3. Ethics
As with any powerful technology, computer
can be use for both good or bad intentions.
The standard that determine whether an
action is good or bad are known as ethics.
Computer Ethics are the moral guideline that
govern the use of computer and information
system.
3Anas Habib
4. History
Norbert Wiener
The concept of computer ethics originated in
1950 when Norbert Wiener, an MIT
professor and inventor of an information
feedback system called "cybernetics",
published a book called "The Human Use of
Human Beings" which laid out the basic
foundations of computer ethics and made
Norbert Wiener the father of computer
ethics.
4Anas Habib
5. Area of Computer Ethics
• Unauthorized use of Computer and network
• Software theft
• Information accuracy
• Intellectual property rights
• Code of conduct
• Information piracy
• Green computing
5Anas Habib
6. Unauthorized use of computer and networks
Unauthorized access is the use of computer or
network without permission.
Unauthorized use is the use of computer or its
data for unapproved or possibly illegal
activities.
6Anas Habib
8. Information Accuracy
Information accuracy is concern:
Not all information on the web is correct
because it is maintained by other people and
companies.
User should evaluate the webpage before
relying on its content.
Be aware that the organization providing access
to the information may not be the creator of
the information.
8Anas Habib
9. Intellectual property rights
• Intellectual property:
It is a unique and original work such as ideas,
inventions, art, writing, processes, company and
product names, and logos.
• Intellectual property rights are the rights to which
creator are entitle for their work.
• Copyright law issues led to the development of
Digital right management (DRM), a strategy
designed to prevent illegal distribution of movies,
music and other digital content.
9Anas Habib
10. Code of conduct
• An IT code of conduct is a written guideline that helps
determine whether a specific computer action is ethical or
unethical.
1. Thou shalt not use a computer in ways that may harm people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization
or proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and
respect for your fellow humans.
10Anas Habib
11. Information Piracy
• Information Piracy refers to the right of
individuals and companies to deny or restrict
the collection and use of information about
them.
• It is important to safeguard your information.
11Anas Habib
12. Green Computing
• Green computing involves reducing electricity and
environmental waste while using a computer.
Green Computing Suggestion:
1. Use computer and devices that comply with ENERGY STAR program.
2. Don’t leave the computer running overnight.
3. Turn off the monitor, printer, and other devices when not in use.
4. Use LCD instead of CRT monitor.
5. Use paper less methods of communicating.
6. Recycle papers.
7. Buy recycled papers.
8. Recycle toner cartridges.
9. Recycle old computers, printer, and other devices.
10. Telecommute to save gas.
11. Use video conferencing and VoIP for meetings.
12Anas Habib