SlideShare a Scribd company logo
LAW 483
CYBERETHICS


              1
What is Ethics?
If we are going to examine ethical issues on the Internet, it is
 first necessary to define ethics.
Today, we regard ethics as a “rational process founded on
 certain principles.”
However, definition that is more applicable is the ethical
 theory that existed in ancient Greece.
There, ethics was the study of what was good for both the
 individual and the society.
Here, we will look at some online issues and how they may be
 good and/ or bad for society.
Cyberethics is the study of ethics on the Internet.
                                                                    2
PRIVACY                     PROPERTY


             FOUR MAIN
           ETHICAL ISSUES
ACCURACY                     ACCESS




                                       3
PRIVACY                                         The technology
                                                 around us increase
                                                 so does the threat
A few years ago, Florida lawmakers               to our privacy.
gave the go ahead to have monitors
      stationed in bathrooms at
 Tallahassee Community College to
   determine if the facilities were
         being underutilized.

    Students and faculties strongly
    protested that the monitors
    violated their privacy.

        State officials said that the value of
        information gained through the
        study was more important than the
        threat to the privacy.
                                                                      4
ACCURACY
•Information educates.
•Misinformation effaces.
•A wealth of information resides on the Net.
•However, sometimes it is difficult to discern/distinguish the
truth from the trash, the nugget of valuable information from
the hearsay, supposition, inference and opinion.
•A poignant illustration of this is the Drudge Report.


  Matt Drudge often reports on rumors and speculation and
  rarely reinforces his stories with specific sources.
                                                                 5
PROPERTY
•WHO has the rights to intellectual property on the internet?

 Issue : When one is constructing his Web page, whether
 it is ethical to lift an image from someone’s homepage
 and use it on his webpage without crediting the source.




                                                                6
Access
•One reason that topics such as online gambling and
pornography have become such firestorms of controversy in
cyberspace is the simple fact that so many people have access to
the Web sites.

•Obviously, pervasive societal issues warrant more attention
surreptitious issues.

•Simply put, if no one had access to online pornography no one
would care.




                                                                   7
Identify the Elements of Malaysian Cyber Law

   i. Computer Ethics
   ii. Code of Ethics
   iii. Intellectual Property

   Ethics is the branch of philosophy concerned
   with:
   a. what is right.
   b. What is wrong.


                                                  8
Computer Ethics for Computer
Professionals
• The field of computer ethics specifies ethical codes for
  computing professionals.

• The core of a computer professional’s code of ethics is
  to preserve and protect human life from harm.


Computer causes new ethical problems and issues:

Computer ethics also deals with the ethical principles associated with those
problems.

                                                                               9
What is code of ethics?

                  code of ethics

  A group of ethical             Developed by
    behavior rules            organizations or by a
                              professional society




                                                      10
Code of Ethics
 Act with integrity, competence, diligence, respect and on an
  ethical manner with the public, clients, employers, employees
  and colleagues.

 Interest in profession and clients above personal interest.

 Practice and encourage others to practice in an ethical manner.

 Promote integrity of ethical markets.

 Improve professional competence.
                                                                11
Computer Ethics for Computer Users

  Respect yourself                         Respect others


                       When using the
                     college’s computers


                     Respect academic
                         integrity




                                                            12
Respect yourself
If you obtain an account and password to use the
 campus computer system, don’t give your password
 to others. They could do something that gets you in
 trouble.

In addition, don’t say or do anything on the internet
 that could reflect poorly on you, even if you think no
 one will ever found out.



                                                       13
Ten Commandments of Computer Ethics

1. Don’t use a computer to harm other people.

2. Don’t interfere with other people’s computer work.

3. Don’t snoop around in other people’s files.

4. Don’t use a computer to steal.

5. Don’t use a computer to bear false witness.

6. Don’t copy or use proprietary software for which you have
   not paid.

                                                               14
7. Don’t use other people’s computer resources without
   authorization or proper compensation.

8. Don’t appropriate other people’s intellectual output.

9. Do think about the social consequences of the program
   you write or the system you design.

10. Do use a computer in ways that show consideration and
    respect for your fellow humans.




                                                            15
Respect Others
You shouldn’t use a computer to threaten or
 harass anyone.
Avoid using more than your share of
 computing resources, such as disk space.
If you publish a Web page on your college’s
 computers, remember that your page’s
 content affects the college’s public image.

                                               16
Respect academic integrity
Always give credit for text you’ve copied from
 the internet.
Obtain permission before you copy pictures.
Don’t copy or distribute software unless the
 license specifically says you can.



                                                  17

More Related Content

What's hot

Sivarasa v Badan Peguam Malaysia
Sivarasa v Badan Peguam  MalaysiaSivarasa v Badan Peguam  Malaysia
Sivarasa v Badan Peguam Malaysia
surrenderyourthrone
 
extortion.pptx
extortion.pptxextortion.pptx
extortion.pptx
mashiali
 
parol evidence rule and collateral contract
parol evidence rule and collateral contractparol evidence rule and collateral contract
parol evidence rule and collateral contract
Nur Farhana Ana
 
Defence of infancy
Defence of infancyDefence of infancy
Defence of infancy
Nabihah Aqilah
 
PRINCIPLE OF PRIMA FACIE CASE AND MAXIMUM EVALUATION AT THE CLOSE OF PROSECUT...
PRINCIPLE OF PRIMA FACIE CASE AND MAXIMUM EVALUATION AT THE CLOSE OF PROSECUT...PRINCIPLE OF PRIMA FACIE CASE AND MAXIMUM EVALUATION AT THE CLOSE OF PROSECUT...
PRINCIPLE OF PRIMA FACIE CASE AND MAXIMUM EVALUATION AT THE CLOSE OF PROSECUT...
surrenderyourthrone
 
Discovery
DiscoveryDiscovery
Discovery
ilyana iskandar
 
Human rights and religions
Human rights and religions Human rights and religions
Human rights and religions
Council of Europe (CoE)
 
A Judge With Many Landmark Decisions
A Judge With Many Landmark DecisionsA Judge With Many Landmark Decisions
A Judge With Many Landmark Decisions
surrenderyourthrone
 
private caveats
private caveatsprivate caveats
private caveats
Hafizul Mukhlis
 
Jeyarajan v Jeyarajan
Jeyarajan v JeyarajanJeyarajan v Jeyarajan
Jeyarajan v Jeyarajan
Dilini GalAnga
 
INAS FAIQAH 2015
INAS FAIQAH 2015INAS FAIQAH 2015
INAS FAIQAH 2015
Lolaa Azhar
 
Ch 4 Elements and Parties
Ch 4 Elements and PartiesCh 4 Elements and Parties
Ch 4 Elements and Parties
rharrisonaz
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
Hi Tech Criminal Justice
 
Ws 2 fusion of the law and equity
Ws 2 fusion of the law and equityWs 2 fusion of the law and equity
Ws 2 fusion of the law and equity
Jackie Willoughby
 
Art 5
Art 5Art 5
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
Anyck Turgeon, CFE/GRCP/CEFI/CCIP/C|CISO/CBA
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
Tawhidur Rahman
 
Criminal Stephen Dunn
Criminal Stephen DunnCriminal Stephen Dunn
Criminal Stephen Dunn
NavleenMultani
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
Lalit Garg
 
Relevancy of evidence under Section 6 of Evidence Act 1950
Relevancy of evidence under Section 6 of Evidence Act 1950Relevancy of evidence under Section 6 of Evidence Act 1950
Relevancy of evidence under Section 6 of Evidence Act 1950
Intan Muhammad
 

What's hot (20)

Sivarasa v Badan Peguam Malaysia
Sivarasa v Badan Peguam  MalaysiaSivarasa v Badan Peguam  Malaysia
Sivarasa v Badan Peguam Malaysia
 
extortion.pptx
extortion.pptxextortion.pptx
extortion.pptx
 
parol evidence rule and collateral contract
parol evidence rule and collateral contractparol evidence rule and collateral contract
parol evidence rule and collateral contract
 
Defence of infancy
Defence of infancyDefence of infancy
Defence of infancy
 
PRINCIPLE OF PRIMA FACIE CASE AND MAXIMUM EVALUATION AT THE CLOSE OF PROSECUT...
PRINCIPLE OF PRIMA FACIE CASE AND MAXIMUM EVALUATION AT THE CLOSE OF PROSECUT...PRINCIPLE OF PRIMA FACIE CASE AND MAXIMUM EVALUATION AT THE CLOSE OF PROSECUT...
PRINCIPLE OF PRIMA FACIE CASE AND MAXIMUM EVALUATION AT THE CLOSE OF PROSECUT...
 
Discovery
DiscoveryDiscovery
Discovery
 
Human rights and religions
Human rights and religions Human rights and religions
Human rights and religions
 
A Judge With Many Landmark Decisions
A Judge With Many Landmark DecisionsA Judge With Many Landmark Decisions
A Judge With Many Landmark Decisions
 
private caveats
private caveatsprivate caveats
private caveats
 
Jeyarajan v Jeyarajan
Jeyarajan v JeyarajanJeyarajan v Jeyarajan
Jeyarajan v Jeyarajan
 
INAS FAIQAH 2015
INAS FAIQAH 2015INAS FAIQAH 2015
INAS FAIQAH 2015
 
Ch 4 Elements and Parties
Ch 4 Elements and PartiesCh 4 Elements and Parties
Ch 4 Elements and Parties
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
 
Ws 2 fusion of the law and equity
Ws 2 fusion of the law and equityWs 2 fusion of the law and equity
Ws 2 fusion of the law and equity
 
Art 5
Art 5Art 5
Art 5
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Criminal Stephen Dunn
Criminal Stephen DunnCriminal Stephen Dunn
Criminal Stephen Dunn
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Relevancy of evidence under Section 6 of Evidence Act 1950
Relevancy of evidence under Section 6 of Evidence Act 1950Relevancy of evidence under Section 6 of Evidence Act 1950
Relevancy of evidence under Section 6 of Evidence Act 1950
 

Similar to Law 483 cyberethics

Nfwordle
NfwordleNfwordle
Nfwordle
Nadine Fray
 
Online ethics
Online ethicsOnline ethics
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
Johan Koren
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
Kathy Sheridan
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
vlbrown
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
sajida zafar
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
dlwadsworth
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
superb11b
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
vlbrown
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
SheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
lahill16
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
Fatin Izzaty
 
Netiquette
NetiquetteNetiquette
Netiquette
Glory
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
jennyJey2
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
glorysunny
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
Johan Koren
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
egschool
 

Similar to Law 483 cyberethics (20)

Nfwordle
NfwordleNfwordle
Nfwordle
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Netiquette
NetiquetteNetiquette
Netiquette
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

More from Ammar Iyyad B. Amran

Law 483 moral n ethics
Law 483 moral n ethicsLaw 483 moral n ethics
Law 483 moral n ethics
Ammar Iyyad B. Amran
 
Law 483 managerial ethics
Law 483 managerial ethicsLaw 483 managerial ethics
Law 483 managerial ethics
Ammar Iyyad B. Amran
 
Law 483 intro
Law 483 introLaw 483 intro
Law 483 intro
Ammar Iyyad B. Amran
 
Law 483 euthanasia complete's slide
Law 483 euthanasia complete's slideLaw 483 euthanasia complete's slide
Law 483 euthanasia complete's slide
Ammar Iyyad B. Amran
 
Law 483 euthanasia 1
Law 483 euthanasia 1Law 483 euthanasia 1
Law 483 euthanasia 1
Ammar Iyyad B. Amran
 
Law 483 abortion
Law 483 abortionLaw 483 abortion
Law 483 abortion
Ammar Iyyad B. Amran
 
Law 483 organ donation
Law 483 organ donationLaw 483 organ donation
Law 483 organ donation
Ammar Iyyad B. Amran
 

More from Ammar Iyyad B. Amran (7)

Law 483 moral n ethics
Law 483 moral n ethicsLaw 483 moral n ethics
Law 483 moral n ethics
 
Law 483 managerial ethics
Law 483 managerial ethicsLaw 483 managerial ethics
Law 483 managerial ethics
 
Law 483 intro
Law 483 introLaw 483 intro
Law 483 intro
 
Law 483 euthanasia complete's slide
Law 483 euthanasia complete's slideLaw 483 euthanasia complete's slide
Law 483 euthanasia complete's slide
 
Law 483 euthanasia 1
Law 483 euthanasia 1Law 483 euthanasia 1
Law 483 euthanasia 1
 
Law 483 abortion
Law 483 abortionLaw 483 abortion
Law 483 abortion
 
Law 483 organ donation
Law 483 organ donationLaw 483 organ donation
Law 483 organ donation
 

Law 483 cyberethics

  • 2. What is Ethics? If we are going to examine ethical issues on the Internet, it is first necessary to define ethics. Today, we regard ethics as a “rational process founded on certain principles.” However, definition that is more applicable is the ethical theory that existed in ancient Greece. There, ethics was the study of what was good for both the individual and the society. Here, we will look at some online issues and how they may be good and/ or bad for society. Cyberethics is the study of ethics on the Internet. 2
  • 3. PRIVACY PROPERTY FOUR MAIN ETHICAL ISSUES ACCURACY ACCESS 3
  • 4. PRIVACY The technology around us increase so does the threat A few years ago, Florida lawmakers to our privacy. gave the go ahead to have monitors stationed in bathrooms at Tallahassee Community College to determine if the facilities were being underutilized. Students and faculties strongly protested that the monitors violated their privacy. State officials said that the value of information gained through the study was more important than the threat to the privacy. 4
  • 5. ACCURACY •Information educates. •Misinformation effaces. •A wealth of information resides on the Net. •However, sometimes it is difficult to discern/distinguish the truth from the trash, the nugget of valuable information from the hearsay, supposition, inference and opinion. •A poignant illustration of this is the Drudge Report. Matt Drudge often reports on rumors and speculation and rarely reinforces his stories with specific sources. 5
  • 6. PROPERTY •WHO has the rights to intellectual property on the internet? Issue : When one is constructing his Web page, whether it is ethical to lift an image from someone’s homepage and use it on his webpage without crediting the source. 6
  • 7. Access •One reason that topics such as online gambling and pornography have become such firestorms of controversy in cyberspace is the simple fact that so many people have access to the Web sites. •Obviously, pervasive societal issues warrant more attention surreptitious issues. •Simply put, if no one had access to online pornography no one would care. 7
  • 8. Identify the Elements of Malaysian Cyber Law i. Computer Ethics ii. Code of Ethics iii. Intellectual Property Ethics is the branch of philosophy concerned with: a. what is right. b. What is wrong. 8
  • 9. Computer Ethics for Computer Professionals • The field of computer ethics specifies ethical codes for computing professionals. • The core of a computer professional’s code of ethics is to preserve and protect human life from harm. Computer causes new ethical problems and issues: Computer ethics also deals with the ethical principles associated with those problems. 9
  • 10. What is code of ethics? code of ethics A group of ethical Developed by behavior rules organizations or by a professional society 10
  • 11. Code of Ethics  Act with integrity, competence, diligence, respect and on an ethical manner with the public, clients, employers, employees and colleagues.  Interest in profession and clients above personal interest.  Practice and encourage others to practice in an ethical manner.  Promote integrity of ethical markets.  Improve professional competence. 11
  • 12. Computer Ethics for Computer Users Respect yourself Respect others When using the college’s computers Respect academic integrity 12
  • 13. Respect yourself If you obtain an account and password to use the campus computer system, don’t give your password to others. They could do something that gets you in trouble. In addition, don’t say or do anything on the internet that could reflect poorly on you, even if you think no one will ever found out. 13
  • 14. Ten Commandments of Computer Ethics 1. Don’t use a computer to harm other people. 2. Don’t interfere with other people’s computer work. 3. Don’t snoop around in other people’s files. 4. Don’t use a computer to steal. 5. Don’t use a computer to bear false witness. 6. Don’t copy or use proprietary software for which you have not paid. 14
  • 15. 7. Don’t use other people’s computer resources without authorization or proper compensation. 8. Don’t appropriate other people’s intellectual output. 9. Do think about the social consequences of the program you write or the system you design. 10. Do use a computer in ways that show consideration and respect for your fellow humans. 15
  • 16. Respect Others You shouldn’t use a computer to threaten or harass anyone. Avoid using more than your share of computing resources, such as disk space. If you publish a Web page on your college’s computers, remember that your page’s content affects the college’s public image. 16
  • 17. Respect academic integrity Always give credit for text you’ve copied from the internet. Obtain permission before you copy pictures. Don’t copy or distribute software unless the license specifically says you can. 17