0% found this document useful (0 votes)
17 views

Ehitcs in IT

Uploaded by

Jebb Licdan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Ehitcs in IT

Uploaded by

Jebb Licdan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Ethics in IT

What is Ethics and


Information Technology?
Ethical issues relating to computer
application
- Security Threats
- Computer Viruses
- Cyber Crime
- Software privacy and hacking
- computer crime prevention
- Ethical dilemmas and consideration
Ethics

- Derived from the Greek word


"ethos", which means "custom",
"habbit", and "way of living"
Definition: "the discipline and
practice of applying value to
human behavior, resulting in
meaningful conduct."
Computer Ethics
- Computer ethics defined as the
application of classical ethical
principles to the use of computer
technology.
Ethical problems related to computers:
- Privacy
1. Computers create a false sense
security
2. People do not realize how
vulnerable information stored o
computers are
Property
1. Physical property
2. Intellectual property
3. data as property
Access
1. Access to computing technology
2. Access to data
Accuracy
1. Accuracy of information stored
-Hacking cracking and virus creation
- Software privacy
The TEN commandments of
computer ethics have been
defined by the computer Ethics
Institute
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interface with other people’s computer work
3. thou shalt not snoop around in other people’s files.
4. Thou shalt not use computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not use or copy software for which you have no
paid
7. Thou shalt not use other people computer resources without
authorization.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program
you write.
10. Thou shalt use a computer in way that show consideration
and respect.
What is Computer Virus?
-Computer viruses are small
software programs that are designed
to spread from one computer to
another and to interface with
computer operation.
Spreading of virus
- Virus are most easily spread,
- Spread though E-mail Attachment,
- Instant Messaging messages,
- Funny Images,
- Audio and Videos Files,
- Downloading files from Internet,
- Greeting cards and many more,
Steps to help avoid Viruses
- Use an Internet firewall,
- Subscribe to industry standard antivirus
software,
- Never open an e-mail attachment from
someone you don't know,
- Scan each and every attachment,
- Rules to be followed, while surfing net
Computer Crime

✔ IT Infrastructure
✔ Illegal access
✔ Illegal Interruption
✔ Data Interface
✔ System Interface
✔ Misuse of Devices
✔ Electronic Fraud
Types of Computer Crimes
Target of the crime
Medium of the attack
Tool
Intimidate or deceive
Types of Computer Criminal

❑ Outsider
❑ Insiders
Reason for Computer Crime
-Economic
-Ideological
-Psychological
-Egocentric
Methods of attack
- Data Tampering
- Programming Techniques
- Other Methods
Software piracy and Hacking
What is piracy????
- Reselling Media
- Downloading from a website
- Taping songs
- Buying a used book or CD
- Watching broadcast television but
skipping commercials
Type of Piracy
- End User Piracy
- Client- Server Piracy
- Internet Piracy
- Hard-Disk Piracy
- Software Counterfeiting
Hacker
- Some one who bypasses the system's access
controls by taking advantages of security
weaknesses left in the system by developers.
- System
1. Access confidential information
2. Threaten someone from YOUR computer
3. Broadcast your confidential letters or
materials.
4. Store illegal materials
Evils Hacking
- Compromise the security of system without
permission from an authorized party, usually
with the intent of accessing computers
connected to the network,
Advantages of Hacking
- To determine problem and weakness for
program.
- Creation of firewall
- Useful for military purpose and spying
- Better computer security
Ethical
Dilemmas and Considerations

Ethical Dilemmas in IT
- Dilemmas are discussed in relation to four
1. privacy
2. Information accuracy
3. Access to information
4. Intellectual property rights
Ethical Dilemmas in relation to IT
- PLAGIARISM
the taking of ideas, writing and
drawings other similar intellectual
property created by others and
presenting it as your own.
- NETIQUETTE
a set of rules(mainly unwritten) to follow while you are
online.

How can we stop it


1. Internet crime prevention
2. Prevention of cyber crime
3. Prevention of computer crime in banking
4. IT Security
5. Computer crime prevention law
6. Hi tech crime prevention law
7. Computer crime preventing online fraud
8. World risk investigation and terrorist prevention

You might also like