You are on page 1of 12

L

A
C
I
H
T
E
R
COMPUTE
S
R
E
S
U
G
N
O
M
A
S
E
U
S
IS

SUE,
IS
S
IC
H
T
E
R
E
T
U
P
M
O
C
,
S
THIC
E
R
E
T
U
P
M
O
C
O
T
N
IO
T
C
U
Y,
C
INTROD
A
IV
R
P
,
L
A
IC
S
Y
H
P
&
L
A
GIC
LO
:
Y
IT
R
U
C
E
S
,
N
IO
T
A
IC
IF
S
USERS CLAS
ETHICS

INTRODUCTION TO COMPUTER ETHICS


What is computer ethics?

Computer ethics is set of moral principles that regulate the use of computers

What is example of bad computer ethics?

Log-in to computer using someone else id and password and read her/his personal data

What is privacy?

Right to control what happens with personal information about people


The claim of individuals, groups or institutions to determine when, how and to what extent information
about them is communicated to others

What is security?

In information technology, security is the protection of information assets through the use of technology,
processes, and training.

ISSUES IN COMPUTER ETHICS


Hacking" originally involved illegal computer trespassing.

Two kinds of hackers, "white hat" hackers and "black hat" hackers

Disruption of service or the gaining of proprietary or personal information from the network

White hat hackers are hired by businesses to test internal computer systems in order to determine its integrity and
whether or not there are vulnerable points of entry for outsiders. white hat hackers therefore use their powers for
good, and can also create new and useful software.

ISSUES IN COMPUTER ETHICS


Harassment, such as cyber-bullying or cyber-stalking

cyber-stalking is intimidation through the use of electronic means, such as email, online

forums, electronic bulletin boards, or social networking communities such as myspace or


facebook.

Computer Theft

Is defined as the unauthorized used of another persons property such as get online material
with no cost

ISSUES IN COMPUTER ETHICS


Computer fraud

is the crime of obtaining money by deceiving (to trick) people through the use of computers

such as email hoaxes, program fraud, investment schemes and claim of expertise on certain
fields

Copyright infringement
is

a violation of the rights secured by a copyright. it occurs when you break the copyright laws
such as copying movie, software or cds illegally

EXAMPLE OF COMPUTER ETHICS CODE


THE TEN COMMANDMENTS OF COMPUTER ETHICS

THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE.


THOU SHALT NOT INTERFERE WITH OTHER PEOPLE'S COMPUTER WORK.
THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE'S COMPUTER FILES
THOU SHALT NOT USE A COMPUTER TO STEAL.
THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.
THOU SHALT NOT COPY OR USE PROPRIETARY SOFTWARE FOR WHICH YOU HAVE
NOT PAID.

EXAMPLE OF COMPUTER ETHICS CODE


THE TEN COMMANDMENTS OF COMPUTER ETHICS

THOU SHALT NOT USE OTHER PEOPLE'S COMPUTER RESOURCES WITHOUT

AUTHORIZATION OR PROPER COMPENSATION


THOU SHALT NOT APPROPRIATE OTHER PEOPLE'S INTELLECTUAL OUTPUT.
THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU
ARE WRITING
OR THE SYSTEM YOU ARE DESIGNING.
THOU SHALT ALWAYS USE A COMPUTER IN WAYS THAT ENSURE CONSIDERATION
AND
RESPECT FOR YOUR FELLOW HUMANS.

PROTECTION AGAINST COMPUTER ETHICAL ISSUES

Authentication

Is a process where user verifies their identity.


Method:

User Identification
Possessed Object
Biometric Device

PROTECTION AGAINST COMPUTER ETHICAL ISSUES

Cyber law

Cyber laws are made to force people to be good


Example:

Computer Crime Act 1997


Copyright (Amendment) Bill 1997

PROTECTION AGAINST COMPUTER ETHICAL ISSUES

Logical security

Logical security refers to the process of using software-based techniques for authenticating a

user's privileges on a specific computer network or system.


Which involves both hardware and software methods for securing a terminal or network.
For example: include usernames and passwords

PROTECTION AGAINST COMPUTER ETHICAL ISSUES


Physical security

The protection of personnel, hardware, programs, networks, and data from physical

circumstances and events that could cause serious losses or damage to an enterprise,
agency, or institution.
Example:

Anti-theft cabling (i.e., an alarm sounds when any piece of equipment is disconnected from
the system)

Magnetic key card /swipeable key card


Lock

ACTIVITY - 3
IN THE SAME GROUP:

IDENTIFY AND EXPLAIN 1 COMPUTER CRIME AND ITS SOLUTION


EXPLAIN ACM COMPUTER ETHICS
EXPLAIN 1 CYBER LAW
PRESENT TO THE CLASS

You might also like