SlideShare a Scribd company logo
1 of 12
COMPUTER ETHICS,
PRIVACY AND
SECURITY
COMPUTER ETHICS
• Computers are involved to some extent in
almost every aspect of our lives
• They often perform life-critical tasks
• Computer science is not regulated to the
extent of medicine, air travel, or
construction zoning
• Therefore, we need to carefully consider
the issues of ethics
ETHICS
• Ethics are standards of moral conduct
•Standards of right and wrong
behavior
•A gauge of personal integrity
•The basis of trust and cooperation
in relationships with others
ETHICAL PRINCIPALS
• Ethical principals are tools which are used to think
through difficult situations.
• Three useful ethical principals:
• An act is ethical if all of society benefits from the act.
• An act is ethical if people are treated as an end and not as
a means to an end.
• An act is ethical if it is fair to all parties involved.
COMPUTER ETHICS
• Computer ethics are morally acceptable use
of computers
• i.e. using computers appropriately
• Standards or guidelines are important in
this industry, because technology changes
are outstripping the legal system’s ability
to keep up
ETHICS FOR COMPUTER
PROFESSIONALS
Computer Professionals:
• Are experts in their field,
• Know customers rely on their knowledge,
expertise, and honesty,
• Understand their products (and related risks)
affect many people,
• Follow good professional standards and
practices,
• Maintain an expected level of competence and
are up-to-date on current knowledge and
technology, and
• Educate the non-computer professional
COMPUTER ETHICS
• Four primary issues
• Privacy – responsibility to protect data about
individuals
• Accuracy - responsibility of data collectors to
authenticate information and ensure its
accuracy
• Property - who owns information and software
and how can they be sold and exchanged
• Access - responsibility of data collectors to
control access and determine what information
a person has the right to obtain about others
and how the information can be used
COMPUTER CRIME
• Computer criminals -using a computer to
commit an illegal act
• Who are computer criminals?
• Employees – disgruntled or dishonest --the
largest category
• Outside users - customers or suppliers
• “Hackers” and “crackers” - hackers do it “for
fun” but crackers have malicious intent
• Organized crime - tracking illegal
enterprises, forgery, counterfeiting
TYPES OF COMPUTER CRIME
• Damage to computers, programs or files
• Viruses - migrate through systems
attached to files and programs
• Worms - continuously self-replicate
• Theft
• Of hardware, software, data, computer
time
• Software piracy - unauthorized copies of
copyrighted material
• View/Manipulation
• “Unauthorized entry” and “harmless
message” still illegal
COMPUTER SECURITY
• Computer security involves protecting:
• information, hardware and software
• from unauthorized use and damage and
• from sabotage and natural disasters
• Restricting access both to the hardware locations
(physical access) and into the system itself (over the
network) using firewalls
• Implementing a plan to prevent break-ins
• Changing passwords frequently
• Making backup copies
• Using anti-virus software
• Encrypting data to frustrate interception
• Anticipating disasters (disaster recovery plan)
Measures to Protect
Computer Security
COMPUTER ETHICS
FOR COMPUTER
PROFESSIONALS
• Competence– Professionals keep up with the
latest knowledge in their field and perform
services only in their area of competence.
• Responsibility– Professionals are loyal to
their clients or employees, and they won’t
disclose confidential information.
• Integrity– Professionals express their
opinions based on facts, and they are
impartial in their judgments.

More Related Content

Similar to Cyber ethics.pptx

Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptxDibyesh1
 
Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challengesSilvia Afrima Chandra
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptxMuruganS82
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxFannyKwok1
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment Jenny Coloma
 
Questions of Ethics in Software Development
Questions of Ethics in Software DevelopmentQuestions of Ethics in Software Development
Questions of Ethics in Software DevelopmentJane Prusakova
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
9. Computer Ethics.ppt
9. Computer Ethics.ppt9. Computer Ethics.ppt
9. Computer Ethics.pptasm071149
 
computer ethics
computer ethicscomputer ethics
computer ethicssdrhr
 
Cyber Law Ethics Lecturer Slides and Notes
Cyber Law Ethics Lecturer Slides and NotesCyber Law Ethics Lecturer Slides and Notes
Cyber Law Ethics Lecturer Slides and Notesinnoraj1
 

Similar to Cyber ethics.pptx (20)

css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
Chapter 13 security and ethical challenges
Chapter 13  security and ethical challengesChapter 13  security and ethical challenges
Chapter 13 security and ethical challenges
 
Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challenges
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment
 
1 ICT in Society
1 ICT in Society1 ICT in Society
1 ICT in Society
 
Questions of Ethics in Software Development
Questions of Ethics in Software DevelopmentQuestions of Ethics in Software Development
Questions of Ethics in Software Development
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Shak taha
Shak tahaShak taha
Shak taha
 
9. Computer Ethics.ppt
9. Computer Ethics.ppt9. Computer Ethics.ppt
9. Computer Ethics.ppt
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber Law Ethics Lecturer Slides and Notes
Cyber Law Ethics Lecturer Slides and NotesCyber Law Ethics Lecturer Slides and Notes
Cyber Law Ethics Lecturer Slides and Notes
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

Cyber ethics.pptx

  • 2. COMPUTER ETHICS • Computers are involved to some extent in almost every aspect of our lives • They often perform life-critical tasks • Computer science is not regulated to the extent of medicine, air travel, or construction zoning • Therefore, we need to carefully consider the issues of ethics
  • 3. ETHICS • Ethics are standards of moral conduct •Standards of right and wrong behavior •A gauge of personal integrity •The basis of trust and cooperation in relationships with others
  • 4. ETHICAL PRINCIPALS • Ethical principals are tools which are used to think through difficult situations. • Three useful ethical principals: • An act is ethical if all of society benefits from the act. • An act is ethical if people are treated as an end and not as a means to an end. • An act is ethical if it is fair to all parties involved.
  • 5. COMPUTER ETHICS • Computer ethics are morally acceptable use of computers • i.e. using computers appropriately • Standards or guidelines are important in this industry, because technology changes are outstripping the legal system’s ability to keep up
  • 6. ETHICS FOR COMPUTER PROFESSIONALS Computer Professionals: • Are experts in their field, • Know customers rely on their knowledge, expertise, and honesty, • Understand their products (and related risks) affect many people, • Follow good professional standards and practices, • Maintain an expected level of competence and are up-to-date on current knowledge and technology, and • Educate the non-computer professional
  • 7. COMPUTER ETHICS • Four primary issues • Privacy – responsibility to protect data about individuals • Accuracy - responsibility of data collectors to authenticate information and ensure its accuracy • Property - who owns information and software and how can they be sold and exchanged • Access - responsibility of data collectors to control access and determine what information a person has the right to obtain about others and how the information can be used
  • 8. COMPUTER CRIME • Computer criminals -using a computer to commit an illegal act • Who are computer criminals? • Employees – disgruntled or dishonest --the largest category • Outside users - customers or suppliers • “Hackers” and “crackers” - hackers do it “for fun” but crackers have malicious intent • Organized crime - tracking illegal enterprises, forgery, counterfeiting
  • 9. TYPES OF COMPUTER CRIME • Damage to computers, programs or files • Viruses - migrate through systems attached to files and programs • Worms - continuously self-replicate • Theft • Of hardware, software, data, computer time • Software piracy - unauthorized copies of copyrighted material • View/Manipulation • “Unauthorized entry” and “harmless message” still illegal
  • 10. COMPUTER SECURITY • Computer security involves protecting: • information, hardware and software • from unauthorized use and damage and • from sabotage and natural disasters
  • 11. • Restricting access both to the hardware locations (physical access) and into the system itself (over the network) using firewalls • Implementing a plan to prevent break-ins • Changing passwords frequently • Making backup copies • Using anti-virus software • Encrypting data to frustrate interception • Anticipating disasters (disaster recovery plan) Measures to Protect Computer Security
  • 12. COMPUTER ETHICS FOR COMPUTER PROFESSIONALS • Competence– Professionals keep up with the latest knowledge in their field and perform services only in their area of competence. • Responsibility– Professionals are loyal to their clients or employees, and they won’t disclose confidential information. • Integrity– Professionals express their opinions based on facts, and they are impartial in their judgments.