Introduction to Computer Ethics

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Lecture 2: What is Computer Ethics? Special Status of Computer Ethics It is not enough that you should understand about applied science in order that your.
Social and Ethical Implications CMSC 101 November 21, 2013 Bhuvana Bellala and Marie desJardins.
Ethical Hacking Pratheeba Murugesan. HACKER AENDA  What is Ethical Hacking?  Who are ethical hackers?  Every Website-A Target  Get out of jail free.
Cyber Ethics Moral Values in Cyber Space The Good, the Bad, and the Electronic.
CyberEthics Essay Outline
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Ethical Hacking by Shivam.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Computer Ethics Overview Gordon College. Introduction  Computer ethics is growing and changing as computers are growing and changing growing and changinggrowing.
Introduction to Computer Ethics
Fall 2014 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering What is Computer Ethics? Fall 2014 Marco Valtorta.
COMPUTER ETHICS & COMPUTER HACKING. Introduction Ethics is the branch of philosophy that involves systemizing, defending and recommending concepts of.
UNESCO ICTLIP Module 1. Lesson 71 Introduction to Information and Communication Technologies Lesson 7. What are the trends and issues in ICT development.
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Professional Practice Lecture 1: Introduction to Course.
Ethics Applied to Computerized World “Privacy” (Morality and Machines S. L. Edgar) **** CS575 *** Jules R. NYA BAWEU.
ITGS Standard Level Mr Gavin Johnson. ITGS The Diploma Programme information technology in a global society (ITGS) course is the study and evaluation.
Why computer ethics Based on “Computer Ethics” by Johnson, Prentice Hall 2001 & “A Gift of Fire by Baase”, Prentice Hall 2003 CS480 Computer Science Seminar.
Introduction to Computer Science
Questions, Quandaries, and Random Thoughts Laura E. Hunter
Computer Ethics Chapter 2 Why Computer Ethics Hassan Ismail Abdalla.
Computer Ethics. What is Computer Ethics? Deborah G. Johnson: Respect for Proprietary Rights Richard Stallman: Sharing Eugene H. Spafford: Something irrelevant.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
Chapter 1 Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics Introduction Cybertechnology, Ethical Concepts,
C OMPUTER E THICS : A G LOBAL PERSPECTIVE BY G IANNIS S TAMATELLOS Chapter 1 – Ranette Halverson.
Readings in Cyberethics Notes from book by Spinello.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Note set 1 Introduction to Computer Ethics Course webpage:
1 Ethics of Computing MONT 113G, Spring 2012 Session 16 Introduction to Computer Ethics.
Reason, Relativity, and Responsibility in Computer Ethics
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 5 Analogical Reasoning.
First week. Catalog Description This course explores basic cultural, social, legal, and ethical issues inherent in the discipline of computing. Students.
Professional Ethics and Responsibilities Part-II
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
1 IT/Cybersecurity - ICRDCE Conference Day Aligning Program, Course, and Class Objectives / Outcomes.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Society for Maintenance and Reliability Professionals (SMRP)
Ethics and Moral reasoning
Seminar On Ethical Hacking Submitted To: Submitted By:
Chapter 16 – Careers in Information Technology
Ethical Hacking By: Erin Noonan.
Note addresses of authors: Floridi – Faculty of Philosophy
Information Technology Sector
An assessment framework for Intrusion Prevention System (IPS)
Legal and Ethical Responsibilities
The Legal System and Ethics in Information Security
Compliance with hardening standards
Department of Computer Science and Computer Engineering
Unit 3- Introduction to Computer Ethics
Introduction to Computer Ethics
Ethical questions on the use of big data in official statistics
Chapter 0: Introduction
chapter 3: Ethics, Technology and Values
Ethical Hacking.
Seminar COE 390 Presentations Skills
Introduction to Computer Ethics
Special Status of Computer Ethics
Entity-Relationship Diagram (ERD)
Computer Ethics.
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Ethics IN PRIVATE SECURITY
COMPUTER ETHICS & COMPUTER HACKING
“Hacking” and Computer System Security
Chapter 1 Key Security Terms.
Presentation transcript:

Introduction to Computer Ethics

Computer ethics defined (1) The ethical questions that arise as a consequence of the development and deployment of computing technologies. This involves: clarifying the issues & problems developing a framework for their resolution Johnson & Nissenbaum

Computer ethics defined (2) The analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology James Moor

Computer ethics defined (3) Computer ethics examines the impact of computers on our social, legal, and moral systems … Tavani

The uniqueness of the computer It plays a defining role in the world It has expanded capabilities And provides expanded possibilities It has created new entities The scale of computer-dependent activities is greater than ever because of its: Speed Scope Ability to store & manipulate large amounts of data Ability to perform complex calculations

The uniqueness of computer ethics? Consider some examples of the impact of this unique technology: Privacy issues Intellectual property issues Workplace issues Effects of malfunctions

Deborah Johnson New species have special features and…if we simply treat them as the same as other familiar cases we may fail to recognize how the new features change the situation in morally significant ways.

James Moor The logical malleability & informational enrichment capabilities of computers give rise to policy vacuums caused by conceptual muddles.

Computer ethics as a field of professional ethics Most professions promote standards for acceptable behavior. What special responsibilities do computer professionals have?

Computer ethics as a field of philosophical ethics Johnson New species of old problems Moor Filling ethical policy vacuums Brey Disclosive ethics

Ethical Hacking Independent computer security Professionals breaking into the computer systems. Neither damage the target systems nor steal information. Evaluate target systems security and report back to owners about the vulnerabilities found.

Ethical Hackers but not Criminal Hackers Completely trustworthy. Strong programming and computer networking skills. Learn about the system and trying to find its weaknesses. Techniques of Criminal hackers-Detection-Prevention. Published research papers or released security software. No Ex-hackers.