Tata AIG General Insurance Company - Insurer Innovation Award 2024
Online Ethics iPad Class Covers Privacy, Piracy, Internet Safety
1. ONLINE
ETHICS
iPad Introduction Class
Faculty of Creative Technology and Heritage
Universiti Malaysia Kelantan
2. • What is Ethics and Information Technology?
• Ethical issues relating to computer application
• Security Threats
– Computer Viruses
– Cyber Crime
– Software piracy and Hacking
– Computer crime prevention
– Ethical dilemmas and consideration
• Ethics in using the internet
Topics
3. • Derived from the Greek word “ethos”, which means
“custom”, “habit”, and “way of living”
• Definition: "the discipline and practice of applying
value to human behavior, resulting in meaningful
conduct.“
Ethics?
4. • Computer ethics defined as the application of
classical ethical principles to the use of computer
technology.
• Ethical problems related to computers:
– Privacy
• Computers create a false sense of security
• People do not realize how vulnerable
information stored on computers are
– Property
• Physical property
• Intellectual property
• Data as property
Computer ethics?
5. Computer ethics?
• Access
– Access to computing technology
– Access to data
• Accuracy
– Accuracy of information stored
• Hacking, cracking and virus creation
• Software piracy
7. As Defined by Computer Ethics Institute.
1. Do not use a computer to harm other people.
2. Do not interfere with other people's computer
work.
3. Do not snoop around in other people's files.
4. Do not use a computer to steal.
5. Do not use a computer to bear false witness.
The Ten Commandments of Computer Ethics
8. 6. Do not use or copy software for which you have
not paid.
7. Do not use other people's computer resources
without authorization.
8. Do not use other people's intellectual output.
9. Think about the social consequences of the
program you write.
10. Use a computer in ways that show consideration
and respect.
The Ten Commandments of Computer Ethics
10. Computer viruses are small
software programs that are
designed to spread from one
computer to another and to
interfere with computer operation.
Computer Virus?
11. • Virus are most easily spread,
• Spread through E-mail Attachments,
– Instant Messaging messages,
– Funny Images,
– Audio and Videos files,
– Downloading files from Internet,
– Greeting cards and many more.
Spreading of Virus
12. • Use an Internet firewall
• Subscribe to industry standard antivirus software
• Never open an e-mail attachment from someone you
don't know
• Scan each and every attachment
• Rules to be followed, while surfing net
• Always update the databases
• Avoid copying folder(s),untrusted files like keygen,
crack files etc
Steps to Avoid Viruses
13. • IT Infrastructure
• Illegal access
• Illegal Interruption
• Data Interfere
• System Interference
• Misuse Of Devices
• Electronic Fraud
Computer Crime
14. • Target of the crime
• Medium of the Attack
• Tool
• Intimidate or Deceive
Type Computer Crimes
17. • Data tempering
• Programming techniques
• Other method
Methods od Attack
18. • Reselling media
• Downloading from a website without permission
• Taping songs
• Buying a used book or CD
• Watching broadcast television but skipping
commercials
What is Piracy
19. • End User Piracy
• Client – Server Piracy
• Internet Piracy
• Hard-Disk Piracy
• Software Counterfeiting
Reason for Computer Crime
20. • Some one who bypasses the system’s access
controls by taking advantage of security
weaknesses left in the system by developers
• System penetration
• Access confidential information
• Threaten someone from your computer
• Broadcast your confidential letters or materials .
• Store illegal material
• Stalking privacy or personal data
Hacker
21. Compromise the security of system
without permission from an
authorized party, usually with the
intent of accessing computers
connected to the network.
Evils of Hacking
22. • To determine problem and weakness for program
• Creation of firewall
• Useful for military purpose and spying
• Better computer security
Advantages of Hacking
23. Dilemmas are discussed in relation to four areas-
• Privacy
• Information accuracy
• Access to information
• Intellectual property rights
Ethical Dilemmas in it…
24. • PLAGIARISM-The taking of ideas, writing and
drawings or other similar intellectual property
created by others and presenting it as your own.
• NETIQUETTE-A set of rules (mainly unwritten) to
follow while you are online.
Ethical Dilemmas in It…
25. • Internet crime prevention.
• Prevention of cyber crime
• Prevention of computer crime in banking
• IT security
• Computer crime prevention law
• Hi tech crime prevention law
• Computer crime preventing on line fraud
• World risk investigation and terrorist prevention
How can We Stop It
27. Internet ethics means acceptable behavior for using
internet.
We should be honest, respect the rights and
property of others on the internet
Internet Ethics
28. Internet Ethics
Acceptance
One has to accept that Internet is not a value free-zone.
It means World Wide Web is a place where values are
considered in the broadest sense so we must take
care while shaping content and services and we
should recognize that internet is not apart from
universal society but it is a primary component of it.
29. Sensitivity to National and Local cultures
It belongs to all and there is no barrier of national and
local cultures. It cannot be subject to one set of values
like the local TV channel or the local newspaper we
have to accommodate multiplicity of usage.
Internet Ethics
30. Internet Ethics
While using e-mail and chatting
Internet must be used for communication with family
and friends. Avoid chatting with strangers and
forwarding e-mails from unknown people /strangers.
We must be aware of risks involved in chatting and
forwarding e-mails to strangers.
31. Internet Ethics
Pretending to be someone else
We must not use internet to fool others by pretending
to be someone else.
Hiding our own identity to fool others in the Internet
world is a crime and may also be a risk to others.
32. Internet Ethics
Avoid Bad language
We must not use rude or bad language while using e-
Mail, chatting, blogging and social networking,
We need to respect their views and should not
criticize anyone on the internet.
33. Internet Ethics
Hide personal information
We should not give personal details like home
address, phone numbers, interests, passwords.
No photographs should be sent to strangers because it
might be misused and shared with others without
their knowledge.
34. Internet Ethics
While Downloading
Internet is used to listen and learn about music.
It is also used to watch videos and play games we
must not use it to download them or share
copyrighted material.
We must be aware of the importance of copyrights
and issues of copyright.
35. Internet Ethics
Access to Internet
The internet is a time-efficient tool for everyone that
enlarges the possibilities for curriculum growth.
Learning depends on the ability to find relevant and
reliable information quickly and easily, and to select,
understand and assess that information. Searching for
information on the internet can help to develop these
skills.
36. Internet Ethics
Access to Internet
Classroom exercises and take-home assessment tasks,
where students are required to compare website
content, are ideal for alerting students to the
requirements of writing for different audiences, the
purpose of particular content, identifying and judging
accuracy and reliability. Since many sites adopt
particular views about issues, the internet is a useful
tool for developing the skills of distinguishing fact
from opinion and exploring subjectivity and
objectivity.