You are on page 1of 24

Ethical issues in computing

INTRODUCTION
• Ethics
Set of moral principles
that govern the behaviour
of a group or individual

• Computer Ethics
System of moral
standards or values used
as guidelines for the
computer user
COMPUTER ETHICS vs LAW
 Ethics  Law
• Serves as guidelines • Rules
• Free to follow • Must follow
• Universal • Country dependent
• Results in ethical • Prevents misuse of
computer users computer
• Not following is • Not following is a
immoral crime
ETHICAL ISSUES
ETHICAL VALUES
• Do not install or uninstall software without
prior permission
• Do not steal information of any other
computer
• Do not make illegal copies of software
• Protect important documents using
passwords
• Do not browse unwanted websites or
emails
INTELLECTUAL PROPERTY RIGHT
• New useful ideas and
designs
• Functional and
Technical inventions

• Original works that


express ideas
• Purely artistic works

• Brand that identifies


source of goods or
services
• Symbol, logo, word,
sound, colour, design,
etc.
DATA PROTECTION
Avoid using Install
Do not
pirated high
disclose
software quality
passwords
antivirus

Do not Do not
open download
unwanted unwanted
emails software

Cancel any
suspicious
downloads
SPAM PREVENTION
•Avoid opening spam emails and
clicking on links in spam messages
•Don’t buy anything from a spammer
•Don’t be tempted to reply
•Avoid ‘unsubscribe’ options

• Use a disposable email


address
• Munging: Use address
as ‘a at b dot com’ instead
of a@b.com
SOFTWARE PIRACY
Make sure that your
Always buy your software comes with a
software from a reputed licensed agreement ,
organization original disc and
authentic packaging

If the seller provides a


Avoid buying multiple
serial number other than
software titles from
one mentioned on
different publishers on a
package, it indicates that
single disc
software is not authentic
CYBER CRIME
Online criminal activities such as illegal copying of software, computer viruses, stealing data
CYBER LAWS
• Cyber space is governed by a
system of law and regulations called
Cyber Law
• Refers to all legal and regulatory
aspects of internet

• Cyber law is the part of the overall legal system that deals with the
Internet, cyberspace, and their respective legal issues.
• Cyber law covers a fairly broad area, encompassing several subtopics
including freedom of expression, access to and usage of the Internet,
and online privacy
HACKING
Technique by which some computer experts can access data from confidential
areas of the system
MALICIOUS INTENT AND CODE
Malicious code is a program that is covertly inserted into another program with the intent of
malicious activities

Can be prevented by limiting the capabilities of the servers and web applications to only the
functions necessary to support the operations, and bringing awareness and training programs, we
can protect our system from malicious intent
CONCLUSION
Safeguard yourself and others by following all best practices and the 10 commandments of
computer ethics
1. Thou shalt not use a computer to harm other people
2. Thou shalt not interfere with other people's computer work
3. Thou shalt not snoop around in other people's computer files
4. Thou shalt not use a computer to steal
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not copy or use proprietary software for which you have not paid (without
permission)
7. Thou shalt not use other people's computer resources without authorization or proper
compensation
8. Thou shalt not appropriate other people's intellectual output
9. Thou shalt think about the social consequences of the program you are writing or the
system you are designing
10.Thou shalt always use a computer in ways that ensure consideration and respect for other
humans
QUESTION 1:
Unwanted messages in the mailbox are called?

Malicious Code SPAM

Cookies

CLICK ON THE CORRECT ANSWER

NEXT->
QUESTION 2:
Cyber criminals who crack the password to
access information from the Internet are called?

Sackers Virus

Hackers
CLICK ON THE CORRECT ANSWER

NEXT->
QUESTION 3:
Set of moral values which regulate the use of
computers are called?

Cyber Law Computer Ethics

Malicious Intent Privacy

CLICK ON THE CORRECT ANSWER

NEXT->
QUESTION 4:
The process of making duplicate copy of the
original software illegally is known as?

Software Piracy Hacking

Cookies Malicious Code


CLICK ON THE CORRECT ANSWER

NEXT->
QUESTION 5:
There are 5 commandments of Computer Ethics?

True False

CLICK ON THE CORRECT ANSWER

NEXT->
Correct Answer!
<-BACK
Wrong Answer!
<-BACK

You might also like