SlideShare a Scribd company logo
1 of 19
Download to read offline
Ethical Issues
in Digital Age
Group 5
1. Privacy
The law stated that a privacy is
the right of every people to make
personal decisions and live their
lives that is secluded from public
scrutiny in a reasonable manner
Privacy Invasion
Privacy invasion is a wrongful
act that have corresponding legal
responsibility because it causes
loss or injury to people’s lives.
Types of Privacy Invasion;
a. Instrution into seclusion
b. Appropriation of name or likeness
c. Public disclosure of private facts
d. Placing a person in a false light
2. Hacking
The act of gaining unauthorized access to data
using a system or any digital devices such as
computers also called system penetration. It is
one of the most common threats in
cybersecurity since information in digital form is
vulnerable to various types of attacks
Different form of Hacking
Different tools and methods used in Hacking
Black-hat hacker
White-hat hacker
Gray-hat hacker
Skript kiddle
Key-logging software
Packet-sniffing software
Port-scanning software
Social Engineering
Dumpster diving
3. Theft
The most popular type of theft is known as
identity theft – an act of stealing other’s personal
information to commit fraud. It can also be in the form of
pretending to be someone else, using the information of
other people for money and other benefits. An
identity thief can make unauthorized purchases and
transactions using other person’s credit card
information.
4. Copyright Infringement
The act of using the copyrighted works or
covered by copyright law without
permission. Specifically,
reproducing, distributing, displaying,
performing protected work, or making
derivative works without
authorization of the copyright holder.
Different forms of copyright infringement:
Film recording in a movie theater
Posting a video on your company’s website that features
copyrighted contents such as songs, wordings, and images
Modifying copyrighted image or videos and displaying it to
company’s website
Creating merchandise for sale that features copyrighted works
Downloading films or music without paying their use
Copying any artistic or literary work without license
5. Freedom of Expression and
Online Defamation
Freedom of expression -is the right to
search, receive, and impart information of
your choice regardless of boundary
without interference.
Online Defamation - is the act of giving false
statement that is harmful to someone’s
reputation verbally or in written form using
online platforms such as social media platform.
two types of defamation:
a) Libel – it refers to the written defamatory
statement
b) Slander – it refers to the spoken defamatory
statement
6. Piracy
It involves illegal copying, use, and
distribution of digital intellectual property
such as software, music, and movies. Piracy
and plagiarism are classifications of
violation of laws regarding intellectual
property rights such as copyright crimes.
Examples of Piracy includes the following:
Illegal use or interception of internet
connection of other people
Publication, reproduction, and/or use of
patented or copyrighted work without
permission
Unauthorized copying of protected
software
Using protected software without license
6. Fraud
In general, it is a wrongful act and
criminal deception resulting in financial
or personal gain. Computer fraud is the
term used in executing the illegal act
using computer system or attacking a
computer intends to alter, damage, or
worst disable it.
Types of fraud includes:
a) Mail Fraud – fraudulent activity that uses
mails or emails such as sending a letter to
someone to scam money or gain personal
information.
b) Health Care Fraud– it refers to a situation
where an individual such as insurance provider
or medical office misuse the insurance
information for their own personal gain.
Types of fraud includes:
c) Debit and Credit Card Fraud – accessing
other people’s debit or credit cards that
can completely drain bank accounts.
d) Internet Fraud – fraudulent activity
using internet to take advantage to other
people. It includes data breaches, malware,
and phishing.
7. Internet Pornography
Accessing pictures or films that contains
representation of sexual behavior using
Internet. It is accessible over the Internet
via file sharing and websites.
CONCLUSION
The ethical issues in the digital age encompass a wide
range of concerns, from privacy to data protection,
cybersecurity, and the digital divide. Each issue poses
ethical dilemmas for individuals, corporations, and
policymakers to address. Recognizing the ethical
implications of these issues is crucial for creating a more
equitable and responsible digital future. Stricter
regulations, greater transparency, and broader access to
digital resources are among the potential solutions that
stakeholders must rally behind to safeguard ethics in the
digital age.
Thank
you very
much!

More Related Content

Similar to Ethical Issue Digital Age Technology Presentatiopdf

Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesVivekanandaGN1
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxFroilan Cantillo
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 

Similar to Ethical Issue Digital Age Technology Presentatiopdf (20)

Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Ethical dilemma
Ethical dilemmaEthical dilemma
Ethical dilemma
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 

Recently uploaded

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 

Recently uploaded (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 

Ethical Issue Digital Age Technology Presentatiopdf

  • 2. 1. Privacy The law stated that a privacy is the right of every people to make personal decisions and live their lives that is secluded from public scrutiny in a reasonable manner
  • 3. Privacy Invasion Privacy invasion is a wrongful act that have corresponding legal responsibility because it causes loss or injury to people’s lives.
  • 4. Types of Privacy Invasion; a. Instrution into seclusion b. Appropriation of name or likeness c. Public disclosure of private facts d. Placing a person in a false light
  • 5. 2. Hacking The act of gaining unauthorized access to data using a system or any digital devices such as computers also called system penetration. It is one of the most common threats in cybersecurity since information in digital form is vulnerable to various types of attacks
  • 6. Different form of Hacking Different tools and methods used in Hacking Black-hat hacker White-hat hacker Gray-hat hacker Skript kiddle Key-logging software Packet-sniffing software Port-scanning software Social Engineering Dumpster diving
  • 7. 3. Theft The most popular type of theft is known as identity theft – an act of stealing other’s personal information to commit fraud. It can also be in the form of pretending to be someone else, using the information of other people for money and other benefits. An identity thief can make unauthorized purchases and transactions using other person’s credit card information.
  • 8. 4. Copyright Infringement The act of using the copyrighted works or covered by copyright law without permission. Specifically, reproducing, distributing, displaying, performing protected work, or making derivative works without authorization of the copyright holder.
  • 9. Different forms of copyright infringement: Film recording in a movie theater Posting a video on your company’s website that features copyrighted contents such as songs, wordings, and images Modifying copyrighted image or videos and displaying it to company’s website Creating merchandise for sale that features copyrighted works Downloading films or music without paying their use Copying any artistic or literary work without license
  • 10. 5. Freedom of Expression and Online Defamation Freedom of expression -is the right to search, receive, and impart information of your choice regardless of boundary without interference.
  • 11. Online Defamation - is the act of giving false statement that is harmful to someone’s reputation verbally or in written form using online platforms such as social media platform. two types of defamation: a) Libel – it refers to the written defamatory statement b) Slander – it refers to the spoken defamatory statement
  • 12. 6. Piracy It involves illegal copying, use, and distribution of digital intellectual property such as software, music, and movies. Piracy and plagiarism are classifications of violation of laws regarding intellectual property rights such as copyright crimes.
  • 13. Examples of Piracy includes the following: Illegal use or interception of internet connection of other people Publication, reproduction, and/or use of patented or copyrighted work without permission Unauthorized copying of protected software Using protected software without license
  • 14. 6. Fraud In general, it is a wrongful act and criminal deception resulting in financial or personal gain. Computer fraud is the term used in executing the illegal act using computer system or attacking a computer intends to alter, damage, or worst disable it.
  • 15. Types of fraud includes: a) Mail Fraud – fraudulent activity that uses mails or emails such as sending a letter to someone to scam money or gain personal information. b) Health Care Fraud– it refers to a situation where an individual such as insurance provider or medical office misuse the insurance information for their own personal gain.
  • 16. Types of fraud includes: c) Debit and Credit Card Fraud – accessing other people’s debit or credit cards that can completely drain bank accounts. d) Internet Fraud – fraudulent activity using internet to take advantage to other people. It includes data breaches, malware, and phishing.
  • 17. 7. Internet Pornography Accessing pictures or films that contains representation of sexual behavior using Internet. It is accessible over the Internet via file sharing and websites.
  • 18. CONCLUSION The ethical issues in the digital age encompass a wide range of concerns, from privacy to data protection, cybersecurity, and the digital divide. Each issue poses ethical dilemmas for individuals, corporations, and policymakers to address. Recognizing the ethical implications of these issues is crucial for creating a more equitable and responsible digital future. Stricter regulations, greater transparency, and broader access to digital resources are among the potential solutions that stakeholders must rally behind to safeguard ethics in the digital age.