SlideShare uma empresa Scribd logo
1 de 11
COMPUTER
ETHICS
PRESENTED BY
AGLAIA
What are Ethics?
Ethics are a structure of standards and practices
that influence how people lead their lives. It is
not strictly implemented to follow these ethics,
but it is basically for the benefit of everyone that
we do.
Ethics are unlike laws that legally mandate what
is right or wrong. Ethics illustrate society’s
views about what is right and what is wrong.
Computer Ethics
Computer ethics are a set of moral standards that
govern the use of computers. It is society’s
views about the use of computers, both hardware
and software. Privacy concerns, intellectual
property rights and effects on the society are
some of the common issues of computer ethics.
Privacy Concerns
Hacking – is unlawful intrusion into a computer or a
network. A hacker can intrude through the security
levels of a computer system or network and can
acquire unauthorised access to other computers.
Malware – means malicious software which is
created to impair a computer system. Common
malware are viruses, spyware, worms and trojan
horses. A virus can delete files from a hard drive
while a spyware can collect data from a computer.
Data Protection – also known as information
privacy or data privacy is the process of
safeguarding data which intends to influence a
balance between individual privacy rights while
still authorising data to be used for business
purposes.
Anonymity – is a way of keeping a user’s
identity masked through various applications.
Intellectual Property Rights
Copyright – is a form of intellectual property that
gives proprietary publication, distribution and usage
rights for the author. This means that whatever idea
the author created cannot be employed or
disseminated by anyone else without the permission
of the author.
Plagiarism – is an act of copying and publishing
another person’s work without proper citation. It’s
like stealing someone else’s work and releasing it as
your own work.
Cracking – is a way of breaking into a system by
getting past the security features of the system.
It’s a way of skipping the registration and
authentication steps when installing a software.
Software License – allows the use of digital
material by following the license agreement.
Ownership remains with the original copyright
owner, users are just granted licenses to use the
material based on the agreement.
Effects on Society
Jobs – Some jobs have been abolished while some jobs
have become simpler as computers have taken over
companies and businesses. Things can now be done in just
one click whereas before it takes multiple steps to perform
a task. This change may be considered unethical as it
limits the skills of the employees.
There are also ethical concerns on health and safety of
employees getting sick from constant sitting, staring at
computer screens and typing on the keyboard or clicking
on the mouse.
Environmental Impact – Environment has been
affected by computers and the internet since so
much time spent using computers increases energy
usage which in turn increases the emission of
greenhouse gases.
There are ways where we can save energy like
limiting computer time and turning off the computer
or putting on sleep mode when not in use. Buying
energy efficient computers with Energy Star label
can also help save the environment.
Social Impact – Computers and the internet help people stay in
touch with family and friends. Social media has been very
popular nowadays.
Computer gaming influenced society both positively and
negatively. Positive effects are improved hand-eye
coordination, stress relief and improved strategic thinking.
Negative effects are addiction of gamers, isolation from the
real world and exposure to violence.
Computer technology helps the government in improving
services to its citizens. Advanced database can hold huge data
being collected and analysed by the government.
Computer technology aids businesses by automating processes,
reports and analysis.
Thank you
For more…. Mail to
aglaiaconnect2018@gmail.com

Mais conteúdo relacionado

Mais procurados

computer ethics
computer ethicscomputer ethics
computer ethicsHoney jose
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsPrabesh Shrestha
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyrightAdyns
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 

Mais procurados (20)

computer ethics
computer ethicscomputer ethics
computer ethics
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Semelhante a Computer ethics

Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics pptWulax37
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitysuperb11b
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Alexander Decker
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)ChristopherAntonius
 

Semelhante a Computer ethics (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
 

Mais de Aglaia Connect

Underground construction
Underground constructionUnderground construction
Underground constructionAglaia Connect
 
Reactive powder-concrete
Reactive powder-concreteReactive powder-concrete
Reactive powder-concreteAglaia Connect
 
Self healing-material-bacterial-concrete
Self healing-material-bacterial-concreteSelf healing-material-bacterial-concrete
Self healing-material-bacterial-concreteAglaia Connect
 
Structural behavious-of-high-strength-concrete
Structural behavious-of-high-strength-concreteStructural behavious-of-high-strength-concrete
Structural behavious-of-high-strength-concreteAglaia Connect
 
Aerated autoclaved-concrete
Aerated autoclaved-concreteAerated autoclaved-concrete
Aerated autoclaved-concreteAglaia Connect
 
Transatlantic tunnel-floating-tunnel
Transatlantic tunnel-floating-tunnelTransatlantic tunnel-floating-tunnel
Transatlantic tunnel-floating-tunnelAglaia Connect
 
Marble and-quarry-dust-as-additives-in-concrete
Marble and-quarry-dust-as-additives-in-concrete Marble and-quarry-dust-as-additives-in-concrete
Marble and-quarry-dust-as-additives-in-concrete Aglaia Connect
 
Plastic waste into fuel using pyrolysis process
Plastic waste into fuel using pyrolysis processPlastic waste into fuel using pyrolysis process
Plastic waste into fuel using pyrolysis processAglaia Connect
 
Geotextile for soil stabilization
Geotextile for soil stabilizationGeotextile for soil stabilization
Geotextile for soil stabilizationAglaia Connect
 
Corrosion control of underwater piles
Corrosion control of underwater pilesCorrosion control of underwater piles
Corrosion control of underwater pilesAglaia Connect
 
Constucted wetlands for waste water treatment
Constucted wetlands for waste water treatmentConstucted wetlands for waste water treatment
Constucted wetlands for waste water treatmentAglaia Connect
 
Coconut shell as coarse aggregate in the concrete
Coconut shell as coarse aggregate in the concreteCoconut shell as coarse aggregate in the concrete
Coconut shell as coarse aggregate in the concreteAglaia Connect
 
Usage of geogrids in flexible pavement
Usage of geogrids in flexible pavementUsage of geogrids in flexible pavement
Usage of geogrids in flexible pavementAglaia Connect
 
Usage of geogrids in flexible pavement
Usage of geogrids in flexible pavementUsage of geogrids in flexible pavement
Usage of geogrids in flexible pavementAglaia Connect
 
Waste water purification using cnstructed wetlands
Waste water purification using cnstructed wetlandsWaste water purification using cnstructed wetlands
Waste water purification using cnstructed wetlandsAglaia Connect
 

Mais de Aglaia Connect (20)

Underground construction
Underground constructionUnderground construction
Underground construction
 
Self curing-concrete-
Self curing-concrete-Self curing-concrete-
Self curing-concrete-
 
Trenchless technology
Trenchless technologyTrenchless technology
Trenchless technology
 
Reactive powder-concrete
Reactive powder-concreteReactive powder-concrete
Reactive powder-concrete
 
Stress ribbon-bridges
Stress ribbon-bridgesStress ribbon-bridges
Stress ribbon-bridges
 
Self healing-material-bacterial-concrete
Self healing-material-bacterial-concreteSelf healing-material-bacterial-concrete
Self healing-material-bacterial-concrete
 
Structural behavious-of-high-strength-concrete
Structural behavious-of-high-strength-concreteStructural behavious-of-high-strength-concrete
Structural behavious-of-high-strength-concrete
 
Aerated autoclaved-concrete
Aerated autoclaved-concreteAerated autoclaved-concrete
Aerated autoclaved-concrete
 
Transatlantic tunnel-floating-tunnel
Transatlantic tunnel-floating-tunnelTransatlantic tunnel-floating-tunnel
Transatlantic tunnel-floating-tunnel
 
Tube structures
Tube structuresTube structures
Tube structures
 
Marble and-quarry-dust-as-additives-in-concrete
Marble and-quarry-dust-as-additives-in-concrete Marble and-quarry-dust-as-additives-in-concrete
Marble and-quarry-dust-as-additives-in-concrete
 
Plastic waste into fuel using pyrolysis process
Plastic waste into fuel using pyrolysis processPlastic waste into fuel using pyrolysis process
Plastic waste into fuel using pyrolysis process
 
Geotextile for soil stabilization
Geotextile for soil stabilizationGeotextile for soil stabilization
Geotextile for soil stabilization
 
Corrosion control of underwater piles
Corrosion control of underwater pilesCorrosion control of underwater piles
Corrosion control of underwater piles
 
Constucted wetlands for waste water treatment
Constucted wetlands for waste water treatmentConstucted wetlands for waste water treatment
Constucted wetlands for waste water treatment
 
Coconut shell as coarse aggregate in the concrete
Coconut shell as coarse aggregate in the concreteCoconut shell as coarse aggregate in the concrete
Coconut shell as coarse aggregate in the concrete
 
Usage of geogrids in flexible pavement
Usage of geogrids in flexible pavementUsage of geogrids in flexible pavement
Usage of geogrids in flexible pavement
 
Pervious concrete
Pervious concretePervious concrete
Pervious concrete
 
Usage of geogrids in flexible pavement
Usage of geogrids in flexible pavementUsage of geogrids in flexible pavement
Usage of geogrids in flexible pavement
 
Waste water purification using cnstructed wetlands
Waste water purification using cnstructed wetlandsWaste water purification using cnstructed wetlands
Waste water purification using cnstructed wetlands
 

Último

Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field ArtilleryKennethSwanberg
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownSandaliGurusinghe2
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdfAlejandromexEspino
 
internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamraAllTops
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxssuserf63bd7
 
Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.aruny7087
 
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelGautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNitya salvi
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentNimot Muili
 
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalW.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalWilliam (Bill) H. Bender, FCSI
 
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime SiliguriSiliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siligurimeghakumariji156
 
How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxAaron Stannard
 
Information Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docxInformation Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docxssuserf63bd7
 
digital Human resource management presentation.pdf
digital Human resource management presentation.pdfdigital Human resource management presentation.pdf
digital Human resource management presentation.pdfArtiSrivastava23
 

Último (14)

Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field Artillery
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard Brown
 
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdf
 
internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamra
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docx
 
Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.
 
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelGautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
 
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalW.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
 
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime SiliguriSiliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
 
How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptx
 
Information Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docxInformation Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docx
 
digital Human resource management presentation.pdf
digital Human resource management presentation.pdfdigital Human resource management presentation.pdf
digital Human resource management presentation.pdf
 

Computer ethics

  • 2. What are Ethics? Ethics are a structure of standards and practices that influence how people lead their lives. It is not strictly implemented to follow these ethics, but it is basically for the benefit of everyone that we do. Ethics are unlike laws that legally mandate what is right or wrong. Ethics illustrate society’s views about what is right and what is wrong.
  • 3. Computer Ethics Computer ethics are a set of moral standards that govern the use of computers. It is society’s views about the use of computers, both hardware and software. Privacy concerns, intellectual property rights and effects on the society are some of the common issues of computer ethics.
  • 4. Privacy Concerns Hacking – is unlawful intrusion into a computer or a network. A hacker can intrude through the security levels of a computer system or network and can acquire unauthorised access to other computers. Malware – means malicious software which is created to impair a computer system. Common malware are viruses, spyware, worms and trojan horses. A virus can delete files from a hard drive while a spyware can collect data from a computer.
  • 5. Data Protection – also known as information privacy or data privacy is the process of safeguarding data which intends to influence a balance between individual privacy rights while still authorising data to be used for business purposes. Anonymity – is a way of keeping a user’s identity masked through various applications.
  • 6. Intellectual Property Rights Copyright – is a form of intellectual property that gives proprietary publication, distribution and usage rights for the author. This means that whatever idea the author created cannot be employed or disseminated by anyone else without the permission of the author. Plagiarism – is an act of copying and publishing another person’s work without proper citation. It’s like stealing someone else’s work and releasing it as your own work.
  • 7. Cracking – is a way of breaking into a system by getting past the security features of the system. It’s a way of skipping the registration and authentication steps when installing a software. Software License – allows the use of digital material by following the license agreement. Ownership remains with the original copyright owner, users are just granted licenses to use the material based on the agreement.
  • 8. Effects on Society Jobs – Some jobs have been abolished while some jobs have become simpler as computers have taken over companies and businesses. Things can now be done in just one click whereas before it takes multiple steps to perform a task. This change may be considered unethical as it limits the skills of the employees. There are also ethical concerns on health and safety of employees getting sick from constant sitting, staring at computer screens and typing on the keyboard or clicking on the mouse.
  • 9. Environmental Impact – Environment has been affected by computers and the internet since so much time spent using computers increases energy usage which in turn increases the emission of greenhouse gases. There are ways where we can save energy like limiting computer time and turning off the computer or putting on sleep mode when not in use. Buying energy efficient computers with Energy Star label can also help save the environment.
  • 10. Social Impact – Computers and the internet help people stay in touch with family and friends. Social media has been very popular nowadays. Computer gaming influenced society both positively and negatively. Positive effects are improved hand-eye coordination, stress relief and improved strategic thinking. Negative effects are addiction of gamers, isolation from the real world and exposure to violence. Computer technology helps the government in improving services to its citizens. Advanced database can hold huge data being collected and analysed by the government. Computer technology aids businesses by automating processes, reports and analysis.
  • 11. Thank you For more…. Mail to aglaiaconnect2018@gmail.com