This document discusses professional practices and computer ethics. It begins with background on ethics according to Socrates, defining ethics as knowing the difference between right and wrong. It then defines computer ethics and its components: responsibility, ownership, access, and personal privacy. The document then discusses the impact of cybercrime such as fraud, sabotage, and hacking. It provides examples of computer ethics cases and concludes with discussing the 10 commandments of computer ethics.
In this Slide we are Covering a Meaning of Computer Ethics and and Common Issues of Computer ethics.
Ethics is a set of moral principles that govern the behavior of an individual or group of people.
Meaning-:
Computer ethics is the application of moral principles to the use of computers and the Internet. Examples include intellectual property rights, privacy policies, and online etiquette, or "netiquette
In this Slide we are Covering a Meaning of Computer Ethics and and Common Issues of Computer ethics.
Ethics is a set of moral principles that govern the behavior of an individual or group of people.
Meaning-:
Computer ethics is the application of moral principles to the use of computers and the Internet. Examples include intellectual property rights, privacy policies, and online etiquette, or "netiquette
INTRODUCTION TO COMPUTER FORENSICS
Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques – Incident and incident response methodology – Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. – Forensics Technology and Systems – Understanding Computer Investigation – Data Acquisition.
INTRODUCTION TO COMPUTER FORENSICS
Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques – Incident and incident response methodology – Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. – Forensics Technology and Systems – Understanding Computer Investigation – Data Acquisition.
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
Technology development is a necessity. Information and Communication Technology is a large dome of terminology that includes all technical equipment for processing and conveying information. It has also caused the world's relationships to be unconstrained. It's here and now means it's somewhere else and now. In every line of technological life present that contributes its role to the desired coveted will be better. That dream is in fact two blades facing each other. In the body of one knife exactly each other. On the one hand technology contributes to the improvement of welfare, progress, and human civilization. Furthermore, on the other hand, technology can be an instrument in the act against the law. With human information technology then likes getting a vehicle to burst its criminal lust. Criminal crime by taking technology as a medium, then manifested in various forms. These forms include hacking, cracking, and so on. Do not be surprised if for example your balance arrives – suddenly reduced, or the bank hundreds of millions in
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
2. Background Of Ethics
Ethics: a set of beliefs about right and
wrong behavior.
According to Socrates (Greek philosopher, 477 - 399
BC):People will naturally do what is good, if they know what
is right
Evil or bad actions (Hacking Cyber Crimes)are the result of
unawareness about right and wrong
so, if a criminal were truly aware of the mental and
spiritual consequences of his actions, he would neither
commit nor even consider committing them
therefore, any person who knows what is truly right will
automatically do it
3. Definition
Ethics: “The science of morals; the department of study
concerned with the principles of human duty. The moral
principles by which a person is guided.” – Oxford
English Dictionary
Moral: “Of or pertaining to character or
disposition, considered as good or bad, virtuous or
vicious; of or pertaining to the distinction between right
and wrong, or good and evil, in relation to the
actions, volitions, or character of responsible beings;
ethical.” – Oxford English Dictionary
Terms will be used interchangeably –
basically, knowing the difference between right
and wrong.
4. Introduction
In the industrialized world computers are changing
everything: from education to health, from voting to
making friends or making war.
Developing countries can also fully participate in
cyberspace and make use of opportunities offered by
global networks.
We are living a technological and informational
revolution.
It is therefore important for policy
makers, leaders, teachers, computer professionals and
all social thinkers to get involved in the social and
ethical impacts of this communication technology.
5. Computer Ethics
The components of an ethical computer system are
responsibility, ownership, access and personal privacy.
◦ Responsibility concerns the accuracy and accountability of the
information (using information properly)
◦ Ownership deals with who has the right to use the information
(information belongs to)
◦ Access deals with who is allowed to use, view, store and process
the information. (eligible to use information)
◦ Personal privacy addresses the question of who the information
belongs to (respect of personal information)
6. Impact of Cyber-Crime
1. Fraud and Embezzlement
The most significant losses to businesses
from computer crime come from employees.
Losses from credit card fraud are estimated
to be between $1and $4 billion per year.
ATM fraud accounts for losses of about $60 million a
year
Telecommunications fraud estimated around $1 to
$9 billion each year.
Why? Tradeoff between convenience and security
7. 2. Sabotage and Information Theft
Direct destruction of hardware, software or
information
Use of “logic bombs”
An employee fired from an insurance company was
convicted for destroying more than 160,000 records.
British Airways paid a competitor $4 million after
hacking into their computers and stealing passenger
lists.
Identity Theft (Information Collection, Privacy
8. 3. Hacking and Cracking
Kevin Mitnick, a notorious hacker, was arrested in 1995.
He allegedly stole thousands of files from a computer
security expert, credit card numbers, and unreleased
software. (Book: Takedown by T. Shimomura)
High-Tech Low-Tech tricks:
Social Engineering, Shoulder Surfing
Clifford Stoll’s The Cuckoo’s Egg written about tracking a
German hacker.
In the 1970’s John Draper discovered that the whistle in a
cereal box could be used to fool the telephone system
into giving free long-distance calls.
9. Cyberethics and cybertechnology
Cyber-technology refers to a broad range of
technologies from stand-alone computers to the
cluster of networked computing, information and
communication technologies.
Cyber-ethics is the field of applied ethics that
examines moral, legal, and social issues in the
development and use of Cyber-technology.
Internet ethics and information ethics.
10. Computer ethics: definition
Same as cyber-ethics, or
The study of ethical issues that are associated
primarily with computing machines and the
computing profession.
The field of applied professional ethics dealing with
ethical problems transformed, or created by
computer technology
11. Computer Ethics:
Some historical milestones
1940-1950: Founded by MIT prof Norbert Wiener:
cybernetics-science of information feedback
systems.
1960s: Donn Parker from California examined
unethical and illegal uses of computers by
professionals. 1st code of professional conduct for
the ACM.
1970: Joseph Weizenbaum, prof at MIT, created
Eliza.
Mid 1970: Walter Maner taught 1st course and
12. Computer ethics history (cont.)
1980: Issues like computer-enabled
crime, disasters, invasion of privacy via
databases, law suits about software ownership
became public.
Mid 80s: James Moore of Darmouth,
Deborah Johnson of Rensselaer, Sherry Turkle of
MIT, and Judith Perrole published article and books.
13. Computer ethics history (cont.)
1990: Interest in computer ethics as a field of
research had spread to Europe and Australia.
Simon Rogerson of De Montfort University (UK)
Terrell Bynum, editor of Metaphilosophy
(USA), initiated international conferences.
Mid 90s: Beginning of a 2nd generation of computer
ethics with more practical action.
2004: Interest spreads to Cotonou, Benin
14. Any unique moral issues?
Deborah Johnson: Ethics on-line
The scope of the Internet is global and interactive.
The Internet enables users to interact with privacy.
Internet technology makes the reproducibility of
information possible in ways not possible before.
The above features make behavior on-line morally
different than off-line.
15. The debate continues:
James Moore: Computer technology is “logically
malleable” unlike previous technologies. It can
create “new possibilities for human action”.
Brey: disclosing non-obvious features embedded in
computer systems that can have moral implications.
Alison Adams: Take into account gender-related
biases. Combine feminist ethics with empirical
studies.
16. Sample topics in computer ethics
Computers in the workplace: a threat to jobs? De-
skilling? Health and safety?
Computer security: Viruses. Spying by hackers.
Logical security:
Privacy, integrity, consistency, controlling access to
resources.
Software ownership: Intellectual property vs. open
source.
Software development: quality, safety
17. Computers in the workplace
Monitoring of employees: employer vs. employee
point of view.
Loyalty
Health issues.
Use of contingent workers.
A threat to jobs.
De-skilling.
19. Logical security
Privacy invasion of email, files, and
own computer (cookies).
Shared databases.
Identity theft.
Combating terrorism: USA Patriot act.
20. Software ownership
Knowledge: private greed, public good.
Profit vs. affordability
Freedom of expression and access to information
Right to communicate: share and learn in a
globalized world.
Digital divide is immoral.
Open source software: Linux. Open access.
North-South information flow. Indigenous
knowledge.
21. Codes of ethics
Avoid harm to others
Be honest and trustworthy
Acquire and maintain professional competence
Know and respect existing laws pertaining to
professional work
No personal interest
Be honest and realistic in stating claims or estimates
based on available data
22. Cases in 2012
Cyber criminals target
Skype, Facebook and Windows
users
Cyber criminals targeted users of
Skype, Facebook and Windows using
multiple Blackhole exploits in
October, according to the latest threat
report from security firm GFI Software.
Researchers uncovered a large
number of Blackhole exploits disguised
as Windows licences, Facebook
accountverification emails, Skype
23. Cases Continues
Cyber attackers increasingly targeting
applications, research shows
Web and mobile applications are the new frontiers in
the war against cyber attack, according to a top
cyber security risks report from Hewlett Packard
(HP) published in May.
The report reveals that SQL injection (SQLi) attacks
on web applications increased sharply from around
15 million in 2010 to more than 50 million in 2011.
24. Case Continues
Therac-25
Therac-25 was a medical linear
accelerator, a device used to treat cancer.
What made Therac-25 unique at the time
of its use was the software. Not only did
the software ease the laborious set-up
process, but it also monitored the safety
of the machine. In this case on safety
critical software, you will find that some
patients received much more radiation
than prescribed despite the software
25. Case Continues
Machado
At age19, Richard Machado
was the first individual to be
convicted of a federal
electronic mail (e-mail) hate
crime. The Machado case is
one example of a handful of
similar incidents that have
occurred since the advent
of the Internet.
26. Case Continues
Hughes Aircraft
Between 1985 and 1987, the
Microelectronic Circuits Division of
Hughes Aircraft shipped hybrid
microelectronics to every branch of
the U.S. military without completing
various environmental chip testing
processes required by contract. This
is a whistle-blower case where the
allegations against Hughes Aircraft
resulted in a criminal case and a civil
27. Cyber-Crime Cases
For more Cyber cases follow the link below
http://www.computerweekly.com/news/2240174301/
Top-10-cyber-crime-stories-of-2012
http://abcnews.go.com/US/harvard-ethics-student-
charged-hacking-mit-computer/story?id=14110364
28. Ten Commandments
1. Not use a computer to harm other people. This is
the foundation for computer ethics.
29. Ten Commandments
2. Not interfere with other people’s computer work.
Such as sending numerous thoughtless e-mails to
larger issues like purposely sending computer
viruses.
30. Ten Commandments
3. Not snoop around in other people’s computer
files. Don’t go looking through other people’s
computer files unless given permission.
32. Ten Commandments
5. Not use a computer to bear false witness. Don’t
spread rumors or change your email address so that
the receiver of an email believes that it came from
someone other than yourself.
33. Ten Commandments
6. Not copy or use proprietary software for which
you have not paid. Once you buy a software
system, music CD or DVD you should not make
copies of that information and distribute it to your
friends.
34. Ten Commandments
7. Not use other people’s computer resources
without authorization or proper compensation. This
means do not surf the internet or print off large
amounts of paper for personal use during work
hours.
35. Ten Commandments
8. Not appropriate other people’s intellectual output.
Don’t upload information and take credit for it such
as music, images and text.
36. Ten Commandments
9. Think about the social consequences of the
program you are writing or the system you are
designing.
37. Ten Commandments
10. Use a computer in ways that ensure consideration
and respect for your fellow humans. Just because you
can’t always see someone face to face doesn’t give
you the right to offer any less respect then you would
offer in a personal encounter.
39. International Papers Links
http://www.ijie.org, International Journal of
Information Ethics.
www.sans.org/topten.htm Top ten Internet security
flaws that system administrators must eliminate to
avoid becoming an easy target.
http://ethics.csc.ncsu.edu/ Computer ethics as a
map.
http://www.neiu.edu/~ncaftori/ethics-course.htm
The ethics course I borrowed these overheads from.
40. Home Assignment
You need to read the following link presentation
http://www.wmburgweb.com/Resources/Presentatio
ns/Copyright/sld001.htm
http://www.isaca.org/Journal/Past-
Issues/2008/Volume-6/Documents/jpdf0806-
computer-ethics.pdf