Presentation by Sachit Sarang

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

COMPUTING AND ETHICS

Presentation by -:
Sachit Sarang
ETHICS
Ethics are a set of moral principles that govern the
behaviour of a group or individual.
Similarly, Computer ethics is the set of commonly
agreed principles that govern the use of computers. Like
ethics more generally, computer ethics is essentially a
set of philosophical guidelines or moral standards that
aim to influence behaviour and prevent harm.

According to James H. Moore, who


is believed to have first coined the
phrase "computer ethics",
computer ethics is the analysis of
the nature and social impact of
computer technology and the
What is corresponding formulation and
justification of policies for the
Computer ethical use of such technology.
It is a study, an analysis of the
Ethics ? values of human actions influenced
by computer technology.

KEY CAUSES OF UNETHICAL


BEHAVIOUR

Meeting overly aggressive financial or business


objectives
Meeting schedule pressures
Helping the organization survive
Rationalizing that others do it
Resisting competitive threats
Saving jobs

ETHICAL PRINCIPALS

Three useful ethical principals -:


An act is ethical if all of society benefits from the act.
An act is ethical if people are treated as an end and not as a
means to an end.
An act is ethical if it is fair to all parties involved.

COMPUTER ETHICS HAS FOUR PRIMARY ISSUES

Privacy - responsibility to protect data about individuals


(Companies need information about their employees and
customers to be effective in the marketplace. )
Accuracy - responsibility of data collectors to authenticate
information and ensure its accuracy
Property - who owns information and software and how can
they be sold and exchanged
Access - responsibility of data collectors to control access and
determine what information a person has the right to obtain
about others and how the information can be used
INTERNET SECURITY

The internet is an insecure channel


The internet is an insecure The internet is an insecure channel for exchanging information because it

for exchanging information because


features a high risk of fraud or phishing. Internet security is a branch of computer security specifically
associated with the utilization of the internet, involving browser security and network security.The internet is
an insecure channel for exchanging information because it features a high risk of fraud or phishing. Internet
it features a high risk of fraud or
security is a branch of computer security specifically associated with the utilization of the internet, involving
browser security and network security.channel for exchanging information because it features a high risk of

phishing. Internet security is a


fraud or phishing. Internet security is a branch of computer security specifically associated with the utilization
of the internet, involving browser security and network security.The internet is an insecure channel for

branch of computer security


exchanging information because it features a high risk of fraud or phishing. Internet security is a branch of
computer security specifically associated with the utilization of the internet, involving browser security and
network security. Security
specifically associated with the
The internet is an insecure channel for exchanging information because it features a high risk of fraud or
phishing. Internet security is a branch of computer security specifically associated with the utilization of the

utilization of the internet, involving


internet, involving browser security and network security.

browser security and network


security.
Information Privacy Page

Information privacy is the privacy or


protection of personal information
and refers to the personal data stored
on a computer. It is an important
aspect of information sharing. Privacy
issues can arise in response to
information from a good range of
sources, such as -: Healthcare records,
Financial institution, transactions,
Biological traits, Location-based
service, etc.
1. Spyware: An application that obtains
data without the user’s consent.
2. Malware: An application used to
illegally harm online and offline
computer users
3. Virus: A small program or software
which is embedded with a legitimate
program and designed to harm your
system.
4. Worms: A self-replicating program that
Some spreads across networks due to the poor
security of the infected computers.
important 5. Trojan horse: A program that allows
the hackers to gain remote access to a
terms Computer Science | 2023
target system.
Page

Unethical
computing
practices
Computer Science | 2023
01
Cyberbullying: When people bully
other people by the use

of electronic communication ( like


the web, telephone, etc).


it’s referred to as cyberbullying.

Sending harmful emails, creating


fake websites to make
fun of or to make harm anyone,
distributing the fake

information about a person,


posting fake images of a
person - are some common ways
of cyberbullying.

02

Phishing: An internet hacking

activity used to steal user


data. A misleading email is ent



to the user making them

believ that it's a trusted source and personal info is asked


by them like passwords, credit card details etc. and later
this info is stolen by the hacker to misuse it.
03
Hacking: It is an unethical
activity in which a highly

skilled technical person(or


commonly known as a
hacker) enters another person’s

computer without the


permission of the user
and steals important

data/project/applications from

the computer or
sometimes destroys the information

from the system.


04

Spamming: An unethical activity

in which bulk unwanted


e-mail is set to you from a strange

or unknown source. Due

to bulk emails, your mail server

gets full and mail bombing


activity happens. This is generally used to deliver viruses,
worms, trojan horses, malware, spyware, etc. to attack the
user.

03

Plagiarism: Plagiarism is stealing or copying


someone else’s intellectual work (can be an idea,


literary work or academic work, etc.) and


representing it as your own work without giving


credit to the creator or without citing the source


of information. Thus, always use a plagiarism


checker before the update.


General
Page steps To minimize internet privacy violation risks,
to protect our the following measures need to be taken:
system from
risks 1. Always use preventive software
applications, like anti-virus, anti-malware,
etc,
2. Avoid exposing personal data on websites
with low-security levels.
3. Avoid shopping from unreliable websites
4. Always use strong passwords consisting of
letters, numerals, and special characters.
5. Always keep your operating system updated.
6. Always on the firewall.
TEN COMMANDMENTS OF COMPUTER ETHICS
Page

Commandment 1: Do not use the computer to harm other


people’s data.

Commandment 2: Do not use a computer to cause interference


in other people’s work.

Commandment 3: Do not spy on another person’s personal data.


125

Commandment 4: Do not use technology to steal personal


information. 100

75
Commandment 5: Do not spread misinformation using
computer
Computer technology
Science | 2023 50
Page
Commandment 6: Do not use the software unless you pay for this
software.

Commandment 7: Do not use someone else’s computer resources


unless he authorized to use them.

Commandment 8: It is wrong to claim ownership of a work that


is the output of someone else’s intellect.

Commandment 9: Before developing software, think125about the


social impact it can of that software.
100

Commandment 10: While computers for communication,


75 always
respectful with fellow members.
50
Page

Computer Science | 2023

You might also like