In Mahipalpur Women Seeking MenSapana Sha
 
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Search Engine Journal
 
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdfTOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdfasiyahanif9977
 
The Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship DeckThe Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship DeckToluwanimi Balogun
 
SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?Searchable Design
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessAggregage
 
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Richard Ingilby
 
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDemandbase
 
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDigital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDemandbase
 
Forecast of Content Marketing through AI
Forecast of Content Marketing through AIForecast of Content Marketing through AI
Forecast of Content Marketing through AIRinky
 
Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx216310017
 

Recently uploaded (20)

The Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison KaltmanThe Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison Kaltman
 
April 2024 - VBOUT Partners Meeting Group
April 2024 - VBOUT Partners Meeting GroupApril 2024 - VBOUT Partners Meeting Group
April 2024 - VBOUT Partners Meeting Group
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
 
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptx
 
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan ScheltgenHow to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
 
9654467111 Call Girls In Mahipalpur Women Seeking Men
9654467111 Call Girls In Mahipalpur Women Seeking Men9654467111 Call Girls In Mahipalpur Women Seeking Men
9654467111 Call Girls In Mahipalpur Women Seeking Men
 
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
 
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdfTOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
 
Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...
Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...
Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...
 
The Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship DeckThe Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship Deck
 
SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail Success
 
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
 
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel LeminTurn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
 
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
 
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDigital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
 
Forecast of Content Marketing through AI
Forecast of Content Marketing through AIForecast of Content Marketing through AI
Forecast of Content Marketing through AI
 
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose GuirgisCreator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
 
Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx
 

Computer Ethics Topics

  • 3. COMPUTER ETHICS Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct
  • 4. History  The concept of computer ethics originated in the 1940s with MIT professor Norbert Wiener. While working on anti-aircraft artillery during World War II, Wiener and his fellow engineers developed a system of communication between the part of a cannon that tracked a warplane, the part that performed calculations to estimate a trajectory, and the part responsible for firing.  Wiener termed the science of such information feedback systems "cybernetics," and he discussed this new field with its related ethical concerns in his 1948 book, Cybernetics
  • 5. SOFTWARE ETHICS Software makes a computer usable.without software, a computer remains just fine machinery. Therefore,while using software, it becomes moral responsibility of users to ensure that their usage of softwareis ethical or not. Unliker other commodities, purchasing does not give you ownership rights for software; rather it gives usage rights only, to the purchaser. They may not understand the implications of their actions or the restrictions of copyright acts.
  • 6. Foundation  To understand the foundation of computer ethics, it is important to look into the different schools of ethical theory.  Each school of ethics influences a situation in a certain direction and pushes the final outcome of ethical theory Relativism is the belief that there are no universal moral norms of right and wrong. In the school of relativistic ethical belief, ethicists divide it into three connected but different structures, subject (Moral) and culture (Anthropological)
  • 7. Internet privacy  Privacy is one of the major issues that has emerged since the internet has become part of many aspects of daily life. Internet users hand over personal information in order to sign up or register for services without realizing that they are potentially setting themselves up for invasions of privacy.  Another example of privacy issues, with concern to Google, is tracking searches. There is a feature within searching that allows Google to keep track of searches so that advertisements will match your search criteria, which in turn means using people as products. If you are not paying for a service online, instead of being the consumer, you may very well be the product.
  • 8. Identifying issues  Identifying ethical issues as they arise, as well as defining how to deal with them, has traditionally been problematic. In solving problems relating to ethical issues, Michael Davis proposed a unique problem-solving method.  In Davis's model, the ethical problem is stated, facts are checked, and a list of options is generated by considering relevant factors relating to the problem. The actual action taken is influenced by specific ethical standards
  • 9. Individual’s Right to Privacy 1. Collecting information 2. Storing information 3. Distributing information
  • 10. Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into three primary influences:  The individual's own personal code.  Any informal code of ethical conduct that exists in the work place.  Exposure to formal codes of ethics.
  • 11. Various national and international professional societies and organizations have produced code of ethics documents to give basic behavioral guidelines to computing professionals and users. They include: •Association for Computing Machinery •ACM Code of Ethics and Professional Conduct