SlideShare ist ein Scribd-Unternehmen logo
1 von 10
A New Paradigm  In Education INFORMATION Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya COMMUNICATION TECHNOLOGY AND 1
6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya Review for last topic ,[object Object],[object Object],[object Object],2
[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya i. What is computer ethic 3
[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya ii. Computer Ethics 4
[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya iii. Computer Law 5
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya iii. Differences between computer ethic and law ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],6
[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya iv. Intellectual Property Rights 7
[object Object],[object Object],[object Object],[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya v. Intellectual Property Protection 8
[object Object],[object Object],[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya Homework / Group work 9
A New Paradigm  In Education Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya Let continue 
 our lesson for today ,[object Object],[object Object],[object Object],10

Weitere Àhnliche Inhalte

Was ist angesagt?

Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
fifiamalina
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Dr. TJ Wolfe
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
muhammad-Sulaiman
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
afolabidare
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

Was ist angesagt? (20)

Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 

Ähnlich wie Ict - Computer Ethics

Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
MohammedAish
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
Chantial
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
salehnia
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
sr24production
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
ClaudeDex
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
wtidwell
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
Melvin DCruz
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
nykobap01
 

Ähnlich wie Ict - Computer Ethics (20)

Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
 
Gr 3 ethical implication of it
Gr 3   ethical implication of itGr 3   ethical implication of it
Gr 3 ethical implication of it
 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 
Course Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docxCourse Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docx
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPR
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
 
EC358-CH8.ppt
EC358-CH8.pptEC358-CH8.ppt
EC358-CH8.ppt
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 

Mehr von aleeya91

~History Of Malaysia~
~History Of Malaysia~~History Of Malaysia~
~History Of Malaysia~
aleeya91
 
How To Use Anti Spyware
How To Use Anti SpywareHow To Use Anti Spyware
How To Use Anti Spyware
aleeya91
 
Ict - Motherboard
Ict - MotherboardIct - Motherboard
Ict - Motherboard
aleeya91
 
Ict - Computer Security
Ict - Computer SecurityIct - Computer Security
Ict - Computer Security
aleeya91
 
Ict - Programming
Ict - ProgrammingIct - Programming
Ict - Programming
aleeya91
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 

Mehr von aleeya91 (6)

~History Of Malaysia~
~History Of Malaysia~~History Of Malaysia~
~History Of Malaysia~
 
How To Use Anti Spyware
How To Use Anti SpywareHow To Use Anti Spyware
How To Use Anti Spyware
 
Ict - Motherboard
Ict - MotherboardIct - Motherboard
Ict - Motherboard
 
Ict - Computer Security
Ict - Computer SecurityIct - Computer Security
Ict - Computer Security
 
Ict - Programming
Ict - ProgrammingIct - Programming
Ict - Programming
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 

KĂŒrzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

KĂŒrzlich hochgeladen (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Ict - Computer Ethics

  • 1. A New Paradigm In Education INFORMATION Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya COMMUNICATION TECHNOLOGY AND 1
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.