This document provides an overview of computer ethics and professional practices. It begins by defining key terms like ethics and morals. It then discusses the background of ethics according to philosophers like Socrates. The document outlines some historical milestones in computer ethics and issues that arose with early computer technologies. It provides examples of topics in computer ethics like privacy, intellectual property, and computer security. The document concludes by presenting the "Ten Commandments" of computer ethics.
we are not responsible if there is any Mistake or error in this presentation. We are trying to help other students. It may not perfect.
We hope , you will get benefit from this presentation.
regards : Students of University of Engineering and Technology , Lahore, Pakistan
we are not responsible if there is any Mistake or error in this presentation. We are trying to help other students. It may not perfect.
We hope , you will get benefit from this presentation.
regards : Students of University of Engineering and Technology , Lahore, Pakistan
This slides are meant ti introduce a course on moral philosophy. All photos in it came from the net. Sources are not included though they are mainly from Google images.
It contains factors that a professional should include while making decision when he/she is in moral dilemma. It also gives insights on moral, ethics and engineers code of conduct.
This slides are meant ti introduce a course on moral philosophy. All photos in it came from the net. Sources are not included though they are mainly from Google images.
It contains factors that a professional should include while making decision when he/she is in moral dilemma. It also gives insights on moral, ethics and engineers code of conduct.
History of computer ethics
What is computer ethics
Computer ethics topics
Computers in the Workplace
Computer Crime
Privacy and Anonymity
Intellectual Property
Professional Responsibility
Globalization
Evolution of computer ethics
Metaethics of computer ethics
Motivation behind software piracy and its usage. Mostly the users of the low developed countries are practising software piracy for survival. This presentation reveals the reasons of it.
1. Cyber Ethics and Cyber Crime
2. Security in Social Media & Risk of Child Internet
3. Social media in Schools and photo privacy
4. Risk of OSNs and Security, Privacy of Facebook
5. Risk and Security of Social Networking site Facebook and Twitter
6. Risk analysis of Government and Online Transaction
Social Impacts of Artificial intelligenceSaqib Raza
This lecture gives detail introduction, applications about AI. This lecture gives details about the social perspective and realities in the field of AI.
This document contains complete course outline of Professional Practices. Most of the topics are for computer science students. This document covers course of 32 lectures 1.5 hours each for professional practice course also known as Professional Ethics.
This lecture includes detail about ethical hacking profession, there jobs description, responsibilities duties and skills required to excel in their field.
This lecture includes introduction to computers security and privacy. This lecture include basic concepts of terminologies and technologies involve in current securities and privacy needs.
This lecture include detail about engineering especially software engineering profession. include common and mostly used schema to develop organisational structure.
This lecture include introduction to software contracts. Before starting development companies prepare agreement document to deal with conflicts afterwards.
This is a detail lecture about software re-engineering. To make software more maintainable. This lecture also give detail about software reverse engineering. When to re-engineer and how to re-engineer software.
This lecture is about the detail definition of software quality and quality assurance. Provide details about software tesing and its types. Clear the basic concepts of software quality and software testing.
This lecture provide a detail concepts of user interface development design and evaluation. This lecture have complete guideline toward UI development. The interesting thing about this lecture is Software User Interface Design trends.
This lecture helps to understand basics software design and especially Architecture Design and its importance. This lecture also describes the goals and importance of architecture design.
This lecture provide a review of requirement engineering process. The slides have been prepared after reading Ian Summerville and Roger Pressman work. This lecture is helpful to understand user, and user requirements.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
2. Definition
• Ethics: “The science of morals; the department of study
concerned with the principles of human duty. The moral
principles by which a person is guided.” – Oxford English
Dictionary
• Moral: “Of or pertaining to character or disposition, considered as
good or bad, virtuous or vicious; of or pertaining to the distinction
between right and wrong, or good and evil, in relation to the actions,
volitions, or character of responsible beings; ethical.” – Oxford English
Dictionary
• Terms will be used interchangeably – basically, knowing
the difference between right and wrong.
3. Background Of Ethics
•Ethics: a set of beliefs about right and wrong
behavior.
• According to Socrates (Greek philosopher, 477 - 399 BC):People will
naturally do what is good, if they know what is right
• Evil or bad actions are the result of unawareness about right and wrong
• So, if a criminal were truly aware of the mental and spiritual
consequences of his actions, he would neither commit nor even consider
committing them
• Therefore, any person who knows what is truly right will automatically do
it
4. Introduction
• In the industrialized world computers are changing everything: from
education to health, from voting to making friends or making war.
• Developing countries can also fully participate in cyberspace and
make use of opportunities offered by global networks.
• We are living a technological and informational revolution.
• It is therefore important for policy makers, leaders, teachers,
computer professionals and all social thinkers to get involved in the
social and ethical impacts of this communication technology.
5. Cyber Ethics and Cyber Technology
• Cyber-technology refers to a broad range of technologies from
stand-alone computers to the cluster of networked computing,
information and communication technologies.
• Cyber-ethics is the field of applied ethics that examines moral, legal,
and social issues in the development and use of Cyber-technology.
• Internet ethics and information ethics.
6. Computer ethics: definition
• Same as cyber-ethics, or
• The study of ethical issues that are associated primarily with
computing machines and the computing profession.
• The field of applied professional ethics dealing with ethical problems
transformed, or created by computer technology
7. Computer Ethics:
Some historical milestones
• 1940-1950: Founded by MIT prof Norbert Wiener: cybernetics-
science of information feedback systems.
• 1960s: Donn Parker from California examined unethical and illegal
uses of computers by professionals. 1st code of professional conduct
for the ACM.
• Mid 1970: Walter Maner taught 1st course and starter kit in computer
ethics.
8. Computer ethics history (cont.)
• 1980: Issues like computer-enabled crime, disasters, invasion of
privacy via databases, law suits about software ownership became
public.
• Mid 80s: James Moore of Darmouth,
• Deborah Johnson of Rensselaer, Sherry Turkle of MIT, and Judith
Perrole published article and books.
9. Computer ethics history (cont.)
• 1990: Interest in computer ethics as a field of research had spread to
Europe and Australia.
• Simon Rogerson of De Montfort University (UK) Terrell Bynum, editor
of Metaphilosophy (USA), initiated international conferences.
• Mid 90s: Beginning of a 2nd generation of computer ethics with more
practical action.
• 2004: Interest spreads to Cotonou, Benin
10. Any unique moral issues?
Deborah Johnson: Ethics on-line
• The scope of the Internet is global and interactive.
• The Internet enables users to interact with privacy.
• Internet technology makes the reproducibility of information possible
in ways not possible before.
• The above features make behavior on-line morally different than off-
line.
11. The debate continues:
• James Moore: Computer technology is “logically malleable” unlike
previous technologies. It can create “new possibilities for human
action”.
• Brey: disclosing non-obvious features embedded in computer systems
that can have moral implications.
• Alison Adams: Take into account gender-related biases. Combine
feminist ethics with empirical studies.
12. Sample topics in computer ethics
• Computers in the workplace: a threat to jobs? De-skilling? Health and
safety?
• Computer security: Viruses. Spying by hackers.
• Logical security: Privacy, integrity, consistency, controlling access to
resources.
• Software ownership: Intellectual property vs. open source.
• Software development: quality, safety
14. Logical Security
• Privacy invasion of email, files, and
• own computer (cookies).
• Shared databases.
• Identity theft.
• Combating terrorism: USA Patriot act.
15. Software Ownership
• Knowledge: private greed, public good.
• Profit vs. affordability
• Freedom of expression and access to information
• Right to communicate: share and learn in a globalized world.
• Digital divide is immoral.
• Open source software: Linux. Open access.
• North-South information flow. Indigenous knowledge.
16. Codes of Ethics
• Avoid harm to others
• Be honest and trustworthy
• Acquire and maintain professional competence
• Know and respect existing laws pertaining to professional work
• No personal interest
• Be honest and realistic in stating claims or estimates based on
available data
17. Cases in 2012
• Cyber criminals target Skype, Facebook and Windows
users
• Cyber criminals targeted users of Skype, Facebook and
Windows using multiple Black hole exploits in October,
according to the latest threat report from security firm
GFI Software.
• Researchers uncovered a large number of Black hole
exploits disguised as Windows licenses, Facebook
account verification emails, Skype voicemail
notifications and spam messages.
18. Cases Continues
• Cyber attackers increasingly targeting applications,
research shows
• Web and mobile applications are the new frontiers in the war against
cyber attack, according to a top cyber security risks report from
Hewlett Packard (HP) published in May.
• The report reveals that SQL injection (SQLi) attacks on web
applications increased sharply from around 15 million in 2010 to
more than 50 million in 2011.
24. The Melissa Virus 1999: 20% of the World's
Computers Infected
• Melissa is a fast-spreading macro virus that is distributed as an e-mail
attachment that, when opened, disables a number of safeguards in
Word 97 or Word 2000, and, if the user has the Microsoft Outlook e-
mail program, causes the virus to be resent to the first 50 people in
each of the user's address books. While it does not destroy files or
other resources, Melissa has the potential to disable corporate and
other mail servers as the ripple of e-mail distribution becomes a
much larger wave. On Friday, March 26, 1999, Melissa caused the
Microsoft Corporation to shut down incoming e-mail.
25. Case Continues
•Therac-25
• Therac-25 was a medical linear accelerator, a
device used to treat cancer. What made Therac-
25 unique at the time of its use was the software.
Not only did the software ease the laborious set-
up process, but it also monitored the safety of the
machine. In this case on safety critical software,
you will find that some patients received much
more radiation than prescribed despite the
software safety programming.
26. Case Continues
• Machado
• At age19, Richard Machado was the
first individual to be convicted of a
federal electronic mail (e-mail) hate
crime. The Machado case is one
example of a handful of similar
incidents that have occurred since
the advent of the Internet.
27. Case Continues
• Hughes Aircraft
• Between 1985 and 1987, the
Microelectronic Circuits Division of Hughes
Aircraft shipped hybrid microelectronics to
every branch of the U.S. military without
completing various environmental chip
testing processes required by contract. This
is a whistle-blower case where the
allegations against Hughes Aircraft resulted
in a criminal case and a civil case.
28. Cyber-Crime Cases
• For more Cyber cases follow the link below
• http://www.computerweekly.com/news/2240174301/Top-10-cyber-
crime-stories-of-2012
• http://abcnews.go.com/US/harvard-ethics-student-charged-hacking-
mit-computer/story?id=14110364
29. Ten Commandments
• 1. Not use a computer to harm other people. This is the foundation
for computer ethics.
30. Ten Commandments
• 2. Not interfere with other people’s computer work. Such as sending
numerous thoughtless e-mails to larger issues like purposely sending
computer viruses.
31. Ten Commandments
• 3. Not snoop around in other people’s computer files. Don’t go
looking through other people’s computer files unless given
permission.
33. Ten Commandments
• 5. Not use a computer to bear false witness. Don’t spread rumors or
change your email address so that the receiver of an email believes
that it came from someone other than yourself.
34. Ten Commandments
• 6. Not copy or use proprietary software for which you have not paid.
Once you buy a software system, music CD or DVD you should not
make copies of that information and distribute it to your friends.
35. Ten Commandments
• 7. Not use other people’s computer resources without
authorization or proper compensation. This means do not surf the
internet or print off large amounts of paper for personal use
during work hours.
36. Ten Commandments
• 8. Not appropriate other people’s intellectual output. Don’t upload
information and take credit for it such as music, images and text.
37. Ten Commandments
• 9. Think about the social consequences of the program you are
writing or the system you are designing.
38. Ten Commandments
• 10. Use a computer in ways that ensure consideration and respect for
your fellow humans. Just because you can’t always see someone face
to face doesn’t give you the right to offer any less respect then you
would offer in a personal encounter.
40. International Papers Links
• http://www.ijie.org, International Journal of Information Ethics.
• www.sans.org/topten.htm Top ten Internet security flaws that system
administrators must eliminate to avoid becoming an easy target.
• http://ethics.csc.ncsu.edu/ Computer ethics as a map.
• http://www.neiu.edu/~ncaftori/ethics-course.htm
• The ethics course I borrowed these overheads from.