SlideShare a Scribd company logo
r
HMR
INSTITUTE
OF
TECHNOLOGY
AND
MANAGEMENT
Hamidpur,
Delhi-11036
(Affiliated
to
Guru
Gobind
Singh
Indraprastha
University
Sector-
16C
Dwarka,
Delhi-110078)
Submitted
in
partial
fulfilment
of
the
requirements
For
the
award
of
the
degree
of
Bachelor
of
Technology
in
Computer
Science
and
Engineering
2022-2026
HVPE
CASE
STUDY
TOPIC:
COMPUTER
ETHICS
SUBMITTED
TO:
SUBMITTED
BY:
Mr.
ABHISHEK
JAISWAL
SANTOSH
KUMAR
,121
RAGHAV
MEHTA
,081
(CSE-3)
TABLE OF CONTENT
1. Introduction
2. Common issues and contradictions with computer ethics
3. Advantages and disadvantages of computer ethics
4. Ten commandments of computer ethics:
5. Information Privacy
6. General steps to protect our system from risks:
7. Unethical computing practices
8. CYBERBULLYING /How to protect yourself from cyberbullying
9. PHISHING/How to protect yourself from phishing
10.HACKING/How to protect yourself from hacking
11.SPAM/How to protect yourself from spam
12.PLAGIARISM/How to protect yourself from plagiarism
13.REFERENCES
COMPUTER ETHICS
INTRODUCTION
Computer ethics is the set of commonly agreed principles that govern the use of computers.
Like ethics more generally, computer ethics is essentially a set of philosophical guidelines or
moral standards that aim to influence behaviour and prevent harm.
COMMON ISSUES WITH
COMPUTER ETHICS
Some common issues of computer ethics include intellectual
property rights such as copyrighted electronic content ,
privacy concerns , and how computers affect society
Contradictions
For example , while it is easy to duplicate copyrighted electronic
or digital content , computer ethics would suggest that it is
wrong to do so without the author’s approval
And while it may be possible to access someone’s personal
information on a computer system , computer ethics would
advise that such an action is unethical
Advantages of using the internet:
•The Internet offers the facility to communicate with a person in any
part of the world.
•We can easily collect information related to any topic from the
world wide web on the internet.
•Various types of business are carried out through Internet, which is
referred to as e-commerce. From booking railway tickets and flight
tickets or tickets for movies to purchasing any type of merchandise
or commodities, are possible via the Internet.
•The Internet allows social networking, that is, it provides the ability
to share our information, emotions, and feelings with our friends
and relatives.
Advantages of using the internet:
•The Internet offers the facility to communicate with a person in any part of the world.
•We can easily collect information related to any topic from the world wide web on the internet.
•Various types of business are carried out through Internet, which is referred to as e-commerce. From
booking railway tickets and flight tickets or tickets for movies to purchasing any type of merchandise
or commodities, are possible via the Internet.
•The Internet allows social networking, that is, it provides the ability to share our information,
emotions, and feelings with our friends and relatives.
Disadvantages of using the internet:
•A group of people is trying to get personal information (like bank detail, address, contact
details, etc,) over the Internet and uses that for unethical benefits.
•Malware or viruses are becoming quick access to different networks and ultimately are causing
harm to personal computers(PC) or computers connected to the network.
•Some people run deceitful businesses over the Internet, and the common people very often
become victims of them.
•People use the internet for cyberbullying, trolling, etc.
Ten commandments of computer ethics:
Commandment 1: Do not use the computer to harm other people’s data.
Commandment 2: Do not use a computer to cause interference in other people’s
work.
Commandment 3: Do not spy on another person’s personal data.
Commandment 4: Do not use technology to steal personal information.
Commandment 5: Do not spread misinformation using computer technology.
Commandment 6: Do not use the software unless you pay for this software.
Commandment 7: Do not use someone else’s computer resources unless he
authorized to use them.
Commandment 8: It is wrong to claim ownership of a work that is the output of
someone else’s intellect.
Commandment 9: Before developing software, think about the social impact it can of
that software.
Commandment 10: While computers for communication, always respectful with fellow
members.
Information Privacy: Information privacy is the privacy or
protection of personal information and refers to the personal data stored on a
computer. It is an important aspect of information sharing. Information privacy is also
known as data privacy or online privacy. Some Internet privacy involves the right of
personal privacy and deals with the storing and displaying of personal information
on the internet. In any exchange of personal information over the internet, there is
always a risk involved with the safety of personal information. Internet privacy may
be a cause for concern especially when online purchases, visiting social networking
sites, participating in online games or attending forums. Privacy issues can arise in
response to information from a good range of sources, such as:
•Healthcare records
•Financial institution
•transactions
•Biological traits
•Residence records
•Location-based service
The risk involved in internet privacy is sometimes dangerous. In the process of data transfer over the
internet, if a password is revealed, a victim’s identity may be deceitfully used.
Some important terms:
1.Spyware: An application that obtains data without the user’s consent.
2.Malware: An application used to illegally harm online and offline computer users
3.Virus: It is a small program or software which is embedded with a legitimate program and designed to
harm your system.
4.Worms: It is a self-replicating program that spread across networks due to the poor security of the
infected computers.
5.Trojan horse: Trojan horse is a program that allows the hackers to gain remote access to a target
system.
General steps to protect our system from risks:
To minimize internet privacy violation risks, the following measures need to be taken:
1.Always use preventive software applications, like anti-virus, anti-malware, etc,
2.Avoid exposing personal data on websites with low-security levels.
3.Avoid shopping from unreliable websites
4.Always use strong passwords consisting of letters, numerals, and special characters.
5.Always keep your operating system updated.
6.Always on the firewall.
Unethical computing practices:
Now we discuss some unethical computing practices:
1. Cyberbullying: When people bully other people by the use of electronic communication ( like the
web, telephone, etc). it’s referred to as cyberbullying. Cyberbullying has been done by friends,
classmates, relatives, any other unknown persons. Sending harmful emails to a person creates fake
websites to make fun of or to make harm a person by distributing the same fake information about a
person posting and distributing fake images of a person. These are some common ways of
cyberbullying.
In most cyberbullying cases, they do not reveal their identities. Due to cyberbullying, some bullied
persons are affected emotionally or mentally. Even if those are fake information, the bullied person may
become depressed or it may affect their day-to-day life. In the case of the students or kids, it may affect
their study or they may lose self-esteem.
How to protect yourself from cyberbullying:
•Not to respond to cyberbullying.
•Never open e-mails received from unknown senders.
•Keep your password secret.
•Be careful, when you are posting something on a social site.
2. Phishing:An internet hacking activity used to steal user data. In this activity, an email is sent to the user wh
misleads him/her to believe that it is from a trusted organization. After sending the email, the attacker asks the user to
website, and on their website, they will ask for the personal information of the user like password, credit card informatio
this is how the attacker steals the personal information of the user.
How to protect yourself from phishing:
•Never open a link, attachment, etc in an email that is sent by some unknown person.
•Never share your personal information in an email that is asked by an unknown person.
•Always on the firewall of the computer system.
•Always check your bank statements regularly to ensure that no unauthorized transactions are made. If
unauthorized transactions are made in your account, then immediately report this issue to your bank.
3. Hacking: It is an unethical activity in which a highly skilled technical person(or commonly known
as a hacker) enters another person’s computer without the permission of the user and steals important
data/project/applications from the computer or sometimes destroys the information from the system.
How to protect yourself from hacking:
•Never connect your system to free wifi or a free network.
•Always use strong passwords consisting of letters, numerals, and special characters.
•Before installing any application in your system, always check permission and authenticity.
•Always keep your operating system updated.
•Always use preventive software applications, like anti-virus, anti-malware, etc,
4. Spamming: It is an unethical activity in which bulk unwanted e-mail is set to you from a
strange or unknown source. Sometimes, due to bulk emails, your mail server gets full and mail bombing
activity happens. Spam mail is generally used to deliver viruses, worms, trojan horses, malware, spyware,
etc. to attack the user.
How to protect yourself from spam:
•To prevent spam mail, install filtering or blocking software.
•In your mailbox, if you find suspicious mail, then immediately delete that mail(without opening).
•Always keep your software updated.
•Never open the link that is sent by an unknown person.
5. Plagiarism: Plagiarism is stealing or copying someone else’s intellectual work (can be an idea,
literary work or academic work, etc.) and representing it as your own work without giving credit to the
creator or without citing the source of information.
How to protect yourself from plagiarism:
•While writing, always writes in your own words.
•Always use a plagiarism checker before the update.
•If you are taking someone else’s work, then always give the credit to the original author in an in-
text citation.
REFERENCE
1. https://www.geeksforgeeks.org/computer-ethics/
2. https://www.comptia.org/blog/ethical-problems-in-computing
3. https://www.slideshare.net/jagannath908/computer-ethics-27777740
4. RAGNAR SIR (Our subject teacher)
5. YOUTUBE
6. GOOGLE

More Related Content

Similar to COMPUTER ETHICS.pptx

Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
Aarush59
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
ReinIgnacioUrolaza
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
JAYANTHKUMARTM
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
AnnMarieTAquinoII
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey92
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
UmaraZahidLecturer
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
MohammedYaseen638128
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey96
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
Karel Van Isacker
 
Internet security
Internet security Internet security
Internet security
Ayesha Rana
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
JoelGautham
 
techalpha07
techalpha07techalpha07
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
Aswani34
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
Kaushal Solanki
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 

Similar to COMPUTER ETHICS.pptx (20)

Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Internet security
Internet security Internet security
Internet security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
techalpha07
techalpha07techalpha07
techalpha07
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 

Recently uploaded

Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 

Recently uploaded (16)

Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 

COMPUTER ETHICS.pptx

  • 2. TABLE OF CONTENT 1. Introduction 2. Common issues and contradictions with computer ethics 3. Advantages and disadvantages of computer ethics 4. Ten commandments of computer ethics: 5. Information Privacy 6. General steps to protect our system from risks: 7. Unethical computing practices 8. CYBERBULLYING /How to protect yourself from cyberbullying 9. PHISHING/How to protect yourself from phishing 10.HACKING/How to protect yourself from hacking 11.SPAM/How to protect yourself from spam 12.PLAGIARISM/How to protect yourself from plagiarism 13.REFERENCES
  • 3. COMPUTER ETHICS INTRODUCTION Computer ethics is the set of commonly agreed principles that govern the use of computers. Like ethics more generally, computer ethics is essentially a set of philosophical guidelines or moral standards that aim to influence behaviour and prevent harm.
  • 4. COMMON ISSUES WITH COMPUTER ETHICS Some common issues of computer ethics include intellectual property rights such as copyrighted electronic content , privacy concerns , and how computers affect society Contradictions For example , while it is easy to duplicate copyrighted electronic or digital content , computer ethics would suggest that it is wrong to do so without the author’s approval And while it may be possible to access someone’s personal information on a computer system , computer ethics would advise that such an action is unethical
  • 5. Advantages of using the internet: •The Internet offers the facility to communicate with a person in any part of the world. •We can easily collect information related to any topic from the world wide web on the internet. •Various types of business are carried out through Internet, which is referred to as e-commerce. From booking railway tickets and flight tickets or tickets for movies to purchasing any type of merchandise or commodities, are possible via the Internet. •The Internet allows social networking, that is, it provides the ability to share our information, emotions, and feelings with our friends and relatives. Advantages of using the internet: •The Internet offers the facility to communicate with a person in any part of the world. •We can easily collect information related to any topic from the world wide web on the internet. •Various types of business are carried out through Internet, which is referred to as e-commerce. From booking railway tickets and flight tickets or tickets for movies to purchasing any type of merchandise or commodities, are possible via the Internet. •The Internet allows social networking, that is, it provides the ability to share our information, emotions, and feelings with our friends and relatives. Disadvantages of using the internet: •A group of people is trying to get personal information (like bank detail, address, contact details, etc,) over the Internet and uses that for unethical benefits. •Malware or viruses are becoming quick access to different networks and ultimately are causing harm to personal computers(PC) or computers connected to the network. •Some people run deceitful businesses over the Internet, and the common people very often become victims of them. •People use the internet for cyberbullying, trolling, etc.
  • 6. Ten commandments of computer ethics: Commandment 1: Do not use the computer to harm other people’s data. Commandment 2: Do not use a computer to cause interference in other people’s work. Commandment 3: Do not spy on another person’s personal data. Commandment 4: Do not use technology to steal personal information. Commandment 5: Do not spread misinformation using computer technology. Commandment 6: Do not use the software unless you pay for this software. Commandment 7: Do not use someone else’s computer resources unless he authorized to use them. Commandment 8: It is wrong to claim ownership of a work that is the output of someone else’s intellect. Commandment 9: Before developing software, think about the social impact it can of that software. Commandment 10: While computers for communication, always respectful with fellow members.
  • 7. Information Privacy: Information privacy is the privacy or protection of personal information and refers to the personal data stored on a computer. It is an important aspect of information sharing. Information privacy is also known as data privacy or online privacy. Some Internet privacy involves the right of personal privacy and deals with the storing and displaying of personal information on the internet. In any exchange of personal information over the internet, there is always a risk involved with the safety of personal information. Internet privacy may be a cause for concern especially when online purchases, visiting social networking sites, participating in online games or attending forums. Privacy issues can arise in response to information from a good range of sources, such as: •Healthcare records •Financial institution •transactions •Biological traits •Residence records •Location-based service
  • 8. The risk involved in internet privacy is sometimes dangerous. In the process of data transfer over the internet, if a password is revealed, a victim’s identity may be deceitfully used. Some important terms: 1.Spyware: An application that obtains data without the user’s consent. 2.Malware: An application used to illegally harm online and offline computer users 3.Virus: It is a small program or software which is embedded with a legitimate program and designed to harm your system. 4.Worms: It is a self-replicating program that spread across networks due to the poor security of the infected computers. 5.Trojan horse: Trojan horse is a program that allows the hackers to gain remote access to a target system. General steps to protect our system from risks: To minimize internet privacy violation risks, the following measures need to be taken: 1.Always use preventive software applications, like anti-virus, anti-malware, etc, 2.Avoid exposing personal data on websites with low-security levels. 3.Avoid shopping from unreliable websites 4.Always use strong passwords consisting of letters, numerals, and special characters. 5.Always keep your operating system updated. 6.Always on the firewall.
  • 9. Unethical computing practices: Now we discuss some unethical computing practices: 1. Cyberbullying: When people bully other people by the use of electronic communication ( like the web, telephone, etc). it’s referred to as cyberbullying. Cyberbullying has been done by friends, classmates, relatives, any other unknown persons. Sending harmful emails to a person creates fake websites to make fun of or to make harm a person by distributing the same fake information about a person posting and distributing fake images of a person. These are some common ways of cyberbullying. In most cyberbullying cases, they do not reveal their identities. Due to cyberbullying, some bullied persons are affected emotionally or mentally. Even if those are fake information, the bullied person may become depressed or it may affect their day-to-day life. In the case of the students or kids, it may affect their study or they may lose self-esteem. How to protect yourself from cyberbullying: •Not to respond to cyberbullying. •Never open e-mails received from unknown senders. •Keep your password secret. •Be careful, when you are posting something on a social site.
  • 10. 2. Phishing:An internet hacking activity used to steal user data. In this activity, an email is sent to the user wh misleads him/her to believe that it is from a trusted organization. After sending the email, the attacker asks the user to website, and on their website, they will ask for the personal information of the user like password, credit card informatio this is how the attacker steals the personal information of the user. How to protect yourself from phishing: •Never open a link, attachment, etc in an email that is sent by some unknown person. •Never share your personal information in an email that is asked by an unknown person. •Always on the firewall of the computer system. •Always check your bank statements regularly to ensure that no unauthorized transactions are made. If unauthorized transactions are made in your account, then immediately report this issue to your bank. 3. Hacking: It is an unethical activity in which a highly skilled technical person(or commonly known as a hacker) enters another person’s computer without the permission of the user and steals important data/project/applications from the computer or sometimes destroys the information from the system. How to protect yourself from hacking: •Never connect your system to free wifi or a free network. •Always use strong passwords consisting of letters, numerals, and special characters. •Before installing any application in your system, always check permission and authenticity. •Always keep your operating system updated. •Always use preventive software applications, like anti-virus, anti-malware, etc,
  • 11. 4. Spamming: It is an unethical activity in which bulk unwanted e-mail is set to you from a strange or unknown source. Sometimes, due to bulk emails, your mail server gets full and mail bombing activity happens. Spam mail is generally used to deliver viruses, worms, trojan horses, malware, spyware, etc. to attack the user. How to protect yourself from spam: •To prevent spam mail, install filtering or blocking software. •In your mailbox, if you find suspicious mail, then immediately delete that mail(without opening). •Always keep your software updated. •Never open the link that is sent by an unknown person. 5. Plagiarism: Plagiarism is stealing or copying someone else’s intellectual work (can be an idea, literary work or academic work, etc.) and representing it as your own work without giving credit to the creator or without citing the source of information. How to protect yourself from plagiarism: •While writing, always writes in your own words. •Always use a plagiarism checker before the update. •If you are taking someone else’s work, then always give the credit to the original author in an in- text citation.
  • 12. REFERENCE 1. https://www.geeksforgeeks.org/computer-ethics/ 2. https://www.comptia.org/blog/ethical-problems-in-computing 3. https://www.slideshare.net/jagannath908/computer-ethics-27777740 4. RAGNAR SIR (Our subject teacher) 5. YOUTUBE 6. GOOGLE