0% found this document useful (0 votes)
14 views

Session 5 Computer ethics

The document outlines a session on Computer Code of Ethics aimed at trainee teachers, focusing on ensuring user privacy, promoting responsible computer use, and protecting intellectual property. It discusses the importance of computer ethics in the context of rapid technological advancements and highlights key areas such as privacy, security, and online behavior. Additionally, it presents the 10 Commandments of Computer Ethics as guidelines for ethical computer usage and includes teaching strategies for effectively conveying these principles.

Uploaded by

Khamid Akhtar
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Session 5 Computer ethics

The document outlines a session on Computer Code of Ethics aimed at trainee teachers, focusing on ensuring user privacy, promoting responsible computer use, and protecting intellectual property. It discusses the importance of computer ethics in the context of rapid technological advancements and highlights key areas such as privacy, security, and online behavior. Additionally, it presents the 10 Commandments of Computer Ethics as guidelines for ethical computer usage and includes teaching strategies for effectively conveying these principles.

Uploaded by

Khamid Akhtar
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Session 5

COMPUTER CODE OF
ETHICS
OBJECTIVES OF THE SESSION

After the completion of this session, the


trainee teachers will be able to:
 Ensure
the privacy and safety of the
computer users.
 Help
people use the computer in the right
ways.
 Guarantee that the works done by someone
did not declare by other people.
Introduction to Computer Ethics

Definition of Ethics:
Ethics =

What is Computer Ethics?


A set of moral principles that regulate how computers and
technology should be used.

Ensures technology is used responsibly, safely, and ethically to


prevent harm.
Introduction to Computer Ethics
Growth of Technology(contd;)
and Ethics:
Technology is rapidly evolving, and with it,
computer ethics must also evolve.
 Smaller, faster computers bring both advantages
and risks (manipulation and exploitation).

As technology advances, understanding ethical


issues related to digital technology is essential for
both professionals and users. Hence, computer
ethics are needed to avoid the improper usage of
computer technology and bring justice.
Introduction to Computer Ethics
(contd;)
 The primary objectives of computer ethics
are to protect the privacy and security of
computer users, promote responsible and
ethical computer usage, and ensure that
individuals' original work is properly
credited, preventing unauthorized claims by
others.
Importance of Computer Ethics
 Rapid Technological Advancements: The growth of
artificial intelligence, big data, and the internet
raises numerous ethical questions.
 Global Connectivity: The internet connects
billions, which can amplify both positive and
negative consequences of digital actions.
 Security and Privacy Concerns: Increasing data
breaches and threats highlight the need for
ethical handling of user data.
 Impacts on Society: Ethical technology use affects
fairness, equality, and social trust.
Key Areas of Computer Ethics
1. Privacy
 Data Privacy: Protecting personal information
from unauthorized access.
 Surveillance: Balancing security and individual
privacy rights

2. Intellectual Property
 Software Piracy: Unauthorized use or distribution
of software.
 Copyrights and Patents: Respecting the work of
creators, including software developers and
digital content creators.
Key Areas of Computer Ethics
3. Security
 Cybersecurity: Protecting systems from hacking,
viruses, and other threats.
 Ethical Hacking: The role of ethical hackers in
identifying vulnerabilities to improve security.

4. Artificial Intelligence (AI)


 Bias and Fairness: Ensuring that AI systems are
not biased and are used responsibly.
 Accountability: Who is responsible when an AI
system causes harm?
Key Areas of Computer Ethics
5. Digital Divide:
 Equal Access: Promoting equal opportunities and access
to technology.
 Accessibility: Developing technology that is usable by
people with disabilities.

6. Online Behavior:
 Cyberbullying: Preventing online harassment and abuse.
 Misinformation: Combating the spread of false
information.
The 10 Commandments of
Computer Ethics
 The 10 Commandments of Computer Ethics
were created by the Computer Ethics
Institute in 1992 as a set of ethical
guidelines for responsible computer use.
 These commandments focus on promoting
respect, fairness, and responsibility in the
digital world.
The 10 Commandments of
Computer Ethics
1. Do not use a computer to harm other people.
 Explanation: Avoid any actions that cause harm to
others, such as spreading viruses, hacking, or
cyberbullying.

2. Do not interfere with other people's computer


work.
 Explanation: Respect the work of others. Do not
disrupt their systems, whether through
unauthorized access or by intentionally slowing
down their devices.

3. Do not snoop around in other people's computer


The 10 Commandments of
Computer Ethics
4. Do not use a computer to steal.
 Explanation:Don't engage in illegal activities
like software piracy, stealing digital content,
or accessing paid services without
authorization.

5. Do not use a computer to bear false witness.


 Explanation: Avoid spreading misinformation
or engaging in deceptive practices, such as
falsifying data or committing identity theft.
The 10 Commandments of
Computer Ethics
6. Do not copy or use proprietary software for
which you have not paid.
 Explanation: Respect intellectual property
rights by purchasing software or using open-
source alternatives instead of pirating or
illegally copying software.

7. Do not use other people's computer


resources without authorization.
 Explanation:
Do not access someone else's
computing resources (e.g., networks, servers)
The 10 Commandments of
Computer Ethics
8. Do not appropriate other people's
intellectual output.
 Explanation: Acknowledge and respect the
intellectual property of others, whether it
be code, content, or ideas. Do not
plagiarize or claim others' work as your
own.
The 10 Commandments of
Computer Ethics
9. Think about the social consequences of the program you
write or the system you design.
 Explanation: Be mindful of how your work impacts society.
Consider potential consequences on privacy, security, and
fairness when designing software or systems.

10. Always use a computer in ways that ensure


consideration and respect for your fellow humans.
 Explanation: Be respectful and considerate of others
when using computers. Avoid harmful behavior and
ensure your digital actions contribute to a positive
environment.
Role Play Activity
Brainstorm a scenario related to computer ethics.
Role-play the scenario while addressing the key principles
of ethics.
Example of Role-Play Scenarios
 Scenario 1: Someone accesses a colleague’s personal
files without permission.
 Scenario 2: A student copies software illegally from a
peer’s computer.
 Scenario 3: A hacker uses a virus to steal data from a
person.
 Scenario 4: Sharing a Colleague’s Password: keeping
personal and professional login credentials confidential
Spotting a Phishing scam
QUESTION

 How can we improve our ethics to


protect our privacy, maintain our
security and to respect others?
 Why are the computer ethics important
for us?
Teaching Strategies

 Group work
 Discussion method
 Interrogating the content
 Class Competition
 Role Play

• Which strategy/activity do you foresee you can apply in


your classrooms and what possible impact do you think
this activity will have on your students?

You might also like