You are on page 1of 21

IT 113

Ethics for IT Professionals


P R O F. R E Y N A N E . D E M A F E L I Z
Stanford Encyclopedia Of Philosophy
Computers Professionals For Social Responsibility
Computer Ethics - code of ethics in computing
Computer Ethics Information Security Education
and Awareness
S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

What is Ethics?
-

refers to the standards and rules that


"should" be followed and it helps us to
regulate our conduct in a group or with a
set of individuals.
Since the term, Ethics is a relative term, it
is branched under philosophy, which
states how users of World Wide Web
should make decisions regarding their
conduct.
S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

What is Ethics and its Value in IT?


In very simple term ethics is nothing more than your belief towards the
action and happening situations.
As the world is adopting the new technology the need of ethics arises to
sustain the proper growth and to minimize the risk of wrong uses.

S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

Ethics...
Derived from the Greek word ethos, which
means custom, habit, and way of living
Definition: "the discipline and practice of
applying value to human behavior, resulting
in meaningful conduct.

S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

Computer Ethics
is a new branch of ethics that is
growing and changing rapidly as
computer technology also grows and
develops.
defined as the set of moral principles
that govern the usage of computers
a set of moral principles that govern
individual or a group on what is
acceptable behavior while using a
computer.

S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

Why do we need
Computer Ethics ?
The growth of the WWW (World Wide Web) has
created several novel legal issues .
The existence of new questions that older laws
cannot
answer and
traditional
laws
are
outdated/anachronistic in this world. Thus, a more
coherent body of law is needed to govern Internet
and computers.

S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

Beginning of IT
and Evaluation of Ethics for IT
Information Technology gets its huge popularity after
year 1995 when Microsoft Company initially launched
the office programs for computers.
Today whole world is relying on such office suites.

Code of Cyber Ethics for IT Professionals


For purposes of this Code, the following terms are defined as
follows:
Information Technology
- the preparation, collection, creation, transport, retrieval,
storage, access, presentation and transformation of electronic
information in all its forms including but not limited to, voice,
graphics, text, video, data and image.
Information Technology Professional
- one who develops or provides information technology
products and/or services to the public.

S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

Code of Cyber Ethics

Information stored on the computer should be treated as seriously as


written or spoken word.
Privacy should not be violated. In case of academic use, it is known
plagiarism.
Information from public viewing should not be modified or deleted or
inaccessible since these are considered as destructive acts.
Intrusive software such as "worms" and "viruses" which are destructive
to the computer system is also illegal.
Congesting somebodys system with a lot of unwanted information is
also unethical.
Sending obscene and crude messages through mail or chat is also
forbidden.
Sending sexually explicit content, message or pictures is also forbidden.

S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

What Ethics can be Followed in IT?


Never Piracy Online
Follow Up the Social Reputation
Never Harm the Public Websites
Closure of Digital Hacking
Certify Websites Who Deal with Payments
Never Do Fraudulent Activities
Never Give Misguided Information
Never Steal Information online for Reproduction
Never Create a False Evidence Using IT
Utilizing the IT in a Manner to Get Benefits Only
S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

P
R
E
A
M
B
L
E

I will use my special knowledge and skills for the benefit of the public. I will serve
employers and clients with integrity, subject to an overriding responsibility to the public
interest, and I will strive to enhance the competence and prestige of the professional. By
these, I mean:

I will promote public knowledge, understanding and appreciation of information technology;

I will consider the general welfare and public good in the performance of my work;

I will advertise goods or professional services in a clear and truthful manner;

I will comply and strictly abide by the intellectual property laws, patent laws and other related laws in respect of information
technology;

I will accept full responsibility for the work undertaken and will utilize my skills with competence and professionalism;

I will make truthful statements on my areas of competence as well as the capabilities and qualities of my products and
services;

I will not disclose or use any confidential information obtained in the course of professional duties without the consent of the
parties concerned, except when required by law;

I will try to attain the highest quality in both the products and services I offer;

I will not knowingly participate in the development of Information Technology Systems that will promote the commission of
fraud and other unlawful acts;

I will uphold and improve the IT professional standards through continuing professional development in order to enhance the
IT profession.

S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

1. Thou shalt not use a computer to harm other people.


2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have
not paid.
7. Thou shalt not use other people's computer resources without
authorization or proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you
are writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure
consideration and respect for your fellow humans
S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

IMPACT OF COMPUTERIZATION
o Computers are often far more efficient than humans in
performing many tasks.
o In the industrialized world many workers already have
been replaced by computerized devices ;
bank tellers, auto workers, telephone operators,
typists,
graphic artists, security guards, assembly-line
workers, and on and on.
o Even professionals like medical doctors, lawyers, teachers,
accountants and psychologists are finding that computers
can perform many of their traditional professional duties
quite effectively.
S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

ETHICAL PROBLEMS RELATED TO COMPUTERS


- Privacy
Computers create a false sense of security
People do not realize how vulnerable information stored on computers are
- Property
Physical property
Intellectual property
Data as property
- Access
Access to data
- Accuracy
Accuracy of information stored
- Hacking, cracking and virus creation
- Software piracy
S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

Computer Crimes
Illegal access
Illegal Interuption
Data Interfare
System Interference
Misuse Of Devices
Electronic Fraud
S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

How do cyber criminals acts?


Target of the crime
Medium of the attack (Methods)
-

Brute force attack (dictionary based)


Phishing
Key logging
Hardware bypassed
Data Tampering
Programming Techniques

Tool
S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

Types of Cyber Criminals


Outsiders
Insiders

Reasons for Computer Crime ;


ECONOMIC
IDEOLOGICAL
PSYCHOLOGICAL
EGOCENTRIC

S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

What is a Computer Virus?


- are small software programs that are
designed to spread from one computer to
another and to interfere with computer
operation.

S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

How Computer Virus Spread-out?


Spread through E-mail
Attachments,
Instant Messaging messages,
Funny Images,
Audio and Videos files,
Downloading files from Internet,
Programmable Greeting cards and
many more.

S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

Steps to help avoid Viruses ;


Use an Internet firewall,
Subscribe to industry standard
antivirus software,
Never open an e-mail attachment
from someone you don't know,
Scan each and every attachment,
Observe rules to be followed, while
surfing net
S K S U I N F O R M ATI O N T E C H N O L O G Y D E P ARTM E N T

What is Piracy?
Today people are becoming rare who
purchase things online. Everyone is
searching things for free and piracy word
commenced from here only.
Reselling Media
Downloading from a website
Taping songs
Buying a used book or CD
Watching broadcast television but skipping
commercials

You might also like