SlideShare a Scribd company logo
1 of 23
1
Social, Legal & Ethical
Aspects of Computing.
Group # 6
 Faizan-u-Rehman 57
 Arbaz Mateen 66
 Hafiz Sohaib 86
 Kashif Razzaq 58
 Tariq Ali 98
2
Contents
Social Computing.
Legal & Ethical Aspects.
Cyber Law.
First Cyber Crime.
Cyber Ethics.
IP (Intellectual Property).
Slander.
Plagiarism.
Copyright Law.
NR3C.
10 Notorious Cyber Crimes.
3
Social Computing.
Social computing is an area of computer science
that is concerned with the
intersection of social
behavior and
computational
systems. Social
computing is the
collaborative and
interactive aspect of online behavior.
4
Legal and Ethical Aspects
Of Computing.
 Legal aspects of computing are related to the
overlapping areas of law and computing.
 Computer Ethics is a system of moral standards
or moral values used as a guide line of computer
users.
5
Privacy, Computer Crimes.
Privacy refers to the right of individuals and
companies to deny or restrict the collection and
use of information about them.
Computer Crime is any illegal acts involving
computers.
6
Ethics.
As a Guideline to computer user.
Computer users are free to follow or ignore the code of ethics.
Universal, can be applied to any
ware, all over the world.
To produced ethical computer
users.
Not follow ethics are
called immoral.
7
Computer Law.
As a Rule to control computer user.
Computer users must follow the regulations and law.
Depend on country where the crime is committed.
To prevent misuse of computer.
Not obeying law are
called crime.
8
Cyber Law.
Cyber Law: any laws relating to protect the internet and
other online communication technologies.
9
Cyber Law.
Why we need Cyber Law?
Cyber law are made to force people to be good.
To give protections against the misuse of computers and
computer criminal activities.
Internet are being used every day by billions of people
around the globe.
Growth rate in mobile and computer devices.
Technology allows the user to bully from an unknown
location, 24 hours a day, 7 days a week.
10
Example of Cyber abuse on the users:
Sending a computer virus via E-Mail.
Harassment through E-Mail or social media.
Hacking into your School’s database to change your exam
results.
Fake Accounts.
Cyber Law.
11
Cyber Ethics.
The most common problem isn’t hacking (illegally accessing
web sites or other computers) or cracking. It’s the unauthorized
downloading of games and software.
13
Computer Crime.
Computer Fraud is the crime of obtaining money by
deceiving (to trick) people through the use of computer
such as E-Mail, program fraud, Investment schemes and
claim of expertise on certain fields.
Copying is a violation of the rights secured by a
copyright law. It occurs when you break the copyright laws
such as copying software or CD’s illegally.
14
Computer Crime. (cont.)
Computer theft is defined as the unauthorized used of
another person’s property such as transfer of payment to
the wrong accounts, get online material with no cost and
tap into the data transmission lines.
Computer Attack is defined as any activities taken to
disrupt the equipment's of computers system, change
processing controls and corrupt stored data.
15
Intellectual Property (IP).
Unique product of the human intellect that has
commercial value.
e.g.
Books, Songs, Movies, Paintings,
Formulas, Computers and programs
etc.
16
Intellectual Property Laws.
Intellectual
Property
Patents
Trademark Design
Copyright
 Patents for Inventions.
 Trademark for brand identity.
 Design for product appearance.
 Copyright for material.
17
Privacy.
Way of making personal data more private.
Install personal firewall.
Purchases goods with cash, rather then credit card.
Online public recode.
 Less use of Facebook.
Avoid GPS tags in photo.
18
Addiction.
Internet Addiction.
Social Media Addiction.
Facebook.
Twitter.
Google +.
Game addiction.
General Computer
Addiction.
19
Slander.
Slander is the action or crime of making a false
spoken statement damaging to a person's reputation.
Can develop society that disregards on honesty and
truth.
Can lead to bad
habits of spreading
rumors and untruth.
Can cause people
to have negative
attitude towards
another person.
20
Plagiarism.
Plagiarism is copying someone else’s work and then
passing it off as one’s own. It is morally bad because it is
an act of stealing.
Copying programs written by other programmers and
claiming it as your own could be an act of plagiarism. It
involves laying, cheating, theft and dishonesty.
21
Copyright Law.
Copyright law are designed to protect the intellectual
property of authors, artists, filmmakers, web designers
etc. so that their own work isn’t stolen for someone else
profit.
23
Computer Viruses.
Creation of worms and computer viruses is morally
bad when it is intended for malicious purpose like to
steal information or destroying of data.
24
Thank you 
If you have any Question, you may ask NOW!

More Related Content

What's hot

What's hot (20)

Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Computer Software and Operating System
Computer Software and Operating SystemComputer Software and Operating System
Computer Software and Operating System
 
cyber crime
cyber crimecyber crime
cyber crime
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
Computer crime
 Computer crime Computer crime
Computer crime
 

Similar to Social, Legal & Ethical Aspects of Computing.

Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computingMichael Jarata
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Chapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxChapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxnorwinadriatico
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 

Similar to Social, Legal & Ethical Aspects of Computing. (20)

Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computing
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Chapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxChapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptx
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 

More from muhammad-Sulaiman

Foundations of Electronic Commerce
Foundations of Electronic CommerceFoundations of Electronic Commerce
Foundations of Electronic Commercemuhammad-Sulaiman
 
Latest technologies in computer system AI(Artificial Intelligence) Knowledg...
Latest technologies in computer system  AI(Artificial Intelligence)  Knowledg...Latest technologies in computer system  AI(Artificial Intelligence)  Knowledg...
Latest technologies in computer system AI(Artificial Intelligence) Knowledg...muhammad-Sulaiman
 
Computer Scientific Applications
Computer Scientific ApplicationsComputer Scientific Applications
Computer Scientific Applicationsmuhammad-Sulaiman
 
Social Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our SociatySocial Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our Sociatymuhammad-Sulaiman
 

More from muhammad-Sulaiman (6)

Foundations of Electronic Commerce
Foundations of Electronic CommerceFoundations of Electronic Commerce
Foundations of Electronic Commerce
 
Digital Library 
Digital Library Digital Library 
Digital Library 
 
Privacy And Copyrights
Privacy And CopyrightsPrivacy And Copyrights
Privacy And Copyrights
 
Latest technologies in computer system AI(Artificial Intelligence) Knowledg...
Latest technologies in computer system  AI(Artificial Intelligence)  Knowledg...Latest technologies in computer system  AI(Artificial Intelligence)  Knowledg...
Latest technologies in computer system AI(Artificial Intelligence) Knowledg...
 
Computer Scientific Applications
Computer Scientific ApplicationsComputer Scientific Applications
Computer Scientific Applications
 
Social Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our SociatySocial Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our Sociaty
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Social, Legal & Ethical Aspects of Computing.

  • 1. 1
  • 2. Social, Legal & Ethical Aspects of Computing. Group # 6  Faizan-u-Rehman 57  Arbaz Mateen 66  Hafiz Sohaib 86  Kashif Razzaq 58  Tariq Ali 98 2
  • 3. Contents Social Computing. Legal & Ethical Aspects. Cyber Law. First Cyber Crime. Cyber Ethics. IP (Intellectual Property). Slander. Plagiarism. Copyright Law. NR3C. 10 Notorious Cyber Crimes. 3
  • 4. Social Computing. Social computing is an area of computer science that is concerned with the intersection of social behavior and computational systems. Social computing is the collaborative and interactive aspect of online behavior. 4
  • 5. Legal and Ethical Aspects Of Computing.  Legal aspects of computing are related to the overlapping areas of law and computing.  Computer Ethics is a system of moral standards or moral values used as a guide line of computer users. 5
  • 6. Privacy, Computer Crimes. Privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them. Computer Crime is any illegal acts involving computers. 6
  • 7. Ethics. As a Guideline to computer user. Computer users are free to follow or ignore the code of ethics. Universal, can be applied to any ware, all over the world. To produced ethical computer users. Not follow ethics are called immoral. 7
  • 8. Computer Law. As a Rule to control computer user. Computer users must follow the regulations and law. Depend on country where the crime is committed. To prevent misuse of computer. Not obeying law are called crime. 8
  • 9. Cyber Law. Cyber Law: any laws relating to protect the internet and other online communication technologies. 9
  • 10. Cyber Law. Why we need Cyber Law? Cyber law are made to force people to be good. To give protections against the misuse of computers and computer criminal activities. Internet are being used every day by billions of people around the globe. Growth rate in mobile and computer devices. Technology allows the user to bully from an unknown location, 24 hours a day, 7 days a week. 10
  • 11. Example of Cyber abuse on the users: Sending a computer virus via E-Mail. Harassment through E-Mail or social media. Hacking into your School’s database to change your exam results. Fake Accounts. Cyber Law. 11
  • 12. Cyber Ethics. The most common problem isn’t hacking (illegally accessing web sites or other computers) or cracking. It’s the unauthorized downloading of games and software. 13
  • 13. Computer Crime. Computer Fraud is the crime of obtaining money by deceiving (to trick) people through the use of computer such as E-Mail, program fraud, Investment schemes and claim of expertise on certain fields. Copying is a violation of the rights secured by a copyright law. It occurs when you break the copyright laws such as copying software or CD’s illegally. 14
  • 14. Computer Crime. (cont.) Computer theft is defined as the unauthorized used of another person’s property such as transfer of payment to the wrong accounts, get online material with no cost and tap into the data transmission lines. Computer Attack is defined as any activities taken to disrupt the equipment's of computers system, change processing controls and corrupt stored data. 15
  • 15. Intellectual Property (IP). Unique product of the human intellect that has commercial value. e.g. Books, Songs, Movies, Paintings, Formulas, Computers and programs etc. 16
  • 16. Intellectual Property Laws. Intellectual Property Patents Trademark Design Copyright  Patents for Inventions.  Trademark for brand identity.  Design for product appearance.  Copyright for material. 17
  • 17. Privacy. Way of making personal data more private. Install personal firewall. Purchases goods with cash, rather then credit card. Online public recode.  Less use of Facebook. Avoid GPS tags in photo. 18
  • 18. Addiction. Internet Addiction. Social Media Addiction. Facebook. Twitter. Google +. Game addiction. General Computer Addiction. 19
  • 19. Slander. Slander is the action or crime of making a false spoken statement damaging to a person's reputation. Can develop society that disregards on honesty and truth. Can lead to bad habits of spreading rumors and untruth. Can cause people to have negative attitude towards another person. 20
  • 20. Plagiarism. Plagiarism is copying someone else’s work and then passing it off as one’s own. It is morally bad because it is an act of stealing. Copying programs written by other programmers and claiming it as your own could be an act of plagiarism. It involves laying, cheating, theft and dishonesty. 21
  • 21. Copyright Law. Copyright law are designed to protect the intellectual property of authors, artists, filmmakers, web designers etc. so that their own work isn’t stolen for someone else profit. 23
  • 22. Computer Viruses. Creation of worms and computer viruses is morally bad when it is intended for malicious purpose like to steal information or destroying of data. 24
  • 23. Thank you  If you have any Question, you may ask NOW!

Editor's Notes

  1. Ethics: person's behavior or the conducting of an activity. (iklakqi) morality: principles concerning the distinction between right and wrong or good and bad behavior.
  2. Harassment synonyms irritation.
  3. intellect: a person's mental powers.
  4. Rumors: story or report of uncertain or doubtful truth.
  5. Intended: planning Malicious: evil , bad, harmful