SlideShare a Scribd company logo
1 of 9
Computer Ethics  William DeCotiis  February 1, 2012
Ethical Principles  ,[object Object],[object Object],S ociety Benefit P eople are an end F air
Netiquette ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Ethics  in  Organizations ,[object Object],[object Object],[object Object],[object Object],[object Object],Code of Conducts
Computer Ethics  for  Organizations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intellectual Property ,[object Object],[object Object],[object Object],[object Object],[object Object]
Unethical and Illegal ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Are there any Questions?
Sources ,[object Object]

More Related Content

What's hot

Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_systemKwame Afreh
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology AlyssaSingleterry
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Rakshit Sharma
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in TechnologyGregory Barnes
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Digital law
Digital lawDigital law
Digital lawmyls69
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsScøtt Lıgøckı
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethicsJunaid Qadir
 

What's hot (20)

Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_system
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
IT Ethics
IT EthicsIT Ethics
IT Ethics
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Digital law
Digital lawDigital law
Digital law
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 

Viewers also liked

Viewers also liked (20)

Rubys power point
Rubys power pointRubys power point
Rubys power point
 
คณิตศาสตร์ปี 2551
คณิตศาสตร์ปี 2551คณิตศาสตร์ปี 2551
คณิตศาสตร์ปี 2551
 
New zealand veet
New zealand veetNew zealand veet
New zealand veet
 
Ms private cloud strategy by Stephane Consalvi
Ms private cloud strategy by Stephane ConsalviMs private cloud strategy by Stephane Consalvi
Ms private cloud strategy by Stephane Consalvi
 
Php apache vs iis By Hafedh Yahmadi
Php apache vs iis  By Hafedh YahmadiPhp apache vs iis  By Hafedh Yahmadi
Php apache vs iis By Hafedh Yahmadi
 
Twitter101
Twitter101Twitter101
Twitter101
 
Library of Сongress (USA)
Library of Сongress (USA)Library of Сongress (USA)
Library of Сongress (USA)
 
Hans new
Hans newHans new
Hans new
 
Araabia maad
Araabia maadAraabia maad
Araabia maad
 
Support you Microsoft cloud with Microsoft services By Anis Chebbi)
Support you Microsoft cloud with Microsoft services By Anis Chebbi)Support you Microsoft cloud with Microsoft services By Anis Chebbi)
Support you Microsoft cloud with Microsoft services By Anis Chebbi)
 
Présentation du lycée Cecioni
Présentation du lycée CecioniPrésentation du lycée Cecioni
Présentation du lycée Cecioni
 
Les anniversaires (1) freschi cagliata
Les anniversaires (1) freschi cagliataLes anniversaires (1) freschi cagliata
Les anniversaires (1) freschi cagliata
 
การบินไทย
การบินไทยการบินไทย
การบินไทย
 
Les boissons
Les boissonsLes boissons
Les boissons
 
Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the Cyberspace
 
See And Feel Before You Think April 2010
See And Feel Before You Think April 2010See And Feel Before You Think April 2010
See And Feel Before You Think April 2010
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Higher Education in Ukraine
Higher Education in UkraineHigher Education in Ukraine
Higher Education in Ukraine
 
101 200 transistorcircuits
101 200 transistorcircuits101 200 transistorcircuits
101 200 transistorcircuits
 
Higher education in the USA
Higher education in the USAHigher education in the USA
Higher education in the USA
 

Similar to Computer Ethics Principles and Guidelines

Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and techwtidwell
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Week 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to ReadWeek 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to Readnicolleszkyj
 
5 e Discovery Risks to Avoid in Board Communications
5 e Discovery Risks to Avoid in Board Communications5 e Discovery Risks to Avoid in Board Communications
5 e Discovery Risks to Avoid in Board CommunicationsOnBoard
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policyEngr Razaque
 
The Dark Side Of The Web
The Dark Side Of The WebThe Dark Side Of The Web
The Dark Side Of The Webmshin
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 

Similar to Computer Ethics Principles and Guidelines (20)

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and tech
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Law 483 cyberethics
Law 483 cyberethicsLaw 483 cyberethics
Law 483 cyberethics
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Week 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to ReadWeek 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to Read
 
5 e Discovery Risks to Avoid in Board Communications
5 e Discovery Risks to Avoid in Board Communications5 e Discovery Risks to Avoid in Board Communications
5 e Discovery Risks to Avoid in Board Communications
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
The Dark Side Of The Web
The Dark Side Of The WebThe Dark Side Of The Web
The Dark Side Of The Web
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Ethics in Computing.pptx
Ethics in Computing.pptxEthics in Computing.pptx
Ethics in Computing.pptx
 
Ethics in IT
Ethics in ITEthics in IT
Ethics in IT
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Computer Ethics Principles and Guidelines