Computer
Ethics
 Computer ethics are morally acceptable use of computers.
 i.e. using computers appropriately
 Standards or guidelines are important in this industry,
because technology changes are outstripping the legal
system’s ability to keep up.
 Cyber-ethics:
The study of moral, legal, and social issues involving
cybertechnology
Computer Ethics
 Computers in the Workplace
 Computer Crime
 Privacy and Anonymity
 Intellectual Property
 Professional Responsibility
 Computers as an engineering tool
 Autonomous computers
 Other issues
Computer Ethics Issues
LOST JOBS: Economic incentives to replace humans with
computerized devices are very high
NEW JOBS: Computer industry already has generated a
wide variety of new jobs
ALTERED JOBS:
“de-skilling”
New skilled jobs
Computers in the Workplace
Four primary issues
Privacy – responsibility to protect data about individuals
Accuracy - responsibility of data collectors to authenticate
information and ensure its accuracy
Property - who owns information and software and how can
they be sold and exchanged
Access - responsibility of data collectors to control access and
determine what information a person has the right to obtain about
others and how the information can be used
Computer Ethics – Primary Issues
Spreading information without consent
Some large companies use medical records and credit records
as a factor in important personnel decisions
Spreading inaccurate information
Mistakes in one computer file can easily migrate to others
Inaccurate data may linger for years
Problems with Large Databases
Internet issues
Inflammatory interchange of messages via internet (email, chat
rooms, etc.)
Chain mail
Virus warning hoaxes
“Spam” – unsolicited, bulk email
Information on internet includes hate, violence, and information
that is harmful for children
• How much of this should be regulated?
• Do filters solve problems or create more?
Is web site information used for course work and research
reliable?
Internet Content Issues
Privacy
Inappropriate access
Hacking
Ethical hacking
Legal responses
• Free Software Foundation –
Software ownership should not be allowed at all.
One can own the following aspects of a program:
• source code
• object code
• algorithm
• look and feel
Copyright infringement
IPR
 Software developers (or the companies they work for) own their
programs.
 Software buyers only own the right to use the software according to
the license agreement.
 No copying, reselling, lending, renting, leasing, or distributing is legal
without the software owner’s permission.
Copyright Laws
 There are four types of software licenses:
 Public Domain
 Freeware
 Shareware
 All Rights Reserved
Software Licenses
 Public domain software has no owner and is not protected by
copyright law.
 It was either created with public funds, or the ownership was
forfeited by the creator.
 Can be copied, sold, and/or modified
 Often is of poor quality/unreliable
Public Domain License
 Freeware is copyrighted software that is licensed to be copied and
distributed without charge.
 Freeware is free, but it’s still under the owner’s control.
 Examples:
 Eudora Light
 Netscape
Freeware License
• A shareware software license allows you to use the software for a
trial period, but you must pay a registration fee to the owner for
permanent use.
• Some shareware trials expire on a certain date
• Payment depends on the honor system
• Purchasing (the right to use) the software may also get you a
version with more powerful features and published documentation.
Shareware License
 May be used by the purchaser according the exact details spelled
out in the license agreement.
 You can’t legally use it--or even possess it-- without the owner’s
permission.
All Rights Reserved License
 SPA (Software Publishers Association) polices software piracy and
mainly targets:
 Illegal duplication
 Sale of copyrighted software
 Companies that purchase single copies and load the software on multiple
computers or networks
 They rely on whistle-blowers.
 Penalties (for primary user of PC) may include fines up to $250,000
and/or imprisonment up to 5 years in jail
Software Piracy
• Bug-free software is difficult to produce
• It must be carefully designed, developed, and tested
• Mistakes generated by computers can be far reaching
• Commenting and documenting software is required for effective
maintenance throughout the life of the program
System Quality
5 aspects of computer crime
Malicious kinds of software, or "programmed threats", provide a significant
challenge to computer security.
"viruses
"worms"
"Trojan horses"
"logic bombs"
"bacteria" or "rabbits" which multiply rapidly and fill up the computer's memory.
Computer crimes, such as / embezzlement or planting of logic bombs /, are
normally committed by /trusted personnel/ who have permission to use
the computer system. Computer security, therefore, must also be concerned
with the actions of trusted computer users.
COMPUTER CRIME can be costly for cleanup and investigation
Computer Crime
• Computer criminals -using a computer to commit an illegal act
• Who are computer criminals?
• Employees – disgruntled or dishonest --the largest category
• Outside users - customers or suppliers
• “Hackers” and “crackers” - hackers do it “for fun” but crackers have
malicious intent
• Organized crime - tracking illegal enterprises, forgery, counterfeiting
Computer Crime
• Damage to computers, programs or files
• Viruses - migrate through systems attached to files and programs
• Worms - continuously self-replicate
• Theft
• Of hardware, software, data, computer time
• Software piracy - unauthorized copies of copyrighted material
• View/Manipulation
• “Unauthorized entry” and “harmless message” still illegal
Types of Computer Crime
Computers as an Engineering Tool
• Computer Design Tools
• Integration of Computers into Engineered Systems
Autonomous Computers
• Autonomy refers to the ability of a computer to make decisions
without the intervention of humans.
• Stock trading
• Military weapons
Computer ethics: other issues
• Health Conditions.
Engineers who supervise computer personnel or design computer terminals
should check that ergonomic considerations are in effect to reduce back
problems,
provide wrist support, offer good keyboard layouts to prevent carpal tunnel
syndrome, and offer good lighting and flicker control.
• Computer Failures.
Failures can occur because of errors in hardware or software. Hardware errors do
not occur often, and when they do they usually do so quite obviously. An exception
was Intel’s highly touted Pentium chip, introduced in 1993. It produced very slight
and rare errors in floating-point arithmetic. Perhaps more serious was the loss of
confidence Intel suffered by not revealing the error before it was detected by a
user.
 Rapid Change:
 Reduced response time to competition
 Maintaining Boundaries:
 Family, work, leisure
 Dependence And Vulnerability
 Employment:
 Re-engineering job loss
 Equity & Access:
 Increasing gap between haves and have nots
 Health Issues
Quality of Life Issues
 Ergonomics:
 helps computer users to avoid physical and mental health risks
 and to increase productivity
 Avoid eyestrain and headache
 Take regular breaks every couple of hours
 Control ambient light and insure adequate monitor brightness
 Avoid back and neck pain
 Have adjustable equipment with adequate back support
 Keep monitor at, or slightly below eye level
Ergonomics and Physical Health Issues
• Avoid effects of electromagnetic fields (VDT radiation)
• Possible connection to miscarriages and cancers, but no statistical support
yet
• Use caution if pregnant
• Avoid repetitive strain injury (RSI)
• Injuries from fast, repetitive work
• Carpal tunnel syndrome (CTS) - nerve and tendon damage in hands and
wrists
Physical Health Issues
• Microcomputers are the greatest user of electricity in the
workplace
• “Green” PCs
• System unit and display - minimize unnecessary energy consumption and
power down when not in use
• Manufacturing - avoids harmful chemicals in production, focus on
chlorofluorocarbons (CFC’s) which some blame for ozone layer depletion
The Environment
• Conserve
• Turn computers off at end of work day
• Use screen savers
• Recycle
• Most of the paper we use is eligible
• Dispose of old parts via recycling programs – most computer parts are dangerous
in landfills
• Educate
• Know the facts about ecological issues
Personal Responsibility of Users
• Computer professionals find themselves in a variety of professional
relationships with other people.
• Association for Computing Machinery (ACM) and the Institute of Electrical
and Electronic Engineers (IEEE), have established codes of ethics, curriculum
guidelines and accreditation requirements.
Professional Responsibility and Code of Ethics
• According to the Association for Computing Machinery (ACM) code, a
computing professional:
• Contributes to society and human well-being
• Avoids harm to others
• Is honest and trustworthy
• Is fair and takes action not to discriminate
• Honors property rights, including copyrights and patents
• Gives proper credit when using the intellectual property of others
• Respects other individuals’ rights to privacy
• Honors confidentiality
The ACM Code of Conduct
THANK YOU!!

More Related Content

PPT
Super billing computer ethics, privacy and security
PPTX
Computer ethics cyber security and technology of it
PPTX
Computer Ethics and History Of computer .pptx
PPTX
COM 421 Chapter 1.pptx computer studies university of eldoret
PPTX
ten important crimes of Computer Crimes.pptx
PPTX
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
PPTX
Super billing computer ethics, privacy and security
Computer ethics cyber security and technology of it
Computer Ethics and History Of computer .pptx
COM 421 Chapter 1.pptx computer studies university of eldoret
ten important crimes of Computer Crimes.pptx
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...

Similar to Computer Ethics_Satyajit Patil.pptx (20)

PPT
Ethics in IT and System Usage
PPTX
Ch15 power point
PPTX
Lecture 8 privacy, security, ergonomics and the environment
PPTX
Chapter 4 2016
PPTX
Chapter 4 Computer Ethics and Security
PPT
Security & control in management information system
PPTX
iGCSE Theory Unit 6 – Effects of Using ICT
PPT
Security (IM).ppt
PPTX
Chap11
PPT
Chap11
PPT
Security and privacy
PPTX
Computer Security and their social effect and their usage.
PPTX
Computer ethics
PDF
BYOD: Device Control in the Wild, Wild, West
PPTX
Questions of Ethics in Software Development
PPTX
Sectors of ICT and Its Career and Business.pptx
PPTX
cyberhygiene regular hygien of computer at office
PPTX
chapter 5.pptxggggggggggggggggggggggggggg
PPTX
2014CyberSecurityProject
PPTX
Cyber Hygiene
Ethics in IT and System Usage
Ch15 power point
Lecture 8 privacy, security, ergonomics and the environment
Chapter 4 2016
Chapter 4 Computer Ethics and Security
Security & control in management information system
iGCSE Theory Unit 6 – Effects of Using ICT
Security (IM).ppt
Chap11
Chap11
Security and privacy
Computer Security and their social effect and their usage.
Computer ethics
BYOD: Device Control in the Wild, Wild, West
Questions of Ethics in Software Development
Sectors of ICT and Its Career and Business.pptx
cyberhygiene regular hygien of computer at office
chapter 5.pptxggggggggggggggggggggggggggg
2014CyberSecurityProject
Cyber Hygiene
Ad

More from SATYAJIT58 (9)

PPTX
Power Electronics for Electric Vehicles and HEVs.pptx
PPT
Flywheel as an energy storage device.ppt
PPTX
Ergonomics with focus on anthropometry.pptx
PPTX
Automotive Ergonomics and considerations.pptx
PPTX
Automotive Back Axle_Construction and Types.pptx
PPTX
Battery Management System for Electric Vehicles.pptx
PPTX
Need of EVs and HEVs.pptx
PPTX
Central Tendency and Dispersion.pptx
PPT
Data Analysis_6 oct 2016.ppt
Power Electronics for Electric Vehicles and HEVs.pptx
Flywheel as an energy storage device.ppt
Ergonomics with focus on anthropometry.pptx
Automotive Ergonomics and considerations.pptx
Automotive Back Axle_Construction and Types.pptx
Battery Management System for Electric Vehicles.pptx
Need of EVs and HEVs.pptx
Central Tendency and Dispersion.pptx
Data Analysis_6 oct 2016.ppt
Ad

Recently uploaded (20)

PPTX
CyberSecurity Mobile and Wireless Devices
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PPTX
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PDF
Java Basics-Introduction and program control
PPTX
Amdahl’s law is explained in the above power point presentations
PDF
Applications of Equal_Area_Criterion.pdf
PDF
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PPTX
Feature types and data preprocessing steps
PDF
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PDF
Design of Material Handling Equipment Lecture Note
PDF
First part_B-Image Processing - 1 of 2).pdf
PPTX
PRASUNET_20240614003_231416_0000[1].pptx
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PPTX
wireless networks, mobile computing.pptx
CyberSecurity Mobile and Wireless Devices
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
distributed database system" (DDBS) is often used to refer to both the distri...
Java Basics-Introduction and program control
Amdahl’s law is explained in the above power point presentations
Applications of Equal_Area_Criterion.pdf
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
Feature types and data preprocessing steps
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Design of Material Handling Equipment Lecture Note
First part_B-Image Processing - 1 of 2).pdf
PRASUNET_20240614003_231416_0000[1].pptx
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
"Array and Linked List in Data Structures with Types, Operations, Implementat...
wireless networks, mobile computing.pptx

Computer Ethics_Satyajit Patil.pptx

  • 2.  Computer ethics are morally acceptable use of computers.  i.e. using computers appropriately  Standards or guidelines are important in this industry, because technology changes are outstripping the legal system’s ability to keep up.  Cyber-ethics: The study of moral, legal, and social issues involving cybertechnology Computer Ethics
  • 3.  Computers in the Workplace  Computer Crime  Privacy and Anonymity  Intellectual Property  Professional Responsibility  Computers as an engineering tool  Autonomous computers  Other issues Computer Ethics Issues
  • 4. LOST JOBS: Economic incentives to replace humans with computerized devices are very high NEW JOBS: Computer industry already has generated a wide variety of new jobs ALTERED JOBS: “de-skilling” New skilled jobs Computers in the Workplace
  • 5. Four primary issues Privacy – responsibility to protect data about individuals Accuracy - responsibility of data collectors to authenticate information and ensure its accuracy Property - who owns information and software and how can they be sold and exchanged Access - responsibility of data collectors to control access and determine what information a person has the right to obtain about others and how the information can be used Computer Ethics – Primary Issues
  • 6. Spreading information without consent Some large companies use medical records and credit records as a factor in important personnel decisions Spreading inaccurate information Mistakes in one computer file can easily migrate to others Inaccurate data may linger for years Problems with Large Databases
  • 7. Internet issues Inflammatory interchange of messages via internet (email, chat rooms, etc.) Chain mail Virus warning hoaxes “Spam” – unsolicited, bulk email
  • 8. Information on internet includes hate, violence, and information that is harmful for children • How much of this should be regulated? • Do filters solve problems or create more? Is web site information used for course work and research reliable? Internet Content Issues
  • 10. • Free Software Foundation – Software ownership should not be allowed at all. One can own the following aspects of a program: • source code • object code • algorithm • look and feel Copyright infringement IPR
  • 11.  Software developers (or the companies they work for) own their programs.  Software buyers only own the right to use the software according to the license agreement.  No copying, reselling, lending, renting, leasing, or distributing is legal without the software owner’s permission. Copyright Laws
  • 12.  There are four types of software licenses:  Public Domain  Freeware  Shareware  All Rights Reserved Software Licenses
  • 13.  Public domain software has no owner and is not protected by copyright law.  It was either created with public funds, or the ownership was forfeited by the creator.  Can be copied, sold, and/or modified  Often is of poor quality/unreliable Public Domain License
  • 14.  Freeware is copyrighted software that is licensed to be copied and distributed without charge.  Freeware is free, but it’s still under the owner’s control.  Examples:  Eudora Light  Netscape Freeware License
  • 15. • A shareware software license allows you to use the software for a trial period, but you must pay a registration fee to the owner for permanent use. • Some shareware trials expire on a certain date • Payment depends on the honor system • Purchasing (the right to use) the software may also get you a version with more powerful features and published documentation. Shareware License
  • 16.  May be used by the purchaser according the exact details spelled out in the license agreement.  You can’t legally use it--or even possess it-- without the owner’s permission. All Rights Reserved License
  • 17.  SPA (Software Publishers Association) polices software piracy and mainly targets:  Illegal duplication  Sale of copyrighted software  Companies that purchase single copies and load the software on multiple computers or networks  They rely on whistle-blowers.  Penalties (for primary user of PC) may include fines up to $250,000 and/or imprisonment up to 5 years in jail Software Piracy
  • 18. • Bug-free software is difficult to produce • It must be carefully designed, developed, and tested • Mistakes generated by computers can be far reaching • Commenting and documenting software is required for effective maintenance throughout the life of the program System Quality
  • 19. 5 aspects of computer crime Malicious kinds of software, or "programmed threats", provide a significant challenge to computer security. "viruses "worms" "Trojan horses" "logic bombs" "bacteria" or "rabbits" which multiply rapidly and fill up the computer's memory. Computer crimes, such as / embezzlement or planting of logic bombs /, are normally committed by /trusted personnel/ who have permission to use the computer system. Computer security, therefore, must also be concerned with the actions of trusted computer users. COMPUTER CRIME can be costly for cleanup and investigation Computer Crime
  • 20. • Computer criminals -using a computer to commit an illegal act • Who are computer criminals? • Employees – disgruntled or dishonest --the largest category • Outside users - customers or suppliers • “Hackers” and “crackers” - hackers do it “for fun” but crackers have malicious intent • Organized crime - tracking illegal enterprises, forgery, counterfeiting Computer Crime
  • 21. • Damage to computers, programs or files • Viruses - migrate through systems attached to files and programs • Worms - continuously self-replicate • Theft • Of hardware, software, data, computer time • Software piracy - unauthorized copies of copyrighted material • View/Manipulation • “Unauthorized entry” and “harmless message” still illegal Types of Computer Crime
  • 22. Computers as an Engineering Tool • Computer Design Tools • Integration of Computers into Engineered Systems
  • 23. Autonomous Computers • Autonomy refers to the ability of a computer to make decisions without the intervention of humans. • Stock trading • Military weapons
  • 24. Computer ethics: other issues • Health Conditions. Engineers who supervise computer personnel or design computer terminals should check that ergonomic considerations are in effect to reduce back problems, provide wrist support, offer good keyboard layouts to prevent carpal tunnel syndrome, and offer good lighting and flicker control. • Computer Failures. Failures can occur because of errors in hardware or software. Hardware errors do not occur often, and when they do they usually do so quite obviously. An exception was Intel’s highly touted Pentium chip, introduced in 1993. It produced very slight and rare errors in floating-point arithmetic. Perhaps more serious was the loss of confidence Intel suffered by not revealing the error before it was detected by a user.
  • 25.  Rapid Change:  Reduced response time to competition  Maintaining Boundaries:  Family, work, leisure  Dependence And Vulnerability  Employment:  Re-engineering job loss  Equity & Access:  Increasing gap between haves and have nots  Health Issues Quality of Life Issues
  • 26.  Ergonomics:  helps computer users to avoid physical and mental health risks  and to increase productivity  Avoid eyestrain and headache  Take regular breaks every couple of hours  Control ambient light and insure adequate monitor brightness  Avoid back and neck pain  Have adjustable equipment with adequate back support  Keep monitor at, or slightly below eye level Ergonomics and Physical Health Issues
  • 27. • Avoid effects of electromagnetic fields (VDT radiation) • Possible connection to miscarriages and cancers, but no statistical support yet • Use caution if pregnant • Avoid repetitive strain injury (RSI) • Injuries from fast, repetitive work • Carpal tunnel syndrome (CTS) - nerve and tendon damage in hands and wrists Physical Health Issues
  • 28. • Microcomputers are the greatest user of electricity in the workplace • “Green” PCs • System unit and display - minimize unnecessary energy consumption and power down when not in use • Manufacturing - avoids harmful chemicals in production, focus on chlorofluorocarbons (CFC’s) which some blame for ozone layer depletion The Environment
  • 29. • Conserve • Turn computers off at end of work day • Use screen savers • Recycle • Most of the paper we use is eligible • Dispose of old parts via recycling programs – most computer parts are dangerous in landfills • Educate • Know the facts about ecological issues Personal Responsibility of Users
  • 30. • Computer professionals find themselves in a variety of professional relationships with other people. • Association for Computing Machinery (ACM) and the Institute of Electrical and Electronic Engineers (IEEE), have established codes of ethics, curriculum guidelines and accreditation requirements. Professional Responsibility and Code of Ethics
  • 31. • According to the Association for Computing Machinery (ACM) code, a computing professional: • Contributes to society and human well-being • Avoids harm to others • Is honest and trustworthy • Is fair and takes action not to discriminate • Honors property rights, including copyrights and patents • Gives proper credit when using the intellectual property of others • Respects other individuals’ rights to privacy • Honors confidentiality The ACM Code of Conduct