Download presentation
Presentation is loading. Please wait.
1
Ethical Uses of Computer
Lecture 7 Ethical Uses of Computer Mohammed Arif Mazumder Sr. lecturer Daffodil International University
2
Computer Ethics Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society.
3
Computer Ethics (Continue..)
For example, while it is easy to duplicate copyrighted electronic content, computer ethics would suggest that it is wrong to do so without the author's approval. And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical.
4
Ten Commandments of Computer Ethics
The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. Here is our interpretation of them: (Source : 1) Thou shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files.
5
Ten Commandments of Computer Ethics
2) Thou shalt not interfere with other people's computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses are unethical. 3)Thou shalt not snoop around in other people's files: Reading other people’s messages is as bad as opening and reading their letters: This is invading their privacy.
6
Ten Commandments of Computer Ethics
4) Thou shalt not use a computer to steal: Using a computer to break into the accounts of a company or a bank and transferring money should be judged the same way as robbery. It is illegal and there are strict laws against it. 5) Thou shalt not use a computer to bear false witness: The Internet can spread untruth as fast as it can spread truth. Putting out false "information" to the world is bad. For instance, spreading false rumors about a person or false propaganda about historical events is wrong. 6) Thou shalt not use or copy software for which you have not paid: Software is an intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. There are laws against both.
7
Ten Commandments of Computer Ethics
7) Thou shalt not use other people's computer resources without authorization: Multiuser systems use user id’s and passwords to enforce their memory and time allocations, and to safeguard information. You should not try to bypass this authorization system. Hacking a system to break and bypass the authorization is unethical. 8) Thou shalt not appropriate other people's intellectual output: For example, the programs you write for the projects assigned in this course are your own intellectual output. Copying somebody else’s program without proper authorization is software piracy and is unethical. Intellectual property is a form of ownership, and may be protected by copyright laws.
8
Ten Commandments of Computer Ethics
9) Thou shalt think about the social consequences of the program you write: You have to think about computer issues in a more general social framework: Can the program you write be used in a way that is harmful to society? For example, if you are working for an animation house, and are producing animated films for children, you are responsible for their contents. Do the animations include scenes that can be harmful to children? 10) Thou shalt use a computer in ways that show consideration and respect: Just like public buses or banks, people using computer communications systems may find themselves in situations where there is some form of queuing and you have to wait for your turn and generally be nice to other people in the environment. The fact that you cannot see the people you are interacting with does not mean that you can be rude to them.
9
Some Scenario Silvia has walked away from a lab computer without logging off. Masud sits down and, still logged in as Silvia. He reads and sends inflammatory messages out to a number of students and posts similar messages on the class newsgroup. Tamim had a report to write on “Business Communication”. He used several sources -- books, magazines, newspaper articles, and an electronic encyclopedia. But he did not list all these sources in his bibliography at the end of the report.
10
Some Scenario Aysha likes to play lots of practical jokes. Once she tried to log on to Rafi’s account, guessing his password was his wife’s name. She got directly into his account. She then wrote a program that would flash the message “There is no Escape” every time the escape key was pressed. Rafi found the joke in a few days and was mad. Joe is giving an on-line demonstration in which he uses software that was licensed for 90 days. Prior to giving the ethics scale seminar, he has noted that the license would expire. Rather than pay the licensing fee, he changes the date on his computer, effectively fooling the software into believing it is at the beginning of the licensing period.
11
Safe Use of Computer Acceptable Use of the Internet
Handling User Accounts & Passwords Using Software Use Public Computers Carefully Safe Online Social Networking Surfing the Web and e-Shopping Protecting Against Spam s, Use Antivirus Blog Safely Securing Your Wireless Network
12
Online Privacy & Safety
Don't save your logon information Don't leave the computer unattended with sensitive information on the screen Erase your tracks Watch for over-the-shoulder snoops Don't enter sensitive information into a public computer
13
Social Networking It's the way the 21st century communicates now!
Social networking is the grouping of individuals into specific groups, like small rural communities or a neighborhood subdivision.
14
The Top Social Networking Sites
There are many different social networking sites. The most popular are as follows: Facebook Twitter YouTube LinkedIn Google+ Pinterest Hi5 Orkut MySpace Baboo
15
Responsible Use of Social Networking
Assume that EVERYONE has access to your profile. Use DISCRETION when putting pictures (or any content for that matter) on your profile. Assume people will USE the information on your profile to cause you harm. Assume there are predators out there trying to FIND you. You may be held RESPONSIBLE for inappropriate content on your profile
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.