SlideShare a Scribd company logo
1 of 10
What is computer ethics?
    Ethics is a set of moral principles that govern the behavior of

    a group or individual. Therefore, computer ethics is set of
    moral principles that regulate the use of computers. Some
    common issues of computer ethics include intellectual
    property rights (such as copyrighted electronic content),
    privacy concerns, and how computers affect society.
    As technology advances, computers continue to have a

    greater impact on society. Therefore, computer ethics
    promotes the discussion of how much influence computers
    should have in areas such as artificial intelligence and
    human communication. As the world of computers evolves,
    computer ethics continues to create ethical standards that
    address new issues raised by new technologies.
What are some issues?

     Identifying ethical issues as they arise, as well as
     defining how to deal with them, has traditionally been
     problematic in computer ethics. Some have argued
     against the idea of computer ethics as a whole.
     However, a new proposed of a method of identifying
     issues in computer ethics in their Paramedic Ethics
     model. The model is a data-centered view of judging
     ethical issues, involving the gathering, analysis,
     negotiation, and judging of data about the issue.
What is the ethic standards?


    iLink Edge was founded by Michael Stankiewicz in order to
    provide Computer Forensic consulting services to legal
    and corporate entities. The goal of the relationship with the
    client is to provide the utmost professional service
    establishing a confidential line of communication in order
    to meet the client's expectations of data discovery and
    analysis.

    One of the most definitive sets of ethical standards is the Association

    for Computing Machinery Code of Ethics. The code is a four-point
    standard governing ethical behavior among computing professionals. It
    covers the core set of computer ethics from professional responsibility
    to the consequences of technology in society.
Continu
  es
One of the most definitive sets
of ethical standards is the
Association for Computing
Machinery Code of Ethics. The
code is a four-point standard
governing ethical behavior
among computing
professionals. It covers the
core set of computer ethics
from professional responsibility
to the consequences of
technology in society.
Computer
crime
When computers first began to be used in society
at large, the absence of ethical standards about
their use and related issues caused some
problems. However, as their use became
widespread in every facet of our lives, discussions
in computer ethics resulted in some kind of a
consensus. Computer crime and computer fraud
the law is against them.
TEN COMMAND OF
COMPUTER ETHICS.
    Those shall not use a computer to harm other people.

    Those shall not interfere with other people's computer work.

    Those shall not snoop around in other peoples files.

    Those shall not use a computer to steal.

    Those shall not use a computer to bear false witness.

    Those shall not use or copy software for which you have not paid.

    Those shall not use other people's computer resources without

    authorization.
    Those shall not appropriate other people's intellectual output.

    Those shall think about the social consequences of the program

    you write.
    Those shall use a computer in ways that show consideration and

    respect.
ALERT INFORM
     Be careful about talking to strangers on a
    computer network.
     Who are these people anyway? Remember that people

    online may not be who they seem at first.

  Never respond to messages or bulletin board items that

  are:
 Suggestive of something improper or indecent.


    Obscene, filthy, or offensive to accepted standards of

    decency.

    Belligerent, hostile, combative, very aggressive.

Continues
    Threaten to do harm or danger towards you or

    another
    Introduction to computer ethics the world of

    worldwide wed is growing on the past of yeas and
    today as unprecedented rate as this one grown is
    not only increasing the rate and the amount
    available knowledge but also increase the problem
    inherent to it usage and distribution.
 All  of these are recently common on
    an everyday life.
. Criminals Can Operate Anonymously
Over the Computer Networks
  Respect PRIVACY Do not repost a

  message that was sent to you privately
  without permission.
 Do not send information using
  someone else name.
 Personal rights.
 Illegal acts.
 Remember that the internet is access is
  a privilege not a right.

More Related Content

What's hot

Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyrightAdyns
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing professionshahmansoor109
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsPrabesh Shrestha
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsMichael Heron
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
 

What's hot (20)

Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 

Viewers also liked

Are Personal Ethics Enough
Are Personal Ethics EnoughAre Personal Ethics Enough
Are Personal Ethics Enoughjim
 
Role of Ethics in Personal Finance
Role of Ethics in Personal FinanceRole of Ethics in Personal Finance
Role of Ethics in Personal FinanceAnamika Pundir
 
Intro to Ethical Decision Making: Ethics and Moral Values
Intro to Ethical Decision Making: Ethics and Moral ValuesIntro to Ethical Decision Making: Ethics and Moral Values
Intro to Ethical Decision Making: Ethics and Moral Values Mia Eaker
 
Business ethics C1 -moral_ethics_ethical_dilemma
Business ethics C1  -moral_ethics_ethical_dilemmaBusiness ethics C1  -moral_ethics_ethical_dilemma
Business ethics C1 -moral_ethics_ethical_dilemmaIzah Asmadi
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 

Viewers also liked (8)

Are Personal Ethics Enough
Are Personal Ethics EnoughAre Personal Ethics Enough
Are Personal Ethics Enough
 
Role of Ethics in Personal Finance
Role of Ethics in Personal FinanceRole of Ethics in Personal Finance
Role of Ethics in Personal Finance
 
Ethic02
Ethic02Ethic02
Ethic02
 
Intro to Ethical Decision Making: Ethics and Moral Values
Intro to Ethical Decision Making: Ethics and Moral ValuesIntro to Ethical Decision Making: Ethics and Moral Values
Intro to Ethical Decision Making: Ethics and Moral Values
 
Business ethics C1 -moral_ethics_ethical_dilemma
Business ethics C1  -moral_ethics_ethical_dilemmaBusiness ethics C1  -moral_ethics_ethical_dilemma
Business ethics C1 -moral_ethics_ethical_dilemma
 
Ethics and Moral Value
Ethics and Moral ValueEthics and Moral Value
Ethics and Moral Value
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Ethics
EthicsEthics
Ethics
 

Similar to Computer Ethics Final Work

Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computingMichael Jarata
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)Maria Obaidi
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
Computer Research Papers
Computer Research PapersComputer Research Papers
Computer Research PapersMonica Rivera
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 

Similar to Computer Ethics Final Work (17)

Nfwordle
NfwordleNfwordle
Nfwordle
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computing
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Computer Research Papers
Computer Research PapersComputer Research Papers
Computer Research Papers
 
P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Computer Ethics Final Work

  • 1.
  • 2. What is computer ethics? Ethics is a set of moral principles that govern the behavior of  a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. As technology advances, computers continue to have a  greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies.
  • 3. What are some issues? Identifying ethical issues as they arise, as well as defining how to deal with them, has traditionally been problematic in computer ethics. Some have argued against the idea of computer ethics as a whole. However, a new proposed of a method of identifying issues in computer ethics in their Paramedic Ethics model. The model is a data-centered view of judging ethical issues, involving the gathering, analysis, negotiation, and judging of data about the issue.
  • 4. What is the ethic standards? iLink Edge was founded by Michael Stankiewicz in order to provide Computer Forensic consulting services to legal and corporate entities. The goal of the relationship with the client is to provide the utmost professional service establishing a confidential line of communication in order to meet the client's expectations of data discovery and analysis. One of the most definitive sets of ethical standards is the Association  for Computing Machinery Code of Ethics. The code is a four-point standard governing ethical behavior among computing professionals. It covers the core set of computer ethics from professional responsibility to the consequences of technology in society.
  • 5. Continu es One of the most definitive sets of ethical standards is the Association for Computing Machinery Code of Ethics. The code is a four-point standard governing ethical behavior among computing professionals. It covers the core set of computer ethics from professional responsibility to the consequences of technology in society.
  • 6. Computer crime When computers first began to be used in society at large, the absence of ethical standards about their use and related issues caused some problems. However, as their use became widespread in every facet of our lives, discussions in computer ethics resulted in some kind of a consensus. Computer crime and computer fraud the law is against them.
  • 7. TEN COMMAND OF COMPUTER ETHICS. Those shall not use a computer to harm other people.  Those shall not interfere with other people's computer work.  Those shall not snoop around in other peoples files.  Those shall not use a computer to steal.  Those shall not use a computer to bear false witness.  Those shall not use or copy software for which you have not paid.  Those shall not use other people's computer resources without  authorization. Those shall not appropriate other people's intellectual output.  Those shall think about the social consequences of the program  you write. Those shall use a computer in ways that show consideration and  respect.
  • 8. ALERT INFORM Be careful about talking to strangers on a computer network. Who are these people anyway? Remember that people  online may not be who they seem at first. Never respond to messages or bulletin board items that  are:  Suggestive of something improper or indecent. Obscene, filthy, or offensive to accepted standards of  decency. Belligerent, hostile, combative, very aggressive. 
  • 9. Continues Threaten to do harm or danger towards you or  another Introduction to computer ethics the world of  worldwide wed is growing on the past of yeas and today as unprecedented rate as this one grown is not only increasing the rate and the amount available knowledge but also increase the problem inherent to it usage and distribution.  All of these are recently common on an everyday life.
  • 10. . Criminals Can Operate Anonymously Over the Computer Networks Respect PRIVACY Do not repost a  message that was sent to you privately without permission.  Do not send information using someone else name.  Personal rights.  Illegal acts.  Remember that the internet is access is a privilege not a right.