13th Week ComputerEthics
13th Week ComputerEthics
1
MS ROSELLE R BENGCO,MIT
Learning Outcomes
Explain IT ethics ?
What is IT ethics?
• Information technology ethics is the study
of the ethical issues arising out of the use
and development of electronic
technologies. Its goal is to identify and
formulate answers to questions about the
moral basis of individual responsibilities
and actions, as well as the moral
underpinnings of public policy.
3
What are ethical challenges in ICT?
4
5
6
7
8
9
10
Social Issues
11
12
13
LEGAL ISSUES
14
15
Scenario
https://www.socialworker.com/products-services/social-work-books/
is-it-ethical-101-scenarios-in-everyday-social-work-practic/
16
IT Professional
17
18
Ethical Issues
19
Copyright
20
Patent
• A patent is the granting of a property
right by a sovereign authority to an
inventor. This grant provides the
inventor exclusive rights to the
patented process, design, or
invention for a designated period in
exchange for a comprehensive
disclosure of the invention. They are
a form of incorporeal right.
21
Trademark
• A trademark is a word, a group of words,
sign, symbol, logo or a combination
thereof that identifies and differentiates the
source of the goods or services ...
22
What is a trademark in design?
What Are Trade Marks? | IP Australia
A trade mark legally protects your brand and helps customers distinguish
your products or services in the market. Trade marks can be used to
protect a logo, phrase, word, letter, colour, sound, smell, picture,
movement, aspect of packaging or any combination of these.
23
AS A GROUP
• Search one company which encounter a
Ethical issues.
• Discuss the scenario and the solution
given the stituation.
• Explain what Code of Ethics is applied
during the incident.
• Cite your references.
24
http://www.ic3.gov/media/annualreport/2009_IC3Report.pdf
http://www.ic3.gov/media/annualreport/2009_IC3Report.pdf
http://us.trendmicro.com/imperia/md/content/us/trendwatch/resear
chandanalysis/zeusapersistentcriminalenterprise.pdf
http://www.legalserviceindia.com/cyber/itact.html
http://www.symantec.com/norton/cybercrime/definition.jsp
http://www.securityworld.com/ia-420-love-bug-virus.aspx
http://www.finjan.com/Content.aspx?id=827
25