SlideShare uma empresa Scribd logo
1 de 8
Cyber Ethics NurulFifiAmalinabtMohdHashim ASD4T PuanHjhFazilah
Definition  Cyber ethics is the ethics applied to the online environment. The treatment of what is and is not cyber-ethical behavior may vary from place to place. Cyber ethics is a code of behavior for using the Internet. One easy way to think about cyber ethics and to address the subject with children is this: acceptable behavior on the Internet is very much the same as acceptable behavior in everyday life.  Cyber-Ethics is the Ethics applied to the online environment. The treatment of what is and is not cyber-ethical behavior may vary from place to place Manners applied to the Internet and the use of technology in everyday situations
Do & don’t in cyber ethics
Do & don’t in cyber ethics
Rules of cyber Do not use rude or offensive language.  Don’t be a bully on the Internet. Do not call people names, lie about them, send embarrassing pictures of them, or do anything else to try to hurt them.  Do not copy information from the Internet and claim it as yours. That is called plagiarism.  Adhere to copyright restrictions when downloading material including software, games, movies, or music from the Internet.  Do not break into someone else’s computer.  Do not use someone else’s password.  Do not attempt to infect or in any way try to make someone else’s computer unusable. 
Faults in cyber  Appropriate other people’s intellectual property (IP)  Ignore the social and legal consequences related to the software program one is writing or the computer system one is designing  Illegally copy or use proprietary software that has not been paid for or for which credit has not been given  Interfere with others computer or online work  Snoop into or alter others computer files or data  Use a computer to bear false witness  Use a computer to cause harm to others  Use others computer resources without prior authorization  Use the computer in ways that ignore the consideration of and respect for fellow human beings
Conclusion Cyber ethics is important in cyber life. Although cyber world is not in reality life, but we have to follow the ethics. For example, don’t take other people work and make it like your own work. You should credit to them. Moreover, when people follow the rules, there is no misunderstood in cyber world. People will respect each other even in cyber world.
References http://us.norton.com/library/familyresource/article.jsp?aid=pr_cyberethics http://iris.nyit.edu/~mtehrani/Week2_assignment1_MTehrani.pdf http://computer.yourdictionary.com/cyber-etiquette

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationCyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer Application
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 

Destaque

Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldRownel Cerezo Gagani
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guest9e3d59
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Rakshit Sharma
 
Ethics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesEthics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesAysha Rahman
 
A Journey Into Cyberspace
A Journey Into CyberspaceA Journey Into Cyberspace
A Journey Into CyberspaceTim Bass
 

Destaque (19)

Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Ethical issues in cyberspace
Ethical issues in cyberspaceEthical issues in cyberspace
Ethical issues in cyberspace
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber law
Cyber lawCyber law
Cyber law
 
Inpage presentation
Inpage presentationInpage presentation
Inpage presentation
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
In-page Urdu Features
In-page Urdu FeaturesIn-page Urdu Features
In-page Urdu Features
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
 
Inpage
InpageInpage
Inpage
 
Inpage
InpageInpage
Inpage
 
Ethics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesEthics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage rates
 
A Journey Into Cyberspace
A Journey Into CyberspaceA Journey Into Cyberspace
A Journey Into Cyberspace
 
Cs106 professional-ethics
Cs106 professional-ethicsCs106 professional-ethics
Cs106 professional-ethics
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 

Semelhante a Cyber ethics

Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rulesMazni Salleh
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2opiedog1
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Ten commandments
Ten commandmentsTen commandments
Ten commandmentslsanford84
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)Maria Obaidi
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictAnwar Jesus Esperida
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquettedhabyahalk
 

Semelhante a Cyber ethics (20)

Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Online ethics
Online ethicsOnline ethics
Online ethics
 

Último

Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 

Último (20)

Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Cyber ethics

  • 2. Definition Cyber ethics is the ethics applied to the online environment. The treatment of what is and is not cyber-ethical behavior may vary from place to place. Cyber ethics is a code of behavior for using the Internet. One easy way to think about cyber ethics and to address the subject with children is this: acceptable behavior on the Internet is very much the same as acceptable behavior in everyday life.  Cyber-Ethics is the Ethics applied to the online environment. The treatment of what is and is not cyber-ethical behavior may vary from place to place Manners applied to the Internet and the use of technology in everyday situations
  • 3. Do & don’t in cyber ethics
  • 4. Do & don’t in cyber ethics
  • 5. Rules of cyber Do not use rude or offensive language.  Don’t be a bully on the Internet. Do not call people names, lie about them, send embarrassing pictures of them, or do anything else to try to hurt them.  Do not copy information from the Internet and claim it as yours. That is called plagiarism.  Adhere to copyright restrictions when downloading material including software, games, movies, or music from the Internet.  Do not break into someone else’s computer.  Do not use someone else’s password.  Do not attempt to infect or in any way try to make someone else’s computer unusable. 
  • 6. Faults in cyber Appropriate other people’s intellectual property (IP) Ignore the social and legal consequences related to the software program one is writing or the computer system one is designing Illegally copy or use proprietary software that has not been paid for or for which credit has not been given Interfere with others computer or online work Snoop into or alter others computer files or data Use a computer to bear false witness Use a computer to cause harm to others Use others computer resources without prior authorization Use the computer in ways that ignore the consideration of and respect for fellow human beings
  • 7. Conclusion Cyber ethics is important in cyber life. Although cyber world is not in reality life, but we have to follow the ethics. For example, don’t take other people work and make it like your own work. You should credit to them. Moreover, when people follow the rules, there is no misunderstood in cyber world. People will respect each other even in cyber world.