SlideShare a Scribd company logo
PROF. ERWIN M. GLOBIO, MSIT

)
• What is Ethics and Information Technology??
• Ethical issues relating to computer application
• Security Threats
– Computer Viruses
– Cyber Crime
– Software piracy and Hacking
– Computer crime prevention
– Ethical dilemmas and consideration
Ethics In Information Tech.
Ethics
• Derived from the Greek word “ethos”, which
means “custom”, “habit”, and “way of living”
• Definition: "the discipline and practice of
applying value to human behavior, resulting
in meaningful conduct.“
Ethics In Information Tech.
Computer Ethics
• Computer ethics defined as the application of
classical ethical principles to the use of computer
technology.
• Ethical problems related to computers:
– Privacy
•Computers create a false sense of security
•People do not realize how vulnerable
information stored on computers are
– Property
•Physical property
•Intellectual property
•Data as property
Ethics In Information Tech.
• Access
– Access to computing technology
– Access to data
• Accuracy
– Accuracy of information stored
• Hacking, cracking and virus creation
• Software piracy
Ethics In Information Tech.
The Ten Commandments of computer
ethics have been defined by the
Computer Ethics Institute.
• 1) Thou shalt not use a computer to harm other people.
• 2) Thou shalt not interfere with other people's computer
work.
• 3) Thou shalt not snoop around in other people's files.
• 4) Thou shalt not use a computer to steal.
• 5) Thou shalt not use a computer to bear false witness.
Ethics In Information Tech.
• 6) Thou shalt not use or copy software for which you have
not paid.
• 7) Thou shalt not use other people's computer resources
without authorisation.
• 8) Thou shalt not appropriate other people's intellectual
output.
• 9) Thou shalt think about the social consequences of the
program you write.
• 10) Thou shalt use a computer in ways that show
consideration and respect.
Ethics In Information Tech.
What is Computer Virus?
• Computer viruses are small software programs that
are designed to spread from one computer to another
and to interfere with computer operation.
Ethics In Information Tech.
Spreading of Virus
• Virus are most easily spread,
• Spread through E-mail Attachments,
– Instant Messaging messages,
– Funny Images,
– Audio and Videos files,
– Downloading files from Internet,
– Greeting cards and many more.
Ethics In Information Tech.
Steps to help avoid Viruses
• Use an Internet firewall,
• Subscribe to industry standard antivirus
software,
• Never open an e-mail attachment from someone
you don't know,
• Scan each and every attachment,
• Rules to be followed, while surfing net
Ethics In Information Tech.
Computer Crime
• IT Infrastructure
• Illegal access
• Illegal Interuption
• Data Interfare
• System Interfrence
• Misuse Of Devices
• Electronic Fraud
Ethics In Information Tech.
TYPES OF COMPUTER CRIMES
• TARGET OF THE CRIME
• MEDIUM OF THE ATTACK
• TOOL
• INTIMIDATE OR DECEIVE
Ethics and Information Tech.
Types of Computer Criminal
• Outsiders
• Insiders
Ethics In Information Tech.
REASON FOR COMPUTER
CRIME
• ECONOMIC
• IDEOLOGICAL
• PSYCHOLOGICAL
• EGOCENTRIC
Ethics In Information Tech.
METHODS OF ATTACK
• DATA TAMPERING
• Programming Techniques
• OTHER METHODS
Ethics In Information Tech.
Software piracy and Hacking
Ethics In Information Tech.
What is
PIRACY???????
Reselling Media
 Downloading from a website
 Taping songs
Buying a used book or CD
Watching broadcast television but skipping commercials
Ethics In Information Tech.
Types of PIRACY
• End User Piracy
• Client – Server Piracy
• Internet Piracy
• Hard-Disk Piracy
• Software Counterfeiting
Ethics In Information Tech.
HACKER
• Some one who bypasses the system’s access controls by
taking advantage of security weaknesses left in the
system by developers .
• SYSTEM
Access confidential information
Threaten someone from YOUR computer
Broadcast your confidential letters or materials .
Store illegal material
Ethics In Information Tech.
Evils of Hacking
• Compromise the security of system without permission
from an authorized party, usually with the intent of
accessing computers connected to the network.
Ethics In Information Tech.
Advantages of Hacking
• To determine problem and weakness for program
• Creation of firewall
• Useful for military purpose and spying
• Better computer security
Ethics In Information Tech.
ETHICAL
DILEMMAS
AND
CONSIDERATIONS
Ethics In Information Tech.
Ethical dilemmas in IT
Dilemmas are discussed in relation to four
areas-
• Privacy
• Information accuracy
• Access to information
• Intellectual property rights
Ethics In Information Tech.
Ethical dilemmas in
relation to IT
• PLAGIARISM-The taking of ideas, writing and
drawings or other similar intellectual property
created by others and presenting it as your own.
• NETIQUETTE-A set of rules (mainly unwritten)
to follow while you are online.
Ethics In Information Tech.
HOW CAN WE STOP IT
• Internet crime prevention.
• Prevention of cyber crime
• Prevention of computer crime in banking
• IT security
• Computer crime prevention law
• Hi tech crime prevention law
• Computer crime preventing on line fraud
• World risk investigation and terrorist prevention
Ethics In Information Tech.
CONCLUSION
https://www.facebook.com/erwinglobio
https://www.facebook.com/erwinglobio
Ethics for IT Professionals

More Related Content

What's hot

Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
SKS
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
mtvvvv
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
stanbridge
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
Kathirvel Ayyaswamy
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
UNIVERSITAS TEKNOKRAT INDONESIA
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
shahmansoor109
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
Jose Luis Leon Gonzalez
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it usersBhanja Kishor Samudra
 
Information security
Information securityInformation security
Information security
avinashbalakrishnan2
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
kelly kusmulyono
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
Dyuti Islam
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
RoshanMaharjan13
 
computing profession and core skills
computing profession and core skillscomputing profession and core skills
computing profession and core skills
Hamza Cheema
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rights
Hamza Cheema
 

What's hot (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Information security
Information securityInformation security
Information security
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
cyber security
cyber securitycyber security
cyber security
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
computing profession and core skills
computing profession and core skillscomputing profession and core skills
computing profession and core skills
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rights
 

Viewers also liked

Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technologyWish Mrt'xa
 
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technology
SJBennett228
 
The Causes, Consequences and Catastrophe of World War 1
The Causes, Consequences and Catastrophe of World War 1The Causes, Consequences and Catastrophe of World War 1
The Causes, Consequences and Catastrophe of World War 1
Peter Hammond
 
Collateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisationsCollateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisations
PECB
 
Towards a Capacity-Building and Apprenticeship Education within African Nations
Towards a Capacity-Building and Apprenticeship Education within African Nations Towards a Capacity-Building and Apprenticeship Education within African Nations
Towards a Capacity-Building and Apprenticeship Education within African Nations
Abdeslam Badre, PhD
 
WORLD WAR 1 CAUSES AND EFFECTS
WORLD WAR 1 CAUSES AND EFFECTSWORLD WAR 1 CAUSES AND EFFECTS
WORLD WAR 1 CAUSES AND EFFECTSJason Pacaway
 

Viewers also liked (7)

Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technology
 
Causes of WWI
Causes of WWICauses of WWI
Causes of WWI
 
The Causes, Consequences and Catastrophe of World War 1
The Causes, Consequences and Catastrophe of World War 1The Causes, Consequences and Catastrophe of World War 1
The Causes, Consequences and Catastrophe of World War 1
 
Collateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisationsCollateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisations
 
Towards a Capacity-Building and Apprenticeship Education within African Nations
Towards a Capacity-Building and Apprenticeship Education within African Nations Towards a Capacity-Building and Apprenticeship Education within African Nations
Towards a Capacity-Building and Apprenticeship Education within African Nations
 
WORLD WAR 1 CAUSES AND EFFECTS
WORLD WAR 1 CAUSES AND EFFECTSWORLD WAR 1 CAUSES AND EFFECTS
WORLD WAR 1 CAUSES AND EFFECTS
 

Similar to Ethics for IT Professionals

Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
tushki92
 
Online ethics
Online ethicsOnline ethics
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
CRM
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
Sifat Hossain
 
9. Computer Ethics.ppt
9. Computer Ethics.ppt9. Computer Ethics.ppt
9. Computer Ethics.ppt
asm071149
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Benjamin Sangalang
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
Dibyesh1
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
Computer Security
Computer SecurityComputer Security
Cyber security
Cyber securityCyber security
Cyber security
TanmoyMaitra
 
sc.pptx
sc.pptxsc.pptx
Cyber crime
Cyber crimeCyber crime
Cyber crime
Niraj Solanke
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
Theko Moima
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 akibrutry
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
Mohamed Madar
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
Cyber ethics.pptx
Cyber ethics.pptxCyber ethics.pptx
Cyber ethics.pptx
GagandeepSinghJass
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
FannyKwok1
 

Similar to Ethics for IT Professionals (20)

Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
9. Computer Ethics.ppt
9. Computer Ethics.ppt9. Computer Ethics.ppt
9. Computer Ethics.ppt
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
sc.pptx
sc.pptxsc.pptx
sc.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 a
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Cyber ethics.pptx
Cyber ethics.pptxCyber ethics.pptx
Cyber ethics.pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 
Hacking
HackingHacking
Hacking
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 

More from Prof. Erwin Globio

Embedded System Presentation
Embedded System PresentationEmbedded System Presentation
Embedded System Presentation
Prof. Erwin Globio
 
BSCS | BSIT Thesis Guidelines
BSCS | BSIT Thesis GuidelinesBSCS | BSIT Thesis Guidelines
BSCS | BSIT Thesis Guidelines
Prof. Erwin Globio
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Prof. Erwin Globio
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic ConfigurationProf. Erwin Globio
 
Introduction to iOS Apps Development
Introduction to iOS Apps DevelopmentIntroduction to iOS Apps Development
Introduction to iOS Apps DevelopmentProf. Erwin Globio
 
Introduction to Android Development Latest
Introduction to Android Development LatestIntroduction to Android Development Latest
Introduction to Android Development LatestProf. Erwin Globio
 
iOS Apps Development (SQLite Tutorial Part 2)
iOS Apps Development (SQLite Tutorial Part 2)iOS Apps Development (SQLite Tutorial Part 2)
iOS Apps Development (SQLite Tutorial Part 2)Prof. Erwin Globio
 
iOS Apps Development (SQLite Tutorial Part 1)
iOS Apps Development (SQLite Tutorial Part 1)iOS Apps Development (SQLite Tutorial Part 1)
iOS Apps Development (SQLite Tutorial Part 1)Prof. Erwin Globio
 
Introduction to Computer Programming
Introduction to Computer ProgrammingIntroduction to Computer Programming
Introduction to Computer ProgrammingProf. Erwin Globio
 
Android Fragments
Android FragmentsAndroid Fragments
Android Fragments
Prof. Erwin Globio
 
Solutions to Common Android Problems
Solutions to Common Android ProblemsSolutions to Common Android Problems
Solutions to Common Android Problems
Prof. Erwin Globio
 
Android Development Tools and Installation
Android Development Tools and InstallationAndroid Development Tools and Installation
Android Development Tools and Installation
Prof. Erwin Globio
 
Java Collections Tutorials
Java Collections TutorialsJava Collections Tutorials
Java Collections Tutorials
Prof. Erwin Globio
 
Action Bar in Android
Action Bar in AndroidAction Bar in Android
Action Bar in Android
Prof. Erwin Globio
 
Resource Speaker
Resource SpeakerResource Speaker
Resource Speaker
Prof. Erwin Globio
 

More from Prof. Erwin Globio (20)

Embedded System Presentation
Embedded System PresentationEmbedded System Presentation
Embedded System Presentation
 
BSCS | BSIT Thesis Guidelines
BSCS | BSIT Thesis GuidelinesBSCS | BSIT Thesis Guidelines
BSCS | BSIT Thesis Guidelines
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Networking Trends
Networking TrendsNetworking Trends
Networking Trends
 
Sq lite presentation
Sq lite presentationSq lite presentation
Sq lite presentation
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
Introduction to iOS Apps Development
Introduction to iOS Apps DevelopmentIntroduction to iOS Apps Development
Introduction to iOS Apps Development
 
Cloud Computing Latest
Cloud Computing LatestCloud Computing Latest
Cloud Computing Latest
 
Introduction to Android Development Latest
Introduction to Android Development LatestIntroduction to Android Development Latest
Introduction to Android Development Latest
 
iOS Apps Development (SQLite Tutorial Part 2)
iOS Apps Development (SQLite Tutorial Part 2)iOS Apps Development (SQLite Tutorial Part 2)
iOS Apps Development (SQLite Tutorial Part 2)
 
iOS Apps Development (SQLite Tutorial Part 1)
iOS Apps Development (SQLite Tutorial Part 1)iOS Apps Development (SQLite Tutorial Part 1)
iOS Apps Development (SQLite Tutorial Part 1)
 
A tutorial on C++ Programming
A tutorial on C++ ProgrammingA tutorial on C++ Programming
A tutorial on C++ Programming
 
Overview of C Language
Overview of C LanguageOverview of C Language
Overview of C Language
 
Introduction to Computer Programming
Introduction to Computer ProgrammingIntroduction to Computer Programming
Introduction to Computer Programming
 
Android Fragments
Android FragmentsAndroid Fragments
Android Fragments
 
Solutions to Common Android Problems
Solutions to Common Android ProblemsSolutions to Common Android Problems
Solutions to Common Android Problems
 
Android Development Tools and Installation
Android Development Tools and InstallationAndroid Development Tools and Installation
Android Development Tools and Installation
 
Java Collections Tutorials
Java Collections TutorialsJava Collections Tutorials
Java Collections Tutorials
 
Action Bar in Android
Action Bar in AndroidAction Bar in Android
Action Bar in Android
 
Resource Speaker
Resource SpeakerResource Speaker
Resource Speaker
 

Recently uploaded

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

Ethics for IT Professionals

  • 1. PROF. ERWIN M. GLOBIO, MSIT )
  • 2. • What is Ethics and Information Technology?? • Ethical issues relating to computer application • Security Threats – Computer Viruses – Cyber Crime – Software piracy and Hacking – Computer crime prevention – Ethical dilemmas and consideration Ethics In Information Tech.
  • 3. Ethics • Derived from the Greek word “ethos”, which means “custom”, “habit”, and “way of living” • Definition: "the discipline and practice of applying value to human behavior, resulting in meaningful conduct.“ Ethics In Information Tech.
  • 4. Computer Ethics • Computer ethics defined as the application of classical ethical principles to the use of computer technology. • Ethical problems related to computers: – Privacy •Computers create a false sense of security •People do not realize how vulnerable information stored on computers are – Property •Physical property •Intellectual property •Data as property Ethics In Information Tech.
  • 5. • Access – Access to computing technology – Access to data • Accuracy – Accuracy of information stored • Hacking, cracking and virus creation • Software piracy Ethics In Information Tech.
  • 6. The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. • 1) Thou shalt not use a computer to harm other people. • 2) Thou shalt not interfere with other people's computer work. • 3) Thou shalt not snoop around in other people's files. • 4) Thou shalt not use a computer to steal. • 5) Thou shalt not use a computer to bear false witness. Ethics In Information Tech.
  • 7. • 6) Thou shalt not use or copy software for which you have not paid. • 7) Thou shalt not use other people's computer resources without authorisation. • 8) Thou shalt not appropriate other people's intellectual output. • 9) Thou shalt think about the social consequences of the program you write. • 10) Thou shalt use a computer in ways that show consideration and respect. Ethics In Information Tech.
  • 8. What is Computer Virus? • Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. Ethics In Information Tech.
  • 9. Spreading of Virus • Virus are most easily spread, • Spread through E-mail Attachments, – Instant Messaging messages, – Funny Images, – Audio and Videos files, – Downloading files from Internet, – Greeting cards and many more. Ethics In Information Tech.
  • 10. Steps to help avoid Viruses • Use an Internet firewall, • Subscribe to industry standard antivirus software, • Never open an e-mail attachment from someone you don't know, • Scan each and every attachment, • Rules to be followed, while surfing net Ethics In Information Tech.
  • 11. Computer Crime • IT Infrastructure • Illegal access • Illegal Interuption • Data Interfare • System Interfrence • Misuse Of Devices • Electronic Fraud Ethics In Information Tech.
  • 12. TYPES OF COMPUTER CRIMES • TARGET OF THE CRIME • MEDIUM OF THE ATTACK • TOOL • INTIMIDATE OR DECEIVE Ethics and Information Tech.
  • 13. Types of Computer Criminal • Outsiders • Insiders Ethics In Information Tech.
  • 14. REASON FOR COMPUTER CRIME • ECONOMIC • IDEOLOGICAL • PSYCHOLOGICAL • EGOCENTRIC Ethics In Information Tech.
  • 15. METHODS OF ATTACK • DATA TAMPERING • Programming Techniques • OTHER METHODS Ethics In Information Tech.
  • 16. Software piracy and Hacking Ethics In Information Tech.
  • 17. What is PIRACY??????? Reselling Media  Downloading from a website  Taping songs Buying a used book or CD Watching broadcast television but skipping commercials Ethics In Information Tech.
  • 18. Types of PIRACY • End User Piracy • Client – Server Piracy • Internet Piracy • Hard-Disk Piracy • Software Counterfeiting Ethics In Information Tech.
  • 19. HACKER • Some one who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers . • SYSTEM Access confidential information Threaten someone from YOUR computer Broadcast your confidential letters or materials . Store illegal material Ethics In Information Tech.
  • 20. Evils of Hacking • Compromise the security of system without permission from an authorized party, usually with the intent of accessing computers connected to the network. Ethics In Information Tech.
  • 21. Advantages of Hacking • To determine problem and weakness for program • Creation of firewall • Useful for military purpose and spying • Better computer security Ethics In Information Tech.
  • 23. Ethical dilemmas in IT Dilemmas are discussed in relation to four areas- • Privacy • Information accuracy • Access to information • Intellectual property rights Ethics In Information Tech.
  • 24. Ethical dilemmas in relation to IT • PLAGIARISM-The taking of ideas, writing and drawings or other similar intellectual property created by others and presenting it as your own. • NETIQUETTE-A set of rules (mainly unwritten) to follow while you are online. Ethics In Information Tech.
  • 25. HOW CAN WE STOP IT • Internet crime prevention. • Prevention of cyber crime • Prevention of computer crime in banking • IT security • Computer crime prevention law • Hi tech crime prevention law • Computer crime preventing on line fraud • World risk investigation and terrorist prevention Ethics In Information Tech.
  • 27.