Professional Documents
Culture Documents
INTRODUCTION
• Ethics
Set of moral principles
that govern the behaviour
of a group or individual
• Computer Ethics
System of moral
standards or values used
as guidelines for the
computer user
COMPUTER ETHICS vs LAW
Ethics Law
• Serves as guidelines • Rules
• Free to follow • Must follow
• Universal • Country dependent
• Results in ethical • Prevents misuse of
computer users computer
• Not following is • Not following is a
immoral crime
ETHICAL ISSUES
ETHICAL VALUES
• Do not install or uninstall software without
prior permission
• Do not steal information of any other
computer
• Do not make illegal copies of software
• Protect important documents using
passwords
• Do not browse unwanted websites or
emails
INTELLECTUAL PROPERTY RIGHT
• New useful ideas and
designs
• Functional and
Technical inventions
Do not Do not
open download
unwanted unwanted
emails software
Cancel any
suspicious
downloads
SPAM PREVENTION
•Avoid opening spam emails and
clicking on links in spam messages
•Don’t buy anything from a spammer
•Don’t be tempted to reply
•Avoid ‘unsubscribe’ options
• Cyber law is the part of the overall legal system that deals with the
Internet, cyberspace, and their respective legal issues.
• Cyber law covers a fairly broad area, encompassing several subtopics
including freedom of expression, access to and usage of the Internet,
and online privacy
HACKING
Technique by which some computer experts can access data from confidential
areas of the system
MALICIOUS INTENT AND CODE
Malicious code is a program that is covertly inserted into another program with the intent of
malicious activities
Can be prevented by limiting the capabilities of the servers and web applications to only the
functions necessary to support the operations, and bringing awareness and training programs, we
can protect our system from malicious intent
CONCLUSION
Safeguard yourself and others by following all best practices and the 10 commandments of
computer ethics
1. Thou shalt not use a computer to harm other people
2. Thou shalt not interfere with other people's computer work
3. Thou shalt not snoop around in other people's computer files
4. Thou shalt not use a computer to steal
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not copy or use proprietary software for which you have not paid (without
permission)
7. Thou shalt not use other people's computer resources without authorization or proper
compensation
8. Thou shalt not appropriate other people's intellectual output
9. Thou shalt think about the social consequences of the program you are writing or the
system you are designing
10.Thou shalt always use a computer in ways that ensure consideration and respect for other
humans
QUESTION 1:
Unwanted messages in the mailbox are called?
Cookies
NEXT->
QUESTION 2:
Cyber criminals who crack the password to
access information from the Internet are called?
Sackers Virus
Hackers
CLICK ON THE CORRECT ANSWER
NEXT->
QUESTION 3:
Set of moral values which regulate the use of
computers are called?
NEXT->
QUESTION 4:
The process of making duplicate copy of the
original software illegally is known as?
NEXT->
QUESTION 5:
There are 5 commandments of Computer Ethics?
True False
NEXT->
Correct Answer!
<-BACK
Wrong Answer!
<-BACK