SlideShare a Scribd company logo
Professional Practices
Computer Ethics
Syed Saqib Raza Rizvi
Background Of Ethics
 Ethics: a set of beliefs about right and
wrong behavior.
 According to Socrates (Greek philosopher, 477 - 399
BC):People will naturally do what is good, if they know what
is right
 Evil or bad actions (Hacking Cyber Crimes)are the result of
unawareness about right and wrong
 so, if a criminal were truly aware of the mental and
spiritual consequences of his actions, he would neither
commit nor even consider committing them
 therefore, any person who knows what is truly right will
automatically do it
Definition
 Ethics: “The science of morals; the department of study
concerned with the principles of human duty. The moral
principles by which a person is guided.” – Oxford
English Dictionary
 Moral: “Of or pertaining to character or
disposition, considered as good or bad, virtuous or
vicious; of or pertaining to the distinction between right
and wrong, or good and evil, in relation to the
actions, volitions, or character of responsible beings;
ethical.” – Oxford English Dictionary
 Terms will be used interchangeably –
basically, knowing the difference between right
and wrong.
Introduction
 In the industrialized world computers are changing
everything: from education to health, from voting to
making friends or making war.
 Developing countries can also fully participate in
cyberspace and make use of opportunities offered by
global networks.
 We are living a technological and informational
revolution.
 It is therefore important for policy
makers, leaders, teachers, computer professionals and
all social thinkers to get involved in the social and
ethical impacts of this communication technology.
Computer Ethics
 The components of an ethical computer system are
responsibility, ownership, access and personal privacy.
◦ Responsibility concerns the accuracy and accountability of the
information (using information properly)
◦ Ownership deals with who has the right to use the information
(information belongs to)
◦ Access deals with who is allowed to use, view, store and process
the information. (eligible to use information)
◦ Personal privacy addresses the question of who the information
belongs to (respect of personal information)
Impact of Cyber-Crime
1. Fraud and Embezzlement
 The most significant losses to businesses
 from computer crime come from employees.
 Losses from credit card fraud are estimated
 to be between $1and $4 billion per year.
 ATM fraud accounts for losses of about $60 million a
year
 Telecommunications fraud estimated around $1 to
$9 billion each year.
 Why? Tradeoff between convenience and security
2. Sabotage and Information Theft
 Direct destruction of hardware, software or
information
 Use of “logic bombs”
 An employee fired from an insurance company was
convicted for destroying more than 160,000 records.
 British Airways paid a competitor $4 million after
hacking into their computers and stealing passenger
lists.
 Identity Theft (Information Collection, Privacy
3. Hacking and Cracking
 Kevin Mitnick, a notorious hacker, was arrested in 1995.
He allegedly stole thousands of files from a computer
security expert, credit card numbers, and unreleased
software. (Book: Takedown by T. Shimomura)
 High-Tech Low-Tech tricks:
 Social Engineering, Shoulder Surfing
 Clifford Stoll’s The Cuckoo’s Egg written about tracking a
German hacker.
 In the 1970’s John Draper discovered that the whistle in a
cereal box could be used to fool the telephone system
into giving free long-distance calls.
Cyberethics and cybertechnology
 Cyber-technology refers to a broad range of
technologies from stand-alone computers to the
cluster of networked computing, information and
communication technologies.
 Cyber-ethics is the field of applied ethics that
examines moral, legal, and social issues in the
development and use of Cyber-technology.
 Internet ethics and information ethics.
Computer ethics: definition
 Same as cyber-ethics, or
 The study of ethical issues that are associated
primarily with computing machines and the
computing profession.
 The field of applied professional ethics dealing with
ethical problems transformed, or created by
computer technology
Computer Ethics:
Some historical milestones
 1940-1950: Founded by MIT prof Norbert Wiener:
cybernetics-science of information feedback
systems.
 1960s: Donn Parker from California examined
unethical and illegal uses of computers by
professionals. 1st code of professional conduct for
the ACM.
 1970: Joseph Weizenbaum, prof at MIT, created
Eliza.
 Mid 1970: Walter Maner taught 1st course and
Computer ethics history (cont.)
 1980: Issues like computer-enabled
crime, disasters, invasion of privacy via
databases, law suits about software ownership
became public.
 Mid 80s: James Moore of Darmouth,
 Deborah Johnson of Rensselaer, Sherry Turkle of
MIT, and Judith Perrole published article and books.
Computer ethics history (cont.)
 1990: Interest in computer ethics as a field of
research had spread to Europe and Australia.
 Simon Rogerson of De Montfort University (UK)
Terrell Bynum, editor of Metaphilosophy
(USA), initiated international conferences.
 Mid 90s: Beginning of a 2nd generation of computer
ethics with more practical action.
 2004: Interest spreads to Cotonou, Benin
Any unique moral issues?
Deborah Johnson: Ethics on-line
 The scope of the Internet is global and interactive.
 The Internet enables users to interact with privacy.
 Internet technology makes the reproducibility of
information possible in ways not possible before.
 The above features make behavior on-line morally
different than off-line.
The debate continues:
 James Moore: Computer technology is “logically
malleable” unlike previous technologies. It can
create “new possibilities for human action”.
 Brey: disclosing non-obvious features embedded in
computer systems that can have moral implications.
 Alison Adams: Take into account gender-related
biases. Combine feminist ethics with empirical
studies.
Sample topics in computer ethics
 Computers in the workplace: a threat to jobs? De-
skilling? Health and safety?
 Computer security: Viruses. Spying by hackers.
 Logical security:
Privacy, integrity, consistency, controlling access to
resources.
 Software ownership: Intellectual property vs. open
source.
 Software development: quality, safety
Computers in the workplace
 Monitoring of employees: employer vs. employee
point of view.
 Loyalty
 Health issues.
 Use of contingent workers.
 A threat to jobs.
 De-skilling.
Computer security
 Viruses: programming code disguised
 Worms: propagate w/o human
intervention(involvement)
 Trojan horses: gets secretly installed.
 Logic bombs: execute conditionally.
 Bacteria or rabbits: multiply rapidly.
 Computer crimes: embezzlement(theft, misuse,
stealing).
 Hackers: vandalism or exploration.
Logical security
 Privacy invasion of email, files, and
 own computer (cookies).
 Shared databases.
 Identity theft.
 Combating terrorism: USA Patriot act.
Software ownership
 Knowledge: private greed, public good.
 Profit vs. affordability
 Freedom of expression and access to information
 Right to communicate: share and learn in a
globalized world.
 Digital divide is immoral.
 Open source software: Linux. Open access.
 North-South information flow. Indigenous
knowledge.
Codes of ethics
 Avoid harm to others
 Be honest and trustworthy
 Acquire and maintain professional competence
 Know and respect existing laws pertaining to
professional work
 No personal interest
 Be honest and realistic in stating claims or estimates
based on available data
Cases in 2012
 Cyber criminals target
Skype, Facebook and Windows
users
 Cyber criminals targeted users of
Skype, Facebook and Windows using
multiple Blackhole exploits in
October, according to the latest threat
report from security firm GFI Software.
 Researchers uncovered a large
number of Blackhole exploits disguised
as Windows licences, Facebook
accountverification emails, Skype
Cases Continues
 Cyber attackers increasingly targeting
applications, research shows
 Web and mobile applications are the new frontiers in
the war against cyber attack, according to a top
cyber security risks report from Hewlett Packard
(HP) published in May.
 The report reveals that SQL injection (SQLi) attacks
on web applications increased sharply from around
15 million in 2010 to more than 50 million in 2011.
Case Continues
 Therac-25
 Therac-25 was a medical linear
accelerator, a device used to treat cancer.
What made Therac-25 unique at the time
of its use was the software. Not only did
the software ease the laborious set-up
process, but it also monitored the safety
of the machine. In this case on safety
critical software, you will find that some
patients received much more radiation
than prescribed despite the software
Case Continues
 Machado
 At age19, Richard Machado
was the first individual to be
convicted of a federal
electronic mail (e-mail) hate
crime. The Machado case is
one example of a handful of
similar incidents that have
occurred since the advent
of the Internet.
Case Continues
 Hughes Aircraft
 Between 1985 and 1987, the
Microelectronic Circuits Division of
Hughes Aircraft shipped hybrid
microelectronics to every branch of
the U.S. military without completing
various environmental chip testing
processes required by contract. This
is a whistle-blower case where the
allegations against Hughes Aircraft
resulted in a criminal case and a civil
Cyber-Crime Cases
 For more Cyber cases follow the link below
 http://www.computerweekly.com/news/2240174301/
Top-10-cyber-crime-stories-of-2012
 http://abcnews.go.com/US/harvard-ethics-student-
charged-hacking-mit-computer/story?id=14110364
Ten Commandments
 1. Not use a computer to harm other people. This is
the foundation for computer ethics.
Ten Commandments
 2. Not interfere with other people’s computer work.
Such as sending numerous thoughtless e-mails to
larger issues like purposely sending computer
viruses.
Ten Commandments
 3. Not snoop around in other people’s computer
files. Don’t go looking through other people’s
computer files unless given permission.
Ten Commandments
 4. Not use a computer to steal.
Ten Commandments
 5. Not use a computer to bear false witness. Don’t
spread rumors or change your email address so that
the receiver of an email believes that it came from
someone other than yourself.
Ten Commandments
 6. Not copy or use proprietary software for which
you have not paid. Once you buy a software
system, music CD or DVD you should not make
copies of that information and distribute it to your
friends.
Ten Commandments
 7. Not use other people’s computer resources
without authorization or proper compensation. This
means do not surf the internet or print off large
amounts of paper for personal use during work
hours.
Ten Commandments
 8. Not appropriate other people’s intellectual output.
Don’t upload information and take credit for it such
as music, images and text.
Ten Commandments
 9. Think about the social consequences of the
program you are writing or the system you are
designing.
Ten Commandments
 10. Use a computer in ways that ensure consideration
and respect for your fellow humans. Just because you
can’t always see someone face to face doesn’t give
you the right to offer any less respect then you would
offer in a personal encounter.
CASE STUDY
 http://www.mit.edu/activities/safe/safe/cases/umich-
baker-story/Baker/timeline.html
 http://www.mit.edu/activities/safe/safe/cases/umich-
baker-story/throwout.1
International Papers Links
 http://www.ijie.org, International Journal of
Information Ethics.
 www.sans.org/topten.htm Top ten Internet security
flaws that system administrators must eliminate to
avoid becoming an easy target.
 http://ethics.csc.ncsu.edu/ Computer ethics as a
map.
 http://www.neiu.edu/~ncaftori/ethics-course.htm
 The ethics course I borrowed these overheads from.
Home Assignment
 You need to read the following link presentation
 http://www.wmburgweb.com/Resources/Presentatio
ns/Copyright/sld001.htm
 http://www.isaca.org/Journal/Past-
Issues/2008/Volume-6/Documents/jpdf0806-
computer-ethics.pdf

More Related Content

What's hot

Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And Computing
David Ramirez
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
SKS
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
muhammad-Sulaiman
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Benjamin Sangalang
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
Rownel Cerezo Gagani
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
AnkitTripathi159
 
computer ethics
computer ethicscomputer ethics
computer ethics
Honey jose
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
Al Forte
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
RJ Khan
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
Junaid Qadir
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
Middle East International School
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
thothakhail
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
WonderingAriana
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
Adyns
 
Presentation computer ethics
Presentation computer ethicsPresentation computer ethics
Presentation computer ethicsYuyul Yieyien
 

What's hot (20)

Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And Computing
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Presentation computer ethics
Presentation computer ethicsPresentation computer ethics
Presentation computer ethics
 

Similar to Introduction to ethics 1

Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
OxfordRiNorth
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
Saqib Raza
 
Ethics
EthicsEthics
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 akibrutry
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
Kathirvel Ayyaswamy
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
Gemy Chan
 
a.pptx
a.pptxa.pptx
a.pptx
angadveer4
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
CUInnovationTeam
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
Assignment Studio
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
Associate Professor in VSB Coimbatore
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
VivekanandaGN1
 

Similar to Introduction to ethics 1 (20)

Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Ethics
EthicsEthics
Ethics
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 a
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
a.pptx
a.pptxa.pptx
a.pptx
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 

Introduction to ethics 1

  • 2. Background Of Ethics  Ethics: a set of beliefs about right and wrong behavior.  According to Socrates (Greek philosopher, 477 - 399 BC):People will naturally do what is good, if they know what is right  Evil or bad actions (Hacking Cyber Crimes)are the result of unawareness about right and wrong  so, if a criminal were truly aware of the mental and spiritual consequences of his actions, he would neither commit nor even consider committing them  therefore, any person who knows what is truly right will automatically do it
  • 3. Definition  Ethics: “The science of morals; the department of study concerned with the principles of human duty. The moral principles by which a person is guided.” – Oxford English Dictionary  Moral: “Of or pertaining to character or disposition, considered as good or bad, virtuous or vicious; of or pertaining to the distinction between right and wrong, or good and evil, in relation to the actions, volitions, or character of responsible beings; ethical.” – Oxford English Dictionary  Terms will be used interchangeably – basically, knowing the difference between right and wrong.
  • 4. Introduction  In the industrialized world computers are changing everything: from education to health, from voting to making friends or making war.  Developing countries can also fully participate in cyberspace and make use of opportunities offered by global networks.  We are living a technological and informational revolution.  It is therefore important for policy makers, leaders, teachers, computer professionals and all social thinkers to get involved in the social and ethical impacts of this communication technology.
  • 5. Computer Ethics  The components of an ethical computer system are responsibility, ownership, access and personal privacy. ◦ Responsibility concerns the accuracy and accountability of the information (using information properly) ◦ Ownership deals with who has the right to use the information (information belongs to) ◦ Access deals with who is allowed to use, view, store and process the information. (eligible to use information) ◦ Personal privacy addresses the question of who the information belongs to (respect of personal information)
  • 6. Impact of Cyber-Crime 1. Fraud and Embezzlement  The most significant losses to businesses  from computer crime come from employees.  Losses from credit card fraud are estimated  to be between $1and $4 billion per year.  ATM fraud accounts for losses of about $60 million a year  Telecommunications fraud estimated around $1 to $9 billion each year.  Why? Tradeoff between convenience and security
  • 7. 2. Sabotage and Information Theft  Direct destruction of hardware, software or information  Use of “logic bombs”  An employee fired from an insurance company was convicted for destroying more than 160,000 records.  British Airways paid a competitor $4 million after hacking into their computers and stealing passenger lists.  Identity Theft (Information Collection, Privacy
  • 8. 3. Hacking and Cracking  Kevin Mitnick, a notorious hacker, was arrested in 1995. He allegedly stole thousands of files from a computer security expert, credit card numbers, and unreleased software. (Book: Takedown by T. Shimomura)  High-Tech Low-Tech tricks:  Social Engineering, Shoulder Surfing  Clifford Stoll’s The Cuckoo’s Egg written about tracking a German hacker.  In the 1970’s John Draper discovered that the whistle in a cereal box could be used to fool the telephone system into giving free long-distance calls.
  • 9. Cyberethics and cybertechnology  Cyber-technology refers to a broad range of technologies from stand-alone computers to the cluster of networked computing, information and communication technologies.  Cyber-ethics is the field of applied ethics that examines moral, legal, and social issues in the development and use of Cyber-technology.  Internet ethics and information ethics.
  • 10. Computer ethics: definition  Same as cyber-ethics, or  The study of ethical issues that are associated primarily with computing machines and the computing profession.  The field of applied professional ethics dealing with ethical problems transformed, or created by computer technology
  • 11. Computer Ethics: Some historical milestones  1940-1950: Founded by MIT prof Norbert Wiener: cybernetics-science of information feedback systems.  1960s: Donn Parker from California examined unethical and illegal uses of computers by professionals. 1st code of professional conduct for the ACM.  1970: Joseph Weizenbaum, prof at MIT, created Eliza.  Mid 1970: Walter Maner taught 1st course and
  • 12. Computer ethics history (cont.)  1980: Issues like computer-enabled crime, disasters, invasion of privacy via databases, law suits about software ownership became public.  Mid 80s: James Moore of Darmouth,  Deborah Johnson of Rensselaer, Sherry Turkle of MIT, and Judith Perrole published article and books.
  • 13. Computer ethics history (cont.)  1990: Interest in computer ethics as a field of research had spread to Europe and Australia.  Simon Rogerson of De Montfort University (UK) Terrell Bynum, editor of Metaphilosophy (USA), initiated international conferences.  Mid 90s: Beginning of a 2nd generation of computer ethics with more practical action.  2004: Interest spreads to Cotonou, Benin
  • 14. Any unique moral issues? Deborah Johnson: Ethics on-line  The scope of the Internet is global and interactive.  The Internet enables users to interact with privacy.  Internet technology makes the reproducibility of information possible in ways not possible before.  The above features make behavior on-line morally different than off-line.
  • 15. The debate continues:  James Moore: Computer technology is “logically malleable” unlike previous technologies. It can create “new possibilities for human action”.  Brey: disclosing non-obvious features embedded in computer systems that can have moral implications.  Alison Adams: Take into account gender-related biases. Combine feminist ethics with empirical studies.
  • 16. Sample topics in computer ethics  Computers in the workplace: a threat to jobs? De- skilling? Health and safety?  Computer security: Viruses. Spying by hackers.  Logical security: Privacy, integrity, consistency, controlling access to resources.  Software ownership: Intellectual property vs. open source.  Software development: quality, safety
  • 17. Computers in the workplace  Monitoring of employees: employer vs. employee point of view.  Loyalty  Health issues.  Use of contingent workers.  A threat to jobs.  De-skilling.
  • 18. Computer security  Viruses: programming code disguised  Worms: propagate w/o human intervention(involvement)  Trojan horses: gets secretly installed.  Logic bombs: execute conditionally.  Bacteria or rabbits: multiply rapidly.  Computer crimes: embezzlement(theft, misuse, stealing).  Hackers: vandalism or exploration.
  • 19. Logical security  Privacy invasion of email, files, and  own computer (cookies).  Shared databases.  Identity theft.  Combating terrorism: USA Patriot act.
  • 20. Software ownership  Knowledge: private greed, public good.  Profit vs. affordability  Freedom of expression and access to information  Right to communicate: share and learn in a globalized world.  Digital divide is immoral.  Open source software: Linux. Open access.  North-South information flow. Indigenous knowledge.
  • 21. Codes of ethics  Avoid harm to others  Be honest and trustworthy  Acquire and maintain professional competence  Know and respect existing laws pertaining to professional work  No personal interest  Be honest and realistic in stating claims or estimates based on available data
  • 22. Cases in 2012  Cyber criminals target Skype, Facebook and Windows users  Cyber criminals targeted users of Skype, Facebook and Windows using multiple Blackhole exploits in October, according to the latest threat report from security firm GFI Software.  Researchers uncovered a large number of Blackhole exploits disguised as Windows licences, Facebook accountverification emails, Skype
  • 23. Cases Continues  Cyber attackers increasingly targeting applications, research shows  Web and mobile applications are the new frontiers in the war against cyber attack, according to a top cyber security risks report from Hewlett Packard (HP) published in May.  The report reveals that SQL injection (SQLi) attacks on web applications increased sharply from around 15 million in 2010 to more than 50 million in 2011.
  • 24. Case Continues  Therac-25  Therac-25 was a medical linear accelerator, a device used to treat cancer. What made Therac-25 unique at the time of its use was the software. Not only did the software ease the laborious set-up process, but it also monitored the safety of the machine. In this case on safety critical software, you will find that some patients received much more radiation than prescribed despite the software
  • 25. Case Continues  Machado  At age19, Richard Machado was the first individual to be convicted of a federal electronic mail (e-mail) hate crime. The Machado case is one example of a handful of similar incidents that have occurred since the advent of the Internet.
  • 26. Case Continues  Hughes Aircraft  Between 1985 and 1987, the Microelectronic Circuits Division of Hughes Aircraft shipped hybrid microelectronics to every branch of the U.S. military without completing various environmental chip testing processes required by contract. This is a whistle-blower case where the allegations against Hughes Aircraft resulted in a criminal case and a civil
  • 27. Cyber-Crime Cases  For more Cyber cases follow the link below  http://www.computerweekly.com/news/2240174301/ Top-10-cyber-crime-stories-of-2012  http://abcnews.go.com/US/harvard-ethics-student- charged-hacking-mit-computer/story?id=14110364
  • 28. Ten Commandments  1. Not use a computer to harm other people. This is the foundation for computer ethics.
  • 29. Ten Commandments  2. Not interfere with other people’s computer work. Such as sending numerous thoughtless e-mails to larger issues like purposely sending computer viruses.
  • 30. Ten Commandments  3. Not snoop around in other people’s computer files. Don’t go looking through other people’s computer files unless given permission.
  • 31. Ten Commandments  4. Not use a computer to steal.
  • 32. Ten Commandments  5. Not use a computer to bear false witness. Don’t spread rumors or change your email address so that the receiver of an email believes that it came from someone other than yourself.
  • 33. Ten Commandments  6. Not copy or use proprietary software for which you have not paid. Once you buy a software system, music CD or DVD you should not make copies of that information and distribute it to your friends.
  • 34. Ten Commandments  7. Not use other people’s computer resources without authorization or proper compensation. This means do not surf the internet or print off large amounts of paper for personal use during work hours.
  • 35. Ten Commandments  8. Not appropriate other people’s intellectual output. Don’t upload information and take credit for it such as music, images and text.
  • 36. Ten Commandments  9. Think about the social consequences of the program you are writing or the system you are designing.
  • 37. Ten Commandments  10. Use a computer in ways that ensure consideration and respect for your fellow humans. Just because you can’t always see someone face to face doesn’t give you the right to offer any less respect then you would offer in a personal encounter.
  • 38. CASE STUDY  http://www.mit.edu/activities/safe/safe/cases/umich- baker-story/Baker/timeline.html  http://www.mit.edu/activities/safe/safe/cases/umich- baker-story/throwout.1
  • 39. International Papers Links  http://www.ijie.org, International Journal of Information Ethics.  www.sans.org/topten.htm Top ten Internet security flaws that system administrators must eliminate to avoid becoming an easy target.  http://ethics.csc.ncsu.edu/ Computer ethics as a map.  http://www.neiu.edu/~ncaftori/ethics-course.htm  The ethics course I borrowed these overheads from.
  • 40. Home Assignment  You need to read the following link presentation  http://www.wmburgweb.com/Resources/Presentatio ns/Copyright/sld001.htm  http://www.isaca.org/Journal/Past- Issues/2008/Volume-6/Documents/jpdf0806- computer-ethics.pdf