SlideShare a Scribd company logo
Computer Ethics: Some Case Study
Dr. Varun Kumar
Dr. Varun Kumar (IIIT Surat) Lecture-3 1 / 8
Outlines
1 Computer Ethics: Case Study
Should I Copy Software ?
Should a Company Data Mine ?
Freedom of Expression
Professional Responsibility
Dr. Varun Kumar (IIIT Surat) Lecture-3 2 / 8
Computer Ethics: Scenario
A Should I copy software ?
⇒ Ramesh invests a small amounts on the stock market.
⇒ Last year he bought and successfully employed a software package to
help him with his investments.
⇒ Recently, he met Suresh who was also interested in using the software.
⇒ Suresh borrowed the package, copied it and then returns it. Both
vaguely knew that the software was proprietary but did not read up
the details.
Q Did Ramesh and Suresh do anything wrong, if so what?
Ans Something to consider:
Should software package be lent?
When is it justifiable to break the law? Bad law, inappropriate law or if
the law is easy to break?
Dr. Varun Kumar (IIIT Surat) Lecture-3 3 / 8
B Should a company data mine ?
⇒ Data mining is a process of exploration and analysis of large
quantities of data, by automatic or semi-automatic means.
⇒ This is done in order to discover meaningful patterns and rules.
⇒ In many cases, the data was not collected primarily for the purpose of
Data Mining.
Case study:
⇒ Mr. Vijay sells hardware and software to over 100 000 customers per
year.
⇒ He has 10 years experience.
⇒ As part of the billing process he keeps information on customers.
⇒ He buys and uses a data mining tool to derive useful information
about her clients information such as zip codes, credit card numbers,
ID numbers etc.
Dr. Varun Kumar (IIIT Surat) Lecture-3 4 / 8
Continued-
⇒ Most of this information identifies groups and not individuals.
⇒ He can then use the information to market his wares more efficiently.
Q Is this ethical since customers did not give her the information
for this purpose?
Something to consider:
Should customer be notified?
Is there a need for establishment of a policy?
What should this policy looks like?
Professional responsibility (professional Ethics):
Do professionals have a responsibility to ensure computing serves
humanity well?
Dr. Varun Kumar (IIIT Surat) Lecture-3 5 / 8
C Freedom of expression
⇒ In the US, a student JB posted sex fantasies on the Internet called
Pamela’s ordeal.
⇒ The story was fictional, but JB named the main character, Pamela ,
after a REAL student.
⇒ In it, he described the rape, torture and murder of Pamela.
⇒ He also exchanged e-mails with other people in the newsgroups,
discussing sex acts.
⇒ An alumnus saw this and reported it to the University.
⇒ JB was then arrested and held in custody.
⇒ He was charged with transmitting interstate communication of threat
to injure another person.
⇒ The charges were eventually dropped, but did JB really do anything
wrong?
Dr. Varun Kumar (IIIT Surat) Lecture-3 6 / 8
D Professional responsibility
Something to consider:
Should self-censorship be enforced.
Who decides what is acceptable?
Is there a need for a public policy?
Professional responsibility
⇒ Mike works for a Software development company which develops
computer games for children aged 8-14.
⇒ The latest game that Mike worked on, uses inferential reasoning and
allows players to choose different characters, primarily macho man
and sexy woman.
⇒ The game is used mainly by boys.
⇒ Recently Mike attended a conference on gender and minorities, where
he described the above.
Dr. Varun Kumar (IIIT Surat) Lecture-3 7 / 8
Continued–
⇒ The conference delegates discussed the issue of lower participation of
women in computing and how to make the industry more attractive
to women.
⇒ Back at work, Mike realised that his production team is all male.
Should he refuse to work on this team?
⇒ Should he ask for the team to be reviewed?
⇒ Will the game sell as well if different message was given?
⇒ What is his responsibility?
Something to consider:
Should software package be lent?
When is it justifiable to break the law? Bad law, inappropriate law or
if the law is easy to break?
Dr. Varun Kumar (IIIT Surat) Lecture-3 8 / 8

More Related Content

What's hot

Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
Zaheer Irshad
 
Email security
Email securityEmail security
Email security
Baliram Yadav
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
Hamza Cheema
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And DecryptionNA
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
Roman Oliynykov
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
Dr Raghu Khimani
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
Dr Naim R Kidwai
 
Software security
Software securitySoftware security
Software security
Roman Oliynykov
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
Bhagya Bgk
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
9905234521
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
Muhammad Haroon
 

What's hot (20)

Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Email security
Email securityEmail security
Email security
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Network security
Network securityNetwork security
Network security
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Network security
Network securityNetwork security
Network security
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Software security
Software securitySoftware security
Software security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
 

Similar to Computer Ethics: Some Case Study

Understanding the computer and privacy issues
Understanding the computer and privacy issuesUnderstanding the computer and privacy issues
Understanding the computer and privacy issues
VARUN KUMAR
 
Informative Essay Examples 5Th Grade - Google Search
Informative Essay Examples 5Th Grade - Google SearchInformative Essay Examples 5Th Grade - Google Search
Informative Essay Examples 5Th Grade - Google Search
Angie Willis
 
Case Study on Computer Privacy
Case Study on Computer PrivacyCase Study on Computer Privacy
Case Study on Computer Privacy
VARUN KUMAR
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship
VARUN KUMAR
 
New Possibility in Computing
New Possibility in ComputingNew Possibility in Computing
New Possibility in Computing
VARUN KUMAR
 
Importance Of Sports Essay In English Write An Essa
Importance Of Sports Essay In English Write An EssaImportance Of Sports Essay In English Write An Essa
Importance Of Sports Essay In English Write An Essa
Sharon Price
 
Gingerbread Writing Paper
Gingerbread Writing PaperGingerbread Writing Paper
Gingerbread Writing Paper
Alyssa Schulte
 
Energy Crisis In Pakistan Essay Free. Online assignment writing service.
Energy Crisis In Pakistan Essay Free. Online assignment writing service.Energy Crisis In Pakistan Essay Free. Online assignment writing service.
Energy Crisis In Pakistan Essay Free. Online assignment writing service.
Lisa Long
 
Persuasive Essay On Benefits Of Video Games
Persuasive Essay On Benefits Of Video GamesPersuasive Essay On Benefits Of Video Games
Persuasive Essay On Benefits Of Video Games
Samantha Hall
 
Ap Biology Essay Questions Rubrics
Ap Biology Essay Questions RubricsAp Biology Essay Questions Rubrics
Ap Biology Essay Questions Rubrics
Melissa Bailey
 
Software as a Property
Software as a PropertySoftware as a Property
Software as a Property
VARUN KUMAR
 
How To Write Scholarship Essay Pd
How To Write Scholarship Essay PdHow To Write Scholarship Essay Pd
How To Write Scholarship Essay Pd
Shannon Sand
 
How Do You Begin A College Application Essay
How Do You Begin A College Application EssayHow Do You Begin A College Application Essay
How Do You Begin A College Application Essay
Amanda Cote
 
How To Write A Research Paper Example-Follow Fou
How To Write A Research Paper Example-Follow FouHow To Write A Research Paper Example-Follow Fou
How To Write A Research Paper Example-Follow Fou
Carla Potier
 
How To Write A Biography Essay
How To Write A Biography EssayHow To Write A Biography Essay
How To Write A Biography Essay
Jennifer Gutierrez
 
Commercial Law Essay Help. Commercial Law Essay Help
Commercial Law Essay Help. Commercial Law Essay HelpCommercial Law Essay Help. Commercial Law Essay Help
Commercial Law Essay Help. Commercial Law Essay Help
Sandra Acirbal
 
The Help Movie Poster By RedShamrock, Via Flickr
The Help Movie Poster By RedShamrock, Via FlickrThe Help Movie Poster By RedShamrock, Via Flickr
The Help Movie Poster By RedShamrock, Via Flickr
Kim Cook
 

Similar to Computer Ethics: Some Case Study (20)

Understanding the computer and privacy issues
Understanding the computer and privacy issuesUnderstanding the computer and privacy issues
Understanding the computer and privacy issues
 
Informative Essay Examples 5Th Grade - Google Search
Informative Essay Examples 5Th Grade - Google SearchInformative Essay Examples 5Th Grade - Google Search
Informative Essay Examples 5Th Grade - Google Search
 
Case Study on Computer Privacy
Case Study on Computer PrivacyCase Study on Computer Privacy
Case Study on Computer Privacy
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship
 
New Possibility in Computing
New Possibility in ComputingNew Possibility in Computing
New Possibility in Computing
 
Importance Of Sports Essay In English Write An Essa
Importance Of Sports Essay In English Write An EssaImportance Of Sports Essay In English Write An Essa
Importance Of Sports Essay In English Write An Essa
 
Gingerbread Writing Paper
Gingerbread Writing PaperGingerbread Writing Paper
Gingerbread Writing Paper
 
Energy Crisis In Pakistan Essay Free. Online assignment writing service.
Energy Crisis In Pakistan Essay Free. Online assignment writing service.Energy Crisis In Pakistan Essay Free. Online assignment writing service.
Energy Crisis In Pakistan Essay Free. Online assignment writing service.
 
Persuasive Essay On Benefits Of Video Games
Persuasive Essay On Benefits Of Video GamesPersuasive Essay On Benefits Of Video Games
Persuasive Essay On Benefits Of Video Games
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Ap Biology Essay Questions Rubrics
Ap Biology Essay Questions RubricsAp Biology Essay Questions Rubrics
Ap Biology Essay Questions Rubrics
 
Software as a Property
Software as a PropertySoftware as a Property
Software as a Property
 
How To Write Scholarship Essay Pd
How To Write Scholarship Essay PdHow To Write Scholarship Essay Pd
How To Write Scholarship Essay Pd
 
How Do You Begin A College Application Essay
How Do You Begin A College Application EssayHow Do You Begin A College Application Essay
How Do You Begin A College Application Essay
 
How To Write A Research Paper Example-Follow Fou
How To Write A Research Paper Example-Follow FouHow To Write A Research Paper Example-Follow Fou
How To Write A Research Paper Example-Follow Fou
 
How To Write A Biography Essay
How To Write A Biography EssayHow To Write A Biography Essay
How To Write A Biography Essay
 
Commercial Law Essay Help. Commercial Law Essay Help
Commercial Law Essay Help. Commercial Law Essay HelpCommercial Law Essay Help. Commercial Law Essay Help
Commercial Law Essay Help. Commercial Law Essay Help
 
The Help Movie Poster By RedShamrock, Via Flickr
The Help Movie Poster By RedShamrock, Via FlickrThe Help Movie Poster By RedShamrock, Via Flickr
The Help Movie Poster By RedShamrock, Via Flickr
 

More from VARUN KUMAR

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc Model
VARUN KUMAR
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire Model
VARUN KUMAR
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI Design
VARUN KUMAR
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI Design
VARUN KUMAR
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO System
VARUN KUMAR
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital Democracy
VARUN KUMAR
 
Ethics of Parasitic Computing
Ethics of Parasitic ComputingEthics of Parasitic Computing
Ethics of Parasitic Computing
VARUN KUMAR
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of Action
VARUN KUMAR
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of Action
VARUN KUMAR
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic Age
VARUN KUMAR
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal Polynomial
VARUN KUMAR
 
Patent Protection
Patent ProtectionPatent Protection
Patent Protection
VARUN KUMAR
 
Copyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawCopyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy Law
VARUN KUMAR
 
Property Right and Software
Property Right and SoftwareProperty Right and Software
Property Right and Software
VARUN KUMAR
 
Investigating Data Trials
Investigating Data TrialsInvestigating Data Trials
Investigating Data Trials
VARUN KUMAR
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical Integration
VARUN KUMAR
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and Controversy
VARUN KUMAR
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's Integration
VARUN KUMAR
 
Protect your online privacy-2
Protect your online privacy-2Protect your online privacy-2
Protect your online privacy-2
VARUN KUMAR
 
Interception Act vs Privacy Act
Interception Act vs Privacy ActInterception Act vs Privacy Act
Interception Act vs Privacy Act
VARUN KUMAR
 

More from VARUN KUMAR (20)

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc Model
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire Model
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI Design
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI Design
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO System
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital Democracy
 
Ethics of Parasitic Computing
Ethics of Parasitic ComputingEthics of Parasitic Computing
Ethics of Parasitic Computing
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of Action
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of Action
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic Age
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal Polynomial
 
Patent Protection
Patent ProtectionPatent Protection
Patent Protection
 
Copyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawCopyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy Law
 
Property Right and Software
Property Right and SoftwareProperty Right and Software
Property Right and Software
 
Investigating Data Trials
Investigating Data TrialsInvestigating Data Trials
Investigating Data Trials
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical Integration
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and Controversy
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's Integration
 
Protect your online privacy-2
Protect your online privacy-2Protect your online privacy-2
Protect your online privacy-2
 
Interception Act vs Privacy Act
Interception Act vs Privacy ActInterception Act vs Privacy Act
Interception Act vs Privacy Act
 

Recently uploaded

Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 

Recently uploaded (20)

Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 

Computer Ethics: Some Case Study

  • 1. Computer Ethics: Some Case Study Dr. Varun Kumar Dr. Varun Kumar (IIIT Surat) Lecture-3 1 / 8
  • 2. Outlines 1 Computer Ethics: Case Study Should I Copy Software ? Should a Company Data Mine ? Freedom of Expression Professional Responsibility Dr. Varun Kumar (IIIT Surat) Lecture-3 2 / 8
  • 3. Computer Ethics: Scenario A Should I copy software ? ⇒ Ramesh invests a small amounts on the stock market. ⇒ Last year he bought and successfully employed a software package to help him with his investments. ⇒ Recently, he met Suresh who was also interested in using the software. ⇒ Suresh borrowed the package, copied it and then returns it. Both vaguely knew that the software was proprietary but did not read up the details. Q Did Ramesh and Suresh do anything wrong, if so what? Ans Something to consider: Should software package be lent? When is it justifiable to break the law? Bad law, inappropriate law or if the law is easy to break? Dr. Varun Kumar (IIIT Surat) Lecture-3 3 / 8
  • 4. B Should a company data mine ? ⇒ Data mining is a process of exploration and analysis of large quantities of data, by automatic or semi-automatic means. ⇒ This is done in order to discover meaningful patterns and rules. ⇒ In many cases, the data was not collected primarily for the purpose of Data Mining. Case study: ⇒ Mr. Vijay sells hardware and software to over 100 000 customers per year. ⇒ He has 10 years experience. ⇒ As part of the billing process he keeps information on customers. ⇒ He buys and uses a data mining tool to derive useful information about her clients information such as zip codes, credit card numbers, ID numbers etc. Dr. Varun Kumar (IIIT Surat) Lecture-3 4 / 8
  • 5. Continued- ⇒ Most of this information identifies groups and not individuals. ⇒ He can then use the information to market his wares more efficiently. Q Is this ethical since customers did not give her the information for this purpose? Something to consider: Should customer be notified? Is there a need for establishment of a policy? What should this policy looks like? Professional responsibility (professional Ethics): Do professionals have a responsibility to ensure computing serves humanity well? Dr. Varun Kumar (IIIT Surat) Lecture-3 5 / 8
  • 6. C Freedom of expression ⇒ In the US, a student JB posted sex fantasies on the Internet called Pamela’s ordeal. ⇒ The story was fictional, but JB named the main character, Pamela , after a REAL student. ⇒ In it, he described the rape, torture and murder of Pamela. ⇒ He also exchanged e-mails with other people in the newsgroups, discussing sex acts. ⇒ An alumnus saw this and reported it to the University. ⇒ JB was then arrested and held in custody. ⇒ He was charged with transmitting interstate communication of threat to injure another person. ⇒ The charges were eventually dropped, but did JB really do anything wrong? Dr. Varun Kumar (IIIT Surat) Lecture-3 6 / 8
  • 7. D Professional responsibility Something to consider: Should self-censorship be enforced. Who decides what is acceptable? Is there a need for a public policy? Professional responsibility ⇒ Mike works for a Software development company which develops computer games for children aged 8-14. ⇒ The latest game that Mike worked on, uses inferential reasoning and allows players to choose different characters, primarily macho man and sexy woman. ⇒ The game is used mainly by boys. ⇒ Recently Mike attended a conference on gender and minorities, where he described the above. Dr. Varun Kumar (IIIT Surat) Lecture-3 7 / 8
  • 8. Continued– ⇒ The conference delegates discussed the issue of lower participation of women in computing and how to make the industry more attractive to women. ⇒ Back at work, Mike realised that his production team is all male. Should he refuse to work on this team? ⇒ Should he ask for the team to be reviewed? ⇒ Will the game sell as well if different message was given? ⇒ What is his responsibility? Something to consider: Should software package be lent? When is it justifiable to break the law? Bad law, inappropriate law or if the law is easy to break? Dr. Varun Kumar (IIIT Surat) Lecture-3 8 / 8