SlideShare a Scribd company logo
1 of 5
GÜVEN KORKMAZ
282672
MANAGMENT INFORMATION
SYSTEMS
What is Computer Ethics ?
• Computer ethics, computer technology, and
an analysis of the effect of the natural and
social policies for the use of ethical
considerable reasons for such a technology.
Major Computer Ethics Rules
• Who can use the system
• Who has the authority to grant access to that
• How to create and how to retain the stored passwords
• Limitation of the system can be used only for business purposes and for
personal gain kullanılamayacağının specified. Spending time and resources
are limited in the use of the system for personal purpose or that it is
completely forbidden issues brought about limitations.
• Girilemeyeceği the system or if the system is sparse and the available
resources, authority, or can not be intentionally interfere with the
functioning of the system yapılamayacağı changes.
• Other users can not be deliberately harassed and their rights can not be
violated.
• Internet download or send material unsuitable for minors. And often
sexually explicit material may be unsuitable material covers a very wide
definition.
Major Computer Ethics Rules
• Authorized someone with a valid reason will not be done without the
consent of the trial subjects related to safety. (Such trials encryption and
security systems in the university setting, but you are allowed to work on
the course.)
• Due to system maintenance, system administrators, the circumstances
under which the files, mail messages, enter data, and the BASIC lists. To
protect the confidentiality of users' activities are limited to such activities.
• System administrators and other authorized personnel to maintain the
system, in order to limit the circumstances under which the use of the
system at any time, or changed at the end erdirebilecekleri. This
permission is not unlimited, but is in danger of sudden intervention may
be necessary in some cases, if the security of the system.
• About software copyrights and licenses principles (guidelines). The system
should not be used to create copies of unlicensed copyrighted material.
The same principle applies to photographs and they can not be copied
without license a vehicle such as a browser
What is Copyright ?
Products caused by the labor of every kind of
person on the idea of ​​rights provided by law.

More Related Content

Viewers also liked

Engineering Mechanics Statics design problem # 5.4 concrete chut by Kehali...
Engineering Mechanics Statics  design problem  # 5.4  concrete chut by Kehali...Engineering Mechanics Statics  design problem  # 5.4  concrete chut by Kehali...
Engineering Mechanics Statics design problem # 5.4 concrete chut by Kehali...kehali Haileselassie
 
Bahasa indonesia teks laporan hasil observasi
Bahasa indonesia teks laporan hasil observasiBahasa indonesia teks laporan hasil observasi
Bahasa indonesia teks laporan hasil observasiSri Utanti
 
Trainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers TestimoniesTrainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers TestimoniesTrainerDavid
 
Inspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for CorrosionInspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for CorrosionEddyfi
 
что такое Smm в 2013 году на примере
что такое Smm в 2013 году на примеречто такое Smm в 2013 году на примере
что такое Smm в 2013 году на примереАнтон Чернятин
 
Bmc mumbai recruitment 2014 clerk jobs
Bmc mumbai  recruitment 2014 clerk jobsBmc mumbai  recruitment 2014 clerk jobs
Bmc mumbai recruitment 2014 clerk jobsSarkari Naukri
 
La salute degli occhi 5 semplici cose da
La salute degli occhi  5 semplici cose daLa salute degli occhi  5 semplici cose da
La salute degli occhi 5 semplici cose damindspk101
 
Texture Powerpoint Final
Texture Powerpoint FinalTexture Powerpoint Final
Texture Powerpoint Finalkphan22
 
Inspecting Lead-Clad Pipes with Pulsed Eddy Current (PEC)
Inspecting Lead-Clad Pipes with Pulsed Eddy Current (PEC)Inspecting Lead-Clad Pipes with Pulsed Eddy Current (PEC)
Inspecting Lead-Clad Pipes with Pulsed Eddy Current (PEC)Eddyfi
 
JLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine ManualJLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine ManualJLL Fitness
 
Assigment 6
Assigment 6Assigment 6
Assigment 6fuzuli41
 
Texture powerpoint final
Texture powerpoint finalTexture powerpoint final
Texture powerpoint finalkphan22
 
Alejandra Ortiz bibliography
Alejandra Ortiz bibliographyAlejandra Ortiz bibliography
Alejandra Ortiz bibliographyAlejandrita Ortiz
 
Detecting Flaws in Condenser Tubing Welds With the DefHi® Probe
Detecting Flaws in Condenser Tubing Welds With the DefHi® ProbeDetecting Flaws in Condenser Tubing Welds With the DefHi® Probe
Detecting Flaws in Condenser Tubing Welds With the DefHi® ProbeEddyfi
 
High-Speed Remote-Field Testing in Carbon Steel Tubing
High-Speed Remote-Field Testing in Carbon Steel TubingHigh-Speed Remote-Field Testing in Carbon Steel Tubing
High-Speed Remote-Field Testing in Carbon Steel TubingEddyfi
 
The great book of best quotes of all time. by Aravinthasamy
The great book of best quotes of all time. by AravinthasamyThe great book of best quotes of all time. by Aravinthasamy
The great book of best quotes of all time. by AravinthasamyAravinth Samy
 
Engineering Mechanics: Statics Design problem # 5.4 concrete chutw
 Engineering Mechanics: Statics Design  problem  # 5.4  concrete chutw Engineering Mechanics: Statics Design  problem  # 5.4  concrete chutw
Engineering Mechanics: Statics Design problem # 5.4 concrete chutwkehali Haileselassie
 
JLL Electronics Treadmills Magzine
JLL Electronics Treadmills MagzineJLL Electronics Treadmills Magzine
JLL Electronics Treadmills MagzineJLL Fitness
 

Viewers also liked (19)

Engineering Mechanics Statics design problem # 5.4 concrete chut by Kehali...
Engineering Mechanics Statics  design problem  # 5.4  concrete chut by Kehali...Engineering Mechanics Statics  design problem  # 5.4  concrete chut by Kehali...
Engineering Mechanics Statics design problem # 5.4 concrete chut by Kehali...
 
Bahasa indonesia teks laporan hasil observasi
Bahasa indonesia teks laporan hasil observasiBahasa indonesia teks laporan hasil observasi
Bahasa indonesia teks laporan hasil observasi
 
Trainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers TestimoniesTrainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers Testimonies
 
Inspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for CorrosionInspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for Corrosion
 
что такое Smm в 2013 году на примере
что такое Smm в 2013 году на примеречто такое Smm в 2013 году на примере
что такое Smm в 2013 году на примере
 
Bmc mumbai recruitment 2014 clerk jobs
Bmc mumbai  recruitment 2014 clerk jobsBmc mumbai  recruitment 2014 clerk jobs
Bmc mumbai recruitment 2014 clerk jobs
 
La salute degli occhi 5 semplici cose da
La salute degli occhi  5 semplici cose daLa salute degli occhi  5 semplici cose da
La salute degli occhi 5 semplici cose da
 
Texture Powerpoint Final
Texture Powerpoint FinalTexture Powerpoint Final
Texture Powerpoint Final
 
Inspecting Lead-Clad Pipes with Pulsed Eddy Current (PEC)
Inspecting Lead-Clad Pipes with Pulsed Eddy Current (PEC)Inspecting Lead-Clad Pipes with Pulsed Eddy Current (PEC)
Inspecting Lead-Clad Pipes with Pulsed Eddy Current (PEC)
 
JLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine ManualJLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine Manual
 
Assigment 6
Assigment 6Assigment 6
Assigment 6
 
Texture powerpoint final
Texture powerpoint finalTexture powerpoint final
Texture powerpoint final
 
Alejandra Ortiz bibliography
Alejandra Ortiz bibliographyAlejandra Ortiz bibliography
Alejandra Ortiz bibliography
 
Detecting Flaws in Condenser Tubing Welds With the DefHi® Probe
Detecting Flaws in Condenser Tubing Welds With the DefHi® ProbeDetecting Flaws in Condenser Tubing Welds With the DefHi® Probe
Detecting Flaws in Condenser Tubing Welds With the DefHi® Probe
 
High-Speed Remote-Field Testing in Carbon Steel Tubing
High-Speed Remote-Field Testing in Carbon Steel TubingHigh-Speed Remote-Field Testing in Carbon Steel Tubing
High-Speed Remote-Field Testing in Carbon Steel Tubing
 
The great book of best quotes of all time. by Aravinthasamy
The great book of best quotes of all time. by AravinthasamyThe great book of best quotes of all time. by Aravinthasamy
The great book of best quotes of all time. by Aravinthasamy
 
OBA.BY
OBA.BYOBA.BY
OBA.BY
 
Engineering Mechanics: Statics Design problem # 5.4 concrete chutw
 Engineering Mechanics: Statics Design  problem  # 5.4  concrete chutw Engineering Mechanics: Statics Design  problem  # 5.4  concrete chutw
Engineering Mechanics: Statics Design problem # 5.4 concrete chutw
 
JLL Electronics Treadmills Magzine
JLL Electronics Treadmills MagzineJLL Electronics Treadmills Magzine
JLL Electronics Treadmills Magzine
 

Similar to Assigment 6

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptDrBasemMohamedElomda
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network designnephtalie
 
BTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical IssuesBTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical Issuesmrcox
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Sreekanth Narendran
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7limsh
 
C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptshanthishyam
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptxdotco
 
IntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxIntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxnormanibarber20063
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10APSU
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROLshinydey
 
IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxpriestmanmable
 
6.12 expert systems
6.12 expert systems6.12 expert systems
6.12 expert systemsDave Smith
 

Similar to Assigment 6 (20)

Shak taha
Shak tahaShak taha
Shak taha
 
Socio technical system
Socio technical systemSocio technical system
Socio technical system
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
 
Network Security of Windows Servers
Network Security of Windows ServersNetwork Security of Windows Servers
Network Security of Windows Servers
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
 
Cyber ethics.pptx
Cyber ethics.pptxCyber ethics.pptx
Cyber ethics.pptx
 
BTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical IssuesBTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical Issues
 
auditing-190520092523.pdf
auditing-190520092523.pdfauditing-190520092523.pdf
auditing-190520092523.pdf
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.ppt
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptx
 
IntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxIntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docx
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic ProceduresPACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic Procedures
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docx
 
6.12 expert systems
6.12 expert systems6.12 expert systems
6.12 expert systems
 

Recently uploaded

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Assigment 6

  • 2. What is Computer Ethics ? • Computer ethics, computer technology, and an analysis of the effect of the natural and social policies for the use of ethical considerable reasons for such a technology.
  • 3. Major Computer Ethics Rules • Who can use the system • Who has the authority to grant access to that • How to create and how to retain the stored passwords • Limitation of the system can be used only for business purposes and for personal gain kullanılamayacağının specified. Spending time and resources are limited in the use of the system for personal purpose or that it is completely forbidden issues brought about limitations. • Girilemeyeceği the system or if the system is sparse and the available resources, authority, or can not be intentionally interfere with the functioning of the system yapılamayacağı changes. • Other users can not be deliberately harassed and their rights can not be violated. • Internet download or send material unsuitable for minors. And often sexually explicit material may be unsuitable material covers a very wide definition.
  • 4. Major Computer Ethics Rules • Authorized someone with a valid reason will not be done without the consent of the trial subjects related to safety. (Such trials encryption and security systems in the university setting, but you are allowed to work on the course.) • Due to system maintenance, system administrators, the circumstances under which the files, mail messages, enter data, and the BASIC lists. To protect the confidentiality of users' activities are limited to such activities. • System administrators and other authorized personnel to maintain the system, in order to limit the circumstances under which the use of the system at any time, or changed at the end erdirebilecekleri. This permission is not unlimited, but is in danger of sudden intervention may be necessary in some cases, if the security of the system. • About software copyrights and licenses principles (guidelines). The system should not be used to create copies of unlicensed copyrighted material. The same principle applies to photographs and they can not be copied without license a vehicle such as a browser
  • 5. What is Copyright ? Products caused by the labor of every kind of person on the idea of ​​rights provided by law.