0% found this document useful (0 votes)
60 views44 pages

Throughout The Ages Man Has Struggled With The Subj. of Right & Wrong, Ethics & Justice' '

Ethics Derived from the Greek word 'ethosu, which u, means 'customu, u, 'habitu, and'u,' way of livingu u Definition: "the discipline and practice of applying value to human behavior, resulting in meaningful conduct" Computer Ethics defined as the application of classical ethical principles to the use of computer technology. The Ten Commandments of Computer Ethics have been defined by the Computer Ethics Institute.

Uploaded by

5437336
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views44 pages

Throughout The Ages Man Has Struggled With The Subj. of Right & Wrong, Ethics & Justice' '

Ethics Derived from the Greek word 'ethosu, which u, means 'customu, u, 'habitu, and'u,' way of livingu u Definition: "the discipline and practice of applying value to human behavior, resulting in meaningful conduct" Computer Ethics defined as the application of classical ethical principles to the use of computer technology. The Ten Commandments of Computer Ethics have been defined by the Computer Ethics Institute.

Uploaded by

5437336
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 44

Throughout the ages man has

struggled with the Subj. of Right &


Wrong, Ethics & Justice` `

Ethics and Information Tech.


Contents
 What is Ethics and Information Technology??
 Ethical issues relating to computer application
 Security Threats
 Computer Viruses
 Cyber Crime
 Software piracy and Hacking
 Computer crime prevention
 Case Study
 Ethical dilemmas and consideration

Ethics and Information Tech.


Ethics
 Derived from the Greek word “ethos
“ ”, which
means “custom
“ ”, “habit
“ ”, and “way
“ of living”

 Definition: "the discipline and practice of


applying value to human behavior,
resulting in meaningful conduct.“

Ethics and Information Tech.


Cont……….

 Professional Ethics: concerns one's conduct of


behavior and practice when carrying out
professional work, e.g., consulting, researching,
teaching and writing.

 A computing professional must understand


 Cultural, social, legal, and ethical issues in computing.
 Responsibility and possible consequences of failure.

Ethics and Information Tech.


Computer Ethics
 Computer ethics defined as the application of classical
ethical principles to the use of computer technology.
 Ethical problems related to computers:
 Privacy
 Computers create a false sense of security
 People do not realize how vulnerable information stored on
computers are
 Property
 Physical property
 Intellectual property (in both copyright and patent)
 Data as property

Ethics and Information Tech.


 Access
 Access to computing technology
 Access to data

 Accuracy
 Accuracy of information stored
 Hacking, cracking and virus creation
 Software piracy

Ethics and Information Tech.


The Ten Commandments of computer ethics have
been defined by the Computer Ethics Institute.

 1) Thou shalt not use a computer to harm


other people.
 2) Thou shalt not interfere with other
people's computer work.
 3) Thou shalt not snoop around in other
people's files.
 4) Thou shalt not use a computer to steal.
 5) Thou shalt not use a computer to bear
false witness.
Ethics and Information Tech.
 6) Thou shalt not use or copy software for
which you have not paid.
 7) Thou shalt not use other people's
computer resources without authorisation.
 8) Thou shalt not appropriate other people's
intellectual output.
 9) Thou shalt think about the social
consequences of the program you write.
 10) Thou shalt use a computer in ways that
show consideration and respect.
Ethics and Information Tech.
Computer Virus

Ethics and Information Tech.


What is Computer Virus?

 Computer viruses are small software programs


that are designed to spread from one computer
to another and to interfere with computer
operation.

Ethics and Information Tech.


Spreading of Virus
 Virus are most easily spread,
 Spread through E-mail Attachments,
 Instant Messaging messages,
 Funny Images,

 Audio and Videos files,

 Downloading files from Internet,

 Greeting cards and many more.

Ethics and Information Tech.


Steps to help avoid Viruses
 Use an Internet firewall,
 Subscribe to 
industry standard antivirus software,
 Never open an e-mail attachment from
someone you don't know,
 Scan each and every attachment,
 Rules to be followed, while surfing net

Ethics and Information Tech.


COMPUTER CRIMES

Ethics and Information


TYPES OF COMPUTER CRIMES
 TARGET OF THE CRIME

 MEDIUM OF THE ATTACK

 TOOL

 INTIMIDATE OR DECEIVE

Ethics and Information Tech.


Types of Computer Criminal

 Outsiders

 Insiders

Ethics and Information Tech.


REASON FOR COMPUTER
CRIME
 ECONOMIC

 IDEOLOGICAL

 PSYCHOLOGICAL

 EGOCENTRIC

Ethics and Information Tech.


METHODS OF ATTACK

 DATA TEMPERING

 Programming Techniques

 OTHER METHODS

Ethics and Information Tech.


Computer Crime can be Defined as
 IT Infrastructure
 Illegal access
 Illegal Interuption
 Data Interfare
 System Interfrence
 Misuse Of Devices
 Electronic Fraud

Ethics and Information Tech.


Software piracy and
Hacking

Ethics and Information Tech.


What is
PIRACY???????
Reselling Media

 Downloading from a website

 Taping songs

Buying a used book or CD

Watching broadcast television but skipping commercials

Ethics and Information Tech.


Types of PIRACY
 End User Piracy

 Client – Server Piracy

 Internet Piracy

 Hard-Disk Piracy

 Software Counterfeiting

Ethics and Information Tech.


End-User Piracy

 This occurs when a company employee


reproduces copies of software without
authorization

 Copying disk for installation and distribution


 Swapping disks in or outside the workplace

Ethics and Information Tech.


Client-Server Piracy
 This type of piracy occurs when too many
employees on a network are using a central
copy of a program at the same time.

 System Overuse

Ethics and Information Tech.


Internet Piracy
 This occurs when software is downloaded
from the Internet The same purchasing rules
should apply to online software purchase as
for those bought in traditional ways.

 Pirate website
 Unauthorized transfer of copyrighted program

Ethics and Information Tech.


Hard-Disk Loading
 This occurs when a business who sells new
computers loads illegal copies of software onto
the hard disks to make the purchase of the
machines more attractive.

 Value Added Resellers (VAR)

Ethics and Information Tech.


Software Counterfeiting
 This type of piracy is the illegal duplication
and sale of copyrighted material with the
intent of directly imitating the copyrighted
product.

Ethics and Information Tech.


HACKER

 Some one who bypasses the system’s access


controls by taking advantage of security
weaknesses left in the system by developers .

Ethics and Information Tech.


What HACKER do???????
 SYSTEM
 Access confidential information

 Threaten someone from YOUR computer

 Broadcast your confidential letters or materials


.
 Store illegal material

Ethics and Information Tech.


Evils of Hacking
 Compromise the security of system without
permission from an authorized party, usually
with the intent of accessing computers
connected to the network.

Ethics and Information Tech.


Advantage of Hacking
 To determine problem and weakness for
program
 Creation of firewall
 Useful for military purpose and spying
 Better computer security

Ethics and Information Tech.


Computer crime
prevention

Ethics and Information Tech.


Computer crime is becoming ever prevalent in
our society. More and more companies and
individuals rely on the service and resources
provided through networks computers.

Ethics and Information Tech.


TYPES OF COMPUTER CRIME
PREVENTION
 Internet crime prevention
 Prevention of cyber crime
 Prevention of computer crime in banking
 IT security
 Computer crime prevention law
 Hi tech crime prevention law
 Computer crime preventing on line fraud
 World risk investigation and terrorist prevention

Ethics and Information Tech.


Case Study
of sole remaining supplier

Ethics and Information Tech.


Key points of Case Study
 Introduction
 Background (pacemaker)
 Lack of dexterity in installation of pacemaker
 Serious consequences
 Transistor making company decided to pull its
hand out of business

Ethics and Information Tech.


Key points of Case Study
 Realization of problem
 Ethical dilemma
 Different views in board of director
 Theory of utilitarianism
 solution

Ethics and Information Tech.


ETHICAL
DILEMMAS
AND
CONSIDERATIONS
Ethical dilemmas in IT
Dilemmas are discussed in relation to four areas-
 Privacy
 Information accuracy
 Access to information
 Intellectual property rights
Ethical dilemmas in relation to IT

 PLAGIARISM-The taking of ideas,writing and


drawings or other similar intellectual property created
by others and presenting it as your own.
 NETIQUETTE-A set of rules (mainly unwritten) to
follow while you are online.
SOME IMPORTANT VIEWS

 Internet offers great riches for the future,but poses


many threats.
 Technology requires vigilance.
 Considerations regarding information ethics influence
personal decisions,professional practice and public
policy.
EFFECTIVE WAY OUT OF
SUCH DILEMMAS
CONCLUSION
Presented By:

Solanki Vimal S.
Binapani
Nishant Ranjan
Archana
Rajnish Choubey
Jyoti Singh

Ethics and Information Tech.

You might also like