SlideShare a Scribd company logo
by Scott M. Ligocki Jr.   Computer Ethics
Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct online.   Ethical decisions related to computer technology and usage can typically be categorized into 3 primary influences:  The individual’s own personal code.   Any informal code of ethical behavior that exists in the work place.   Exposure to formal code of ethics.  The Beginning
To understand the foundation of Computer Ethics, it is important to examine the different schools of ethical theory.   Relativism - the understanding that there are no universal moral norms of right and wrong.   Kantianism - the belief that people’s actions are to be guided by moral laws, and that these moral laws are universal.  Utilitarianism - the belief that an action is good if it benefits someone and an action is bad if it harms someone.   Social contract - the concept that for a society to arise and maintain order, a morality based set of rules must be agreed upon.   The Foundation
In 1950 Norbert Weiner, an MIT professor and inventor of an information feedback system called “Cybernetics", published a book called: The Human Use of Human Beings,which laid out the basic foundations of computer ethics and made Norbert Weiner the father of computer ethics.   The 1990's were a time when computers were reaching their pinnacle.  The combination of computers, with telecommunication, the internet and other media meant that many new ethical issues were being raised.   In the year 1992, the Association for Computing Machinery adopted a new set of ethical rules called: ACM Code of Ethics and Professional Conduct, which consisted of 24 statements of personal responsibility.  The History
With the increase in social networking, more and more people are allowing their private information to be shared publicly.  The power struggles of the real world have easily transferred onto the internet.  Independent users, businesses, and search engines are subject to manipulation, bias and censorship, whether they realize it or not.  This gives views to certain issues or events that may or may not be modified, which could easily bend public opinion in frightening ways. International news can spread across the globe in very little time.  The internet can easily be controlled by companies or organizations trying to get the public to buy in to certain things.   In reference to Computer Ethics, there is a lot to be said about Internet Privacy.  The Internet
Computer Ethics Identifying ethical issues as they arise, as well as defining how to deal with them.

More Related Content

What's hot

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
Al Forte
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Shanmugam Thiagoo
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
Michael Heron
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Benjamin Sangalang
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Adeel Rasheed
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
poonam.rwalia
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
sneha164
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
shashi kiran
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Ramki M
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
Adyns
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
Ambar Deo
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mohan Robert
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
cparimala
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
Mukesh Tekwani
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
Laguna State Polytechnic University
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
afolabidare
 

What's hot (20)

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Viewers also liked

Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)
Rana Muhammad Asif
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And Computing
David Ramirez
 
Sis 2008
Sis 2008Sis 2008
Sis 2008
Kishor Satpathy
 
Utility Players: A Library's Research Services Easily Integrate into Translat...
Utility Players: A Library's Research Services Easily Integrate into Translat...Utility Players: A Library's Research Services Easily Integrate into Translat...
Utility Players: A Library's Research Services Easily Integrate into Translat...
Sally Gore, Lamar Soutter Library, UMass Medical School
 
Five laws of Library Science by S R Ranganathan
Five laws of Library Science by S R RanganathanFive laws of Library Science by S R Ranganathan
Five laws of Library Science by S R Ranganathan
Munesh Kumar
 
Ethical vs non ethical marketing
Ethical vs non ethical marketingEthical vs non ethical marketing
Ethical vs non ethical marketing
Sayali Pange
 
S R Ranganathan Powerpoint
S R  Ranganathan PowerpointS R  Ranganathan Powerpoint
S R Ranganathan Powerpoint
Drumchapel High School
 
Computer Basics
Computer BasicsComputer Basics
Computer Generations
Computer GenerationsComputer Generations
Computer Generations
Aris Santos
 
Importance of Ethics
Importance of EthicsImportance of Ethics
Importance of Ethics
Sayak Sarkar
 
Laws of library science
Laws of library scienceLaws of library science
Laws of library science
Dheeraj Negi
 
Sears Subject Headings
Sears Subject HeadingsSears Subject Headings
Sears Subject Headings
Erica Findley
 
Collection development: selection Context, criteria on selection and electron...
Collection development: selection Context, criteria on selection and electron...Collection development: selection Context, criteria on selection and electron...
Collection development: selection Context, criteria on selection and electron...
Jennifer Laluna
 
Dealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizationsDealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizations
Kenny Nguyen
 
Comparative study of major classification schemes
Comparative study of major classification schemesComparative study of major classification schemes
Comparative study of major classification schemes
Nadeem Nazir
 
Library Types & Personnel Roles
Library Types & Personnel RolesLibrary Types & Personnel Roles
Library Types & Personnel Roles
Scott Lee
 
Ranganathan and Reference Service in the Modern Library
Ranganathan and Reference Service in the Modern LibraryRanganathan and Reference Service in the Modern Library
Ranganathan and Reference Service in the Modern Library
Jenna Kammer
 
The Role of Libraries and Librarians in Information Literacy
The Role of Libraries and Librarians in Information LiteracyThe Role of Libraries and Librarians in Information Literacy
The Role of Libraries and Librarians in Information Literacy
PLAI STRLC
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
Kak Yong
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software Engineering
Lemi Orhan Ergin
 

Viewers also liked (20)

Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And Computing
 
Sis 2008
Sis 2008Sis 2008
Sis 2008
 
Utility Players: A Library's Research Services Easily Integrate into Translat...
Utility Players: A Library's Research Services Easily Integrate into Translat...Utility Players: A Library's Research Services Easily Integrate into Translat...
Utility Players: A Library's Research Services Easily Integrate into Translat...
 
Five laws of Library Science by S R Ranganathan
Five laws of Library Science by S R RanganathanFive laws of Library Science by S R Ranganathan
Five laws of Library Science by S R Ranganathan
 
Ethical vs non ethical marketing
Ethical vs non ethical marketingEthical vs non ethical marketing
Ethical vs non ethical marketing
 
S R Ranganathan Powerpoint
S R  Ranganathan PowerpointS R  Ranganathan Powerpoint
S R Ranganathan Powerpoint
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Computer Generations
Computer GenerationsComputer Generations
Computer Generations
 
Importance of Ethics
Importance of EthicsImportance of Ethics
Importance of Ethics
 
Laws of library science
Laws of library scienceLaws of library science
Laws of library science
 
Sears Subject Headings
Sears Subject HeadingsSears Subject Headings
Sears Subject Headings
 
Collection development: selection Context, criteria on selection and electron...
Collection development: selection Context, criteria on selection and electron...Collection development: selection Context, criteria on selection and electron...
Collection development: selection Context, criteria on selection and electron...
 
Dealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizationsDealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizations
 
Comparative study of major classification schemes
Comparative study of major classification schemesComparative study of major classification schemes
Comparative study of major classification schemes
 
Library Types & Personnel Roles
Library Types & Personnel RolesLibrary Types & Personnel Roles
Library Types & Personnel Roles
 
Ranganathan and Reference Service in the Modern Library
Ranganathan and Reference Service in the Modern LibraryRanganathan and Reference Service in the Modern Library
Ranganathan and Reference Service in the Modern Library
 
The Role of Libraries and Librarians in Information Literacy
The Role of Libraries and Librarians in Information LiteracyThe Role of Libraries and Librarians in Information Literacy
The Role of Libraries and Librarians in Information Literacy
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software Engineering
 

Similar to PPT Lab Assignment - Computers - Computer Ethics

Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppt
eastitech
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Faraz Ahmed
 
Ict2 somehistoricalmilestone-ja barrientos
Ict2 somehistoricalmilestone-ja barrientosIct2 somehistoricalmilestone-ja barrientos
Ict2 somehistoricalmilestone-ja barrientos
Jonnalyn Barrientos
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
OxfordRiNorth
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
Academic Research Paper Writing Services
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
Academic Research Paper Writing Services
 
Some Historical Milestone
Some Historical MilestoneSome Historical Milestone
Some Historical Milestone
Romeo Navarro Jr.
 
computer ethics
computer ethicscomputer ethics
computer ethics
Saurabh Singh
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Saptarshi Ghosh
 
Ethics
EthicsEthics
Ethics
EthicsEthics
a.pptx
a.pptxa.pptx
a.pptx
angadveer4
 
Ijetcas14 345
Ijetcas14 345Ijetcas14 345
Ijetcas14 345
Iasir Journals
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
onur karaman
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
Saqib Raza
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
AvilaTherese1
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
johniemcm5zt
 
INT 1010 05-2.pdf
INT 1010 05-2.pdfINT 1010 05-2.pdf
INT 1010 05-2.pdf
Luis R Castellanos
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
ijtsrd
 
Computer Research Papers
Computer Research PapersComputer Research Papers
Computer Research Papers
Monica Rivera
 

Similar to PPT Lab Assignment - Computers - Computer Ethics (20)

Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppt
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ict2 somehistoricalmilestone-ja barrientos
Ict2 somehistoricalmilestone-ja barrientosIct2 somehistoricalmilestone-ja barrientos
Ict2 somehistoricalmilestone-ja barrientos
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Some Historical Milestone
Some Historical MilestoneSome Historical Milestone
Some Historical Milestone
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
a.pptx
a.pptxa.pptx
a.pptx
 
Ijetcas14 345
Ijetcas14 345Ijetcas14 345
Ijetcas14 345
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
 
INT 1010 05-2.pdf
INT 1010 05-2.pdfINT 1010 05-2.pdf
INT 1010 05-2.pdf
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
 
Computer Research Papers
Computer Research PapersComputer Research Papers
Computer Research Papers
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 

PPT Lab Assignment - Computers - Computer Ethics

  • 1. by Scott M. Ligocki Jr. Computer Ethics
  • 2. Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct online. Ethical decisions related to computer technology and usage can typically be categorized into 3 primary influences: The individual’s own personal code. Any informal code of ethical behavior that exists in the work place. Exposure to formal code of ethics. The Beginning
  • 3. To understand the foundation of Computer Ethics, it is important to examine the different schools of ethical theory. Relativism - the understanding that there are no universal moral norms of right and wrong. Kantianism - the belief that people’s actions are to be guided by moral laws, and that these moral laws are universal. Utilitarianism - the belief that an action is good if it benefits someone and an action is bad if it harms someone. Social contract - the concept that for a society to arise and maintain order, a morality based set of rules must be agreed upon. The Foundation
  • 4. In 1950 Norbert Weiner, an MIT professor and inventor of an information feedback system called “Cybernetics", published a book called: The Human Use of Human Beings,which laid out the basic foundations of computer ethics and made Norbert Weiner the father of computer ethics. The 1990's were a time when computers were reaching their pinnacle. The combination of computers, with telecommunication, the internet and other media meant that many new ethical issues were being raised. In the year 1992, the Association for Computing Machinery adopted a new set of ethical rules called: ACM Code of Ethics and Professional Conduct, which consisted of 24 statements of personal responsibility. The History
  • 5. With the increase in social networking, more and more people are allowing their private information to be shared publicly. The power struggles of the real world have easily transferred onto the internet. Independent users, businesses, and search engines are subject to manipulation, bias and censorship, whether they realize it or not. This gives views to certain issues or events that may or may not be modified, which could easily bend public opinion in frightening ways. International news can spread across the globe in very little time. The internet can easily be controlled by companies or organizations trying to get the public to buy in to certain things. In reference to Computer Ethics, there is a lot to be said about Internet Privacy. The Internet
  • 6. Computer Ethics Identifying ethical issues as they arise, as well as defining how to deal with them.