SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Doing the Right Thing 
Computer Ethics
Plagiarism 
• Downloading somebody else’s works as if it were your 
own. 
• Plagiarism is a serious offense. The more famous you get, 
the more you’re at risk. 
• In college writing, it’s fine to make use of someone else’s 
effort as long as you use your own words and give credit. 
• Plagiarizing copyrighted materials is called copyright 
infringement
Privacy & Encryption 
• Privacy – refers to an individual’s ability to restrict or 
eliminate the collection, use, and sale of confidential 
personal information. 
• Encryption – refers to a coding or scrambling process by 
which a message is rendered unreadable by anyone except 
the intended recipient. Coded Message
Cipher text 
• Refers to a coded message 
Decode the message below 
V YBIR LBH 
ORYC BRX WRR 
A B C D E F J H I J K L M N O P Q R S T U V W X Y Z
Global Unique Identifiers (GUID) 
• A unique identification number that is generated by a computer 
hardware component or a program.
Privacy at Work. (Things to Remember) 
• Except in the case of an emergency, never use your employer’s 
telephone system for professional calls. Make all such calls from a 
pay telephone. 
• Never use the e-mail account your employer gives you for 
professional purposes. Get your own account with an Internet 
Service Provider (ISP), and be sure to send and receive all personal 
mail from your home computer. 
• Assume that everything you do while you’re at work – whether it’s 
talking on the phone, using your computer, taking a break, or 
chatting with co-workers is being monitored and recorded.
Protecting your Privacy Online 
To safeguard your privacy on the internet do the following: 
• Browse anonymously by surfing from sites such as “The Anonymizer” or “The-cloak” 
• Disable cookies on your Web browser or use cookie management software, such 
as Junkbuster. 
• Use a “throw-away” e-mail address on a free Web-based service such as 
Hotmail. 
• Tell children not to divulge any personal information to strangers online without 
first asking permision. 
• Don’t fill out site registration form unless you see a privacy policy statement 
indicating that the information you supply will not be sold to third parties.
Computer Crime: Tools and Techniques 
• Password guessing 
• Shoulder surfing 
• Packet sniffers 
• Dumpster diving 
• Social Engineering 
• Superuser status
SALAMI SHAVING AND DATA 
• Salami Shaving – a programmer alters a program so 
that it subtracts a very small amount of money from 
each account. 
• Data Diddling- insiders modify data so that it’s difficult 
or impossible to tell that they’ve stolen fund or 
equipment.
COMPUTER VIRUSES 
• Computer Virus - a computer program that can copy itself and 
infect a computer without permission or knowledge of the 
user. 
• File infectors – attached themselves to a program file. 
• Boot sector virus – propagates by means of in infected program, but 
it installs itself at the beginning of a hard drive. 
• Macro Virus – Take advantage of the automatic command 
execution capabilities 
• Executable File- program that can run on a given computer 
Platform. 
• E-mail Attachment-a computer file that is included with an e-mail 
message. 
Plain Text – safe file
MORE ROGUE PROGRAMS 
• Time bombs- also called logic bombs, are designed to sit harmlessly 
on a system until a certain event or set of circumstance causes the 
program to become active. 
• Worm – resembles a computer virus in that it can spread from one 
computer to another. Can propagate over a computer network. 
• Trojan Horse – is disguised as a useful program, but it contains hidden 
instructions to perform a malicious task instead. Sometimes a trojan 
horse is disguised as a game or a utility program that users will find 
appealing.
ATTACKERS 
• Hackers – computer hobbyist who enjoy pushing computer system to 
their limits 
• Crackers – obsessed with gaining entry to highly secure computer 
systems 
• Cyber Gang – bring crackers together by means of the internet and 
physical meetings. 
• Computer virus Author - Makers of Computer Viruses 
• Disgruntled Employees – Kick out employees 
• Fraud Artist - Swindlers & Shills
Cyberstalkers & Sexual Predators 
• Cyberstalking – define as the use of the internet e-mail, and other 
electronic communication media to harass or threaten a person 
repeatedly. 
• Cybersex - a virtual sex encounter in which two or more persons 
connected remotely via a computer network send one another sexually 
explicit messages describing a sexual experience. It is a form of role-playing 
in which the participants pretend they are having actual sexual 
relations
INFORMATION WARFARE 
• IW – the use of information technologies to corrupt or destroy 
an enemy’s information and industrial infrastructure. 
• Electronic Warfare – The use of electronic device to destroy 
or damage computer system. 
• Network Warfare – hacker-like attacks on the nation’s 
network infrastructure, including the electronic banking 
system. 
• Structural Sabotage – Attacks on information systems that 
support transportation, finance, energy and 
telecommunication.
Spotlight Ethics 
• Plagiarism – The presentation of Somebody else’s work as if 
it were your own. 
• At some colleges, plagiarism can get you thrown out of school on 
the first offense. 
• Copyright Infringement – Plagiarizing copyrighted material.
Ten Commandments for Computer Ethics 
1. Thou shalt not use computer to harm other people. 
2. Thou shalt not interfere with other people’s computer work. 
3. Thou shalt not snoop around in other people’s files. 
4. Thou shalt not use a computer to steal. 
5. Thou shalt not use a computer to bear false witness. 
6. Thou shalt not copy or use propriety software for which you have not paid. 
7. Thou shalt not use other people’s computer resources without authorization or proper 
compensation. 
8. Thou shalt not appropriate other people’s intellectual output. 
9. Thou shalt think about the social consequences of the program you write or the 
system you design. 
10. Thou shalt use a computer in ways that show consideration and respect for your 
fellow Humans.
Summary 
• Respecting yourself 
• Respecting Others 
• Respecting Academic Integrity

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 

Was ist angesagt? (20)

Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer security
Computer securityComputer security
Computer security
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
cyber crime
cyber crimecyber crime
cyber crime
 

Ähnlich wie Computer ethics

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 

Ähnlich wie Computer ethics (20)

Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Kürzlich hochgeladen (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Computer ethics

  • 1. Doing the Right Thing Computer Ethics
  • 2.
  • 3. Plagiarism • Downloading somebody else’s works as if it were your own. • Plagiarism is a serious offense. The more famous you get, the more you’re at risk. • In college writing, it’s fine to make use of someone else’s effort as long as you use your own words and give credit. • Plagiarizing copyrighted materials is called copyright infringement
  • 4. Privacy & Encryption • Privacy – refers to an individual’s ability to restrict or eliminate the collection, use, and sale of confidential personal information. • Encryption – refers to a coding or scrambling process by which a message is rendered unreadable by anyone except the intended recipient. Coded Message
  • 5. Cipher text • Refers to a coded message Decode the message below V YBIR LBH ORYC BRX WRR A B C D E F J H I J K L M N O P Q R S T U V W X Y Z
  • 6. Global Unique Identifiers (GUID) • A unique identification number that is generated by a computer hardware component or a program.
  • 7. Privacy at Work. (Things to Remember) • Except in the case of an emergency, never use your employer’s telephone system for professional calls. Make all such calls from a pay telephone. • Never use the e-mail account your employer gives you for professional purposes. Get your own account with an Internet Service Provider (ISP), and be sure to send and receive all personal mail from your home computer. • Assume that everything you do while you’re at work – whether it’s talking on the phone, using your computer, taking a break, or chatting with co-workers is being monitored and recorded.
  • 8. Protecting your Privacy Online To safeguard your privacy on the internet do the following: • Browse anonymously by surfing from sites such as “The Anonymizer” or “The-cloak” • Disable cookies on your Web browser or use cookie management software, such as Junkbuster. • Use a “throw-away” e-mail address on a free Web-based service such as Hotmail. • Tell children not to divulge any personal information to strangers online without first asking permision. • Don’t fill out site registration form unless you see a privacy policy statement indicating that the information you supply will not be sold to third parties.
  • 9. Computer Crime: Tools and Techniques • Password guessing • Shoulder surfing • Packet sniffers • Dumpster diving • Social Engineering • Superuser status
  • 10. SALAMI SHAVING AND DATA • Salami Shaving – a programmer alters a program so that it subtracts a very small amount of money from each account. • Data Diddling- insiders modify data so that it’s difficult or impossible to tell that they’ve stolen fund or equipment.
  • 11. COMPUTER VIRUSES • Computer Virus - a computer program that can copy itself and infect a computer without permission or knowledge of the user. • File infectors – attached themselves to a program file. • Boot sector virus – propagates by means of in infected program, but it installs itself at the beginning of a hard drive. • Macro Virus – Take advantage of the automatic command execution capabilities • Executable File- program that can run on a given computer Platform. • E-mail Attachment-a computer file that is included with an e-mail message. Plain Text – safe file
  • 12. MORE ROGUE PROGRAMS • Time bombs- also called logic bombs, are designed to sit harmlessly on a system until a certain event or set of circumstance causes the program to become active. • Worm – resembles a computer virus in that it can spread from one computer to another. Can propagate over a computer network. • Trojan Horse – is disguised as a useful program, but it contains hidden instructions to perform a malicious task instead. Sometimes a trojan horse is disguised as a game or a utility program that users will find appealing.
  • 13. ATTACKERS • Hackers – computer hobbyist who enjoy pushing computer system to their limits • Crackers – obsessed with gaining entry to highly secure computer systems • Cyber Gang – bring crackers together by means of the internet and physical meetings. • Computer virus Author - Makers of Computer Viruses • Disgruntled Employees – Kick out employees • Fraud Artist - Swindlers & Shills
  • 14. Cyberstalkers & Sexual Predators • Cyberstalking – define as the use of the internet e-mail, and other electronic communication media to harass or threaten a person repeatedly. • Cybersex - a virtual sex encounter in which two or more persons connected remotely via a computer network send one another sexually explicit messages describing a sexual experience. It is a form of role-playing in which the participants pretend they are having actual sexual relations
  • 15. INFORMATION WARFARE • IW – the use of information technologies to corrupt or destroy an enemy’s information and industrial infrastructure. • Electronic Warfare – The use of electronic device to destroy or damage computer system. • Network Warfare – hacker-like attacks on the nation’s network infrastructure, including the electronic banking system. • Structural Sabotage – Attacks on information systems that support transportation, finance, energy and telecommunication.
  • 16. Spotlight Ethics • Plagiarism – The presentation of Somebody else’s work as if it were your own. • At some colleges, plagiarism can get you thrown out of school on the first offense. • Copyright Infringement – Plagiarizing copyrighted material.
  • 17. Ten Commandments for Computer Ethics 1. Thou shalt not use computer to harm other people. 2. Thou shalt not interfere with other people’s computer work. 3. Thou shalt not snoop around in other people’s files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use propriety software for which you have not paid. 7. Thou shalt not use other people’s computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people’s intellectual output. 9. Thou shalt think about the social consequences of the program you write or the system you design. 10. Thou shalt use a computer in ways that show consideration and respect for your fellow Humans.
  • 18. Summary • Respecting yourself • Respecting Others • Respecting Academic Integrity