SlideShare a Scribd company logo
1
COMPUTER
ETHICS
2
What is computer ethics?
Computer ethics a system of
moral standards or value uses
as a guideline for computer user
Analysis of the nature and
social impact of computer
technology
3
THE TEN COMMANDMENTS OF
COMPUTER ETHICS
 You shall not use a computer to harm other people.
 You shall not interfere with other people's computer work.
 You shall not snoop around in other people's computer files.
 You shall not use a computer to steal.
 You shall not use a computer to bear false witness.
 You shall not copy or use proprietary software for which you
have not paid.
 You shall not use other people's computer resources without
authorisation or proper compensation.
 You shall not appropriate other people's intellectual output.
 You shall think about the social consequences of the
program you are writing or the system you are designing.
 You shall always use a computer in ways that ensure
consideration and respect for your fellow humans
The United States Institute of Computer Ethics
4
GUIDELINES ON THE E-MAIL AND
INTERNET USAGE IN MALAYSIA
 use only individual e-mail address to forward individual opinion
 keep the identity name and password a secret to avoid the
misuse of your e-mail without your knowledge
 e-mail must be active to promptly reply the necessary actions
needed for any matters
 ensure the total mail kept in the box is within the computer
storage capacity
 scan files regularly to avoid the transmission of virus from one
computer to another
 do not send e-mails that contain classified information which can
be used to tarnish other people or country
 choose a suitable time to search the Internet to save access time
and cost
 beware of prohibited sites which could affect one's moral,
organisation or nation
 print only relevant documents that you think can be used in future
to save cost
5
Examples of unethical
computer code of conducts
include
 modifying certain information on the
Internet, affecting the accuracy of the
information
 selling information to other parties without
the owner’s permission
 using information without authorization
 involvement in stealing software
 invasion of privacy
6
Examples of ethical computer code of conducts
include:
sending warning about viruses to
other computer users
asking permission before sending
any business advertisements to
others
using information with
authorization
7
Why do we need
ethics and law in
computing?
 Respecting Ownership
 not stealing other people’s work
 Respecting Privacy
 reading others’ mails or files without
permission
 Respecting Property
 act of tampering and changing electronic
information is considered as vandalism and
disrespect for other people’s property
8
The Differences between Ethics
and Law
Ethics
Free to Follow
No Punishment
Universals
Produce ethical
computer user
Immoral
Law
Must follow
Penalties, Punishment
Depends on Country
Prevent misusing of
Computer
Crime
9
COMPUTER ETHICS
Intellectual Properties (IP)
Privacy
Authentications
Verification
Controversial contents
10
INTELLECTUAL
PROPERTY
(IP)
These works are
unique and have value
in the market placeWork created by
inventors, authors
and artist
school begs, shoes
and even your socks
are protected by IP
11
1) INTELECTUAL PROPERTY
PROTECTION
DesignPatent
Trademarks Copyright
TYPESTo safeguard intellectual
property rights
16
2) PRIVACY
Data and information privacy
The rights of individuals and
companies to deny or restrict
the collection and use of
information about them
Anonymity, confidentiality
17
Ways Computer Technology
Threaten Our Privacy
Cookies
- used to identify users by web casting,
e-commerce and other
- contain user information and are saved
in the computer hard disk
- used by some websites to store
passwords and track how regularly we
visit a websites, that’s how we become
potential targets for web advertisers
Cookies
Electronic
profile
Spyware
18
A program that collects user
information without the user’s
knowledge
Can enter computers, sneaking in
like a virus
Is a result of installing new programs
Communicates information it collects
to some outside source while we are
online
Spyware
19
the combining of data in a database
that can be sold to the Internet by the
company to the interested parties
this database is in a form such as
magazine subscription or product
warranty cards that had been filled
by online subscribers
includes personal details such as your
age, address and marital status
Electronic Profile
20
ways to protect privacy
1. Privacy law
– Security Services to review the security
policy
– Security Management to protect the
resources
– Security Mechanism to implement the
required security services
– Security Objects, the important entities
within the system environment
21
2. Utilities software
–anti-spam program,
firewall, anti-spyware
and antivirus
22
3. Authentications
A process where users verify
that they are who they say
they are
Example ATM machine
Methods of authentications:-
a) Biometric devices
b) Callback system
Important  to safeguard
against the unauthorized
access and use
23
a) Biometric devices
 a device that
translates personal
characteristics into
a digital code that is
compared with a
digital code stored
in the database
24
BIOMETRIC DEVICES
25
b) Callback system
The checking system that
authenticates the user
Commonly used in the bank
operation and business
transaction
26
Callback system
 For example, when you book
for the taxi service, the
operator will ask you to hang
up and she will call you back
to confirm for the service
required
27
4. Verification
Act of proving or disproving
the correctness of a system
with respect to a certain
formal specification
Methods of verification:-
a) User identification
b) Processed object
28
User identification
 The process of
validating the user
 E.g.; Key in the
user name to log-in
to a system, show
exam slip to verify
that you are the
valid candidate for
the exam
Processed identification
 Something the user has
(identification card,
security token, key,
badge and cell phone)
E.g.; The policeman will
check on the driver’s
license to identify the
valid driver, buy
blouses at the mall
using a credit card
29
5. Controversial content
Information that causes
disagreement in opinions and
may cause the disruption of
peace because different people
or culture will have different
views about the contents
Pornography, Slander
30
 Can lead to criminal acts
such as exploitation of
women and children
 Can lead to sexual
addiction or perversion
 Can develop low moral
value towards other
men, women or children
 Can erode good
religious, cultural and
social beliefs and
behaviors
 Can develop into a
society that disregards
honesty and truth
 Can develop bad habit
of spreading untruths
and rumors
 Can lead to unnecessary
argument
 Can cause people to
have negative attitudes
towards another person.
Pornography Slander
31
32
33

More Related Content

PPTX
COMPUTER ETHICS
PPT
Intellectual Property Rights.
PPT
Computer Ethics
PPTX
Characteristics of report writing
PPTX
Learn html Basics
PPTX
Computer ethics
PPTX
MS Word Introduction and Tools.
DOCX
Class 10th FIT Practical File(HTML)
COMPUTER ETHICS
Intellectual Property Rights.
Computer Ethics
Characteristics of report writing
Learn html Basics
Computer ethics
MS Word Introduction and Tools.
Class 10th FIT Practical File(HTML)

What's hot (20)

PPTX
computer ethics
PPTX
computer ethics slides
PPT
Computer Ethics Presentation
PPTX
Computer Ethics Final Work
PPTX
Ethics in computing
PPTX
Computer Ethics
PPTX
Computer ethics
PDF
Computer ethics
PPT
Internet Ethics
PPTX
An Introduction to Cyber Ethics
PPTX
Netiquette
PPTX
Social and professional issuesin it
PPTX
PPT Lab Assignment - Computers - Computer Ethics
PPTX
Computer ethics & copyright
PPTX
Overview of ethics and information technology
PPTX
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
PPTX
Ethics and computing profession
PPTX
Computer ethics and crime
PPTX
Computer ethics
PDF
Computer ethics
computer ethics
computer ethics slides
Computer Ethics Presentation
Computer Ethics Final Work
Ethics in computing
Computer Ethics
Computer ethics
Computer ethics
Internet Ethics
An Introduction to Cyber Ethics
Netiquette
Social and professional issuesin it
PPT Lab Assignment - Computers - Computer Ethics
Computer ethics & copyright
Overview of ethics and information technology
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
Ethics and computing profession
Computer ethics and crime
Computer ethics
Computer ethics
Ad

Similar to Ethics in using computer (20)

PPTX
chapter 5.pptxggggggggggggggggggggggggggg
PPTX
Ethical privacy and security issues
PPTX
Computer ethics cyber security and technology of it
PPT
Information Ethics
PPTX
ComputingEthics.pptx
PPTX
Legal And Ethical Aspects.pptx
PPTX
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
PPT
Etical and professional issues of computer
PPTX
Corporate ethics
PPTX
corporateethics11111111111111111111.pptx
PPTX
social, legal and ethical issues of e-commerce..
PPTX
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PPT
Objective 5 legal consideration in NIS.ppt
PPT
PDF
CTech-8-Q4-Lesson-2-Computer-Ethics-AI.pdf
PPTX
c13 Security and Ethics(1)(1)(1).pptsasdax
PPTX
Lecture 6 Cybersecurity-Basics and .pptx
PPT
Unit 6 Privacy technological impacts.ppt
PPTX
SAFETY, SECURITY AND ETHICS.ppttttttxxxx
PPT
3999779.ppt
chapter 5.pptxggggggggggggggggggggggggggg
Ethical privacy and security issues
Computer ethics cyber security and technology of it
Information Ethics
ComputingEthics.pptx
Legal And Ethical Aspects.pptx
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Etical and professional issues of computer
Corporate ethics
corporateethics11111111111111111111.pptx
social, legal and ethical issues of e-commerce..
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
Objective 5 legal consideration in NIS.ppt
CTech-8-Q4-Lesson-2-Computer-Ethics-AI.pdf
c13 Security and Ethics(1)(1)(1).pptsasdax
Lecture 6 Cybersecurity-Basics and .pptx
Unit 6 Privacy technological impacts.ppt
SAFETY, SECURITY AND ETHICS.ppttttttxxxx
3999779.ppt
Ad

More from nurulafifa_matsaleh (8)

DOCX
Aktiviti kelab komputer
DOCX
Programming exercise
PPT
Overview of comp system
DOCX
RP ICT F5 2013
DOCX
RP ICT F4 2013
PDF
huraian sukatan pelajaran ict
PPT
Intro to ict
PDF
sukatan pelajaran ict
Aktiviti kelab komputer
Programming exercise
Overview of comp system
RP ICT F5 2013
RP ICT F4 2013
huraian sukatan pelajaran ict
Intro to ict
sukatan pelajaran ict

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Cloud computing and distributed systems.
PDF
Approach and Philosophy of On baking technology
PDF
Modernizing your data center with Dell and AMD
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
KodekX | Application Modernization Development
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Cloud computing and distributed systems.
Approach and Philosophy of On baking technology
Modernizing your data center with Dell and AMD
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks
The AUB Centre for AI in Media Proposal.docx
Per capita expenditure prediction using model stacking based on satellite ima...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Weekly Chronicles - August'25 Week I
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
KodekX | Application Modernization Development
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation_ Review paper, used for researhc scholars
Diabetes mellitus diagnosis method based random forest with bat algorithm
Digital-Transformation-Roadmap-for-Companies.pptx

Ethics in using computer

  • 2. 2 What is computer ethics? Computer ethics a system of moral standards or value uses as a guideline for computer user Analysis of the nature and social impact of computer technology
  • 3. 3 THE TEN COMMANDMENTS OF COMPUTER ETHICS  You shall not use a computer to harm other people.  You shall not interfere with other people's computer work.  You shall not snoop around in other people's computer files.  You shall not use a computer to steal.  You shall not use a computer to bear false witness.  You shall not copy or use proprietary software for which you have not paid.  You shall not use other people's computer resources without authorisation or proper compensation.  You shall not appropriate other people's intellectual output.  You shall think about the social consequences of the program you are writing or the system you are designing.  You shall always use a computer in ways that ensure consideration and respect for your fellow humans The United States Institute of Computer Ethics
  • 4. 4 GUIDELINES ON THE E-MAIL AND INTERNET USAGE IN MALAYSIA  use only individual e-mail address to forward individual opinion  keep the identity name and password a secret to avoid the misuse of your e-mail without your knowledge  e-mail must be active to promptly reply the necessary actions needed for any matters  ensure the total mail kept in the box is within the computer storage capacity  scan files regularly to avoid the transmission of virus from one computer to another  do not send e-mails that contain classified information which can be used to tarnish other people or country  choose a suitable time to search the Internet to save access time and cost  beware of prohibited sites which could affect one's moral, organisation or nation  print only relevant documents that you think can be used in future to save cost
  • 5. 5 Examples of unethical computer code of conducts include  modifying certain information on the Internet, affecting the accuracy of the information  selling information to other parties without the owner’s permission  using information without authorization  involvement in stealing software  invasion of privacy
  • 6. 6 Examples of ethical computer code of conducts include: sending warning about viruses to other computer users asking permission before sending any business advertisements to others using information with authorization
  • 7. 7 Why do we need ethics and law in computing?  Respecting Ownership  not stealing other people’s work  Respecting Privacy  reading others’ mails or files without permission  Respecting Property  act of tampering and changing electronic information is considered as vandalism and disrespect for other people’s property
  • 8. 8 The Differences between Ethics and Law Ethics Free to Follow No Punishment Universals Produce ethical computer user Immoral Law Must follow Penalties, Punishment Depends on Country Prevent misusing of Computer Crime
  • 9. 9 COMPUTER ETHICS Intellectual Properties (IP) Privacy Authentications Verification Controversial contents
  • 10. 10 INTELLECTUAL PROPERTY (IP) These works are unique and have value in the market placeWork created by inventors, authors and artist school begs, shoes and even your socks are protected by IP
  • 11. 11 1) INTELECTUAL PROPERTY PROTECTION DesignPatent Trademarks Copyright TYPESTo safeguard intellectual property rights
  • 12. 16 2) PRIVACY Data and information privacy The rights of individuals and companies to deny or restrict the collection and use of information about them Anonymity, confidentiality
  • 13. 17 Ways Computer Technology Threaten Our Privacy Cookies - used to identify users by web casting, e-commerce and other - contain user information and are saved in the computer hard disk - used by some websites to store passwords and track how regularly we visit a websites, that’s how we become potential targets for web advertisers Cookies Electronic profile Spyware
  • 14. 18 A program that collects user information without the user’s knowledge Can enter computers, sneaking in like a virus Is a result of installing new programs Communicates information it collects to some outside source while we are online Spyware
  • 15. 19 the combining of data in a database that can be sold to the Internet by the company to the interested parties this database is in a form such as magazine subscription or product warranty cards that had been filled by online subscribers includes personal details such as your age, address and marital status Electronic Profile
  • 16. 20 ways to protect privacy 1. Privacy law – Security Services to review the security policy – Security Management to protect the resources – Security Mechanism to implement the required security services – Security Objects, the important entities within the system environment
  • 17. 21 2. Utilities software –anti-spam program, firewall, anti-spyware and antivirus
  • 18. 22 3. Authentications A process where users verify that they are who they say they are Example ATM machine Methods of authentications:- a) Biometric devices b) Callback system Important  to safeguard against the unauthorized access and use
  • 19. 23 a) Biometric devices  a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database
  • 21. 25 b) Callback system The checking system that authenticates the user Commonly used in the bank operation and business transaction
  • 22. 26 Callback system  For example, when you book for the taxi service, the operator will ask you to hang up and she will call you back to confirm for the service required
  • 23. 27 4. Verification Act of proving or disproving the correctness of a system with respect to a certain formal specification Methods of verification:- a) User identification b) Processed object
  • 24. 28 User identification  The process of validating the user  E.g.; Key in the user name to log-in to a system, show exam slip to verify that you are the valid candidate for the exam Processed identification  Something the user has (identification card, security token, key, badge and cell phone) E.g.; The policeman will check on the driver’s license to identify the valid driver, buy blouses at the mall using a credit card
  • 25. 29 5. Controversial content Information that causes disagreement in opinions and may cause the disruption of peace because different people or culture will have different views about the contents Pornography, Slander
  • 26. 30  Can lead to criminal acts such as exploitation of women and children  Can lead to sexual addiction or perversion  Can develop low moral value towards other men, women or children  Can erode good religious, cultural and social beliefs and behaviors  Can develop into a society that disregards honesty and truth  Can develop bad habit of spreading untruths and rumors  Can lead to unnecessary argument  Can cause people to have negative attitudes towards another person. Pornography Slander
  • 27. 31
  • 28. 32
  • 29. 33