0% found this document useful (0 votes)
113 views36 pages

Smart Learning Via The Ethical Way of Computing !

This document discusses cyber ethics and related issues. It defines cyber ethics as the analysis and formulation of policies for the ethical use of computer technology and its social impacts. Some key components of cyber ethics discussed include privacy, accessibility, accuracy, and property. The document also outlines several common cyber ethical concerns such as piracy, plagiarism, cyberbullying, cyber-libel, computer viruses, privacy violations, and cyber-stalking. Finally, it lists seven essential components of a personal computer ethics code.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views36 pages

Smart Learning Via The Ethical Way of Computing !

This document discusses cyber ethics and related issues. It defines cyber ethics as the analysis and formulation of policies for the ethical use of computer technology and its social impacts. Some key components of cyber ethics discussed include privacy, accessibility, accuracy, and property. The document also outlines several common cyber ethical concerns such as piracy, plagiarism, cyberbullying, cyber-libel, computer viruses, privacy violations, and cyber-stalking. Finally, it lists seven essential components of a personal computer ethics code.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

ASSURING YOUR CYBER PRESENCE THE ETHICAL WAY !

Dr. Dheeraj Mehrotra


(Author & National Awardee)

Vice President- Academics & Audits

Next Education India Pvt. Ltd. Hyderabad (India)

CELEBRATING

The New Age Learner !

ORM- ONLINE REPUTATION MANAGEMENT

ONLINE REPUTATION MANAGEMENT

EXPLORING CONCERNS TODAY !

WHAT IS CYBER ETHICS? WHAT ARE THE ISSUES RELATED TO CYBER ETHICS? WHAT ARE THE COMPONENTS OF CYBER ETHICS? WHAT ARE CYBER ETHICAL CONCERNS?

CYBER ETHICS IS THE ANALYSIS OF NATURE AND SOCIAL IMPACT OF COMPUTER TECHNOLOGY AND THE CORRESPONDING FORMULATION AND JUSTIFICATION OF POLICIES FOR THE ETHICAL USE OF SUCH TECHNOLOGY.

ISSUES RELATED TO CYBER ETHICS

PRIVACY

ACCESSI-BILITY

ACCURACY

PROPERTY

PRIVACY

PRIVACY TELLS ABOUT WHAT INFORMATION ABOUT ONES SELF OR ONES ASSOCIATIONS MUST A PERSION REVEL TO OTHERS UNDSR WHAT CONDITIONS AND WHAT SAFEGUARDS.

MISTAKES EVEN SMART KIDS MAKE ONLINE

ACCURACY

ACCURACY TELLS US ABOUT WHO IS RESPONSIBLE FOR THE AUTHENTICITY,FIDELI TY AND ACCURACY OF INFORMATION. IT TELLS US WHO IS TO BE HEALD ACCOUNTABLE FOR ERRORS IN INFORMATION.

PROPERTY

IT TELLS US WHO OWNS INFORMATION? WHAT ARE THE JUST AND FAIR PRICES FOR ITS EXCHANGE? WHO OWNS THE CHANNELES, ESPECIALLY THE AIRWAYS THROUGH WHICH INFORMATION IS TRANSMITTED.

ASSURING EXPLORAGE OF KNOWLEDGE BUT A FLOW OF INFORMATION

The future is in your hands

ACCESSIBILITY

WHAT INFORMATION DOES A PERSION OR AN ORGANIZATION HAVE A RIGHT OR A PRIVILEGE TO OBTAIN, UNDER WHAT CONDITIONS AND WITH WHAT SAFEGUARDS.

SEVEN ESSENTIAL COMPONENTS OF PERSONAL CODE COMPUTER ETHICS.

HONESTY RESPECT CONFIDENTIALITY PROFESSIONALISM RESPONSIBILITY COMMUNICATION OBEYING THE LAW

SOME COMMON CYBER ETHICAL CONCERNS

PIRACY PLAGIARISM CYBER BULLYING CYBER-LIBEL WORMS AND VIRUSES VIOLATING PRIVACY CYBER-STALKING

PIRACY

IT REFERS TO UNAUTHORISED DUPLICATION AND DISTRIBUTION OF ITEM SUCH AS GAMES, DVD, SOFTWARE, MUSIC ETC.

The new age learning scenario

South Korea is aiming to have iRobi and Genibo robots in almost all pre-schools by 2013

This isn't a sci-fi movie; it's an English language class taught by Engkey, a robot teacher, in the coastal city of Masan in South Korea.

THINK BEFORE YOU POST

PLAGIARISM

PLAGIARISM IS PRESENTING SOME ONE ELSE WORK AS YOUR OWN, THIS INCLUDES WORK REPRESENTED IN HARD COPY IN DISK OR ON THE INTERNET.

CYBER-BULLYING

WHEN THE INTERNET, CELL PHONES OR OTHER DEVICES ARE USE TO SEND OR POST TEXT IMAGES INTENDED TO HURT OR EMBRASS ANOTHER PERSON.

CYBER CRIME CAN EXPLODE WITH ANY USER TODAY !

CYBER-LIBEL

IT IS THE DELIBERATE MISREPRESENTATION OF PEOPLE OR EVENTS, FALSE STATEMENTS THAT HARM ANOTHERS REPUTATION. CYBERLIBEL IS A CATCHPHRASE FOR DEFAMATION THAT TAKES PLACE THROUGH THE INTERNET.

WORMS AND VIRUSES

COMPUTER VIRUSES ARE SIMILER TO THE BILOGICAL VIRUSES IN THE WAY THEY MULTIPLY IN THE NUMBER AND IN THE WAY THEY NEED A HOST TO SERVIVE.

CYBER-STALKING

CYBER STALKING CAN BE DEFINED AS THE REPEATED ACTS HARASSMENT OR THREATINING BEHAVIOR OF THE CYBER CRIMINALS TOWARDS THE VICTIM BY USING INTERNET SERVICES.

TO THE SURPRISE OF MANY !!!

KNOWLEDGE FOR ALL

The vision of Century Learners ! ! !

st 21

EXPLORE YOUR CLOUD PRESENCE VIA

www.scribd.com

www.tripod.com

www.youtube.com

www.blogit.com

QUESTIONS IF ANY !

Mail your queries at: [email protected]

You might also like