SlideShare uma empresa Scribd logo
1 de 30
Baixar para ler offline
PROF. ERWIN M. GLOBIO, MSIT

)
• What is Ethics and Information Technology??
• Ethical issues relating to computer application
• Security Threats
– Computer Viruses
– Cyber Crime
– Software piracy and Hacking
– Computer crime prevention
– Ethical dilemmas and consideration
Ethics In Information Tech.
Ethics
• Derived from the Greek word “ethos”, which
means “custom”, “habit”, and “way of living”
• Definition: "the discipline and practice of
applying value to human behavior, resulting
in meaningful conduct.“
Ethics In Information Tech.
Computer Ethics
• Computer ethics defined as the application of
classical ethical principles to the use of computer
technology.
• Ethical problems related to computers:
– Privacy
•Computers create a false sense of security
•People do not realize how vulnerable
information stored on computers are
– Property
•Physical property
•Intellectual property
•Data as property
Ethics In Information Tech.
• Access
– Access to computing technology
– Access to data
• Accuracy
– Accuracy of information stored
• Hacking, cracking and virus creation
• Software piracy
Ethics In Information Tech.
The Ten Commandments of computer
ethics have been defined by the
Computer Ethics Institute.
• 1) Thou shalt not use a computer to harm other people.
• 2) Thou shalt not interfere with other people's computer
work.
• 3) Thou shalt not snoop around in other people's files.
• 4) Thou shalt not use a computer to steal.
• 5) Thou shalt not use a computer to bear false witness.
Ethics In Information Tech.
• 6) Thou shalt not use or copy software for which you have
not paid.
• 7) Thou shalt not use other people's computer resources
without authorisation.
• 8) Thou shalt not appropriate other people's intellectual
output.
• 9) Thou shalt think about the social consequences of the
program you write.
• 10) Thou shalt use a computer in ways that show
consideration and respect.
Ethics In Information Tech.
What is Computer Virus?
• Computer viruses are small software programs that
are designed to spread from one computer to another
and to interfere with computer operation.
Ethics In Information Tech.
Spreading of Virus
• Virus are most easily spread,
• Spread through E-mail Attachments,
– Instant Messaging messages,
– Funny Images,
– Audio and Videos files,
– Downloading files from Internet,
– Greeting cards and many more.
Ethics In Information Tech.
Steps to help avoid Viruses
• Use an Internet firewall,
• Subscribe to industry standard antivirus
software,
• Never open an e-mail attachment from someone
you don't know,
• Scan each and every attachment,
• Rules to be followed, while surfing net
Ethics In Information Tech.
Computer Crime
• IT Infrastructure
• Illegal access
• Illegal Interuption
• Data Interfare
• System Interfrence
• Misuse Of Devices
• Electronic Fraud
Ethics In Information Tech.
TYPES OF COMPUTER CRIMES
• TARGET OF THE CRIME
• MEDIUM OF THE ATTACK
• TOOL
• INTIMIDATE OR DECEIVE
Ethics and Information Tech.
Types of Computer Criminal
• Outsiders
• Insiders
Ethics In Information Tech.
REASON FOR COMPUTER
CRIME
• ECONOMIC
• IDEOLOGICAL
• PSYCHOLOGICAL
• EGOCENTRIC
Ethics In Information Tech.
METHODS OF ATTACK
• DATA TAMPERING
• Programming Techniques
• OTHER METHODS
Ethics In Information Tech.
Software piracy and Hacking
Ethics In Information Tech.
What is
PIRACY???????
Reselling Media
 Downloading from a website
 Taping songs
Buying a used book or CD
Watching broadcast television but skipping commercials
Ethics In Information Tech.
Types of PIRACY
• End User Piracy
• Client – Server Piracy
• Internet Piracy
• Hard-Disk Piracy
• Software Counterfeiting
Ethics In Information Tech.
HACKER
• Some one who bypasses the system’s access controls by
taking advantage of security weaknesses left in the
system by developers .
• SYSTEM
Access confidential information
Threaten someone from YOUR computer
Broadcast your confidential letters or materials .
Store illegal material
Ethics In Information Tech.
Evils of Hacking
• Compromise the security of system without permission
from an authorized party, usually with the intent of
accessing computers connected to the network.
Ethics In Information Tech.
Advantages of Hacking
• To determine problem and weakness for program
• Creation of firewall
• Useful for military purpose and spying
• Better computer security
Ethics In Information Tech.
ETHICAL
DILEMMAS
AND
CONSIDERATIONS
Ethics In Information Tech.
Ethical dilemmas in IT
Dilemmas are discussed in relation to four
areas-
• Privacy
• Information accuracy
• Access to information
• Intellectual property rights
Ethics In Information Tech.
Ethical dilemmas in
relation to IT
• PLAGIARISM-The taking of ideas, writing and
drawings or other similar intellectual property
created by others and presenting it as your own.
• NETIQUETTE-A set of rules (mainly unwritten)
to follow while you are online.
Ethics In Information Tech.
HOW CAN WE STOP IT
• Internet crime prevention.
• Prevention of cyber crime
• Prevention of computer crime in banking
• IT security
• Computer crime prevention law
• Hi tech crime prevention law
• Computer crime preventing on line fraud
• World risk investigation and terrorist prevention
Ethics In Information Tech.
CONCLUSION
https://www.facebook.com/erwinglobio
https://www.facebook.com/erwinglobio
Ethics for IT Professionals

Mais conteúdo relacionado

Mais procurados

Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 

Mais procurados (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Ethics for IT Workers and IT Users
Ethics for IT Workers and IT UsersEthics for IT Workers and IT Users
Ethics for IT Workers and IT Users
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 
Software liability
Software liabilitySoftware liability
Software liability
 
The ten commandments of computer ethics
The ten commandments of computer ethicsThe ten commandments of computer ethics
The ten commandments of computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 

Destaque

Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
jvonschilling
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
Wish Mrt'xa
 
WORLD WAR 1 CAUSES AND EFFECTS
WORLD WAR 1 CAUSES AND EFFECTSWORLD WAR 1 CAUSES AND EFFECTS
WORLD WAR 1 CAUSES AND EFFECTS
Jason Pacaway
 

Destaque (9)

Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technology
 
Causes of WWI
Causes of WWICauses of WWI
Causes of WWI
 
The Causes, Consequences and Catastrophe of World War 1
The Causes, Consequences and Catastrophe of World War 1The Causes, Consequences and Catastrophe of World War 1
The Causes, Consequences and Catastrophe of World War 1
 
Collateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisationsCollateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisations
 
Towards a Capacity-Building and Apprenticeship Education within African Nations
Towards a Capacity-Building and Apprenticeship Education within African Nations Towards a Capacity-Building and Apprenticeship Education within African Nations
Towards a Capacity-Building and Apprenticeship Education within African Nations
 
WORLD WAR 1 CAUSES AND EFFECTS
WORLD WAR 1 CAUSES AND EFFECTSWORLD WAR 1 CAUSES AND EFFECTS
WORLD WAR 1 CAUSES AND EFFECTS
 

Semelhante a Ethics for IT Professionals

Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
CRM
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 a
kibrutry
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
Raffa Learning Community
 

Semelhante a Ethics for IT Professionals (20)

Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
9. Computer Ethics.ppt
9. Computer Ethics.ppt9. Computer Ethics.ppt
9. Computer Ethics.ppt
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
sc.pptx
sc.pptxsc.pptx
sc.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 a
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Cyber ethics.pptx
Cyber ethics.pptxCyber ethics.pptx
Cyber ethics.pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 
Hacking
HackingHacking
Hacking
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 

Mais de Prof. Erwin Globio

Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
Prof. Erwin Globio
 
Introduction to iOS Apps Development
Introduction to iOS Apps DevelopmentIntroduction to iOS Apps Development
Introduction to iOS Apps Development
Prof. Erwin Globio
 
Introduction to Android Development Latest
Introduction to Android Development LatestIntroduction to Android Development Latest
Introduction to Android Development Latest
Prof. Erwin Globio
 
iOS Apps Development (SQLite Tutorial Part 2)
iOS Apps Development (SQLite Tutorial Part 2)iOS Apps Development (SQLite Tutorial Part 2)
iOS Apps Development (SQLite Tutorial Part 2)
Prof. Erwin Globio
 
iOS Apps Development (SQLite Tutorial Part 1)
iOS Apps Development (SQLite Tutorial Part 1)iOS Apps Development (SQLite Tutorial Part 1)
iOS Apps Development (SQLite Tutorial Part 1)
Prof. Erwin Globio
 
Introduction to Computer Programming
Introduction to Computer ProgrammingIntroduction to Computer Programming
Introduction to Computer Programming
Prof. Erwin Globio
 

Mais de Prof. Erwin Globio (20)

Embedded System Presentation
Embedded System PresentationEmbedded System Presentation
Embedded System Presentation
 
BSCS | BSIT Thesis Guidelines
BSCS | BSIT Thesis GuidelinesBSCS | BSIT Thesis Guidelines
BSCS | BSIT Thesis Guidelines
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Networking Trends
Networking TrendsNetworking Trends
Networking Trends
 
Sq lite presentation
Sq lite presentationSq lite presentation
Sq lite presentation
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
Introduction to iOS Apps Development
Introduction to iOS Apps DevelopmentIntroduction to iOS Apps Development
Introduction to iOS Apps Development
 
Cloud Computing Latest
Cloud Computing LatestCloud Computing Latest
Cloud Computing Latest
 
Introduction to Android Development Latest
Introduction to Android Development LatestIntroduction to Android Development Latest
Introduction to Android Development Latest
 
iOS Apps Development (SQLite Tutorial Part 2)
iOS Apps Development (SQLite Tutorial Part 2)iOS Apps Development (SQLite Tutorial Part 2)
iOS Apps Development (SQLite Tutorial Part 2)
 
iOS Apps Development (SQLite Tutorial Part 1)
iOS Apps Development (SQLite Tutorial Part 1)iOS Apps Development (SQLite Tutorial Part 1)
iOS Apps Development (SQLite Tutorial Part 1)
 
A tutorial on C++ Programming
A tutorial on C++ ProgrammingA tutorial on C++ Programming
A tutorial on C++ Programming
 
Overview of C Language
Overview of C LanguageOverview of C Language
Overview of C Language
 
Introduction to Computer Programming
Introduction to Computer ProgrammingIntroduction to Computer Programming
Introduction to Computer Programming
 
Android Fragments
Android FragmentsAndroid Fragments
Android Fragments
 
Solutions to Common Android Problems
Solutions to Common Android ProblemsSolutions to Common Android Problems
Solutions to Common Android Problems
 
Android Development Tools and Installation
Android Development Tools and InstallationAndroid Development Tools and Installation
Android Development Tools and Installation
 
Java Collections Tutorials
Java Collections TutorialsJava Collections Tutorials
Java Collections Tutorials
 
Action Bar in Android
Action Bar in AndroidAction Bar in Android
Action Bar in Android
 
Resource Speaker
Resource SpeakerResource Speaker
Resource Speaker
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 

Último (20)

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Ethics for IT Professionals

  • 1. PROF. ERWIN M. GLOBIO, MSIT )
  • 2. • What is Ethics and Information Technology?? • Ethical issues relating to computer application • Security Threats – Computer Viruses – Cyber Crime – Software piracy and Hacking – Computer crime prevention – Ethical dilemmas and consideration Ethics In Information Tech.
  • 3. Ethics • Derived from the Greek word “ethos”, which means “custom”, “habit”, and “way of living” • Definition: "the discipline and practice of applying value to human behavior, resulting in meaningful conduct.“ Ethics In Information Tech.
  • 4. Computer Ethics • Computer ethics defined as the application of classical ethical principles to the use of computer technology. • Ethical problems related to computers: – Privacy •Computers create a false sense of security •People do not realize how vulnerable information stored on computers are – Property •Physical property •Intellectual property •Data as property Ethics In Information Tech.
  • 5. • Access – Access to computing technology – Access to data • Accuracy – Accuracy of information stored • Hacking, cracking and virus creation • Software piracy Ethics In Information Tech.
  • 6. The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. • 1) Thou shalt not use a computer to harm other people. • 2) Thou shalt not interfere with other people's computer work. • 3) Thou shalt not snoop around in other people's files. • 4) Thou shalt not use a computer to steal. • 5) Thou shalt not use a computer to bear false witness. Ethics In Information Tech.
  • 7. • 6) Thou shalt not use or copy software for which you have not paid. • 7) Thou shalt not use other people's computer resources without authorisation. • 8) Thou shalt not appropriate other people's intellectual output. • 9) Thou shalt think about the social consequences of the program you write. • 10) Thou shalt use a computer in ways that show consideration and respect. Ethics In Information Tech.
  • 8. What is Computer Virus? • Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. Ethics In Information Tech.
  • 9. Spreading of Virus • Virus are most easily spread, • Spread through E-mail Attachments, – Instant Messaging messages, – Funny Images, – Audio and Videos files, – Downloading files from Internet, – Greeting cards and many more. Ethics In Information Tech.
  • 10. Steps to help avoid Viruses • Use an Internet firewall, • Subscribe to industry standard antivirus software, • Never open an e-mail attachment from someone you don't know, • Scan each and every attachment, • Rules to be followed, while surfing net Ethics In Information Tech.
  • 11. Computer Crime • IT Infrastructure • Illegal access • Illegal Interuption • Data Interfare • System Interfrence • Misuse Of Devices • Electronic Fraud Ethics In Information Tech.
  • 12. TYPES OF COMPUTER CRIMES • TARGET OF THE CRIME • MEDIUM OF THE ATTACK • TOOL • INTIMIDATE OR DECEIVE Ethics and Information Tech.
  • 13. Types of Computer Criminal • Outsiders • Insiders Ethics In Information Tech.
  • 14. REASON FOR COMPUTER CRIME • ECONOMIC • IDEOLOGICAL • PSYCHOLOGICAL • EGOCENTRIC Ethics In Information Tech.
  • 15. METHODS OF ATTACK • DATA TAMPERING • Programming Techniques • OTHER METHODS Ethics In Information Tech.
  • 16. Software piracy and Hacking Ethics In Information Tech.
  • 17. What is PIRACY??????? Reselling Media  Downloading from a website  Taping songs Buying a used book or CD Watching broadcast television but skipping commercials Ethics In Information Tech.
  • 18. Types of PIRACY • End User Piracy • Client – Server Piracy • Internet Piracy • Hard-Disk Piracy • Software Counterfeiting Ethics In Information Tech.
  • 19. HACKER • Some one who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers . • SYSTEM Access confidential information Threaten someone from YOUR computer Broadcast your confidential letters or materials . Store illegal material Ethics In Information Tech.
  • 20. Evils of Hacking • Compromise the security of system without permission from an authorized party, usually with the intent of accessing computers connected to the network. Ethics In Information Tech.
  • 21. Advantages of Hacking • To determine problem and weakness for program • Creation of firewall • Useful for military purpose and spying • Better computer security Ethics In Information Tech.
  • 23. Ethical dilemmas in IT Dilemmas are discussed in relation to four areas- • Privacy • Information accuracy • Access to information • Intellectual property rights Ethics In Information Tech.
  • 24. Ethical dilemmas in relation to IT • PLAGIARISM-The taking of ideas, writing and drawings or other similar intellectual property created by others and presenting it as your own. • NETIQUETTE-A set of rules (mainly unwritten) to follow while you are online. Ethics In Information Tech.
  • 25. HOW CAN WE STOP IT • Internet crime prevention. • Prevention of cyber crime • Prevention of computer crime in banking • IT security • Computer crime prevention law • Hi tech crime prevention law • Computer crime preventing on line fraud • World risk investigation and terrorist prevention Ethics In Information Tech.
  • 27.