SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Computer EthicsComputer Ethics
By: Paola ArizaBy: Paola Ariza
Ethics?
Ethic refers to the standards and rules
that "should" be followed and it helps us
to regulate our conduct in a group or
with a set of individuals. Since the term
Ethics is a relative term, it is branched
under philosophy, which states how
users of World Wide Web should make
decisions regarding their conduct.
 Computer ethics is
a new branch of
ethics that is
growing and
changing rapidly as
computer
technology also
grows and
develops.
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not
paid.
7. Thou shalt not use other people's computer resources without
authorization or proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration
and respect for your fellow humans
The Ten Commandments On Computer EthicsThe Ten Commandments On Computer Ethics
Computers are often far more
efficient than humans in performing
many tasks. In the industrialized
world many workers already have
been replaced by computerized
devices -- bank tellers, auto workers,
telephone operators, typists, graphic
artists, security guards, assembly-
line workers, and on and on. Even
professionals like medical doctors,
lawyers, teachers, accountants and
psychologists are finding that
computers can perform many of
their traditional professional duties
quite effectively.
Why do we need computer ethics?
The growth of the WWW has created several
novel legal issues
The existence of new questions that older
laws cannot answer
Traditional laws are outdated/anachronistic
in this world
a more coherent body of law is needed to
govern Internet and computers
Cyber Ethics
• the most common problem isn't hacking (illegally
accessing Web sites) or cracking (vandalizing
Web sites); It's the unauthorized downloading of
games and software.
• the average hacker is likely to be a teenager and
given that most homes now have at least one
computer
Code of Ethics
 Information stored on the computer should be treated
as seriously as written or spoken word.
 Privacy should not be violated. In case of academic
use, it is known plagiarism.
 Information from public viewing should not be
modified or deleted or inaccessible since these are
considered as destructive acts.
 Intrusive software such as "worms" and "viruses"
which are destructive to the computer system is also
illegal.
 Congesting somebody’s system with a lot of unwanted
information is also unethical.
 Sending obscene and crude messages through mail or
chat is also forbidden.
 Sending sexually explicit content, message or pictures
is also forbidden.
Ethics is a set of moral
principles that govern
individual or a group on what
is acceptable behaviour while
using a computer.
Computer ethics is set of
moral principles that govern
the usage of computers. One
of the common issue of
computer ethics is violation of
copyright issues.
Duplicating the copyrighted
content without the authors
approval , accessing
personal information of
others are some of the
examples that violate ethical
principles.
Ethical rules for computer users
 Do not use computer to harm other users.
 Do not use computers to steal other's information.
 Do not access files without the permission of owner.
 Do not copy copyrighted softwares without the authors permission.
 Always respect copyright laws and policies.
 Respect the privacy of others, just as you expect the same from
others.
 Do not use other user's computer resources with out their permission.
 Use Internet ethically.
 Complain about illegal communication and activities, if found, to
Internet service Providers and local law enforcement authorities.
 Users are responsible for safeguarding their User Id and passwords.
They should not write them on paper or anywhere else for
remembrance.
 Users should not intentionally use the computers to retrieve or modify
the information of others which may include password information, files
etc.
References
• Stanford Encyclopedia Of Philosophy
• Computers Professionals For Social Responsi
• Computer Ethics - code of ethics in computing
• Computer Ethics — Information Security Educ

Weitere ähnliche Inhalte

Was ist angesagt?

Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
SaimaRafiq
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
 
Chapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebChapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide Web
Patty Ramsey
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
mjtheman
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
realpeterz
 
INTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNETINTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNET
Arvin Dey
 

Was ist angesagt? (20)

The internet
The internetThe internet
The internet
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Chapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebChapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide Web
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet threats
Internet threatsInternet threats
Internet threats
 
INTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNETINTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNET
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 

Ähnlich wie Computer ethics-presentation-1221139444034074-9

Ähnlich wie Computer ethics-presentation-1221139444034074-9 (20)

Nfwordle
NfwordleNfwordle
Nfwordle
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Shak taha
Shak tahaShak taha
Shak taha
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computing
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 

Computer ethics-presentation-1221139444034074-9

  • 1. Computer EthicsComputer Ethics By: Paola ArizaBy: Paola Ariza
  • 2. Ethics? Ethic refers to the standards and rules that "should" be followed and it helps us to regulate our conduct in a group or with a set of individuals. Since the term Ethics is a relative term, it is branched under philosophy, which states how users of World Wide Web should make decisions regarding their conduct.
  • 3.  Computer ethics is a new branch of ethics that is growing and changing rapidly as computer technology also grows and develops.
  • 4. 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans The Ten Commandments On Computer EthicsThe Ten Commandments On Computer Ethics
  • 5. Computers are often far more efficient than humans in performing many tasks. In the industrialized world many workers already have been replaced by computerized devices -- bank tellers, auto workers, telephone operators, typists, graphic artists, security guards, assembly- line workers, and on and on. Even professionals like medical doctors, lawyers, teachers, accountants and psychologists are finding that computers can perform many of their traditional professional duties quite effectively.
  • 6. Why do we need computer ethics? The growth of the WWW has created several novel legal issues The existence of new questions that older laws cannot answer Traditional laws are outdated/anachronistic in this world a more coherent body of law is needed to govern Internet and computers
  • 7. Cyber Ethics • the most common problem isn't hacking (illegally accessing Web sites) or cracking (vandalizing Web sites); It's the unauthorized downloading of games and software. • the average hacker is likely to be a teenager and given that most homes now have at least one computer
  • 8. Code of Ethics  Information stored on the computer should be treated as seriously as written or spoken word.  Privacy should not be violated. In case of academic use, it is known plagiarism.  Information from public viewing should not be modified or deleted or inaccessible since these are considered as destructive acts.  Intrusive software such as "worms" and "viruses" which are destructive to the computer system is also illegal.  Congesting somebody’s system with a lot of unwanted information is also unethical.  Sending obscene and crude messages through mail or chat is also forbidden.  Sending sexually explicit content, message or pictures is also forbidden.
  • 9. Ethics is a set of moral principles that govern individual or a group on what is acceptable behaviour while using a computer. Computer ethics is set of moral principles that govern the usage of computers. One of the common issue of computer ethics is violation of copyright issues. Duplicating the copyrighted content without the authors approval , accessing personal information of others are some of the examples that violate ethical principles.
  • 10. Ethical rules for computer users  Do not use computer to harm other users.  Do not use computers to steal other's information.  Do not access files without the permission of owner.  Do not copy copyrighted softwares without the authors permission.  Always respect copyright laws and policies.  Respect the privacy of others, just as you expect the same from others.  Do not use other user's computer resources with out their permission.  Use Internet ethically.  Complain about illegal communication and activities, if found, to Internet service Providers and local law enforcement authorities.  Users are responsible for safeguarding their User Id and passwords. They should not write them on paper or anywhere else for remembrance.  Users should not intentionally use the computers to retrieve or modify the information of others which may include password information, files etc.
  • 11. References • Stanford Encyclopedia Of Philosophy • Computers Professionals For Social Responsi • Computer Ethics - code of ethics in computing • Computer Ethics — Information Security Educ