SlideShare ist ein Scribd-Unternehmen logo
1 von 6
by Scott M. Ligocki Jr.   Computer Ethics
Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct online.   Ethical decisions related to computer technology and usage can typically be categorized into 3 primary influences:  The individual’s own personal code.   Any informal code of ethical behavior that exists in the work place.   Exposure to formal code of ethics.  The Beginning
To understand the foundation of Computer Ethics, it is important to examine the different schools of ethical theory.   Relativism - the understanding that there are no universal moral norms of right and wrong.   Kantianism - the belief that people’s actions are to be guided by moral laws, and that these moral laws are universal.  Utilitarianism - the belief that an action is good if it benefits someone and an action is bad if it harms someone.   Social contract - the concept that for a society to arise and maintain order, a morality based set of rules must be agreed upon.   The Foundation
In 1950 Norbert Weiner, an MIT professor and inventor of an information feedback system called “Cybernetics", published a book called: The Human Use of Human Beings,which laid out the basic foundations of computer ethics and made Norbert Weiner the father of computer ethics.   The 1990's were a time when computers were reaching their pinnacle.  The combination of computers, with telecommunication, the internet and other media meant that many new ethical issues were being raised.   In the year 1992, the Association for Computing Machinery adopted a new set of ethical rules called: ACM Code of Ethics and Professional Conduct, which consisted of 24 statements of personal responsibility.  The History
With the increase in social networking, more and more people are allowing their private information to be shared publicly.  The power struggles of the real world have easily transferred onto the internet.  Independent users, businesses, and search engines are subject to manipulation, bias and censorship, whether they realize it or not.  This gives views to certain issues or events that may or may not be modified, which could easily bend public opinion in frightening ways. International news can spread across the globe in very little time.  The internet can easily be controlled by companies or organizations trying to get the public to buy in to certain things.   In reference to Computer Ethics, there is a lot to be said about Internet Privacy.  The Internet
Computer Ethics Identifying ethical issues as they arise, as well as defining how to deal with them.

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
 
history of internet and usage of internet in education and communication
history of internet and usage of internet in education and communicationhistory of internet and usage of internet in education and communication
history of internet and usage of internet in education and communication
Kowshick Ahmed
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 

Was ist angesagt? (20)

Internet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir HabibInternet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir Habib
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Intranet & Extranet
Intranet & ExtranetIntranet & Extranet
Intranet & Extranet
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
An Introduction to Cyber Ethics
An Introduction to Cyber EthicsAn Introduction to Cyber Ethics
An Introduction to Cyber Ethics
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Ethical Issues in Social Media
Ethical Issues in Social MediaEthical Issues in Social Media
Ethical Issues in Social Media
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
 
Social networking sites presentation
Social networking sites presentationSocial networking sites presentation
Social networking sites presentation
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
history of internet and usage of internet in education and communication
history of internet and usage of internet in education and communicationhistory of internet and usage of internet in education and communication
history of internet and usage of internet in education and communication
 
uses and misuses of social media.pptx
uses and misuses of social media.pptxuses and misuses of social media.pptx
uses and misuses of social media.pptx
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 

Andere mochten auch

Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)
Rana Muhammad Asif
 
Ethical vs non ethical marketing
Ethical vs non ethical marketingEthical vs non ethical marketing
Ethical vs non ethical marketing
Sayali Pange
 
Computer Generations
Computer GenerationsComputer Generations
Computer Generations
Aris Santos
 
Sears Subject Headings
Sears Subject HeadingsSears Subject Headings
Sears Subject Headings
Erica Findley
 
Collection development: selection Context, criteria on selection and electron...
Collection development: selection Context, criteria on selection and electron...Collection development: selection Context, criteria on selection and electron...
Collection development: selection Context, criteria on selection and electron...
Jennifer Laluna
 
Dealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizationsDealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizations
Kenny Nguyen
 
Ranganathan and Reference Service in the Modern Library
Ranganathan and Reference Service in the Modern LibraryRanganathan and Reference Service in the Modern Library
Ranganathan and Reference Service in the Modern Library
Jenna Kammer
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
Kak Yong
 

Andere mochten auch (20)

Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And Computing
 
Sis 2008
Sis 2008Sis 2008
Sis 2008
 
Utility Players: A Library's Research Services Easily Integrate into Translat...
Utility Players: A Library's Research Services Easily Integrate into Translat...Utility Players: A Library's Research Services Easily Integrate into Translat...
Utility Players: A Library's Research Services Easily Integrate into Translat...
 
Five laws of Library Science by S R Ranganathan
Five laws of Library Science by S R RanganathanFive laws of Library Science by S R Ranganathan
Five laws of Library Science by S R Ranganathan
 
Ethical vs non ethical marketing
Ethical vs non ethical marketingEthical vs non ethical marketing
Ethical vs non ethical marketing
 
S R Ranganathan Powerpoint
S R  Ranganathan PowerpointS R  Ranganathan Powerpoint
S R Ranganathan Powerpoint
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Computer Generations
Computer GenerationsComputer Generations
Computer Generations
 
Importance of Ethics
Importance of EthicsImportance of Ethics
Importance of Ethics
 
Laws of library science
Laws of library scienceLaws of library science
Laws of library science
 
Sears Subject Headings
Sears Subject HeadingsSears Subject Headings
Sears Subject Headings
 
Collection development: selection Context, criteria on selection and electron...
Collection development: selection Context, criteria on selection and electron...Collection development: selection Context, criteria on selection and electron...
Collection development: selection Context, criteria on selection and electron...
 
Dealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizationsDealing with unethical behaviors in organizations
Dealing with unethical behaviors in organizations
 
Comparative study of major classification schemes
Comparative study of major classification schemesComparative study of major classification schemes
Comparative study of major classification schemes
 
Library Types & Personnel Roles
Library Types & Personnel RolesLibrary Types & Personnel Roles
Library Types & Personnel Roles
 
Ranganathan and Reference Service in the Modern Library
Ranganathan and Reference Service in the Modern LibraryRanganathan and Reference Service in the Modern Library
Ranganathan and Reference Service in the Modern Library
 
The Role of Libraries and Librarians in Information Literacy
The Role of Libraries and Librarians in Information LiteracyThe Role of Libraries and Librarians in Information Literacy
The Role of Libraries and Librarians in Information Literacy
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 

Ähnlich wie PPT Lab Assignment - Computers - Computer Ethics

Ict2 somehistoricalmilestone-ja barrientos
Ict2 somehistoricalmilestone-ja barrientosIct2 somehistoricalmilestone-ja barrientos
Ict2 somehistoricalmilestone-ja barrientos
Jonnalyn Barrientos
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
johniemcm5zt
 

Ähnlich wie PPT Lab Assignment - Computers - Computer Ethics (20)

Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppt
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ict2 somehistoricalmilestone-ja barrientos
Ict2 somehistoricalmilestone-ja barrientosIct2 somehistoricalmilestone-ja barrientos
Ict2 somehistoricalmilestone-ja barrientos
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Some Historical Milestone
Some Historical MilestoneSome Historical Milestone
Some Historical Milestone
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
a.pptx
a.pptxa.pptx
a.pptx
 
Ijetcas14 345
Ijetcas14 345Ijetcas14 345
Ijetcas14 345
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
INT 1010 05-2.pdf
INT 1010 05-2.pdfINT 1010 05-2.pdf
INT 1010 05-2.pdf
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

PPT Lab Assignment - Computers - Computer Ethics

  • 1. by Scott M. Ligocki Jr. Computer Ethics
  • 2. Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct online. Ethical decisions related to computer technology and usage can typically be categorized into 3 primary influences: The individual’s own personal code. Any informal code of ethical behavior that exists in the work place. Exposure to formal code of ethics. The Beginning
  • 3. To understand the foundation of Computer Ethics, it is important to examine the different schools of ethical theory. Relativism - the understanding that there are no universal moral norms of right and wrong. Kantianism - the belief that people’s actions are to be guided by moral laws, and that these moral laws are universal. Utilitarianism - the belief that an action is good if it benefits someone and an action is bad if it harms someone. Social contract - the concept that for a society to arise and maintain order, a morality based set of rules must be agreed upon. The Foundation
  • 4. In 1950 Norbert Weiner, an MIT professor and inventor of an information feedback system called “Cybernetics", published a book called: The Human Use of Human Beings,which laid out the basic foundations of computer ethics and made Norbert Weiner the father of computer ethics. The 1990's were a time when computers were reaching their pinnacle. The combination of computers, with telecommunication, the internet and other media meant that many new ethical issues were being raised. In the year 1992, the Association for Computing Machinery adopted a new set of ethical rules called: ACM Code of Ethics and Professional Conduct, which consisted of 24 statements of personal responsibility. The History
  • 5. With the increase in social networking, more and more people are allowing their private information to be shared publicly. The power struggles of the real world have easily transferred onto the internet. Independent users, businesses, and search engines are subject to manipulation, bias and censorship, whether they realize it or not. This gives views to certain issues or events that may or may not be modified, which could easily bend public opinion in frightening ways. International news can spread across the globe in very little time. The internet can easily be controlled by companies or organizations trying to get the public to buy in to certain things. In reference to Computer Ethics, there is a lot to be said about Internet Privacy. The Internet
  • 6. Computer Ethics Identifying ethical issues as they arise, as well as defining how to deal with them.