SlideShare a Scribd company logo
1 of 29
1
COMPUTER
ETHICS
2
What is computer ethics?
Computer ethics a system of
moral standards or value uses
as a guideline for computer user
Analysis of the nature and
social impact of computer
technology
3
THE TEN COMMANDMENTS OF
COMPUTER ETHICS
 You shall not use a computer to harm other people.
 You shall not interfere with other people's computer work.
 You shall not snoop around in other people's computer files.
 You shall not use a computer to steal.
 You shall not use a computer to bear false witness.
 You shall not copy or use proprietary software for which you
have not paid.
 You shall not use other people's computer resources without
authorisation or proper compensation.
 You shall not appropriate other people's intellectual output.
 You shall think about the social consequences of the
program you are writing or the system you are designing.
 You shall always use a computer in ways that ensure
consideration and respect for your fellow humans
The United States Institute of Computer Ethics
4
GUIDELINES ON THE E-MAIL AND
INTERNET USAGE IN MALAYSIA
 use only individual e-mail address to forward individual opinion
 keep the identity name and password a secret to avoid the
misuse of your e-mail without your knowledge
 e-mail must be active to promptly reply the necessary actions
needed for any matters
 ensure the total mail kept in the box is within the computer
storage capacity
 scan files regularly to avoid the transmission of virus from one
computer to another
 do not send e-mails that contain classified information which can
be used to tarnish other people or country
 choose a suitable time to search the Internet to save access time
and cost
 beware of prohibited sites which could affect one's moral,
organisation or nation
 print only relevant documents that you think can be used in future
to save cost
5
Examples of unethical
computer code of conducts
include
 modifying certain information on the
Internet, affecting the accuracy of the
information
 selling information to other parties without
the owner’s permission
 using information without authorization
 involvement in stealing software
 invasion of privacy
6
Examples of ethical computer code of conducts
include:
sending warning about viruses to
other computer users
asking permission before sending
any business advertisements to
others
using information with
authorization
7
Why do we need
ethics and law in
computing?
 Respecting Ownership
 not stealing other people’s work
 Respecting Privacy
 reading others’ mails or files without
permission
 Respecting Property
 act of tampering and changing electronic
information is considered as vandalism and
disrespect for other people’s property
8
The Differences between Ethics
and Law
Ethics
Free to Follow
No Punishment
Universals
Produce ethical
computer user
Immoral
Law
Must follow
Penalties, Punishment
Depends on Country
Prevent misusing of
Computer
Crime
9
COMPUTER ETHICS
Intellectual Properties (IP)
Privacy
Authentications
Verification
Controversial contents
10
INTELLECTUAL
PROPERTY
(IP)
These works are
unique and have value
in the market placeWork created by
inventors, authors
and artist
school begs, shoes
and even your socks
are protected by IP
11
1) INTELECTUAL PROPERTY
PROTECTION
DesignPatent
Trademarks Copyright
TYPESTo safeguard intellectual
property rights
16
2) PRIVACY
Data and information privacy
The rights of individuals and
companies to deny or restrict
the collection and use of
information about them
Anonymity, confidentiality
17
Ways Computer Technology
Threaten Our Privacy
Cookies
- used to identify users by web casting,
e-commerce and other
- contain user information and are saved
in the computer hard disk
- used by some websites to store
passwords and track how regularly we
visit a websites, that’s how we become
potential targets for web advertisers
Cookies
Electronic
profile
Spyware
18
A program that collects user
information without the user’s
knowledge
Can enter computers, sneaking in
like a virus
Is a result of installing new programs
Communicates information it collects
to some outside source while we are
online
Spyware
19
the combining of data in a database
that can be sold to the Internet by the
company to the interested parties
this database is in a form such as
magazine subscription or product
warranty cards that had been filled
by online subscribers
includes personal details such as your
age, address and marital status
Electronic Profile
20
ways to protect privacy
1. Privacy law
– Security Services to review the security
policy
– Security Management to protect the
resources
– Security Mechanism to implement the
required security services
– Security Objects, the important entities
within the system environment
21
2. Utilities software
–anti-spam program,
firewall, anti-spyware
and antivirus
22
3. Authentications
A process where users verify
that they are who they say
they are
Example ATM machine
Methods of authentications:-
a) Biometric devices
b) Callback system
Important  to safeguard
against the unauthorized
access and use
23
a) Biometric devices
 a device that
translates personal
characteristics into
a digital code that is
compared with a
digital code stored
in the database
24
BIOMETRIC DEVICES
25
b) Callback system
The checking system that
authenticates the user
Commonly used in the bank
operation and business
transaction
26
Callback system
 For example, when you book
for the taxi service, the
operator will ask you to hang
up and she will call you back
to confirm for the service
required
27
4. Verification
Act of proving or disproving
the correctness of a system
with respect to a certain
formal specification
Methods of verification:-
a) User identification
b) Processed object
28
User identification
 The process of
validating the user
 E.g.; Key in the
user name to log-in
to a system, show
exam slip to verify
that you are the
valid candidate for
the exam
Processed identification
 Something the user has
(identification card,
security token, key,
badge and cell phone)
E.g.; The policeman will
check on the driver’s
license to identify the
valid driver, buy
blouses at the mall
using a credit card
29
5. Controversial content
Information that causes
disagreement in opinions and
may cause the disruption of
peace because different people
or culture will have different
views about the contents
Pornography, Slander
30
 Can lead to criminal acts
such as exploitation of
women and children
 Can lead to sexual
addiction or perversion
 Can develop low moral
value towards other
men, women or children
 Can erode good
religious, cultural and
social beliefs and
behaviors
 Can develop into a
society that disregards
honesty and truth
 Can develop bad habit
of spreading untruths
and rumors
 Can lead to unnecessary
argument
 Can cause people to
have negative attitudes
towards another person.
Pornography Slander
31
32
33

More Related Content

What's hot

Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
Kak Yong
 

What's hot (20)

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 

Similar to Ethics in using computer

Information Ethics
Information EthicsInformation Ethics
Information Ethics
UMaine
 

Similar to Ethics in using computer (20)

chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Ethical privacy and security issues
Ethical privacy and security issuesEthical privacy and security issues
Ethical privacy and security issues
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
Newethics
NewethicsNewethics
Newethics
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital World
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 

More from nurulafifa_matsaleh (8)

Aktiviti kelab komputer
Aktiviti kelab komputerAktiviti kelab komputer
Aktiviti kelab komputer
 
Programming exercise
Programming exerciseProgramming exercise
Programming exercise
 
Overview of comp system
Overview of comp systemOverview of comp system
Overview of comp system
 
RP ICT F5 2013
RP ICT F5 2013RP ICT F5 2013
RP ICT F5 2013
 
RP ICT F4 2013
RP ICT F4 2013RP ICT F4 2013
RP ICT F4 2013
 
huraian sukatan pelajaran ict
huraian sukatan pelajaran icthuraian sukatan pelajaran ict
huraian sukatan pelajaran ict
 
Intro to ict
Intro to ictIntro to ict
Intro to ict
 
sukatan pelajaran ict
sukatan pelajaran ictsukatan pelajaran ict
sukatan pelajaran ict
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Ethics in using computer

  • 2. 2 What is computer ethics? Computer ethics a system of moral standards or value uses as a guideline for computer user Analysis of the nature and social impact of computer technology
  • 3. 3 THE TEN COMMANDMENTS OF COMPUTER ETHICS  You shall not use a computer to harm other people.  You shall not interfere with other people's computer work.  You shall not snoop around in other people's computer files.  You shall not use a computer to steal.  You shall not use a computer to bear false witness.  You shall not copy or use proprietary software for which you have not paid.  You shall not use other people's computer resources without authorisation or proper compensation.  You shall not appropriate other people's intellectual output.  You shall think about the social consequences of the program you are writing or the system you are designing.  You shall always use a computer in ways that ensure consideration and respect for your fellow humans The United States Institute of Computer Ethics
  • 4. 4 GUIDELINES ON THE E-MAIL AND INTERNET USAGE IN MALAYSIA  use only individual e-mail address to forward individual opinion  keep the identity name and password a secret to avoid the misuse of your e-mail without your knowledge  e-mail must be active to promptly reply the necessary actions needed for any matters  ensure the total mail kept in the box is within the computer storage capacity  scan files regularly to avoid the transmission of virus from one computer to another  do not send e-mails that contain classified information which can be used to tarnish other people or country  choose a suitable time to search the Internet to save access time and cost  beware of prohibited sites which could affect one's moral, organisation or nation  print only relevant documents that you think can be used in future to save cost
  • 5. 5 Examples of unethical computer code of conducts include  modifying certain information on the Internet, affecting the accuracy of the information  selling information to other parties without the owner’s permission  using information without authorization  involvement in stealing software  invasion of privacy
  • 6. 6 Examples of ethical computer code of conducts include: sending warning about viruses to other computer users asking permission before sending any business advertisements to others using information with authorization
  • 7. 7 Why do we need ethics and law in computing?  Respecting Ownership  not stealing other people’s work  Respecting Privacy  reading others’ mails or files without permission  Respecting Property  act of tampering and changing electronic information is considered as vandalism and disrespect for other people’s property
  • 8. 8 The Differences between Ethics and Law Ethics Free to Follow No Punishment Universals Produce ethical computer user Immoral Law Must follow Penalties, Punishment Depends on Country Prevent misusing of Computer Crime
  • 9. 9 COMPUTER ETHICS Intellectual Properties (IP) Privacy Authentications Verification Controversial contents
  • 10. 10 INTELLECTUAL PROPERTY (IP) These works are unique and have value in the market placeWork created by inventors, authors and artist school begs, shoes and even your socks are protected by IP
  • 11. 11 1) INTELECTUAL PROPERTY PROTECTION DesignPatent Trademarks Copyright TYPESTo safeguard intellectual property rights
  • 12. 16 2) PRIVACY Data and information privacy The rights of individuals and companies to deny or restrict the collection and use of information about them Anonymity, confidentiality
  • 13. 17 Ways Computer Technology Threaten Our Privacy Cookies - used to identify users by web casting, e-commerce and other - contain user information and are saved in the computer hard disk - used by some websites to store passwords and track how regularly we visit a websites, that’s how we become potential targets for web advertisers Cookies Electronic profile Spyware
  • 14. 18 A program that collects user information without the user’s knowledge Can enter computers, sneaking in like a virus Is a result of installing new programs Communicates information it collects to some outside source while we are online Spyware
  • 15. 19 the combining of data in a database that can be sold to the Internet by the company to the interested parties this database is in a form such as magazine subscription or product warranty cards that had been filled by online subscribers includes personal details such as your age, address and marital status Electronic Profile
  • 16. 20 ways to protect privacy 1. Privacy law – Security Services to review the security policy – Security Management to protect the resources – Security Mechanism to implement the required security services – Security Objects, the important entities within the system environment
  • 17. 21 2. Utilities software –anti-spam program, firewall, anti-spyware and antivirus
  • 18. 22 3. Authentications A process where users verify that they are who they say they are Example ATM machine Methods of authentications:- a) Biometric devices b) Callback system Important  to safeguard against the unauthorized access and use
  • 19. 23 a) Biometric devices  a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database
  • 21. 25 b) Callback system The checking system that authenticates the user Commonly used in the bank operation and business transaction
  • 22. 26 Callback system  For example, when you book for the taxi service, the operator will ask you to hang up and she will call you back to confirm for the service required
  • 23. 27 4. Verification Act of proving or disproving the correctness of a system with respect to a certain formal specification Methods of verification:- a) User identification b) Processed object
  • 24. 28 User identification  The process of validating the user  E.g.; Key in the user name to log-in to a system, show exam slip to verify that you are the valid candidate for the exam Processed identification  Something the user has (identification card, security token, key, badge and cell phone) E.g.; The policeman will check on the driver’s license to identify the valid driver, buy blouses at the mall using a credit card
  • 25. 29 5. Controversial content Information that causes disagreement in opinions and may cause the disruption of peace because different people or culture will have different views about the contents Pornography, Slander
  • 26. 30  Can lead to criminal acts such as exploitation of women and children  Can lead to sexual addiction or perversion  Can develop low moral value towards other men, women or children  Can erode good religious, cultural and social beliefs and behaviors  Can develop into a society that disregards honesty and truth  Can develop bad habit of spreading untruths and rumors  Can lead to unnecessary argument  Can cause people to have negative attitudes towards another person. Pornography Slander
  • 27. 31
  • 28. 32
  • 29. 33