iPad Introduction Class
Faculty of Creative Technology and Heritage
Universiti Malaysia Kelantan
• What is Ethics and Information Technology?
• Ethical issues relating to computer application
• Security Threats
– Computer Viruses
– Cyber Crime
– Software piracy and Hacking
– Computer crime prevention
– Ethical dilemmas and consideration
• Ethics in using the internet
• Derived from the Greek word “ethos”, which means
“custom”, “habit”, and “way of living”
• Definition: "the discipline and practice of applying
value to human behavior, resulting in meaningful
• Computer ethics defined as the application of
classical ethical principles to the use of computer
• Ethical problems related to computers:
• Computers create a false sense of security
• People do not realize how vulnerable
information stored on computers are
• Physical property
• Intellectual property
• Data as property
– Access to computing technology
– Access to data
– Accuracy of information stored
• Hacking, cracking and virus creation
• Software piracy
As Defined by Computer Ethics Institute.
1. Do not use a computer to harm other people.
2. Do not interfere with other people's computer
3. Do not snoop around in other people's files.
4. Do not use a computer to steal.
5. Do not use a computer to bear false witness.
The Ten Commandments of Computer Ethics
6. Do not use or copy software for which you have
7. Do not use other people's computer resources
8. Do not use other people's intellectual output.
9. Think about the social consequences of the
program you write.
10. Use a computer in ways that show consideration
The Ten Commandments of Computer Ethics
Computer viruses are small
software programs that are
designed to spread from one
computer to another and to
interfere with computer operation.
• Virus are most easily spread,
• Spread through E-mail Attachments,
– Instant Messaging messages,
– Funny Images,
– Audio and Videos files,
– Downloading files from Internet,
– Greeting cards and many more.
Spreading of Virus
• Use an Internet firewall
• Subscribe to industry standard antivirus software
• Never open an e-mail attachment from someone you
• Scan each and every attachment
• Rules to be followed, while surfing net
• Always update the databases
• Avoid copying folder(s),untrusted files like keygen,
crack files etc
Steps to Avoid Viruses
• IT Infrastructure
• Illegal access
• Illegal Interruption
• Data Interfere
• System Interference
• Misuse Of Devices
• Electronic Fraud
• Target of the crime
• Medium of the Attack
• Intimidate or Deceive
Type Computer Crimes
• Data tempering
• Programming techniques
• Other method
Methods od Attack
• Reselling media
• Downloading from a website without permission
• Taping songs
• Buying a used book or CD
• Watching broadcast television but skipping
What is Piracy
• End User Piracy
• Client – Server Piracy
• Internet Piracy
• Hard-Disk Piracy
• Software Counterfeiting
Reason for Computer Crime
• Some one who bypasses the system’s access
controls by taking advantage of security
weaknesses left in the system by developers
• System penetration
• Access confidential information
• Threaten someone from your computer
• Broadcast your confidential letters or materials .
• Store illegal material
• Stalking privacy or personal data
Compromise the security of system
without permission from an
authorized party, usually with the
intent of accessing computers
connected to the network.
Evils of Hacking
• To determine problem and weakness for program
• Creation of firewall
• Useful for military purpose and spying
• Better computer security
Advantages of Hacking
Dilemmas are discussed in relation to four areas-
• Information accuracy
• Access to information
• Intellectual property rights
Ethical Dilemmas in it…
• PLAGIARISM-The taking of ideas, writing and
drawings or other similar intellectual property
created by others and presenting it as your own.
• NETIQUETTE-A set of rules (mainly unwritten) to
follow while you are online.
Ethical Dilemmas in It…
• Internet crime prevention.
• Prevention of cyber crime
• Prevention of computer crime in banking
• IT security
• Computer crime prevention law
• Hi tech crime prevention law
• Computer crime preventing on line fraud
• World risk investigation and terrorist prevention
How can We Stop It
Internet ethics means acceptable behavior for using
We should be honest, respect the rights and
property of others on the internet
One has to accept that Internet is not a value free-zone.
It means World Wide Web is a place where values are
considered in the broadest sense so we must take
care while shaping content and services and we
should recognize that internet is not apart from
universal society but it is a primary component of it.
Sensitivity to National and Local cultures
It belongs to all and there is no barrier of national and
local cultures. It cannot be subject to one set of values
like the local TV channel or the local newspaper we
have to accommodate multiplicity of usage.
While using e-mail and chatting
Internet must be used for communication with family
and friends. Avoid chatting with strangers and
forwarding e-mails from unknown people /strangers.
We must be aware of risks involved in chatting and
forwarding e-mails to strangers.
Pretending to be someone else
We must not use internet to fool others by pretending
to be someone else.
Hiding our own identity to fool others in the Internet
world is a crime and may also be a risk to others.
Avoid Bad language
We must not use rude or bad language while using e-
Mail, chatting, blogging and social networking,
We need to respect their views and should not
criticize anyone on the internet.
Hide personal information
We should not give personal details like home
address, phone numbers, interests, passwords.
No photographs should be sent to strangers because it
might be misused and shared with others without
Internet is used to listen and learn about music.
It is also used to watch videos and play games we
must not use it to download them or share
We must be aware of the importance of copyrights
and issues of copyright.
Access to Internet
The internet is a time-efficient tool for everyone that
enlarges the possibilities for curriculum growth.
Learning depends on the ability to find relevant and
reliable information quickly and easily, and to select,
understand and assess that information. Searching for
information on the internet can help to develop these
Access to Internet
Classroom exercises and take-home assessment tasks,
where students are required to compare website
content, are ideal for alerting students to the
requirements of writing for different audiences, the
purpose of particular content, identifying and judging
accuracy and reliability. Since many sites adopt
particular views about issues, the internet is a useful
tool for developing the skills of distinguishing fact
from opinion and exploring subjectivity and