SlideShare ist ein Scribd-Unternehmen logo
1 von 27
4.0
Computer Ethics and Security
4.1
Computer Ethics
4.1
Computer Ethics
4.1.1
Netiquette
4.2
Computer Security
4.2
Computer Security
4.2.1
Computer Security Risks
4.2.2
Security Measures
4.1.2
Area of computer ethics
4.1 Computer Ethics
4.1.1 Netiquette
 At the end of this topic, students should be able
to:
◦ Identify the rules of netiquette
Learning Outcome
4.1.1 Netiquette
Definition:
• Three areas where good netiquette is
highly stressed are :
4.1.1 Netiquette
Rules of netiquette
• Rules of netiquette on social interaction and
communication electronically.
4.1.1 Netiquette
btw By the way
imho In my humble opinion
fyi For your information
tyvm Thank You Very Much
4.1.1 Netiquette
:) smile :| Indifference :O Surprised
:( Frown : Undecided
4.1.1 Netiquette
6. Avoid forward chain letter.
8. Never access someone's private email.
9. Clearly identify a spoiler which is a message that reveals
a solution to a game or ending to a movie or program.
Rules of netiquette
4.1.1 Netiquette
Rules of netiquette
4.1.1 Netiquette
Summary
What you have learned:
• Definition of Netiquette. • Rules of Netiquette.
4.1.1 Netiquette
1. Define netiquette.
2. What is the basic rule of netiquette?
3. Name two things you should remember about being online that
are related to netiquette.
4. What is a flame war?
5. Why should you stay away from using all capital letters?
6. Why is it easy for there to be misunderstandings in online
conversations?
7. What is an emoticon (smiley) and why would you use one? Give at
least 2 examples and explain what they mean.
8. What should you do before forwarding personal emails to others?
9. List some items you think should be included in our college 's
Internet Safety Tips.
10. List some items you think should be included in our college's
Netiquette Rules.
4.1.1 Netiquette
4.1 Computer Ethics
4.1.2 Area of Computer Ethics
 At the end of this topic, students should be able
to:
◦ Define computer ethics.
◦ Describe areas of computer ethics.
Learning Outcome
Definition of computer ethicsDefinition of computer ethics
• Moral guidelines that govern the use of
computers and information systems
Shelly Cashman
• set of moral principles that regulate the use of
computers
http://www.techterms.com
4.1.2 Areas of computer Ethics
Areas of computer ethics:Areas of computer ethics:
1. Information accuracy
2. Green Computing
3. Codes of conduct
4. Intellectual Property Rights
5. Information Privacy
4.1.2 Areas of computer Ethics
1. Information Accuracy1. Information Accuracy
 knowledge that is correct, or something that is true
 Information accuracy is a concern
*** not all information on the web is correct
4.1.2 Areas of computer Ethics
2. Green Computing:2. Green Computing:
- Involving reducing the electricity and environmental
waste while using a computer
4.1.2 Areas of computer Ethics
3. Codes of conduct:3. Codes of conduct:
- Written guideline that helps determine whether a
specific computer action is ethical or unethical
4.1.2 Areas of computer Ethics
4.1.2 Areas of computer Ethics
4. Information Privacy:4. Information Privacy:
• refer to the rights of individuals andrefer to the rights of individuals and
companies to deny or restrict thecompanies to deny or restrict the
collection and use of information aboutcollection and use of information about
themthem
4.1.2 Areas of computer Ethics
5. Intellectual Property5. Intellectual Property
Unique and original works such as idea, inventions,
art, writing, processes, company and product name,
and logos.
Refer to the creation of mind used in
commerce
4.1.2 Areas of computer Ethics
Intellectual PropertyIntellectual Property
PatentPatent TrademarkTrademark CopyrightCopyright
Intellectual Property
 is an exclusive right granted for an invention
invention - a product or a process that provides a new
way of doing something, or offers a new technical
solution to a problem
Example : the function and operation of Windows 7
Intellectual Property
• A distinctive sign which identifies
certain goods or services
Examples :
LOGO
SIGN
SLOGAN
Color
DESIGN
Connecting People
Intellectual Property
A legal term describing rights given to creators for their
literary and artistic works.
literary works - novels, poems, plays, reference works,
newspapers, computer programs, databases, films, musical
compositions, and choreography
artistic works - paintings, drawings, photographs, sculpture,
architecture, advertisements, maps and technical drawings
Intellectual Property
Example : Licensed Windows 7
Importance of Intellectual Property
To protect any original work that created by
individual person/ company for example,
image, drawing, lyric, publishing and so on.
Preserve the features and processes that
make things work. This lets inventors profit
from their inventions.
Intellectual Property

Weitere ähnliche Inhalte

Was ist angesagt?

An Introduction to Internet
An Introduction to InternetAn Introduction to Internet
An Introduction to InternetChinmay Raul
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online NetiquetteZoro18
 
Lab 1 Introduction to Computer
Lab 1   Introduction to ComputerLab 1   Introduction to Computer
Lab 1 Introduction to ComputerHalimaton Sa'adiah
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetASIT Education
 
How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-worksRashmi Kaul
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptanwarkade1
 
Internet
InternetInternet
Internetmustha3
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Fizaril Amzari Omar
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 

Was ist angesagt? (20)

An Introduction to Internet
An Introduction to InternetAn Introduction to Internet
An Introduction to Internet
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
Computer security
Computer securityComputer security
Computer security
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Lab 1 Introduction to Computer
Lab 1   Introduction to ComputerLab 1   Introduction to Computer
Lab 1 Introduction to Computer
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.ppt
 
Internet
InternetInternet
Internet
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 

Andere mochten auch

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
5.computer ethics
5.computer ethics5.computer ethics
5.computer ethicsnajwan97
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Ethical issues in organizational behavior
Ethical issues in organizational behaviorEthical issues in organizational behavior
Ethical issues in organizational behaviorccrumly
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
10 commandments of computer ethics with example
10 commandments of computer ethics with example10 commandments of computer ethics with example
10 commandments of computer ethics with exampleMhia Maravilla
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 

Andere mochten auch (17)

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
5.computer ethics
5.computer ethics5.computer ethics
5.computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Embedded operating systems
Embedded operating systemsEmbedded operating systems
Embedded operating systems
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethical issues in organizational behavior
Ethical issues in organizational behaviorEthical issues in organizational behavior
Ethical issues in organizational behavior
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Organizational culture and ethical behavior
Organizational culture and ethical behaviorOrganizational culture and ethical behavior
Organizational culture and ethical behavior
 
10 commandments of computer ethics with example
10 commandments of computer ethics with example10 commandments of computer ethics with example
10 commandments of computer ethics with example
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 

Ähnlich wie 4.1.1 areas of computer ethics

PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018Fizaril Amzari Omar
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptxMohammedAish
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computeribrahimtbl3147
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)smkengkilili2011
 
Lecture 1 introduction to course
Lecture 1 introduction to courseLecture 1 introduction to course
Lecture 1 introduction to courseGC University Fsd
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional EthicsFaraz Ahmed
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your futuresuperb11b
 
COMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYCOMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYzenbrowski
 
Digital Technology Merit Badge
Digital Technology Merit BadgeDigital Technology Merit Badge
Digital Technology Merit BadgeChuck Vohs
 
ICT_PracticeWorks[1].pdf
ICT_PracticeWorks[1].pdfICT_PracticeWorks[1].pdf
ICT_PracticeWorks[1].pdfssuserade1a1
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Surname 2NameCourseDatePE Exam in ECE Computer En.docx
Surname 2NameCourseDatePE Exam in ECE Computer En.docxSurname 2NameCourseDatePE Exam in ECE Computer En.docx
Surname 2NameCourseDatePE Exam in ECE Computer En.docxmabelf3
 
Lesson4.0 unit 4 the internet and global impact
Lesson4.0 unit 4  the internet and global impactLesson4.0 unit 4  the internet and global impact
Lesson4.0 unit 4 the internet and global impactLexume1
 
SPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsxSPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsxozaixyzo
 
Professional societies
Professional societiesProfessional societies
Professional societiesSulman Ahmed
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course OutlineSaqib Raza
 

Ähnlich wie 4.1.1 areas of computer ethics (20)

Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Lecture 1 introduction to course
Lecture 1 introduction to courseLecture 1 introduction to course
Lecture 1 introduction to course
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
 
COMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYCOMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITY
 
Digital Technology Merit Badge
Digital Technology Merit BadgeDigital Technology Merit Badge
Digital Technology Merit Badge
 
ICT_PracticeWorks[1].pdf
ICT_PracticeWorks[1].pdfICT_PracticeWorks[1].pdf
ICT_PracticeWorks[1].pdf
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
P.p lect1-
P.p lect1-P.p lect1-
P.p lect1-
 
Surname 2NameCourseDatePE Exam in ECE Computer En.docx
Surname 2NameCourseDatePE Exam in ECE Computer En.docxSurname 2NameCourseDatePE Exam in ECE Computer En.docx
Surname 2NameCourseDatePE Exam in ECE Computer En.docx
 
Lesson4.0 unit 4 the internet and global impact
Lesson4.0 unit 4  the internet and global impactLesson4.0 unit 4  the internet and global impact
Lesson4.0 unit 4 the internet and global impact
 
SPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsxSPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsx
 
Professional societies
Professional societiesProfessional societies
Professional societies
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
 

Kürzlich hochgeladen

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 

Kürzlich hochgeladen (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

4.1.1 areas of computer ethics

  • 1. 4.0 Computer Ethics and Security 4.1 Computer Ethics 4.1 Computer Ethics 4.1.1 Netiquette 4.2 Computer Security 4.2 Computer Security 4.2.1 Computer Security Risks 4.2.2 Security Measures 4.1.2 Area of computer ethics
  • 3.  At the end of this topic, students should be able to: ◦ Identify the rules of netiquette Learning Outcome
  • 5. • Three areas where good netiquette is highly stressed are : 4.1.1 Netiquette
  • 6. Rules of netiquette • Rules of netiquette on social interaction and communication electronically. 4.1.1 Netiquette
  • 7. btw By the way imho In my humble opinion fyi For your information tyvm Thank You Very Much 4.1.1 Netiquette
  • 8. :) smile :| Indifference :O Surprised :( Frown : Undecided 4.1.1 Netiquette
  • 9. 6. Avoid forward chain letter. 8. Never access someone's private email. 9. Clearly identify a spoiler which is a message that reveals a solution to a game or ending to a movie or program. Rules of netiquette 4.1.1 Netiquette
  • 11. Summary What you have learned: • Definition of Netiquette. • Rules of Netiquette. 4.1.1 Netiquette
  • 12. 1. Define netiquette. 2. What is the basic rule of netiquette? 3. Name two things you should remember about being online that are related to netiquette. 4. What is a flame war? 5. Why should you stay away from using all capital letters? 6. Why is it easy for there to be misunderstandings in online conversations? 7. What is an emoticon (smiley) and why would you use one? Give at least 2 examples and explain what they mean. 8. What should you do before forwarding personal emails to others? 9. List some items you think should be included in our college 's Internet Safety Tips. 10. List some items you think should be included in our college's Netiquette Rules. 4.1.1 Netiquette
  • 13. 4.1 Computer Ethics 4.1.2 Area of Computer Ethics
  • 14.  At the end of this topic, students should be able to: ◦ Define computer ethics. ◦ Describe areas of computer ethics. Learning Outcome
  • 15. Definition of computer ethicsDefinition of computer ethics • Moral guidelines that govern the use of computers and information systems Shelly Cashman • set of moral principles that regulate the use of computers http://www.techterms.com 4.1.2 Areas of computer Ethics
  • 16. Areas of computer ethics:Areas of computer ethics: 1. Information accuracy 2. Green Computing 3. Codes of conduct 4. Intellectual Property Rights 5. Information Privacy 4.1.2 Areas of computer Ethics
  • 17. 1. Information Accuracy1. Information Accuracy  knowledge that is correct, or something that is true  Information accuracy is a concern *** not all information on the web is correct 4.1.2 Areas of computer Ethics
  • 18. 2. Green Computing:2. Green Computing: - Involving reducing the electricity and environmental waste while using a computer 4.1.2 Areas of computer Ethics
  • 19. 3. Codes of conduct:3. Codes of conduct: - Written guideline that helps determine whether a specific computer action is ethical or unethical 4.1.2 Areas of computer Ethics
  • 20. 4.1.2 Areas of computer Ethics
  • 21. 4. Information Privacy:4. Information Privacy: • refer to the rights of individuals andrefer to the rights of individuals and companies to deny or restrict thecompanies to deny or restrict the collection and use of information aboutcollection and use of information about themthem 4.1.2 Areas of computer Ethics
  • 22. 5. Intellectual Property5. Intellectual Property Unique and original works such as idea, inventions, art, writing, processes, company and product name, and logos. Refer to the creation of mind used in commerce 4.1.2 Areas of computer Ethics
  • 23. Intellectual PropertyIntellectual Property PatentPatent TrademarkTrademark CopyrightCopyright Intellectual Property
  • 24.  is an exclusive right granted for an invention invention - a product or a process that provides a new way of doing something, or offers a new technical solution to a problem Example : the function and operation of Windows 7 Intellectual Property
  • 25. • A distinctive sign which identifies certain goods or services Examples : LOGO SIGN SLOGAN Color DESIGN Connecting People Intellectual Property
  • 26. A legal term describing rights given to creators for their literary and artistic works. literary works - novels, poems, plays, reference works, newspapers, computer programs, databases, films, musical compositions, and choreography artistic works - paintings, drawings, photographs, sculpture, architecture, advertisements, maps and technical drawings Intellectual Property Example : Licensed Windows 7
  • 27. Importance of Intellectual Property To protect any original work that created by individual person/ company for example, image, drawing, lyric, publishing and so on. Preserve the features and processes that make things work. This lets inventors profit from their inventions. Intellectual Property

Hinweis der Redaktion

  1. Huge databases store data online It is important to safeguard your information
  2. Notes : Open Source is not a copyright because the software can be shared and develop together.