SlideShare uma empresa Scribd logo
1 de 37
ONLINE 
ETHICS 
iPad Introduction Class 
Faculty of Creative Technology and Heritage 
Universiti Malaysia Kelantan
• What is Ethics and Information Technology? 
• Ethical issues relating to computer application 
• Security Threats 
– Computer Viruses 
– Cyber Crime 
– Software piracy and Hacking 
– Computer crime prevention 
– Ethical dilemmas and consideration 
• Ethics in using the internet 
Topics
• Derived from the Greek word “ethos”, which means 
“custom”, “habit”, and “way of living” 
• Definition: "the discipline and practice of applying 
value to human behavior, resulting in meaningful 
conduct.“ 
Ethics?
• Computer ethics defined as the application of 
classical ethical principles to the use of computer 
technology. 
• Ethical problems related to computers: 
– Privacy 
• Computers create a false sense of security 
• People do not realize how vulnerable 
information stored on computers are 
– Property 
• Physical property 
• Intellectual property 
• Data as property 
Computer ethics?
Computer ethics? 
• Access 
– Access to computing technology 
– Access to data 
• Accuracy 
– Accuracy of information stored 
• Hacking, cracking and virus creation 
• Software piracy
Computer 
ETHICS
As Defined by Computer Ethics Institute. 
1. Do not use a computer to harm other people. 
2. Do not interfere with other people's computer 
work. 
3. Do not snoop around in other people's files. 
4. Do not use a computer to steal. 
5. Do not use a computer to bear false witness. 
The Ten Commandments of Computer Ethics
6. Do not use or copy software for which you have 
not paid. 
7. Do not use other people's computer resources 
without authorization. 
8. Do not use other people's intellectual output. 
9. Think about the social consequences of the 
program you write. 
10. Use a computer in ways that show consideration 
and respect. 
The Ten Commandments of Computer Ethics
Security 
THREATS 
THE PRECAUTION
Computer viruses are small 
software programs that are 
designed to spread from one 
computer to another and to 
interfere with computer operation. 
Computer Virus?
• Virus are most easily spread, 
• Spread through E-mail Attachments, 
– Instant Messaging messages, 
– Funny Images, 
– Audio and Videos files, 
– Downloading files from Internet, 
– Greeting cards and many more. 
Spreading of Virus
• Use an Internet firewall 
• Subscribe to industry standard antivirus software 
• Never open an e-mail attachment from someone you 
don't know 
• Scan each and every attachment 
• Rules to be followed, while surfing net 
• Always update the databases 
• Avoid copying folder(s),untrusted files like keygen, 
crack files etc 
Steps to Avoid Viruses
• IT Infrastructure 
• Illegal access 
• Illegal Interruption 
• Data Interfere 
• System Interference 
• Misuse Of Devices 
• Electronic Fraud 
Computer Crime
• Target of the crime 
• Medium of the Attack 
• Tool 
• Intimidate or Deceive 
Type Computer Crimes
• Outsiders 
• Insiders 
Type Computer Crimes
• Economic 
• Ideological 
• Psychological 
• Egocentric 
Reason for Computer Crime
• Data tempering 
• Programming techniques 
• Other method 
Methods od Attack
• Reselling media 
• Downloading from a website without permission 
• Taping songs 
• Buying a used book or CD 
• Watching broadcast television but skipping 
commercials 
What is Piracy
• End User Piracy 
• Client – Server Piracy 
• Internet Piracy 
• Hard-Disk Piracy 
• Software Counterfeiting 
Reason for Computer Crime
• Some one who bypasses the system’s access 
controls by taking advantage of security 
weaknesses left in the system by developers 
• System penetration 
• Access confidential information 
• Threaten someone from your computer 
• Broadcast your confidential letters or materials . 
• Store illegal material 
• Stalking privacy or personal data 
Hacker
Compromise the security of system 
without permission from an 
authorized party, usually with the 
intent of accessing computers 
connected to the network. 
Evils of Hacking
• To determine problem and weakness for program 
• Creation of firewall 
• Useful for military purpose and spying 
• Better computer security 
Advantages of Hacking
Dilemmas are discussed in relation to four areas- 
• Privacy 
• Information accuracy 
• Access to information 
• Intellectual property rights 
Ethical Dilemmas in it…
• PLAGIARISM-The taking of ideas, writing and 
drawings or other similar intellectual property 
created by others and presenting it as your own. 
• NETIQUETTE-A set of rules (mainly unwritten) to 
follow while you are online. 
Ethical Dilemmas in It…
• Internet crime prevention. 
• Prevention of cyber crime 
• Prevention of computer crime in banking 
• IT security 
• Computer crime prevention law 
• Hi tech crime prevention law 
• Computer crime preventing on line fraud 
• World risk investigation and terrorist prevention 
How can We Stop It
ETHICS in using 
INTERNET 
BEHAVE WHEN ONLINE
Internet ethics means acceptable behavior for using 
internet. 
We should be honest, respect the rights and 
property of others on the internet 
Internet Ethics
Internet Ethics 
Acceptance 
One has to accept that Internet is not a value free-zone. 
It means World Wide Web is a place where values are 
considered in the broadest sense so we must take 
care while shaping content and services and we 
should recognize that internet is not apart from 
universal society but it is a primary component of it.
Sensitivity to National and Local cultures 
It belongs to all and there is no barrier of national and 
local cultures. It cannot be subject to one set of values 
like the local TV channel or the local newspaper we 
have to accommodate multiplicity of usage. 
Internet Ethics
Internet Ethics 
While using e-mail and chatting 
Internet must be used for communication with family 
and friends. Avoid chatting with strangers and 
forwarding e-mails from unknown people /strangers. 
We must be aware of risks involved in chatting and 
forwarding e-mails to strangers.
Internet Ethics 
Pretending to be someone else 
We must not use internet to fool others by pretending 
to be someone else. 
Hiding our own identity to fool others in the Internet 
world is a crime and may also be a risk to others.
Internet Ethics 
Avoid Bad language 
We must not use rude or bad language while using e- 
Mail, chatting, blogging and social networking, 
We need to respect their views and should not 
criticize anyone on the internet.
Internet Ethics 
Hide personal information 
We should not give personal details like home 
address, phone numbers, interests, passwords. 
No photographs should be sent to strangers because it 
might be misused and shared with others without 
their knowledge.
Internet Ethics 
While Downloading 
Internet is used to listen and learn about music. 
It is also used to watch videos and play games we 
must not use it to download them or share 
copyrighted material. 
We must be aware of the importance of copyrights 
and issues of copyright.
Internet Ethics 
Access to Internet 
The internet is a time-efficient tool for everyone that 
enlarges the possibilities for curriculum growth. 
Learning depends on the ability to find relevant and 
reliable information quickly and easily, and to select, 
understand and assess that information. Searching for 
information on the internet can help to develop these 
skills.
Internet Ethics 
Access to Internet 
Classroom exercises and take-home assessment tasks, 
where students are required to compare website 
content, are ideal for alerting students to the 
requirements of writing for different audiences, the 
purpose of particular content, identifying and judging 
accuracy and reliability. Since many sites adopt 
particular views about issues, the internet is a useful 
tool for developing the skills of distinguishing fact 
from opinion and exploring subjectivity and 
objectivity.
THANK YOU 
iPad Introduction Class

Mais conteúdo relacionado

Mais procurados

Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsAngelito Quiambao
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content DevelopmentAngelito Quiambao
 
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Arniel Ping
 
Online Search and Research Skills - Empowerment Technologies
Online Search and Research Skills - Empowerment TechnologiesOnline Search and Research Skills - Empowerment Technologies
Online Search and Research Skills - Empowerment TechnologiesMark Jhon Oxillo
 
Opportunities, Challenges and Power of Media Information
Opportunities, Challenges and Power of Media InformationOpportunities, Challenges and Power of Media Information
Opportunities, Challenges and Power of Media InformationHazel Lorenzo
 
Opportunities and Challenges of Media and Information - Media and Information...
Opportunities and Challenges of Media and Information - Media and Information...Opportunities and Challenges of Media and Information - Media and Information...
Opportunities and Challenges of Media and Information - Media and Information...Mark Jhon Oxillo
 
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptxONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptxMeiaGuzman1
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfkenneth218994
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Netiquette powerpointbooth
Netiquette powerpointboothNetiquette powerpointbooth
Netiquette powerpointboothkabooth
 
Chuaa51: The History of Internet in the Philippines
Chuaa51: The History of Internet in the PhilippinesChuaa51: The History of Internet in the Philippines
Chuaa51: The History of Internet in the Philippinesmaxseenu
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Arniel Ping
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Arniel Ping
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
ICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment TechnologiesICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment TechnologiesMark Jhon Oxillo
 

Mais procurados (20)

Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
 
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
 
Online Search and Research Skills - Empowerment Technologies
Online Search and Research Skills - Empowerment TechnologiesOnline Search and Research Skills - Empowerment Technologies
Online Search and Research Skills - Empowerment Technologies
 
Opportunities, Challenges and Power of Media Information
Opportunities, Challenges and Power of Media InformationOpportunities, Challenges and Power of Media Information
Opportunities, Challenges and Power of Media Information
 
Opportunities and Challenges of Media and Information - Media and Information...
Opportunities and Challenges of Media and Information - Media and Information...Opportunities and Challenges of Media and Information - Media and Information...
Opportunities and Challenges of Media and Information - Media and Information...
 
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptxONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdf
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Netiquette powerpointbooth
Netiquette powerpointboothNetiquette powerpointbooth
Netiquette powerpointbooth
 
Chuaa51: The History of Internet in the Philippines
Chuaa51: The History of Internet in the PhilippinesChuaa51: The History of Internet in the Philippines
Chuaa51: The History of Internet in the Philippines
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
ICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment TechnologiesICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment Technologies
 

Destaque

Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Chapter 1 Ethics
Chapter 1  EthicsChapter 1  Ethics
Chapter 1 Ethicswraithxjmin
 
Social Networks Hc1
Social Networks Hc1Social Networks Hc1
Social Networks Hc1Ernst Phaff
 
Customer Media & Social Networks
Customer Media & Social NetworksCustomer Media & Social Networks
Customer Media & Social NetworksJeroen Mirck
 
Social Networks Sjors Timmer
Social Networks Sjors TimmerSocial Networks Sjors Timmer
Social Networks Sjors TimmerSjors Timmer
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rulesMazni Salleh
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the InternetPhil Bradley
 
Islamic ethics of using the internet
Islamic ethics of using the internetIslamic ethics of using the internet
Islamic ethics of using the internetMomina Mateen
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and SecurityAlex Hyer
 
Chapter 2: Ethics
Chapter 2: EthicsChapter 2: Ethics
Chapter 2: Ethicsdmeyeravc
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 

Destaque (20)

Ethics online
Ethics onlineEthics online
Ethics online
 
Illegal downloading
Illegal downloadingIllegal downloading
Illegal downloading
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Chapter 1 Ethics
Chapter 1  EthicsChapter 1  Ethics
Chapter 1 Ethics
 
Social Networks Hc1
Social Networks Hc1Social Networks Hc1
Social Networks Hc1
 
Customer Media & Social Networks
Customer Media & Social NetworksCustomer Media & Social Networks
Customer Media & Social Networks
 
Social Networks Sjors Timmer
Social Networks Sjors TimmerSocial Networks Sjors Timmer
Social Networks Sjors Timmer
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
Audio&Video
Audio&VideoAudio&Video
Audio&Video
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Ethics & Etiquette Online
Ethics & Etiquette OnlineEthics & Etiquette Online
Ethics & Etiquette Online
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Islamic ethics of using the internet
Islamic ethics of using the internetIslamic ethics of using the internet
Islamic ethics of using the internet
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Chapter 2: Ethics
Chapter 2: EthicsChapter 2: Ethics
Chapter 2: Ethics
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 

Semelhante a Online Ethics iPad Class Covers Privacy, Piracy, Internet Safety

Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxJCGonzaga1
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxCatherineBagaan
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptxMuruganS82
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challengesCRM
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 

Semelhante a Online Ethics iPad Class Covers Privacy, Piracy, Internet Safety (20)

Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptx
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Online Ethics iPad Class Covers Privacy, Piracy, Internet Safety

  • 1. ONLINE ETHICS iPad Introduction Class Faculty of Creative Technology and Heritage Universiti Malaysia Kelantan
  • 2. • What is Ethics and Information Technology? • Ethical issues relating to computer application • Security Threats – Computer Viruses – Cyber Crime – Software piracy and Hacking – Computer crime prevention – Ethical dilemmas and consideration • Ethics in using the internet Topics
  • 3. • Derived from the Greek word “ethos”, which means “custom”, “habit”, and “way of living” • Definition: "the discipline and practice of applying value to human behavior, resulting in meaningful conduct.“ Ethics?
  • 4. • Computer ethics defined as the application of classical ethical principles to the use of computer technology. • Ethical problems related to computers: – Privacy • Computers create a false sense of security • People do not realize how vulnerable information stored on computers are – Property • Physical property • Intellectual property • Data as property Computer ethics?
  • 5. Computer ethics? • Access – Access to computing technology – Access to data • Accuracy – Accuracy of information stored • Hacking, cracking and virus creation • Software piracy
  • 7. As Defined by Computer Ethics Institute. 1. Do not use a computer to harm other people. 2. Do not interfere with other people's computer work. 3. Do not snoop around in other people's files. 4. Do not use a computer to steal. 5. Do not use a computer to bear false witness. The Ten Commandments of Computer Ethics
  • 8. 6. Do not use or copy software for which you have not paid. 7. Do not use other people's computer resources without authorization. 8. Do not use other people's intellectual output. 9. Think about the social consequences of the program you write. 10. Use a computer in ways that show consideration and respect. The Ten Commandments of Computer Ethics
  • 9. Security THREATS THE PRECAUTION
  • 10. Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. Computer Virus?
  • 11. • Virus are most easily spread, • Spread through E-mail Attachments, – Instant Messaging messages, – Funny Images, – Audio and Videos files, – Downloading files from Internet, – Greeting cards and many more. Spreading of Virus
  • 12. • Use an Internet firewall • Subscribe to industry standard antivirus software • Never open an e-mail attachment from someone you don't know • Scan each and every attachment • Rules to be followed, while surfing net • Always update the databases • Avoid copying folder(s),untrusted files like keygen, crack files etc Steps to Avoid Viruses
  • 13. • IT Infrastructure • Illegal access • Illegal Interruption • Data Interfere • System Interference • Misuse Of Devices • Electronic Fraud Computer Crime
  • 14. • Target of the crime • Medium of the Attack • Tool • Intimidate or Deceive Type Computer Crimes
  • 15. • Outsiders • Insiders Type Computer Crimes
  • 16. • Economic • Ideological • Psychological • Egocentric Reason for Computer Crime
  • 17. • Data tempering • Programming techniques • Other method Methods od Attack
  • 18. • Reselling media • Downloading from a website without permission • Taping songs • Buying a used book or CD • Watching broadcast television but skipping commercials What is Piracy
  • 19. • End User Piracy • Client – Server Piracy • Internet Piracy • Hard-Disk Piracy • Software Counterfeiting Reason for Computer Crime
  • 20. • Some one who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers • System penetration • Access confidential information • Threaten someone from your computer • Broadcast your confidential letters or materials . • Store illegal material • Stalking privacy or personal data Hacker
  • 21. Compromise the security of system without permission from an authorized party, usually with the intent of accessing computers connected to the network. Evils of Hacking
  • 22. • To determine problem and weakness for program • Creation of firewall • Useful for military purpose and spying • Better computer security Advantages of Hacking
  • 23. Dilemmas are discussed in relation to four areas- • Privacy • Information accuracy • Access to information • Intellectual property rights Ethical Dilemmas in it…
  • 24. • PLAGIARISM-The taking of ideas, writing and drawings or other similar intellectual property created by others and presenting it as your own. • NETIQUETTE-A set of rules (mainly unwritten) to follow while you are online. Ethical Dilemmas in It…
  • 25. • Internet crime prevention. • Prevention of cyber crime • Prevention of computer crime in banking • IT security • Computer crime prevention law • Hi tech crime prevention law • Computer crime preventing on line fraud • World risk investigation and terrorist prevention How can We Stop It
  • 26. ETHICS in using INTERNET BEHAVE WHEN ONLINE
  • 27. Internet ethics means acceptable behavior for using internet. We should be honest, respect the rights and property of others on the internet Internet Ethics
  • 28. Internet Ethics Acceptance One has to accept that Internet is not a value free-zone. It means World Wide Web is a place where values are considered in the broadest sense so we must take care while shaping content and services and we should recognize that internet is not apart from universal society but it is a primary component of it.
  • 29. Sensitivity to National and Local cultures It belongs to all and there is no barrier of national and local cultures. It cannot be subject to one set of values like the local TV channel or the local newspaper we have to accommodate multiplicity of usage. Internet Ethics
  • 30. Internet Ethics While using e-mail and chatting Internet must be used for communication with family and friends. Avoid chatting with strangers and forwarding e-mails from unknown people /strangers. We must be aware of risks involved in chatting and forwarding e-mails to strangers.
  • 31. Internet Ethics Pretending to be someone else We must not use internet to fool others by pretending to be someone else. Hiding our own identity to fool others in the Internet world is a crime and may also be a risk to others.
  • 32. Internet Ethics Avoid Bad language We must not use rude or bad language while using e- Mail, chatting, blogging and social networking, We need to respect their views and should not criticize anyone on the internet.
  • 33. Internet Ethics Hide personal information We should not give personal details like home address, phone numbers, interests, passwords. No photographs should be sent to strangers because it might be misused and shared with others without their knowledge.
  • 34. Internet Ethics While Downloading Internet is used to listen and learn about music. It is also used to watch videos and play games we must not use it to download them or share copyrighted material. We must be aware of the importance of copyrights and issues of copyright.
  • 35. Internet Ethics Access to Internet The internet is a time-efficient tool for everyone that enlarges the possibilities for curriculum growth. Learning depends on the ability to find relevant and reliable information quickly and easily, and to select, understand and assess that information. Searching for information on the internet can help to develop these skills.
  • 36. Internet Ethics Access to Internet Classroom exercises and take-home assessment tasks, where students are required to compare website content, are ideal for alerting students to the requirements of writing for different audiences, the purpose of particular content, identifying and judging accuracy and reliability. Since many sites adopt particular views about issues, the internet is a useful tool for developing the skills of distinguishing fact from opinion and exploring subjectivity and objectivity.
  • 37. THANK YOU iPad Introduction Class