SlideShare a Scribd company logo
LAW 483
CYBERETHICS


              1
What is Ethics?
If we are going to examine ethical issues on the Internet, it is
 first necessary to define ethics.
Today, we regard ethics as a “rational process founded on
 certain principles.”
However, definition that is more applicable is the ethical
 theory that existed in ancient Greece.
There, ethics was the study of what was good for both the
 individual and the society.
Here, we will look at some online issues and how they may be
 good and/ or bad for society.
Cyberethics is the study of ethics on the Internet.
                                                                    2
PRIVACY                     PROPERTY


             FOUR MAIN
           ETHICAL ISSUES
ACCURACY                     ACCESS




                                       3
PRIVACY                                         The technology
                                                 around us increase
                                                 so does the threat
A few years ago, Florida lawmakers               to our privacy.
gave the go ahead to have monitors
      stationed in bathrooms at
 Tallahassee Community College to
   determine if the facilities were
         being underutilized.

    Students and faculties strongly
    protested that the monitors
    violated their privacy.

        State officials said that the value of
        information gained through the
        study was more important than the
        threat to the privacy.
                                                                      4
ACCURACY
•Information educates.
•Misinformation effaces.
•A wealth of information resides on the Net.
•However, sometimes it is difficult to discern/distinguish the
truth from the trash, the nugget of valuable information from
the hearsay, supposition, inference and opinion.
•A poignant illustration of this is the Drudge Report.


  Matt Drudge often reports on rumors and speculation and
  rarely reinforces his stories with specific sources.
                                                                 5
PROPERTY
•WHO has the rights to intellectual property on the internet?

 Issue : When one is constructing his Web page, whether
 it is ethical to lift an image from someone’s homepage
 and use it on his webpage without crediting the source.




                                                                6
Access
•One reason that topics such as online gambling and
pornography have become such firestorms of controversy in
cyberspace is the simple fact that so many people have access to
the Web sites.

•Obviously, pervasive societal issues warrant more attention
surreptitious issues.

•Simply put, if no one had access to online pornography no one
would care.




                                                                   7
Identify the Elements of Malaysian Cyber Law

   i. Computer Ethics
   ii. Code of Ethics
   iii. Intellectual Property

   Ethics is the branch of philosophy concerned
   with:
   a. what is right.
   b. What is wrong.


                                                  8
Computer Ethics for Computer
Professionals
• The field of computer ethics specifies ethical codes for
  computing professionals.

• The core of a computer professional’s code of ethics is
  to preserve and protect human life from harm.


Computer causes new ethical problems and issues:

Computer ethics also deals with the ethical principles associated with those
problems.

                                                                               9
What is code of ethics?

                  code of ethics

  A group of ethical             Developed by
    behavior rules            organizations or by a
                              professional society




                                                      10
Code of Ethics
 Act with integrity, competence, diligence, respect and on an
  ethical manner with the public, clients, employers, employees
  and colleagues.

 Interest in profession and clients above personal interest.

 Practice and encourage others to practice in an ethical manner.

 Promote integrity of ethical markets.

 Improve professional competence.
                                                                11
Computer Ethics for Computer Users

  Respect yourself                         Respect others


                       When using the
                     college’s computers


                     Respect academic
                         integrity




                                                            12
Respect yourself
If you obtain an account and password to use the
 campus computer system, don’t give your password
 to others. They could do something that gets you in
 trouble.

In addition, don’t say or do anything on the internet
 that could reflect poorly on you, even if you think no
 one will ever found out.



                                                       13
Ten Commandments of Computer Ethics

1. Don’t use a computer to harm other people.

2. Don’t interfere with other people’s computer work.

3. Don’t snoop around in other people’s files.

4. Don’t use a computer to steal.

5. Don’t use a computer to bear false witness.

6. Don’t copy or use proprietary software for which you have
   not paid.

                                                               14
7. Don’t use other people’s computer resources without
   authorization or proper compensation.

8. Don’t appropriate other people’s intellectual output.

9. Do think about the social consequences of the program
   you write or the system you design.

10. Do use a computer in ways that show consideration and
    respect for your fellow humans.




                                                            15
Respect Others
You shouldn’t use a computer to threaten or
 harass anyone.
Avoid using more than your share of
 computing resources, such as disk space.
If you publish a Web page on your college’s
 computers, remember that your page’s
 content affects the college’s public image.

                                               16
Respect academic integrity
Always give credit for text you’ve copied from
 the internet.
Obtain permission before you copy pictures.
Don’t copy or distribute software unless the
 license specifically says you can.



                                                  17

More Related Content

What's hot

Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
sheryl90
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
Md Aktar
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 

What's hot (20)

Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
1.3 ancaman komputer
1.3 ancaman komputer1.3 ancaman komputer
1.3 ancaman komputer
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Sosial media presentation
Sosial media presentationSosial media presentation
Sosial media presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Sivarasa v Badan Peguam Malaysia
Sivarasa v Badan Peguam  MalaysiaSivarasa v Badan Peguam  Malaysia
Sivarasa v Badan Peguam Malaysia
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Similar to Law 483 cyberethics

Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
Johan Koren
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
vlbrown
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
dlwadsworth
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
vlbrown
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
lahill16
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
Johan Koren
 

Similar to Law 483 cyberethics (20)

Nfwordle
NfwordleNfwordle
Nfwordle
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Netiquette
NetiquetteNetiquette
Netiquette
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 

More from Ammar Iyyad B. Amran

More from Ammar Iyyad B. Amran (8)

Law 483 moral n ethics
Law 483 moral n ethicsLaw 483 moral n ethics
Law 483 moral n ethics
 
Law 483 managerial ethics
Law 483 managerial ethicsLaw 483 managerial ethics
Law 483 managerial ethics
 
Law 483 intro
Law 483 introLaw 483 intro
Law 483 intro
 
Law 483 euthanasia complete's slide
Law 483 euthanasia complete's slideLaw 483 euthanasia complete's slide
Law 483 euthanasia complete's slide
 
Law 483 euthanasia 1
Law 483 euthanasia 1Law 483 euthanasia 1
Law 483 euthanasia 1
 
Law 483 chapter 1 moral n ethics
Law 483 chapter 1 moral n ethicsLaw 483 chapter 1 moral n ethics
Law 483 chapter 1 moral n ethics
 
Law 483 abortion
Law 483 abortionLaw 483 abortion
Law 483 abortion
 
Law 483 organ donation
Law 483 organ donationLaw 483 organ donation
Law 483 organ donation
 

Law 483 cyberethics

  • 2. What is Ethics? If we are going to examine ethical issues on the Internet, it is first necessary to define ethics. Today, we regard ethics as a “rational process founded on certain principles.” However, definition that is more applicable is the ethical theory that existed in ancient Greece. There, ethics was the study of what was good for both the individual and the society. Here, we will look at some online issues and how they may be good and/ or bad for society. Cyberethics is the study of ethics on the Internet. 2
  • 3. PRIVACY PROPERTY FOUR MAIN ETHICAL ISSUES ACCURACY ACCESS 3
  • 4. PRIVACY The technology around us increase so does the threat A few years ago, Florida lawmakers to our privacy. gave the go ahead to have monitors stationed in bathrooms at Tallahassee Community College to determine if the facilities were being underutilized. Students and faculties strongly protested that the monitors violated their privacy. State officials said that the value of information gained through the study was more important than the threat to the privacy. 4
  • 5. ACCURACY •Information educates. •Misinformation effaces. •A wealth of information resides on the Net. •However, sometimes it is difficult to discern/distinguish the truth from the trash, the nugget of valuable information from the hearsay, supposition, inference and opinion. •A poignant illustration of this is the Drudge Report. Matt Drudge often reports on rumors and speculation and rarely reinforces his stories with specific sources. 5
  • 6. PROPERTY •WHO has the rights to intellectual property on the internet? Issue : When one is constructing his Web page, whether it is ethical to lift an image from someone’s homepage and use it on his webpage without crediting the source. 6
  • 7. Access •One reason that topics such as online gambling and pornography have become such firestorms of controversy in cyberspace is the simple fact that so many people have access to the Web sites. •Obviously, pervasive societal issues warrant more attention surreptitious issues. •Simply put, if no one had access to online pornography no one would care. 7
  • 8. Identify the Elements of Malaysian Cyber Law i. Computer Ethics ii. Code of Ethics iii. Intellectual Property Ethics is the branch of philosophy concerned with: a. what is right. b. What is wrong. 8
  • 9. Computer Ethics for Computer Professionals • The field of computer ethics specifies ethical codes for computing professionals. • The core of a computer professional’s code of ethics is to preserve and protect human life from harm. Computer causes new ethical problems and issues: Computer ethics also deals with the ethical principles associated with those problems. 9
  • 10. What is code of ethics? code of ethics A group of ethical Developed by behavior rules organizations or by a professional society 10
  • 11. Code of Ethics  Act with integrity, competence, diligence, respect and on an ethical manner with the public, clients, employers, employees and colleagues.  Interest in profession and clients above personal interest.  Practice and encourage others to practice in an ethical manner.  Promote integrity of ethical markets.  Improve professional competence. 11
  • 12. Computer Ethics for Computer Users Respect yourself Respect others When using the college’s computers Respect academic integrity 12
  • 13. Respect yourself If you obtain an account and password to use the campus computer system, don’t give your password to others. They could do something that gets you in trouble. In addition, don’t say or do anything on the internet that could reflect poorly on you, even if you think no one will ever found out. 13
  • 14. Ten Commandments of Computer Ethics 1. Don’t use a computer to harm other people. 2. Don’t interfere with other people’s computer work. 3. Don’t snoop around in other people’s files. 4. Don’t use a computer to steal. 5. Don’t use a computer to bear false witness. 6. Don’t copy or use proprietary software for which you have not paid. 14
  • 15. 7. Don’t use other people’s computer resources without authorization or proper compensation. 8. Don’t appropriate other people’s intellectual output. 9. Do think about the social consequences of the program you write or the system you design. 10. Do use a computer in ways that show consideration and respect for your fellow humans. 15
  • 16. Respect Others You shouldn’t use a computer to threaten or harass anyone. Avoid using more than your share of computing resources, such as disk space. If you publish a Web page on your college’s computers, remember that your page’s content affects the college’s public image. 16
  • 17. Respect academic integrity Always give credit for text you’ve copied from the internet. Obtain permission before you copy pictures. Don’t copy or distribute software unless the license specifically says you can. 17