SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Ethical issues in computing
INTRODUCTION
• Ethics
Set of moral principles
that govern the behaviour
of a group or individual
• Computer Ethics
System of moral
standards or values used
as guidelines for the
computer user
COMPUTER ETHICS vs LAW
 Ethics
• Serves as guidelines
• Free to follow
• Universal
• Results in ethical
computer users
• Not following is
immoral
 Law
• Rules
• Must follow
• Country dependent
• Prevents misuse of
computer
• Not following is a
crime
ETHICAL ISSUES
ETHICAL VALUES
• Do not install or uninstall software without
prior permission
• Do not steal information of any other
computer
• Do not make illegal copies of software
• Protect important documents using
passwords
• Do not browse unwanted websites or
emails
INTELLECTUAL PROPERTY RIGHT
• New useful ideas and
designs
• Functional and
Technical inventions
• Original works that
express ideas
• Purely artistic works
• Brand that identifies
source of goods or
services
• Symbol, logo, word,
sound, colour, design,
etc.
DATA PROTECTION
Install
high
quality
antivirus
Avoid using
pirated
software
Do not
disclose
passwords
Do not
open
unwanted
emails
Do not
download
unwanted
software
Cancel any
suspicious
downloads
SPAM PREVENTION
•Avoid opening spam emails and
clicking on links in spam messages
•Don’t buy anything from a spammer
•Don’t be tempted to reply
•Avoid ‘unsubscribe’ options
• Use a disposable email
address
• Munging: Use address
as ‘a at b dot com’ instead
of a@b.com
SOFTWARE PIRACY
Always buy your
software from a reputed
organization
Make sure that your
software comes with a
licensed agreement ,
original disc and
authentic packaging
Avoid buying multiple
software titles from
different publishers on a
single disc
If the seller provides a
serial number other than
one mentioned on
package, it indicates that
software is not authentic
CYBER CRIME
Online criminal activities such as illegal copying of software, computer viruses, stealing data
CYBER LAWS
• Cyber space is governed by a
system of law and regulations called
Cyber Law
• Refers to all legal and regulatory
aspects of internet
• Cyber law is the part of the overall legal system that deals with the
Internet, cyberspace, and their respective legal issues.
• Cyber law covers a fairly broad area, encompassing several subtopics
including freedom of expression, access to and usage of the Internet,
and online privacy
HACKING
Technique by which some computer experts can access data from confidential
areas of the system
MALICIOUS INTENT AND CODE
Malicious code is a program that is covertly inserted into another program with the intent of
malicious activities
Can be prevented by limiting the capabilities of the servers and web applications to only the
functions necessary to support the operations, and bringing awareness and training programs, we
can protect our system from malicious intent
CONCLUSION
Safeguard yourself and others by following all best practices and the 10 commandments of
computer ethics
1. Thou shalt not use a computer to harm other people
2. Thou shalt not interfere with other people's computer work
3. Thou shalt not snoop around in other people's computer files
4. Thou shalt not use a computer to steal
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not copy or use proprietary software for which you have not paid (without
permission)
7. Thou shalt not use other people's computer resources without authorization or proper
compensation
8. Thou shalt not appropriate other people's intellectual output
9. Thou shalt think about the social consequences of the program you are writing or the
system you are designing
10.Thou shalt always use a computer in ways that ensure consideration and respect for other
humans
QUESTION 1:
Unwanted messages in the mailbox are called?
Malicious Code SPAM
Cookies
NEXT->
CLICK ON THE CORRECT ANSWER
QUESTION 2:
Cyber criminals who crack the password to
access information from the Internet are called?
Sackers
Hackers
Virus
NEXT->
CLICK ON THE CORRECT ANSWER
QUESTION 3:
Set of moral values which regulate the use of
computers are called?
Cyber Law Computer Ethics
Malicious Intent
NEXT->
Privacy
CLICK ON THE CORRECT ANSWER
QUESTION 4:
The process of making duplicate copy of the
original software illegally is known as?
Malicious Code
Software Piracy
Cookies
NEXT->
Hacking
CLICK ON THE CORRECT ANSWER
QUESTION 5:
There are 5 commandments of Computer Ethics?
True
NEXT->
False
CLICK ON THE CORRECT ANSWER
Correct Answer!
<-BACK
Wrong Answer!
<-BACK
ComputingEthics.pptx

Weitere ähnliche Inhalte

Ähnlich wie ComputingEthics.pptx

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
CRM
 
Computer Ethics By Anas Habib
Computer Ethics By Anas HabibComputer Ethics By Anas Habib
Computer Ethics By Anas Habib
AnasHabib23
 

Ähnlich wie ComputingEthics.pptx (20)

Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Shak taha
Shak tahaShak taha
Shak taha
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
L2 COMPUTER ETHICS PPT [Autosaved].pptx
L2 COMPUTER  ETHICS  PPT [Autosaved].pptxL2 COMPUTER  ETHICS  PPT [Autosaved].pptx
L2 COMPUTER ETHICS PPT [Autosaved].pptx
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Computer Ethics By Anas Habib
Computer Ethics By Anas HabibComputer Ethics By Anas Habib
Computer Ethics By Anas Habib
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

ComputingEthics.pptx

  • 1. Ethical issues in computing
  • 2. INTRODUCTION • Ethics Set of moral principles that govern the behaviour of a group or individual • Computer Ethics System of moral standards or values used as guidelines for the computer user
  • 3. COMPUTER ETHICS vs LAW  Ethics • Serves as guidelines • Free to follow • Universal • Results in ethical computer users • Not following is immoral  Law • Rules • Must follow • Country dependent • Prevents misuse of computer • Not following is a crime
  • 5. ETHICAL VALUES • Do not install or uninstall software without prior permission • Do not steal information of any other computer • Do not make illegal copies of software • Protect important documents using passwords • Do not browse unwanted websites or emails
  • 6. INTELLECTUAL PROPERTY RIGHT • New useful ideas and designs • Functional and Technical inventions • Original works that express ideas • Purely artistic works • Brand that identifies source of goods or services • Symbol, logo, word, sound, colour, design, etc.
  • 7. DATA PROTECTION Install high quality antivirus Avoid using pirated software Do not disclose passwords Do not open unwanted emails Do not download unwanted software Cancel any suspicious downloads
  • 8.
  • 9. SPAM PREVENTION •Avoid opening spam emails and clicking on links in spam messages •Don’t buy anything from a spammer •Don’t be tempted to reply •Avoid ‘unsubscribe’ options • Use a disposable email address • Munging: Use address as ‘a at b dot com’ instead of a@b.com
  • 10. SOFTWARE PIRACY Always buy your software from a reputed organization Make sure that your software comes with a licensed agreement , original disc and authentic packaging Avoid buying multiple software titles from different publishers on a single disc If the seller provides a serial number other than one mentioned on package, it indicates that software is not authentic
  • 11. CYBER CRIME Online criminal activities such as illegal copying of software, computer viruses, stealing data
  • 12. CYBER LAWS • Cyber space is governed by a system of law and regulations called Cyber Law • Refers to all legal and regulatory aspects of internet • Cyber law is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues. • Cyber law covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy
  • 13. HACKING Technique by which some computer experts can access data from confidential areas of the system
  • 14. MALICIOUS INTENT AND CODE Malicious code is a program that is covertly inserted into another program with the intent of malicious activities Can be prevented by limiting the capabilities of the servers and web applications to only the functions necessary to support the operations, and bringing awareness and training programs, we can protect our system from malicious intent
  • 15. CONCLUSION Safeguard yourself and others by following all best practices and the 10 commandments of computer ethics 1. Thou shalt not use a computer to harm other people 2. Thou shalt not interfere with other people's computer work 3. Thou shalt not snoop around in other people's computer files 4. Thou shalt not use a computer to steal 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid (without permission) 7. Thou shalt not use other people's computer resources without authorization or proper compensation 8. Thou shalt not appropriate other people's intellectual output 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing 10.Thou shalt always use a computer in ways that ensure consideration and respect for other humans
  • 16.
  • 17. QUESTION 1: Unwanted messages in the mailbox are called? Malicious Code SPAM Cookies NEXT-> CLICK ON THE CORRECT ANSWER
  • 18. QUESTION 2: Cyber criminals who crack the password to access information from the Internet are called? Sackers Hackers Virus NEXT-> CLICK ON THE CORRECT ANSWER
  • 19. QUESTION 3: Set of moral values which regulate the use of computers are called? Cyber Law Computer Ethics Malicious Intent NEXT-> Privacy CLICK ON THE CORRECT ANSWER
  • 20. QUESTION 4: The process of making duplicate copy of the original software illegally is known as? Malicious Code Software Piracy Cookies NEXT-> Hacking CLICK ON THE CORRECT ANSWER
  • 21. QUESTION 5: There are 5 commandments of Computer Ethics? True NEXT-> False CLICK ON THE CORRECT ANSWER