SlideShare uma empresa Scribd logo
1 de 17
LAW 483
CYBERETHICS


              1
What is Ethics?
If we are going to examine ethical issues on the Internet, it is
 first necessary to define ethics.
Today, we regard ethics as a “rational process founded on
 certain principles.”
However, definition that is more applicable is the ethical
 theory that existed in ancient Greece.
There, ethics was the study of what was good for both the
 individual and the society.
Here, we will look at some online issues and how they may be
 good and/ or bad for society.
Cyberethics is the study of ethics on the Internet.
                                                                    2
PRIVACY                     PROPERTY


             FOUR MAIN
           ETHICAL ISSUES
ACCURACY                     ACCESS




                                       3
PRIVACY                                         The technology
                                                 around us increase
                                                 so does the threat
A few years ago, Florida lawmakers               to our privacy.
gave the go ahead to have monitors
      stationed in bathrooms at
 Tallahassee Community College to
   determine if the facilities were
         being underutilized.

    Students and faculties strongly
    protested that the monitors
    violated their privacy.

        State officials said that the value of
        information gained through the
        study was more important than the
        threat to the privacy.
                                                                      4
ACCURACY
•Information educates.
•Misinformation effaces.
•A wealth of information resides on the Net.
•However, sometimes it is difficult to discern/distinguish the
truth from the trash, the nugget of valuable information from
the hearsay, supposition, inference and opinion.
•A poignant illustration of this is the Drudge Report.


  Matt Drudge often reports on rumors and speculation and
  rarely reinforces his stories with specific sources.
                                                                 5
PROPERTY
•WHO has the rights to intellectual property on the internet?

 Issue : When one is constructing his Web page, whether
 it is ethical to lift an image from someone’s homepage
 and use it on his webpage without crediting the source.




                                                                6
Access
•One reason that topics such as online gambling and
pornography have become such firestorms of controversy in
cyberspace is the simple fact that so many people have access to
the Web sites.

•Obviously, pervasive societal issues warrant more attention
surreptitious issues.

•Simply put, if no one had access to online pornography no one
would care.




                                                                   7
Identify the Elements of Malaysian Cyber Law

   i. Computer Ethics
   ii. Code of Ethics
   iii. Intellectual Property

   Ethics is the branch of philosophy concerned
   with:
   a. what is right.
   b. What is wrong.


                                                  8
Computer Ethics for Computer
Professionals
• The field of computer ethics specifies ethical codes for
  computing professionals.

• The core of a computer professional’s code of ethics is
  to preserve and protect human life from harm.


Computer causes new ethical problems and issues:

Computer ethics also deals with the ethical principles associated with those
problems.

                                                                               9
What is code of ethics?

                  code of ethics

  A group of ethical             Developed by
    behavior rules            organizations or by a
                              professional society




                                                      10
Code of Ethics
 Act with integrity, competence, diligence, respect and on an
  ethical manner with the public, clients, employers, employees
  and colleagues.

 Interest in profession and clients above personal interest.

 Practice and encourage others to practice in an ethical manner.

 Promote integrity of ethical markets.

 Improve professional competence.
                                                                11
Computer Ethics for Computer Users

  Respect yourself                         Respect others


                       When using the
                     college’s computers


                     Respect academic
                         integrity




                                                            12
Respect yourself
If you obtain an account and password to use the
 campus computer system, don’t give your password
 to others. They could do something that gets you in
 trouble.

In addition, don’t say or do anything on the internet
 that could reflect poorly on you, even if you think no
 one will ever found out.



                                                       13
Ten Commandments of Computer Ethics

1. Don’t use a computer to harm other people.

2. Don’t interfere with other people’s computer work.

3. Don’t snoop around in other people’s files.

4. Don’t use a computer to steal.

5. Don’t use a computer to bear false witness.

6. Don’t copy or use proprietary software for which you have
   not paid.

                                                               14
7. Don’t use other people’s computer resources without
   authorization or proper compensation.

8. Don’t appropriate other people’s intellectual output.

9. Do think about the social consequences of the program
   you write or the system you design.

10. Do use a computer in ways that show consideration and
    respect for your fellow humans.




                                                            15
Respect Others
You shouldn’t use a computer to threaten or
 harass anyone.
Avoid using more than your share of
 computing resources, such as disk space.
If you publish a Web page on your college’s
 computers, remember that your page’s
 content affects the college’s public image.

                                               16
Respect academic integrity
Always give credit for text you’ve copied from
 the internet.
Obtain permission before you copy pictures.
Don’t copy or distribute software unless the
 license specifically says you can.



                                                  17

Mais conteúdo relacionado

Mais procurados

Criminal Law 1 TANGGUNGAN KERAS (updated).pdf
Criminal Law 1 TANGGUNGAN KERAS (updated).pdfCriminal Law 1 TANGGUNGAN KERAS (updated).pdf
Criminal Law 1 TANGGUNGAN KERAS (updated).pdfAINANURBALQISHMARZUK
 
Paper case studies admissibility of digital records as legal evidence in mala...
Paper case studies admissibility of digital records as legal evidence in mala...Paper case studies admissibility of digital records as legal evidence in mala...
Paper case studies admissibility of digital records as legal evidence in mala...malar17
 
Two land mark case on injunction
Two land mark case on injunctionTwo land mark case on injunction
Two land mark case on injunctionilyana iskandar
 
Article 5 (2) right to habeas corpus
Article 5 (2) right to habeas corpusArticle 5 (2) right to habeas corpus
Article 5 (2) right to habeas corpusHafizul Mukhlis
 
Article 121(1A) of federal constitution
Article 121(1A) of federal constitutionArticle 121(1A) of federal constitution
Article 121(1A) of federal constitutionmirey
 
CONTOH MOOTING OLEH PELAJAR TAHUN AKHIR DI UUM
CONTOH MOOTING OLEH PELAJAR TAHUN AKHIR DI UUMCONTOH MOOTING OLEH PELAJAR TAHUN AKHIR DI UUM
CONTOH MOOTING OLEH PELAJAR TAHUN AKHIR DI UUMASMAH CHE WAN
 
Opinion evidence in Malaysia (2018-2019)
Opinion evidence in Malaysia (2018-2019)Opinion evidence in Malaysia (2018-2019)
Opinion evidence in Malaysia (2018-2019)Intan Muhammad
 
Tugas Kerahsiaan - Duty for Confidentiality
Tugas Kerahsiaan - Duty for ConfidentialityTugas Kerahsiaan - Duty for Confidentiality
Tugas Kerahsiaan - Duty for Confidentialitysurrenderyourthrone
 
character evidence in Malaysia
character evidence in Malaysiacharacter evidence in Malaysia
character evidence in MalaysiaIntan Muhammad
 
Judiciary System of Malaysia
Judiciary System of MalaysiaJudiciary System of Malaysia
Judiciary System of MalaysiaWenkLee1
 
Review of syariah court decisions by the high court
Review of syariah court decisions by the high courtReview of syariah court decisions by the high court
Review of syariah court decisions by the high courtNoor Atikah
 
LAND LAW 1 Forfeiture 2014
LAND LAW 1 Forfeiture 2014LAND LAW 1 Forfeiture 2014
LAND LAW 1 Forfeiture 2014xareejx
 
ILMU ALQADHI, QIYAFAH & QUR'AH (2).ppt
ILMU ALQADHI, QIYAFAH & QUR'AH (2).pptILMU ALQADHI, QIYAFAH & QUR'AH (2).ppt
ILMU ALQADHI, QIYAFAH & QUR'AH (2).pptssuserb0d1522
 
1. FIQH AWLAWIYYAT DAN FIQH MUWAZZANAH
1. FIQH AWLAWIYYAT DAN FIQH MUWAZZANAH1. FIQH AWLAWIYYAT DAN FIQH MUWAZZANAH
1. FIQH AWLAWIYYAT DAN FIQH MUWAZZANAHAmiruddin Ahmad
 

Mais procurados (20)

Criminal Law 1 TANGGUNGAN KERAS (updated).pdf
Criminal Law 1 TANGGUNGAN KERAS (updated).pdfCriminal Law 1 TANGGUNGAN KERAS (updated).pdf
Criminal Law 1 TANGGUNGAN KERAS (updated).pdf
 
Paper case studies admissibility of digital records as legal evidence in mala...
Paper case studies admissibility of digital records as legal evidence in mala...Paper case studies admissibility of digital records as legal evidence in mala...
Paper case studies admissibility of digital records as legal evidence in mala...
 
Two land mark case on injunction
Two land mark case on injunctionTwo land mark case on injunction
Two land mark case on injunction
 
EVIDENCE LAW SECTION 6, 8, 9
EVIDENCE LAW SECTION 6, 8, 9EVIDENCE LAW SECTION 6, 8, 9
EVIDENCE LAW SECTION 6, 8, 9
 
Article 5 (2) right to habeas corpus
Article 5 (2) right to habeas corpusArticle 5 (2) right to habeas corpus
Article 5 (2) right to habeas corpus
 
Article 121(1A) of federal constitution
Article 121(1A) of federal constitutionArticle 121(1A) of federal constitution
Article 121(1A) of federal constitution
 
Charitable trust ii
Charitable trust iiCharitable trust ii
Charitable trust ii
 
CONTOH MOOTING OLEH PELAJAR TAHUN AKHIR DI UUM
CONTOH MOOTING OLEH PELAJAR TAHUN AKHIR DI UUMCONTOH MOOTING OLEH PELAJAR TAHUN AKHIR DI UUM
CONTOH MOOTING OLEH PELAJAR TAHUN AKHIR DI UUM
 
Opinion evidence in Malaysia (2018-2019)
Opinion evidence in Malaysia (2018-2019)Opinion evidence in Malaysia (2018-2019)
Opinion evidence in Malaysia (2018-2019)
 
Tugas Kerahsiaan - Duty for Confidentiality
Tugas Kerahsiaan - Duty for ConfidentialityTugas Kerahsiaan - Duty for Confidentiality
Tugas Kerahsiaan - Duty for Confidentiality
 
character evidence in Malaysia
character evidence in Malaysiacharacter evidence in Malaysia
character evidence in Malaysia
 
Judiciary System of Malaysia
Judiciary System of MalaysiaJudiciary System of Malaysia
Judiciary System of Malaysia
 
Review of syariah court decisions by the high court
Review of syariah court decisions by the high courtReview of syariah court decisions by the high court
Review of syariah court decisions by the high court
 
EVIDENCE 2
EVIDENCE 2EVIDENCE 2
EVIDENCE 2
 
Charitable trust
Charitable trust Charitable trust
Charitable trust
 
LAND LAW 1 Forfeiture 2014
LAND LAW 1 Forfeiture 2014LAND LAW 1 Forfeiture 2014
LAND LAW 1 Forfeiture 2014
 
UNDANG-UNDANG TORT - FITNAH
UNDANG-UNDANG TORT - FITNAHUNDANG-UNDANG TORT - FITNAH
UNDANG-UNDANG TORT - FITNAH
 
ILMU ALQADHI, QIYAFAH & QUR'AH (2).ppt
ILMU ALQADHI, QIYAFAH & QUR'AH (2).pptILMU ALQADHI, QIYAFAH & QUR'AH (2).ppt
ILMU ALQADHI, QIYAFAH & QUR'AH (2).ppt
 
1. FIQH AWLAWIYYAT DAN FIQH MUWAZZANAH
1. FIQH AWLAWIYYAT DAN FIQH MUWAZZANAH1. FIQH AWLAWIYYAT DAN FIQH MUWAZZANAH
1. FIQH AWLAWIYYAT DAN FIQH MUWAZZANAH
 
director Law
director Lawdirector Law
director Law
 

Semelhante a Law 483 cyberethics

Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs studentsvlbrown
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs studentsdlwadsworth
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your futuresuperb11b
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs studentsvlbrown
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
Netiquette
NetiquetteNetiquette
NetiquetteGlory
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxjennyJey2
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 

Semelhante a Law 483 cyberethics (20)

Nfwordle
NfwordleNfwordle
Nfwordle
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Netiquette
NetiquetteNetiquette
Netiquette
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

Mais de Ammar Iyyad B. Amran (8)

Law 483 moral n ethics
Law 483 moral n ethicsLaw 483 moral n ethics
Law 483 moral n ethics
 
Law 483 managerial ethics
Law 483 managerial ethicsLaw 483 managerial ethics
Law 483 managerial ethics
 
Law 483 intro
Law 483 introLaw 483 intro
Law 483 intro
 
Law 483 euthanasia complete's slide
Law 483 euthanasia complete's slideLaw 483 euthanasia complete's slide
Law 483 euthanasia complete's slide
 
Law 483 euthanasia 1
Law 483 euthanasia 1Law 483 euthanasia 1
Law 483 euthanasia 1
 
Law 483 chapter 1 moral n ethics
Law 483 chapter 1 moral n ethicsLaw 483 chapter 1 moral n ethics
Law 483 chapter 1 moral n ethics
 
Law 483 abortion
Law 483 abortionLaw 483 abortion
Law 483 abortion
 
Law 483 organ donation
Law 483 organ donationLaw 483 organ donation
Law 483 organ donation
 

Law 483 cyberethics

  • 2. What is Ethics? If we are going to examine ethical issues on the Internet, it is first necessary to define ethics. Today, we regard ethics as a “rational process founded on certain principles.” However, definition that is more applicable is the ethical theory that existed in ancient Greece. There, ethics was the study of what was good for both the individual and the society. Here, we will look at some online issues and how they may be good and/ or bad for society. Cyberethics is the study of ethics on the Internet. 2
  • 3. PRIVACY PROPERTY FOUR MAIN ETHICAL ISSUES ACCURACY ACCESS 3
  • 4. PRIVACY The technology around us increase so does the threat A few years ago, Florida lawmakers to our privacy. gave the go ahead to have monitors stationed in bathrooms at Tallahassee Community College to determine if the facilities were being underutilized. Students and faculties strongly protested that the monitors violated their privacy. State officials said that the value of information gained through the study was more important than the threat to the privacy. 4
  • 5. ACCURACY •Information educates. •Misinformation effaces. •A wealth of information resides on the Net. •However, sometimes it is difficult to discern/distinguish the truth from the trash, the nugget of valuable information from the hearsay, supposition, inference and opinion. •A poignant illustration of this is the Drudge Report. Matt Drudge often reports on rumors and speculation and rarely reinforces his stories with specific sources. 5
  • 6. PROPERTY •WHO has the rights to intellectual property on the internet? Issue : When one is constructing his Web page, whether it is ethical to lift an image from someone’s homepage and use it on his webpage without crediting the source. 6
  • 7. Access •One reason that topics such as online gambling and pornography have become such firestorms of controversy in cyberspace is the simple fact that so many people have access to the Web sites. •Obviously, pervasive societal issues warrant more attention surreptitious issues. •Simply put, if no one had access to online pornography no one would care. 7
  • 8. Identify the Elements of Malaysian Cyber Law i. Computer Ethics ii. Code of Ethics iii. Intellectual Property Ethics is the branch of philosophy concerned with: a. what is right. b. What is wrong. 8
  • 9. Computer Ethics for Computer Professionals • The field of computer ethics specifies ethical codes for computing professionals. • The core of a computer professional’s code of ethics is to preserve and protect human life from harm. Computer causes new ethical problems and issues: Computer ethics also deals with the ethical principles associated with those problems. 9
  • 10. What is code of ethics? code of ethics A group of ethical Developed by behavior rules organizations or by a professional society 10
  • 11. Code of Ethics  Act with integrity, competence, diligence, respect and on an ethical manner with the public, clients, employers, employees and colleagues.  Interest in profession and clients above personal interest.  Practice and encourage others to practice in an ethical manner.  Promote integrity of ethical markets.  Improve professional competence. 11
  • 12. Computer Ethics for Computer Users Respect yourself Respect others When using the college’s computers Respect academic integrity 12
  • 13. Respect yourself If you obtain an account and password to use the campus computer system, don’t give your password to others. They could do something that gets you in trouble. In addition, don’t say or do anything on the internet that could reflect poorly on you, even if you think no one will ever found out. 13
  • 14. Ten Commandments of Computer Ethics 1. Don’t use a computer to harm other people. 2. Don’t interfere with other people’s computer work. 3. Don’t snoop around in other people’s files. 4. Don’t use a computer to steal. 5. Don’t use a computer to bear false witness. 6. Don’t copy or use proprietary software for which you have not paid. 14
  • 15. 7. Don’t use other people’s computer resources without authorization or proper compensation. 8. Don’t appropriate other people’s intellectual output. 9. Do think about the social consequences of the program you write or the system you design. 10. Do use a computer in ways that show consideration and respect for your fellow humans. 15
  • 16. Respect Others You shouldn’t use a computer to threaten or harass anyone. Avoid using more than your share of computing resources, such as disk space. If you publish a Web page on your college’s computers, remember that your page’s content affects the college’s public image. 16
  • 17. Respect academic integrity Always give credit for text you’ve copied from the internet. Obtain permission before you copy pictures. Don’t copy or distribute software unless the license specifically says you can. 17