SlideShare a Scribd company logo
COMPUTER ETHICS
COMPUTERS
Computers have become the technological
backbone of society as their complexity,
applications and sheer numbers continue
to increase. They have become helpful in
the advancement of the technology that we
use today.
COMPUTERS
Also today, computers have a wide
variety of applications and uses in
the industry such as in education,
business, engineering and scientific
research.
COMPUTERS
Computers are also beneficial in our
daily lives such as communication
with other people, watching movies
and videos, listening to music,
studying, etc…
COMPUTERS
Since computers are still only a few
decades old, it is difficult to foresee all
the moral issues that will surround them.
Many of these issues are free speech,
privacy, respect for property, informed
consent and harm.
COMPUTERS
In order to deal with these issues, it is
important to learn computer ethics.
Computer ethics has importance to
those who work with computers such as
programmers, designers and systems
analysts.
WHAT IS COMPUTER ETHICS?
WHAT IS ETHICS?
Ethics is defined as moral principles that
govern a person's behaviour or the
conducting of an activity.
WHAT IS COMPUTER?
Computer is defined as an electronic
device for storing and processing data,
typically in binary form, according to
instructions given to it in a variable
program.
WHAT IS COMPUTER ETHICS?
Computer ethics deals with the procedures,
values and practices that govern the process
of consuming computing technology and its
related disciplines without damaging or
violating the moral values and beliefs of any
individual, organization or entity.
ISSUES AND CONCERNS ON
COMPUTER ETHICS
THE INTERNET AND FREE SPEECH
The Internet has extended all issues in
computer ethics. It is the most powerful
communication technology ever
developed as it is used daily by
hundreds of millions of people.
The Internet has greatly improved
communication as it provides a
wellspring of new ways to be in contact
with other people and with sources of
information.
Also, the Internet created greater
convenience in ordering consumer
items, paying bills, and trading stocks
and bonds.
 Like other major “social experiments,” it also
has raised a host of new issues. One set of
issues centers on free speech, including
control of obscene forms of pornography, hate
speech, spam (unwanted commercial
speech), and libel.
POWER RELATIONSHIPS
Computers and the Internet dramatically
increase the ability of centralized
bureaucracies to manage high quantities
of data, involving multiple variables and
at astonishing speed.
Social critics have been alarmed during the
1960’s and 1970’s that computers would
concentrate power in a few centralized
bureaucracies of big government and big
business, thereby eroding democratic
systems by moving toward totalitarianism.
Eventually, these were unjustified but
they have lessened due to recent
developments of computer technology.
There are actually reasons why it is
believed that computers would inevitably
tend to centralize power:
Early large computers are much efficient
in dealing large tasks.
The development of microcomputers
changed all this as small computers
became increasingly powerful and
economically competitive with larger
models.
Computer have been linked for the
purpose in exchanging information and
therefore making up the Internet.
Despite being feared before, computers
are powerful tools that do not by
themselves generate power shifts. They
contribute to greater centralization or
decentralization insofar as human
decision makers direct them.
JOB ELIMINATION
Computers have led and will continue to
lead to the elimination of some jobs.
Since computers are much more
efficient, employers tend to eliminate
human costs.
CUSTOMER RELATIONS
It can be either very difficult or relatively
simple for a consumer to notice and correct
computer errors or computer printed errors.
The prices on cash register receipts have
been shown to sometimes vary from those
posted on the shelves.
BIASED SOFTWARE
Sometimes a software can be biased in
one direction or another as the
development of a software can be
influenced by the political and social
perspective of the developer.
STOCK TRADING
Programmed trading is the automatic,
hands-off, computer trading of stocks,
futures, and options on the stock market.
Control over the market is a big problem
as some are manipulating the market in
order to increase profit.
MILITARY WEAPONS
Many military weapons can be controlled
and used through computers. Many of
these are kept in secrecy but the
problem will be the unprovoked attacks
that will be caused by these weapons.
PROPERTY
The major concern here is the issue on
embezzlement and other forms of
stealing money or financial assets.
Another issue will be software and
information theft.
EMBEZZLEMENT
Through computers, theft and fraud is
done much easier as computers are
much faster and at the same time, can
cover a large area. Another problem will
be anonymity, as the transaction will be
harder to trace.
DATA AND SOFTWARE
The issue about data and software
concerns about copyright as some
programmers develop software which
can be a copy of another program and
make some changes into it and sell it
into a new one.
PRIVACY
By making more data available to more
people with more ease, computers make
privacy more vulnerable to others.
INAPPROPRIATE ACCESS
If you commit a crime, any information
gathered about it will be recorded in
computers which will be easily accessed
by law enforcement officer. Through the
record, it will create a standing bias
against you to those who will see it.
HACKERS
Hackers break the limits of access to
information such as individual privacy,
national security and freedom within a
capitalist economy to protect proprietary
information essential in pursuing
corporate goals.
LEGAL RESPONSES
Laws on information access have been a
huge problem to people as privacy can
be easily invaded by hackers and the
laws to implement these violations are
very inconvenient and expensive.

More Related Content

Similar to COMPUTER_ETHICS presentation for Engineer

foedumed: Computing issues that affect the society
foedumed: Computing issues that affect the societyfoedumed: Computing issues that affect the society
foedumed: Computing issues that affect the society
Maliha Ghazal
 
foedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfoedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the society
farahsyed9
 
foedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfoedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the society
farahsyed9
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
Malik Afzaal
 
IT.pptx
IT.pptxIT.pptx
IT.pptx
ssuser291aea1
 
Information technology
Information technologyInformation technology
Information technology
Enes Bolfidan
 
Module_1_IT_ERA.pptx
Module_1_IT_ERA.pptxModule_1_IT_ERA.pptx
Module_1_IT_ERA.pptx
JenloDiamse
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
ikmalsham
 
jageer ppt.pptx
jageer ppt.pptxjageer ppt.pptx
jageer ppt.pptx
jageerabbas2
 
Information communication technology & cyber law presentation
Information communication technology & cyber law presentationInformation communication technology & cyber law presentation
Information communication technology & cyber law presentation
Being Aabis
 
EmergingTrend.pdf
EmergingTrend.pdfEmergingTrend.pdf
EmergingTrend.pdf
Vennimalai N
 
Essay: Eli Lilly Scholarship for BDPA Students, Gerardo Dominguez
Essay: Eli Lilly Scholarship for BDPA Students, Gerardo DominguezEssay: Eli Lilly Scholarship for BDPA Students, Gerardo Dominguez
Essay: Eli Lilly Scholarship for BDPA Students, Gerardo Dominguez
BDPA Education and Technology Foundation
 
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
Rauf Khalid
 

Similar to COMPUTER_ETHICS presentation for Engineer (13)

foedumed: Computing issues that affect the society
foedumed: Computing issues that affect the societyfoedumed: Computing issues that affect the society
foedumed: Computing issues that affect the society
 
foedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfoedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the society
 
foedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfoedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the society
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
 
IT.pptx
IT.pptxIT.pptx
IT.pptx
 
Information technology
Information technologyInformation technology
Information technology
 
Module_1_IT_ERA.pptx
Module_1_IT_ERA.pptxModule_1_IT_ERA.pptx
Module_1_IT_ERA.pptx
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
jageer ppt.pptx
jageer ppt.pptxjageer ppt.pptx
jageer ppt.pptx
 
Information communication technology & cyber law presentation
Information communication technology & cyber law presentationInformation communication technology & cyber law presentation
Information communication technology & cyber law presentation
 
EmergingTrend.pdf
EmergingTrend.pdfEmergingTrend.pdf
EmergingTrend.pdf
 
Essay: Eli Lilly Scholarship for BDPA Students, Gerardo Dominguez
Essay: Eli Lilly Scholarship for BDPA Students, Gerardo DominguezEssay: Eli Lilly Scholarship for BDPA Students, Gerardo Dominguez
Essay: Eli Lilly Scholarship for BDPA Students, Gerardo Dominguez
 
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
 

Recently uploaded

Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 

Recently uploaded (20)

Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 

COMPUTER_ETHICS presentation for Engineer

  • 2. COMPUTERS Computers have become the technological backbone of society as their complexity, applications and sheer numbers continue to increase. They have become helpful in the advancement of the technology that we use today.
  • 3. COMPUTERS Also today, computers have a wide variety of applications and uses in the industry such as in education, business, engineering and scientific research.
  • 4. COMPUTERS Computers are also beneficial in our daily lives such as communication with other people, watching movies and videos, listening to music, studying, etc…
  • 5. COMPUTERS Since computers are still only a few decades old, it is difficult to foresee all the moral issues that will surround them. Many of these issues are free speech, privacy, respect for property, informed consent and harm.
  • 6. COMPUTERS In order to deal with these issues, it is important to learn computer ethics. Computer ethics has importance to those who work with computers such as programmers, designers and systems analysts.
  • 8. WHAT IS ETHICS? Ethics is defined as moral principles that govern a person's behaviour or the conducting of an activity.
  • 9. WHAT IS COMPUTER? Computer is defined as an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  • 10. WHAT IS COMPUTER ETHICS? Computer ethics deals with the procedures, values and practices that govern the process of consuming computing technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization or entity.
  • 11. ISSUES AND CONCERNS ON COMPUTER ETHICS
  • 12. THE INTERNET AND FREE SPEECH The Internet has extended all issues in computer ethics. It is the most powerful communication technology ever developed as it is used daily by hundreds of millions of people.
  • 13. The Internet has greatly improved communication as it provides a wellspring of new ways to be in contact with other people and with sources of information.
  • 14. Also, the Internet created greater convenience in ordering consumer items, paying bills, and trading stocks and bonds.
  • 15.  Like other major “social experiments,” it also has raised a host of new issues. One set of issues centers on free speech, including control of obscene forms of pornography, hate speech, spam (unwanted commercial speech), and libel.
  • 16. POWER RELATIONSHIPS Computers and the Internet dramatically increase the ability of centralized bureaucracies to manage high quantities of data, involving multiple variables and at astonishing speed.
  • 17. Social critics have been alarmed during the 1960’s and 1970’s that computers would concentrate power in a few centralized bureaucracies of big government and big business, thereby eroding democratic systems by moving toward totalitarianism.
  • 18. Eventually, these were unjustified but they have lessened due to recent developments of computer technology.
  • 19. There are actually reasons why it is believed that computers would inevitably tend to centralize power: Early large computers are much efficient in dealing large tasks.
  • 20. The development of microcomputers changed all this as small computers became increasingly powerful and economically competitive with larger models.
  • 21. Computer have been linked for the purpose in exchanging information and therefore making up the Internet.
  • 22. Despite being feared before, computers are powerful tools that do not by themselves generate power shifts. They contribute to greater centralization or decentralization insofar as human decision makers direct them.
  • 23. JOB ELIMINATION Computers have led and will continue to lead to the elimination of some jobs. Since computers are much more efficient, employers tend to eliminate human costs.
  • 24. CUSTOMER RELATIONS It can be either very difficult or relatively simple for a consumer to notice and correct computer errors or computer printed errors. The prices on cash register receipts have been shown to sometimes vary from those posted on the shelves.
  • 25. BIASED SOFTWARE Sometimes a software can be biased in one direction or another as the development of a software can be influenced by the political and social perspective of the developer.
  • 26. STOCK TRADING Programmed trading is the automatic, hands-off, computer trading of stocks, futures, and options on the stock market. Control over the market is a big problem as some are manipulating the market in order to increase profit.
  • 27. MILITARY WEAPONS Many military weapons can be controlled and used through computers. Many of these are kept in secrecy but the problem will be the unprovoked attacks that will be caused by these weapons.
  • 28. PROPERTY The major concern here is the issue on embezzlement and other forms of stealing money or financial assets. Another issue will be software and information theft.
  • 29. EMBEZZLEMENT Through computers, theft and fraud is done much easier as computers are much faster and at the same time, can cover a large area. Another problem will be anonymity, as the transaction will be harder to trace.
  • 30. DATA AND SOFTWARE The issue about data and software concerns about copyright as some programmers develop software which can be a copy of another program and make some changes into it and sell it into a new one.
  • 31. PRIVACY By making more data available to more people with more ease, computers make privacy more vulnerable to others.
  • 32. INAPPROPRIATE ACCESS If you commit a crime, any information gathered about it will be recorded in computers which will be easily accessed by law enforcement officer. Through the record, it will create a standing bias against you to those who will see it.
  • 33. HACKERS Hackers break the limits of access to information such as individual privacy, national security and freedom within a capitalist economy to protect proprietary information essential in pursuing corporate goals.
  • 34. LEGAL RESPONSES Laws on information access have been a huge problem to people as privacy can be easily invaded by hackers and the laws to implement these violations are very inconvenient and expensive.