SlideShare ist ein Scribd-Unternehmen logo
1 von 18
INFORMATION AND COMMUNICATION
TECHNOLOGY
Submitted by
C.Avila Therese
Sec-B
English
INTRODUCTION
 Internet is a communication media which is
easily accessible and open to all.
 Information Technology is wide spread through
computers, mobile phones and internet.
 There is a lot of scope and possibility for issue of
information Technology.
 Computer systems in general and
vulnerable.They play an important role in the
daily lives of individuals and business.
ETHICS
 Ethics means “What is Wrong and What is
Right”. It is a set of moral principles that rule the
behavior of individuals who use computers.
 An individual gains knowledge to follow the
right behavior, using morals that are also known
as ethics.
 Morals refer to the generally accepted standards
of right and wrong in the society.
The core issues in computer ethics are
based on the scenarios arising from the use
of internet such as privacy,publication of
copyrighted content, unauthorized
distribution of digital content and user
interaction with web sites, software and
related services.
GUIDELINES OF ETHICS
Generally, the following guidelines should
be observed by computer users:
 Honesty: Users should be truthful while
using the internet.
 Confidentiality: Users should not share
any important information with
unauthorized people.
 Respect: Each user should respect the privacy of other
users.
 Professionalism: Each user should maintain
professional conduct.
 Obey The Law: Users should strictly obey the cyber
law in computer usage.
 Responsibility: Each user should take ownership and
responsibility for their actions.
COMPUTER ETHICS
 With the help of internet, world has now become
a global village.Internet has been proven to be a
boon to individuals as well as various
organizations and businesses.
 Computer ethics deals with the procedures,
values and practices that govern the process of
consuming computer technology and its related
disciplines without damaging or violating the
moral values and beliefs of any individual,
organization or entity.
CYBER WORLD
Similarly, in cyber world, there are certain standard
such as
 Do not use pirated software
 Do not use unauthorized user accounts
 Do not steal others’ passwords
 Do not hack
CYBER ETHICS
 Cyber law or Internet law is a term that
encapsulates the legal issues related to use of the
Internet.
 Cyber ethics is the philosophic study of ethics
pertaining to computers, encompassing user
behavior and what computers are programmed to
do and how this affects individuals and society.
DIGITAL ETHICS
 Digital ethics is the field of study concerned with
the way technology is shaping and will shape our
political, social and moral existence.
 Digital ethics or information ethics in a broader
sense deals with the impact of digital
Information and Communication
Technologies(ICT) on our societies and the
environment at large.
COMMANDMENTS OF
COMPUTER ETHICS
The ethical values as defined in 1992 by the
Computer ethics institute;a nonprofit organisation
whose mission is to advance technology by ethical
means, these rules as a guide to computer ethics :
 Thou shalt not use a computer to harm other
people.
 Thou shalt not interfere with of her people’s
computer work.
 Thou shalt not snoop around in other
people’s computer files.
 Thou shalt not use a computer to steal.
 Thou shalt think about the social
consequences of the program you are writing
or the system you designing.
INFORMATION TECHNOLOGYACT
 In the 21st century , computer , Internet and ICT
or e-revolution has changed the life style of the
people.
 In India Cyber law and IT Act 2000, modified in
2008 are being articulated to prevent computer
crimes.
 IT Act 2000 is an act to provide legal recognition
for transactions carried out by means of
Electronic Data Interchange (EDI)and other
means of electronic communication.
CODE OF ETHICS
 (ISC)2 , a professional association which seeks
to inspire a safe and secure cyber world.
 Four canons , under a general preamble;
 Protect society, the common good, necessary
public trust and confidence and the
infrastracture.
 Act honorably, honestly, justly, responsibly and
legally.
Provide diligent and competent service to
principles.
Advance and protect the profession.
CONCLUSION
 To protect the information the following to be
noted;
 Complex password setting can make your
surfing secured.
 When the internet is not in use, disconnect it.
 Do not open spam mail or emails that have an
unfamiliar sender.
 When using anti-virus software , keep it up-to-
date.
REFERENCES:
 Kannan.K., Ramakrishnan V.G , Mohandas(2018).
Computer Ethics and Cyber security.Tamil Nadu
Textbook & Educational Service
 http://www.cmpe.boun.edu.tv
COMPUTER ETHICS

Weitere ähnliche Inhalte

Was ist angesagt?

Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetASIT Education
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
advantages and disadvantages of computer
advantages and disadvantages  of computeradvantages and disadvantages  of computer
advantages and disadvantages of computerAbhishek Panda
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Transforming Data into Information
Transforming Data into InformationTransforming Data into Information
Transforming Data into InformationBint-e- Hawa
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating SystemsMukesh Chinta
 
Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. pptNaveen Sihag
 
History of the internet
History of the internetHistory of the internet
History of the internetpptsaresilly
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 

Was ist angesagt? (20)

Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
advantages and disadvantages of computer
advantages and disadvantages  of computeradvantages and disadvantages  of computer
advantages and disadvantages of computer
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Transforming Data into Information
Transforming Data into InformationTransforming Data into Information
Transforming Data into Information
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
 
Introduction and brief history of computers
Introduction and brief history of computersIntroduction and brief history of computers
Introduction and brief history of computers
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Computers and society
Computers and societyComputers and society
Computers and society
 
Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. ppt
 
History of the internet
History of the internetHistory of the internet
History of the internet
 
Basics of information technology
Basics of information technologyBasics of information technology
Basics of information technology
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 

Ähnlich wie COMPUTER ETHICS

Share Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxShare Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxeyesred813
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...ijtsrd
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.vitor94
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethicssyed ahmed
 
Digital Citizenship by Fatema
Digital Citizenship by FatemaDigital Citizenship by Fatema
Digital Citizenship by Fatemaguest8541ec
 
Digital Citizenship by Fatema Salik
Digital Citizenship by Fatema SalikDigital Citizenship by Fatema Salik
Digital Citizenship by Fatema Salikguest8541ec
 
Digital Citizenship...
Digital Citizenship...Digital Citizenship...
Digital Citizenship...guest8541ec
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptPOWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptisaacmendoza76
 
2011 4-define-ethics-and-law
2011 4-define-ethics-and-law2011 4-define-ethics-and-law
2011 4-define-ethics-and-lawcikgushaharizan
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenshipmonazarrinkelk
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
PPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptxPPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptxRowellRizalte
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfmt5854804210
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipr_bushlow
 

Ähnlich wie COMPUTER ETHICS (20)

Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Share Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxShare Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptx
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
 
Ict
IctIct
Ict
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethics
 
Digital Citizenship by Fatema
Digital Citizenship by FatemaDigital Citizenship by Fatema
Digital Citizenship by Fatema
 
Digital Citizenship by Fatema Salik
Digital Citizenship by Fatema SalikDigital Citizenship by Fatema Salik
Digital Citizenship by Fatema Salik
 
Digital Citizenship...
Digital Citizenship...Digital Citizenship...
Digital Citizenship...
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptPOWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
 
2011 4-define-ethics-and-law
2011 4-define-ethics-and-law2011 4-define-ethics-and-law
2011 4-define-ethics-and-law
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenship
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
PPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptxPPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptx
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdf
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

Kürzlich hochgeladen

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Kürzlich hochgeladen (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

COMPUTER ETHICS

  • 1. INFORMATION AND COMMUNICATION TECHNOLOGY Submitted by C.Avila Therese Sec-B English
  • 2. INTRODUCTION  Internet is a communication media which is easily accessible and open to all.  Information Technology is wide spread through computers, mobile phones and internet.  There is a lot of scope and possibility for issue of information Technology.  Computer systems in general and vulnerable.They play an important role in the daily lives of individuals and business.
  • 3. ETHICS  Ethics means “What is Wrong and What is Right”. It is a set of moral principles that rule the behavior of individuals who use computers.  An individual gains knowledge to follow the right behavior, using morals that are also known as ethics.  Morals refer to the generally accepted standards of right and wrong in the society.
  • 4. The core issues in computer ethics are based on the scenarios arising from the use of internet such as privacy,publication of copyrighted content, unauthorized distribution of digital content and user interaction with web sites, software and related services.
  • 5. GUIDELINES OF ETHICS Generally, the following guidelines should be observed by computer users:  Honesty: Users should be truthful while using the internet.  Confidentiality: Users should not share any important information with unauthorized people.
  • 6.  Respect: Each user should respect the privacy of other users.  Professionalism: Each user should maintain professional conduct.  Obey The Law: Users should strictly obey the cyber law in computer usage.  Responsibility: Each user should take ownership and responsibility for their actions.
  • 7. COMPUTER ETHICS  With the help of internet, world has now become a global village.Internet has been proven to be a boon to individuals as well as various organizations and businesses.  Computer ethics deals with the procedures, values and practices that govern the process of consuming computer technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization or entity.
  • 8. CYBER WORLD Similarly, in cyber world, there are certain standard such as  Do not use pirated software  Do not use unauthorized user accounts  Do not steal others’ passwords  Do not hack
  • 9. CYBER ETHICS  Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet.  Cyber ethics is the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do and how this affects individuals and society.
  • 10. DIGITAL ETHICS  Digital ethics is the field of study concerned with the way technology is shaping and will shape our political, social and moral existence.  Digital ethics or information ethics in a broader sense deals with the impact of digital Information and Communication Technologies(ICT) on our societies and the environment at large.
  • 11. COMMANDMENTS OF COMPUTER ETHICS The ethical values as defined in 1992 by the Computer ethics institute;a nonprofit organisation whose mission is to advance technology by ethical means, these rules as a guide to computer ethics :  Thou shalt not use a computer to harm other people.  Thou shalt not interfere with of her people’s computer work.
  • 12.  Thou shalt not snoop around in other people’s computer files.  Thou shalt not use a computer to steal.  Thou shalt think about the social consequences of the program you are writing or the system you designing.
  • 13. INFORMATION TECHNOLOGYACT  In the 21st century , computer , Internet and ICT or e-revolution has changed the life style of the people.  In India Cyber law and IT Act 2000, modified in 2008 are being articulated to prevent computer crimes.  IT Act 2000 is an act to provide legal recognition for transactions carried out by means of Electronic Data Interchange (EDI)and other means of electronic communication.
  • 14. CODE OF ETHICS  (ISC)2 , a professional association which seeks to inspire a safe and secure cyber world.  Four canons , under a general preamble;  Protect society, the common good, necessary public trust and confidence and the infrastracture.  Act honorably, honestly, justly, responsibly and legally.
  • 15. Provide diligent and competent service to principles. Advance and protect the profession.
  • 16. CONCLUSION  To protect the information the following to be noted;  Complex password setting can make your surfing secured.  When the internet is not in use, disconnect it.  Do not open spam mail or emails that have an unfamiliar sender.  When using anti-virus software , keep it up-to- date.
  • 17. REFERENCES:  Kannan.K., Ramakrishnan V.G , Mohandas(2018). Computer Ethics and Cyber security.Tamil Nadu Textbook & Educational Service  http://www.cmpe.boun.edu.tv