computer ethics.pptx for students and professionals
saifnasir3
15 views
17 slides
Aug 30, 2024
Slide 1 of 17
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
About This Presentation
Computer ethics in detail for professionals and students.
Size: 469.31 KB
Language: en
Added: Aug 30, 2024
Slides: 17 pages
Slide Content
Professional practices Presentation:-1 Computing Ethics By Emaan & Sara
What is ethics? It is a discipline that deals what is good or bad. It is concerned with individual human opinions and believes. According to philosophy:- “ The system or code of morals of a particular person, religion, group or profession.These are generally accepted the standards of goodness and rightness in character, principle standard of habits of right and wrong “
Ethical principles There are three main principles . All the society benefits from your act. People are treated as an end not means to as an end. It is fair to parties involved.
What is computer ethics? According to James H Moore “ Computer ethics is the analysis of nature and social impact of computer technology and the corresponding formulation and justification of policies for ethical uses of technology.” OR It is the analysis of the values of human actions influenced by computer technology.
Four primary issues Privacy:- Responsibility to protect data about individual ( Companies need information about their employees and customers to be effective in marketplace.) Accuracy:- Responsibilty of data collecters to authenticate information and ensure it’s accuracy. Property :- Who owns information and software or how they can be sold and change.
Cond… Access:- Responsibilty of data collecters to control access and determine what information a person has the right to obtain about others and how the information can be used.
Why we study ? Doing so will make us behave like responsible professionals. Doing so will teach us how to avoid computer abuse ( The advance of computer technology will continue to create temporary policy vaccum ) Computing technology create and will continue to create new ethical issues that requires special study.
Ten commandments Commandment 1:- Do not use computer to harm others people data. Commandment 2:- Do not use computer to interference in others people work. Commandment 3:- Do not spy on another person’s personal data.
Cond… Commandment 4:- Do not use technology to steal personal information. Commandment 5:- Do not spread mis-information using computer technology. Commandment 6:- Do not use the software unless you pay for this software. Commandment 7:-
Cond…. Do not use someone else’s computer resource unless he authorized to use them. Commandment 8:- It is wrong to claim ownership of a work that is the output of someone else’s intellect. Commandment 9:- Before developing a software, think about the social impact it can that of software. Commandment 10:- While computer’s for communication, always respectful with fellow members.
Protect your privacy Just as you would in real world, be aware of risk, fraud and false information which exit on internet. Use your common sense when deciding whether information is valid.Don’t spread any further information about which you are in doubt. Protect your personal information to someone in using unethical way.
Cyber bulling When people bully other people by use of electronic communication ( like web and telephone etc) It has been done by friends, family , classmates or other unknown person. Sending harmful emails to a person create fake website to make fun of or to make harm a person by distributing some fake information about a person are some cases of cyber bulling. In most cases they do not reveal their identities. Due to this , bullied person are affected emotionally and mentally.
How to protect Never opened email send from unknown person Keep your password secret. Becarefull when you are posting some on social media.
Plagiarism It is stealing or copying someone else intellectual work (can be idea, literal or academic work). And representing as your own work without giving any credit to the creator or without citing the source of information.
How to protect While writing, always write in your own words. Always use a plagiarism checker before any updates. If you are taking someone else work , then always give the credit to the original writer in the text citation.
Spamming It is an unethical activity in which bulk unwanted email send it to you from strange or unknown sources. Sometimes , due to the bulk emails your mail server gets full and mail bombing activity happened. These are usually use to send viruses to the user.
How to protect To prevent Spam email, install filtering or blocking software. In your mailbox,if you find some suspicious mail then immediately delete the email without opening it. Always keep your software updated. Never open a link that is send by a unknown person.