SlideShare a Scribd company logo
1 of 13
1Anas Habib
Topic: Computer Ethics & Society
Presented by: Anas Habib
2Anas Habib
Ethics
As with any powerful technology, computer
can be use for both good or bad intentions.
The standard that determine whether an
action is good or bad are known as ethics.
Computer Ethics are the moral guideline that
govern the use of computer and information
system.
3Anas Habib
History
Norbert Wiener
The concept of computer ethics originated in
1950 when Norbert Wiener, an MIT
professor and inventor of an information
feedback system called "cybernetics",
published a book called "The Human Use of
Human Beings" which laid out the basic
foundations of computer ethics and made
Norbert Wiener the father of computer
ethics.
4Anas Habib
Area of Computer Ethics
• Unauthorized use of Computer and network
• Software theft
• Information accuracy
• Intellectual property rights
• Code of conduct
• Information piracy
• Green computing
5Anas Habib
Unauthorized use of computer and networks
 Unauthorized access is the use of computer or
network without permission.
 Unauthorized use is the use of computer or its
data for unapproved or possibly illegal
activities.
6Anas Habib
Software Theft
Steal
Software
Media
Intentionally
Erases
Programs
Illegally
Copied a
Program
Illegally
register or
activates a
Program
7Anas Habib
Information Accuracy
Information accuracy is concern:
Not all information on the web is correct
because it is maintained by other people and
companies.
User should evaluate the webpage before
relying on its content.
Be aware that the organization providing access
to the information may not be the creator of
the information.
8Anas Habib
Intellectual property rights
• Intellectual property:
It is a unique and original work such as ideas,
inventions, art, writing, processes, company and
product names, and logos.
• Intellectual property rights are the rights to which
creator are entitle for their work.
• Copyright law issues led to the development of
Digital right management (DRM), a strategy
designed to prevent illegal distribution of movies,
music and other digital content.
9Anas Habib
Code of conduct
• An IT code of conduct is a written guideline that helps
determine whether a specific computer action is ethical or
unethical.
1. Thou shalt not use a computer in ways that may harm people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization
or proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and
respect for your fellow humans.
10Anas Habib
Information Piracy
• Information Piracy refers to the right of
individuals and companies to deny or restrict
the collection and use of information about
them.
• It is important to safeguard your information.
11Anas Habib
Green Computing
• Green computing involves reducing electricity and
environmental waste while using a computer.
Green Computing Suggestion:
1. Use computer and devices that comply with ENERGY STAR program.
2. Don’t leave the computer running overnight.
3. Turn off the monitor, printer, and other devices when not in use.
4. Use LCD instead of CRT monitor.
5. Use paper less methods of communicating.
6. Recycle papers.
7. Buy recycled papers.
8. Recycle toner cartridges.
9. Recycle old computers, printer, and other devices.
10. Telecommute to save gas.
11. Use video conferencing and VoIP for meetings.
12Anas Habib
Anas Habib 13

More Related Content

What's hot

Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
CRM
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer security
Computer securityComputer security
Computer security
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
 
Digital law
Digital lawDigital law
Digital law
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer crime
Computer crimeComputer crime
Computer crime
 

Similar to Computer Ethics By Anas Habib

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
lcnemedez
 

Similar to Computer Ethics By Anas Habib (20)

Nfwordle
NfwordleNfwordle
Nfwordle
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Erasmus+ group 2
Erasmus+ group 2Erasmus+ group 2
Erasmus+ group 2
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
erasmusgroup2-160126193027 (4).pdf
erasmusgroup2-160126193027 (4).pdferasmusgroup2-160126193027 (4).pdf
erasmusgroup2-160126193027 (4).pdf
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
General Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & EthicalGeneral Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & Ethical
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 

Recently uploaded

pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 

Recently uploaded (20)

Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 

Computer Ethics By Anas Habib

  • 2. Topic: Computer Ethics & Society Presented by: Anas Habib 2Anas Habib
  • 3. Ethics As with any powerful technology, computer can be use for both good or bad intentions. The standard that determine whether an action is good or bad are known as ethics. Computer Ethics are the moral guideline that govern the use of computer and information system. 3Anas Habib
  • 4. History Norbert Wiener The concept of computer ethics originated in 1950 when Norbert Wiener, an MIT professor and inventor of an information feedback system called "cybernetics", published a book called "The Human Use of Human Beings" which laid out the basic foundations of computer ethics and made Norbert Wiener the father of computer ethics. 4Anas Habib
  • 5. Area of Computer Ethics • Unauthorized use of Computer and network • Software theft • Information accuracy • Intellectual property rights • Code of conduct • Information piracy • Green computing 5Anas Habib
  • 6. Unauthorized use of computer and networks  Unauthorized access is the use of computer or network without permission.  Unauthorized use is the use of computer or its data for unapproved or possibly illegal activities. 6Anas Habib
  • 8. Information Accuracy Information accuracy is concern: Not all information on the web is correct because it is maintained by other people and companies. User should evaluate the webpage before relying on its content. Be aware that the organization providing access to the information may not be the creator of the information. 8Anas Habib
  • 9. Intellectual property rights • Intellectual property: It is a unique and original work such as ideas, inventions, art, writing, processes, company and product names, and logos. • Intellectual property rights are the rights to which creator are entitle for their work. • Copyright law issues led to the development of Digital right management (DRM), a strategy designed to prevent illegal distribution of movies, music and other digital content. 9Anas Habib
  • 10. Code of conduct • An IT code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical. 1. Thou shalt not use a computer in ways that may harm people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. 10Anas Habib
  • 11. Information Piracy • Information Piracy refers to the right of individuals and companies to deny or restrict the collection and use of information about them. • It is important to safeguard your information. 11Anas Habib
  • 12. Green Computing • Green computing involves reducing electricity and environmental waste while using a computer. Green Computing Suggestion: 1. Use computer and devices that comply with ENERGY STAR program. 2. Don’t leave the computer running overnight. 3. Turn off the monitor, printer, and other devices when not in use. 4. Use LCD instead of CRT monitor. 5. Use paper less methods of communicating. 6. Recycle papers. 7. Buy recycled papers. 8. Recycle toner cartridges. 9. Recycle old computers, printer, and other devices. 10. Telecommute to save gas. 11. Use video conferencing and VoIP for meetings. 12Anas Habib