SlideShare uma empresa Scribd logo
1 de 10
Computer Ethics
 Privacy
 Security and accuracy
 Ownership of property
 Environmental issues
 Equity in access
 Artificial intelligence
 Unemployment and displacement
 Computer misuse
 Internal control integrity
Computer Ethics
 Computer fraud:
 Theft, misuse and misappropriation by altering
computer data
 Theft, misuse and misappropriation by altering
software programming
 Theft or illegal use of computer data/info
 Illegal copying or destruction of software or
hardware
 Misappropriation of computer hardware
Computer Ethics
 Computer fraud:
 Input violation (Data Diddling)
 Altering programs to allow illegal access
 Destroy programs/data by virus injection
 Misusing computers for personal use/business
 Output violation:

Encoding falsified information at the back of
credit cards

Salami technique
Computer Ethics
 Hard drives full with Music and videos
 Downloading of music from the web without
paying
 Software Piracy
 Formatted your hard drive prior to leaving your
company because you were angry about leaving
Information Technology Ethics
 Prior to IT, it may have been easier to know
whether the activity was right or wrong
 Virtual world:
•A student uses the copy and paste
commands to place large parts of an
electronic article into an assigned paper and
turns the paper in as own work
Information Technology Ethics
 Some users view their computing actions as less
serious than their actions in the “real world”
•Stealing software from a store – no way!.......
However, SW piracy costs businesses
billions of dollars per year
•Picking a lock to someone’s house – no;
However, guessing passwords to gain
access to a website, information, or
programs is a common
•Do it to demonstrate 'technical heroism'
IT Ethics: Challenges
 Workplace:
 Customer and vendor relationships
 Outsourcing issues
 Should the employer has the right to monitor
private email messages
•Two most popular websites visited by US
workers: ESPN and Playboy
Computer Crimes
 Financial Frauds
 Laptop theft
 Virus/trojan/worm infection
 Insider computer system abuse
 Telecommunication fraud
 Unauthorised privileged access
 Outsider system penetration (Hacking)
 Website defacement
Computer Security Expenditure
 Prioratised sectorwise
 Transportation
 Government
 Telecommunication
 High-tech
 Financial
 Legal
 Medical
Computer Security Expenditure
 Prioratised sectorwise
 Transportation
 Government
 Telecommunication
 High-tech
 Financial
 Legal
 Medical

Mais conteúdo relacionado

Mais procurados

Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challengesVishakha Joshi
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsPrabesh Shrestha
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics PresentationJonathan Ezor
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The LawSaimaRafiq
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterpriseAbha Damani
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practiceJonathan Ezor
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 

Mais procurados (20)

Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challenges
 
Computer
ComputerComputer
Computer
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation11 27 07 Ezor Attorney E Mail Ethics Presentation
11 27 07 Ezor Attorney E Mail Ethics Presentation
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterprise
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Dangers of Computer devices
Dangers of Computer devices Dangers of Computer devices
Dangers of Computer devices
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Computer security
Computer securityComputer security
Computer security
 

Destaque

Modelo ACS de geração de startups
Modelo ACS de geração de startupsModelo ACS de geração de startups
Modelo ACS de geração de startupsKleber Teraoka
 
Modelos de negócios inovadores para startups
Modelos de negócios inovadores para startupsModelos de negócios inovadores para startups
Modelos de negócios inovadores para startupsMarcelo Pimenta (menta90)
 
Flávio Almeida MEAN Stack "to be or not to be mean"
Flávio Almeida MEAN Stack "to be or not to be mean"Flávio Almeida MEAN Stack "to be or not to be mean"
Flávio Almeida MEAN Stack "to be or not to be mean"flaviohalmeida
 
9 fórum iNOVAção @daniel_egger
9 fórum iNOVAção  @daniel_egger9 fórum iNOVAção  @daniel_egger
9 fórum iNOVAção @daniel_eggerDaniel Egger
 
Semana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startups
Semana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startupsSemana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startups
Semana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startupsMarcelo Pimenta (menta90)
 
Criar modelos de negócios através da geração de ideias
Criar modelos de negócios através da geração de ideiasCriar modelos de negócios através da geração de ideias
Criar modelos de negócios através da geração de ideiasUserSanti
 
Startups - Ideias que viram negócios milionários
Startups - Ideias que viram negócios milionáriosStartups - Ideias que viram negócios milionários
Startups - Ideias que viram negócios milionáriosRenzo Colnago
 
Métricas para Startups
Métricas para StartupsMétricas para Startups
Métricas para StartupsThiago Paiva
 
MERCADO DE STARTUPS
MERCADO DE STARTUPSMERCADO DE STARTUPS
MERCADO DE STARTUPSRenato Melo
 
Plano de negócio para startups
Plano de negócio para startupsPlano de negócio para startups
Plano de negócio para startupsFelipe Perlino
 

Destaque (10)

Modelo ACS de geração de startups
Modelo ACS de geração de startupsModelo ACS de geração de startups
Modelo ACS de geração de startups
 
Modelos de negócios inovadores para startups
Modelos de negócios inovadores para startupsModelos de negócios inovadores para startups
Modelos de negócios inovadores para startups
 
Flávio Almeida MEAN Stack "to be or not to be mean"
Flávio Almeida MEAN Stack "to be or not to be mean"Flávio Almeida MEAN Stack "to be or not to be mean"
Flávio Almeida MEAN Stack "to be or not to be mean"
 
9 fórum iNOVAção @daniel_egger
9 fórum iNOVAção  @daniel_egger9 fórum iNOVAção  @daniel_egger
9 fórum iNOVAção @daniel_egger
 
Semana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startups
Semana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startupsSemana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startups
Semana Global de Empreendedorismo - Sebrae Piauí - Modelo de negócios & startups
 
Criar modelos de negócios através da geração de ideias
Criar modelos de negócios através da geração de ideiasCriar modelos de negócios através da geração de ideias
Criar modelos de negócios através da geração de ideias
 
Startups - Ideias que viram negócios milionários
Startups - Ideias que viram negócios milionáriosStartups - Ideias que viram negócios milionários
Startups - Ideias que viram negócios milionários
 
Métricas para Startups
Métricas para StartupsMétricas para Startups
Métricas para Startups
 
MERCADO DE STARTUPS
MERCADO DE STARTUPSMERCADO DE STARTUPS
MERCADO DE STARTUPS
 
Plano de negócio para startups
Plano de negócio para startupsPlano de negócio para startups
Plano de negócio para startups
 

Semelhante a 9 ethics in it space

Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItSonali Srivastava
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threadsLeena Reddy
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016dilahkmpk
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptxDibyesh1
 

Semelhante a 9 ethics in it space (20)

Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber_security_.pdf
Cyber_security_.pdfCyber_security_.pdf
Cyber_security_.pdf
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
Hackers
HackersHackers
Hackers
 

Mais de Alwyn Dalmeida

11 business and social responsiveness
11 business and social responsiveness11 business and social responsiveness
11 business and social responsivenessAlwyn Dalmeida
 
8 advertising and ethics
8 advertising and ethics8 advertising and ethics
8 advertising and ethicsAlwyn Dalmeida
 
7 ethics and marketing
7 ethics and marketing7 ethics and marketing
7 ethics and marketingAlwyn Dalmeida
 
6 individualism v collectivism
6 individualism v collectivism6 individualism v collectivism
6 individualism v collectivismAlwyn Dalmeida
 
5 utilitarianism cognitivism and consequentialism
5 utilitarianism cognitivism and consequentialism5 utilitarianism cognitivism and consequentialism
5 utilitarianism cognitivism and consequentialismAlwyn Dalmeida
 
4 types & codes of ethics
4 types & codes of ethics4 types & codes of ethics
4 types & codes of ethicsAlwyn Dalmeida
 

Mais de Alwyn Dalmeida (8)

12 csr & cg
12 csr & cg12 csr & cg
12 csr & cg
 
11 business and social responsiveness
11 business and social responsiveness11 business and social responsiveness
11 business and social responsiveness
 
10 ethics in hrm
10 ethics in hrm10 ethics in hrm
10 ethics in hrm
 
8 advertising and ethics
8 advertising and ethics8 advertising and ethics
8 advertising and ethics
 
7 ethics and marketing
7 ethics and marketing7 ethics and marketing
7 ethics and marketing
 
6 individualism v collectivism
6 individualism v collectivism6 individualism v collectivism
6 individualism v collectivism
 
5 utilitarianism cognitivism and consequentialism
5 utilitarianism cognitivism and consequentialism5 utilitarianism cognitivism and consequentialism
5 utilitarianism cognitivism and consequentialism
 
4 types & codes of ethics
4 types & codes of ethics4 types & codes of ethics
4 types & codes of ethics
 

Último

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

9 ethics in it space

  • 1. Computer Ethics  Privacy  Security and accuracy  Ownership of property  Environmental issues  Equity in access  Artificial intelligence  Unemployment and displacement  Computer misuse  Internal control integrity
  • 2. Computer Ethics  Computer fraud:  Theft, misuse and misappropriation by altering computer data  Theft, misuse and misappropriation by altering software programming  Theft or illegal use of computer data/info  Illegal copying or destruction of software or hardware  Misappropriation of computer hardware
  • 3. Computer Ethics  Computer fraud:  Input violation (Data Diddling)  Altering programs to allow illegal access  Destroy programs/data by virus injection  Misusing computers for personal use/business  Output violation:  Encoding falsified information at the back of credit cards  Salami technique
  • 4. Computer Ethics  Hard drives full with Music and videos  Downloading of music from the web without paying  Software Piracy  Formatted your hard drive prior to leaving your company because you were angry about leaving
  • 5. Information Technology Ethics  Prior to IT, it may have been easier to know whether the activity was right or wrong  Virtual world: •A student uses the copy and paste commands to place large parts of an electronic article into an assigned paper and turns the paper in as own work
  • 6. Information Technology Ethics  Some users view their computing actions as less serious than their actions in the “real world” •Stealing software from a store – no way!....... However, SW piracy costs businesses billions of dollars per year •Picking a lock to someone’s house – no; However, guessing passwords to gain access to a website, information, or programs is a common •Do it to demonstrate 'technical heroism'
  • 7. IT Ethics: Challenges  Workplace:  Customer and vendor relationships  Outsourcing issues  Should the employer has the right to monitor private email messages •Two most popular websites visited by US workers: ESPN and Playboy
  • 8. Computer Crimes  Financial Frauds  Laptop theft  Virus/trojan/worm infection  Insider computer system abuse  Telecommunication fraud  Unauthorised privileged access  Outsider system penetration (Hacking)  Website defacement
  • 9. Computer Security Expenditure  Prioratised sectorwise  Transportation  Government  Telecommunication  High-tech  Financial  Legal  Medical
  • 10. Computer Security Expenditure  Prioratised sectorwise  Transportation  Government  Telecommunication  High-tech  Financial  Legal  Medical