SlideShare a Scribd company logo
1 of 8
Table of Contents
Introduction to Computing Ethics
Philosophy of Ethics
Cracking and Hacking of Computing
Ethics
Computing Ethics
It refers to the ways in which ethical traditions and
norms are tested, applied and stretched in computer
world
Computing Ethics are studied in six topics
Globalization
Privacy and Anonymity
Computers in the workplace
Computer crime
Intellectual Property
Professional Responsibility
Globalization
Computer and computer networks do not know any
boundaries so computing ethics are globalized
Global laws
Global Cyber business
Global Education
Privacy and Anonymity
Conflict between personal privacy and company rules
Organizations check proper use of their computers but
employers want anonymity
Computers in the Workplace
Challenge is to facilitate harmony between personal
ethical norms, peers' ethical norms, and
organizational norms, and eliminate confusion
between them
Computer Crime
 Fraud and Information Theft
Software Piracy
Viruses
Hacking and Cracking
Intellectual Property
Intellectual property refers as having one’s own
genuine concept, idea and invention
Professional Responsibility
Integrity
Objectivity
Intellectual honesty and impartiality
Competence
Philosophy of Computing Ethics
Investigation of the basic nature and principles of
computers and the process of computation.
Computing is discussed in different philosophical aspects
as
 Data, representation and information
Hacking and Cracking
A person that seeks to understand computer, phone or
other systems for the satisfaction of having that
knowledge is known as Hacker
A malicious hacker that gets into all kinds of mischief,
causing harm, changing data, or stealing is known as
cracker
Black hat hackers/Crackers
That use their skills to break into computers
They are punished when caught
White hat hackers/Crackers
That use their skills to detect intrusions and are
hired by organizations

More Related Content

What's hot

Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialistheidirobison
 
La3 Tcp Ip
La3 Tcp IpLa3 Tcp Ip
La3 Tcp IpCma Mohd
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethicsKriscila Yumul
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityJamie Hutt
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemFaHaD .H. NooR
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacymrzapper
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technologyjvonschilling
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Careers in ethical hacking
Careers in ethical hackingCareers in ethical hacking
Careers in ethical hackingentranzz123
 
Careers in ethical hacking
Careers in ethical hackingCareers in ethical hacking
Careers in ethical hackingentranzz123
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation dhirujapla
 

What's hot (20)

Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
 
La3 Tcp Ip
La3 Tcp IpLa3 Tcp Ip
La3 Tcp Ip
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And Security
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Cover Letter
Cover LetterCover Letter
Cover Letter
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Analysis the attack and E-commerce security
Analysis the attack and E-commerce securityAnalysis the attack and E-commerce security
Analysis the attack and E-commerce security
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Careers in ethical hacking
Careers in ethical hackingCareers in ethical hacking
Careers in ethical hacking
 
Careers in ethical hacking
Careers in ethical hackingCareers in ethical hacking
Careers in ethical hacking
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Information security presentation
Information security presentationInformation security presentation
Information security presentation
 

Viewers also liked

Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksSrikanth VNV
 
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...phanleson
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008Jim Geovedi
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hackingleminhvuong
 
인터파크노티투미 매체소개서 20140612_메조미디어
인터파크노티투미 매체소개서 20140612_메조미디어인터파크노티투미 매체소개서 20140612_메조미디어
인터파크노티투미 매체소개서 20140612_메조미디어Junhwa Kim
 
Семінар з фізики
Семінар з фізикиСемінар з фізики
Семінар з фізикиTeslevych
 
20101215 learning files consulting students
20101215 learning files  consulting students20101215 learning files  consulting students
20101215 learning files consulting studentslievle
 
K meyer jcc version ii
K meyer jcc version iiK meyer jcc version ii
K meyer jcc version iiguestcbdb7b
 
savannah bubin
savannah bubinsavannah bubin
savannah bubinLigScience
 
WhatsOnAtTheEdge
WhatsOnAtTheEdgeWhatsOnAtTheEdge
WhatsOnAtTheEdgeSarah Brown
 
Øyvind Solstad - Trysilseminaret2010
Øyvind Solstad - Trysilseminaret2010Øyvind Solstad - Trysilseminaret2010
Øyvind Solstad - Trysilseminaret2010Destinasjon Trysil
 
Terrazzo adhesive
Terrazzo adhesiveTerrazzo adhesive
Terrazzo adhesiveola olu
 

Viewers also liked (20)

Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Wonders & Worries
Wonders & WorriesWonders & Worries
Wonders & Worries
 
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
Hacking
HackingHacking
Hacking
 
basic knowhow hacking
basic knowhow hackingbasic knowhow hacking
basic knowhow hacking
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Swine Flu Info
Swine Flu InfoSwine Flu Info
Swine Flu Info
 
인터파크노티투미 매체소개서 20140612_메조미디어
인터파크노티투미 매체소개서 20140612_메조미디어인터파크노티투미 매체소개서 20140612_메조미디어
인터파크노티투미 매체소개서 20140612_메조미디어
 
Семінар з фізики
Семінар з фізикиСемінар з фізики
Семінар з фізики
 
20101215 learning files consulting students
20101215 learning files  consulting students20101215 learning files  consulting students
20101215 learning files consulting students
 
Prueba
PruebaPrueba
Prueba
 
K meyer jcc version ii
K meyer jcc version iiK meyer jcc version ii
K meyer jcc version ii
 
savannah bubin
savannah bubinsavannah bubin
savannah bubin
 
2010-11 Academic Program Information
2010-11 Academic Program Information2010-11 Academic Program Information
2010-11 Academic Program Information
 
WhatsOnAtTheEdge
WhatsOnAtTheEdgeWhatsOnAtTheEdge
WhatsOnAtTheEdge
 
Øyvind Solstad - Trysilseminaret2010
Øyvind Solstad - Trysilseminaret2010Øyvind Solstad - Trysilseminaret2010
Øyvind Solstad - Trysilseminaret2010
 
Terrazzo adhesive
Terrazzo adhesiveTerrazzo adhesive
Terrazzo adhesive
 
HSGR
HSGRHSGR
HSGR
 

Similar to Ethics slides

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptxMohammedAish
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.pptKaty Kate
 
computer ethics
computer ethicscomputer ethics
computer ethicsHoney jose
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptxMuruganS82
 
3.0 computer ethic
3.0 computer ethic3.0 computer ethic
3.0 computer ethicfauzihayob
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.pptpixvilx
 

Similar to Ethics slides (20)

Ethics in Computing.pptx
Ethics in Computing.pptxEthics in Computing.pptx
Ethics in Computing.pptx
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.ppt
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Ethics in IT
Ethics in ITEthics in IT
Ethics in IT
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 
3.0 computer ethic
3.0 computer ethic3.0 computer ethic
3.0 computer ethic
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Ethics slides

  • 1.
  • 2. Table of Contents Introduction to Computing Ethics Philosophy of Ethics Cracking and Hacking of Computing Ethics
  • 3. Computing Ethics It refers to the ways in which ethical traditions and norms are tested, applied and stretched in computer world Computing Ethics are studied in six topics Globalization Privacy and Anonymity Computers in the workplace Computer crime Intellectual Property Professional Responsibility
  • 4. Globalization Computer and computer networks do not know any boundaries so computing ethics are globalized Global laws Global Cyber business Global Education Privacy and Anonymity Conflict between personal privacy and company rules Organizations check proper use of their computers but employers want anonymity
  • 5. Computers in the Workplace Challenge is to facilitate harmony between personal ethical norms, peers' ethical norms, and organizational norms, and eliminate confusion between them Computer Crime  Fraud and Information Theft Software Piracy Viruses Hacking and Cracking
  • 6. Intellectual Property Intellectual property refers as having one’s own genuine concept, idea and invention Professional Responsibility Integrity Objectivity Intellectual honesty and impartiality Competence
  • 7. Philosophy of Computing Ethics Investigation of the basic nature and principles of computers and the process of computation. Computing is discussed in different philosophical aspects as  Data, representation and information Hacking and Cracking A person that seeks to understand computer, phone or other systems for the satisfaction of having that knowledge is known as Hacker A malicious hacker that gets into all kinds of mischief, causing harm, changing data, or stealing is known as cracker
  • 8. Black hat hackers/Crackers That use their skills to break into computers They are punished when caught White hat hackers/Crackers That use their skills to detect intrusions and are hired by organizations