SlideShare a Scribd company logo
1 of 5
GÜVEN KORKMAZ
282672
MANAGMENT INFORMATION
SYSTEMS
What is Computer Ethics ?
• Computer ethics, computer technology, and
an analysis of the effect of the natural and
social policies for the use of ethical
considerable reasons for such a technology.
Major Computer Ethics Rules
• Who can use the system
• Who has the authority to grant access to that
• How to create and how to retain the stored passwords
• Limitation of the system can be used only for business purposes and for
personal gain kullanılamayacağının specified. Spending time and resources
are limited in the use of the system for personal purpose or that it is
completely forbidden issues brought about limitations.
• Girilemeyeceği the system or if the system is sparse and the available
resources, authority, or can not be intentionally interfere with the
functioning of the system yapılamayacağı changes.
• Other users can not be deliberately harassed and their rights can not be
violated.
• Internet download or send material unsuitable for minors. And often
sexually explicit material may be unsuitable material covers a very wide
definition.
Major Computer Ethics Rules
• Authorized someone with a valid reason will not be done without the
consent of the trial subjects related to safety. (Such trials encryption and
security systems in the university setting, but you are allowed to work on
the course.)
• Due to system maintenance, system administrators, the circumstances
under which the files, mail messages, enter data, and the BASIC lists. To
protect the confidentiality of users' activities are limited to such activities.
• System administrators and other authorized personnel to maintain the
system, in order to limit the circumstances under which the use of the
system at any time, or changed at the end erdirebilecekleri. This
permission is not unlimited, but is in danger of sudden intervention may
be necessary in some cases, if the security of the system.
• About software copyrights and licenses principles (guidelines). The system
should not be used to create copies of unlicensed copyrighted material.
The same principle applies to photographs and they can not be copied
without license a vehicle such as a browser
What is Copyright ?
Products caused by the labor of every kind of
person on the idea of ​​rights provided by law.

More Related Content

Viewers also liked

스마트큐 발표자료 김재우
스마트큐 발표자료 김재우스마트큐 발표자료 김재우
스마트큐 발표자료 김재우JaeWoo Kim
 
Inspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for CorrosionInspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for CorrosionEddyfi
 
JLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine ManualJLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine ManualJLL Fitness
 
Inspecting Laser Welds in Component Manufacturing
Inspecting Laser Welds in Component ManufacturingInspecting Laser Welds in Component Manufacturing
Inspecting Laser Welds in Component ManufacturingEddyfi
 
Trainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers TestimoniesTrainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers TestimoniesTrainerDavid
 
Factors affecting lls usage
Factors affecting lls usageFactors affecting lls usage
Factors affecting lls usageEvelyn Estrella
 
Texture Powerpoint Final
Texture Powerpoint FinalTexture Powerpoint Final
Texture Powerpoint Finalkphan22
 
State-of-the-Art RFT— Meeting the Ferromagnetic Tube Challenge
State-of-the-Art RFT— Meeting the Ferromagnetic Tube ChallengeState-of-the-Art RFT— Meeting the Ferromagnetic Tube Challenge
State-of-the-Art RFT— Meeting the Ferromagnetic Tube ChallengeEddyfi
 
Detecting Cracks and Corrosion in Aircraft Longerons
Detecting Cracks and Corrosion in Aircraft LongeronsDetecting Cracks and Corrosion in Aircraft Longerons
Detecting Cracks and Corrosion in Aircraft LongeronsEddyfi
 
EE 305 Project_1 The Effective External Defibrillators
EE 305 Project_1 The Effective External Defibrillators EE 305 Project_1 The Effective External Defibrillators
EE 305 Project_1 The Effective External Defibrillators kehali Haileselassie
 
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger Tubes
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger TubesAssessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger Tubes
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger TubesEddyfi
 
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)Looking for Cracks in Control Rod Drive Mechanisms (CRDM)
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)Eddyfi
 
JLL JF 100 Excercise Bike Manual
JLL JF 100 Excercise Bike ManualJLL JF 100 Excercise Bike Manual
JLL JF 100 Excercise Bike ManualJLL Fitness
 
The avanti group sharp turn for electronics company
The avanti group sharp turn for electronics companyThe avanti group sharp turn for electronics company
The avanti group sharp turn for electronics companyApplecherr McDougal
 
что такое Smm в 2013 году на примере
что такое Smm в 2013 году на примеречто такое Smm в 2013 году на примере
что такое Smm в 2013 году на примереАнтон Чернятин
 
Defect Detection & Prevention in Cast Turbine Wheels
Defect Detection & Prevention in Cast Turbine WheelsDefect Detection & Prevention in Cast Turbine Wheels
Defect Detection & Prevention in Cast Turbine WheelsEddyfi
 
Alejandra Ortiz bibliography
Alejandra Ortiz bibliographyAlejandra Ortiz bibliography
Alejandra Ortiz bibliographyAlejandrita Ortiz
 

Viewers also liked (17)

스마트큐 발표자료 김재우
스마트큐 발표자료 김재우스마트큐 발표자료 김재우
스마트큐 발표자료 김재우
 
Inspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for CorrosionInspecting In-Service Storage Tank Annular Rings for Corrosion
Inspecting In-Service Storage Tank Annular Rings for Corrosion
 
JLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine ManualJLL D100 Folding Treadmill Running Machine Manual
JLL D100 Folding Treadmill Running Machine Manual
 
Inspecting Laser Welds in Component Manufacturing
Inspecting Laser Welds in Component ManufacturingInspecting Laser Welds in Component Manufacturing
Inspecting Laser Welds in Component Manufacturing
 
Trainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers TestimoniesTrainer David Cruuz Slimmers Testimonies
Trainer David Cruuz Slimmers Testimonies
 
Factors affecting lls usage
Factors affecting lls usageFactors affecting lls usage
Factors affecting lls usage
 
Texture Powerpoint Final
Texture Powerpoint FinalTexture Powerpoint Final
Texture Powerpoint Final
 
State-of-the-Art RFT— Meeting the Ferromagnetic Tube Challenge
State-of-the-Art RFT— Meeting the Ferromagnetic Tube ChallengeState-of-the-Art RFT— Meeting the Ferromagnetic Tube Challenge
State-of-the-Art RFT— Meeting the Ferromagnetic Tube Challenge
 
Detecting Cracks and Corrosion in Aircraft Longerons
Detecting Cracks and Corrosion in Aircraft LongeronsDetecting Cracks and Corrosion in Aircraft Longerons
Detecting Cracks and Corrosion in Aircraft Longerons
 
EE 305 Project_1 The Effective External Defibrillators
EE 305 Project_1 The Effective External Defibrillators EE 305 Project_1 The Effective External Defibrillators
EE 305 Project_1 The Effective External Defibrillators
 
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger Tubes
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger TubesAssessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger Tubes
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger Tubes
 
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)Looking for Cracks in Control Rod Drive Mechanisms (CRDM)
Looking for Cracks in Control Rod Drive Mechanisms (CRDM)
 
JLL JF 100 Excercise Bike Manual
JLL JF 100 Excercise Bike ManualJLL JF 100 Excercise Bike Manual
JLL JF 100 Excercise Bike Manual
 
The avanti group sharp turn for electronics company
The avanti group sharp turn for electronics companyThe avanti group sharp turn for electronics company
The avanti group sharp turn for electronics company
 
что такое Smm в 2013 году на примере
что такое Smm в 2013 году на примеречто такое Smm в 2013 году на примере
что такое Smm в 2013 году на примере
 
Defect Detection & Prevention in Cast Turbine Wheels
Defect Detection & Prevention in Cast Turbine WheelsDefect Detection & Prevention in Cast Turbine Wheels
Defect Detection & Prevention in Cast Turbine Wheels
 
Alejandra Ortiz bibliography
Alejandra Ortiz bibliographyAlejandra Ortiz bibliography
Alejandra Ortiz bibliography
 

Similar to Assigment 6

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptDrBasemMohamedElomda
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network designnephtalie
 
BTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical IssuesBTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical Issuesmrcox
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Sreekanth Narendran
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7limsh
 
C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptshanthishyam
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptxdotco
 
IntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxIntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxnormanibarber20063
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10APSU
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROLshinydey
 
IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxpriestmanmable
 
6.12 expert systems
6.12 expert systems6.12 expert systems
6.12 expert systemsDave Smith
 

Similar to Assigment 6 (20)

Shak taha
Shak tahaShak taha
Shak taha
 
Socio technical system
Socio technical systemSocio technical system
Socio technical system
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
 
Network Security of Windows Servers
Network Security of Windows ServersNetwork Security of Windows Servers
Network Security of Windows Servers
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
 
Cyber ethics.pptx
Cyber ethics.pptxCyber ethics.pptx
Cyber ethics.pptx
 
BTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical IssuesBTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical Issues
 
auditing-190520092523.pdf
auditing-190520092523.pdfauditing-190520092523.pdf
auditing-190520092523.pdf
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.ppt
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptx
 
IntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxIntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docx
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic ProceduresPACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic Procedures
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docx
 
6.12 expert systems
6.12 expert systems6.12 expert systems
6.12 expert systems
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Assigment 6

  • 2. What is Computer Ethics ? • Computer ethics, computer technology, and an analysis of the effect of the natural and social policies for the use of ethical considerable reasons for such a technology.
  • 3. Major Computer Ethics Rules • Who can use the system • Who has the authority to grant access to that • How to create and how to retain the stored passwords • Limitation of the system can be used only for business purposes and for personal gain kullanılamayacağının specified. Spending time and resources are limited in the use of the system for personal purpose or that it is completely forbidden issues brought about limitations. • Girilemeyeceği the system or if the system is sparse and the available resources, authority, or can not be intentionally interfere with the functioning of the system yapılamayacağı changes. • Other users can not be deliberately harassed and their rights can not be violated. • Internet download or send material unsuitable for minors. And often sexually explicit material may be unsuitable material covers a very wide definition.
  • 4. Major Computer Ethics Rules • Authorized someone with a valid reason will not be done without the consent of the trial subjects related to safety. (Such trials encryption and security systems in the university setting, but you are allowed to work on the course.) • Due to system maintenance, system administrators, the circumstances under which the files, mail messages, enter data, and the BASIC lists. To protect the confidentiality of users' activities are limited to such activities. • System administrators and other authorized personnel to maintain the system, in order to limit the circumstances under which the use of the system at any time, or changed at the end erdirebilecekleri. This permission is not unlimited, but is in danger of sudden intervention may be necessary in some cases, if the security of the system. • About software copyrights and licenses principles (guidelines). The system should not be used to create copies of unlicensed copyrighted material. The same principle applies to photographs and they can not be copied without license a vehicle such as a browser
  • 5. What is Copyright ? Products caused by the labor of every kind of person on the idea of ​​rights provided by law.