Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ethical Use of Computer

Similar presentations


Presentation on theme: "Ethical Use of Computer"— Presentation transcript:

1 Ethical Use of Computer
Lecture 5 Ethical Use of Computer

2 Lecture Outline Today’s Ten Commandment of Computer Ethics
Scenario Analysis Safe Use of Computer Social Networking Responsible use of Social Media

3 Computer Ethics Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers.

4 Ten Commandments of Computer Ethics
The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. Here is our interpretation of them: 1) Thou shalt not use a computer to harm other people:  If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files. (Source :

5 Ten Commandments of Computer Ethics
2) Thou shalt not interfere with other people's computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages.Generating and consciously spreading computer viruses are unethical. 3)Thou shalt not snoop around in other people's files: Reading other people’s messages is as bad as opening and reading their letters: This is invading their privacy.

6 Ten Commandments of Computer Ethics
4) Thou shalt not use a computer to steal:  Using a computer to break into the accounts of a company or a bank and transferring money should be judged the same way as robbery. It is illegal and there are strict laws against it. 5) Thou shalt not use a computer to bear false witness:  The Internet can spread untruth as fast as it can spread truth. Putting out false "information" to the world is bad. For instance, spreading false rumors about a person or false propaganda about historical events is wrong. 6) Thou shalt not use or copy software for which you have not paid:  Software is an intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. There are laws against both.

7 Ten Commandments of Computer Ethics
7) Thou shalt not use other people's computer resources without authorization: Multiuser systems use user id’s and passwords to enforce their memory and time allocations, and to safeguard information. You should not try to bypass this authorization system. Hacking a system to break and bypass the authorization is unethical. 8) Thou shalt not appropriate other people's intellectual output: For example, the programs you write for the projects assigned in this course are your own intellectual output. Copying somebody else’s program without proper authorization is software piracy and is unethical. Intellectual property is a form of ownership, and may be protected by copyright laws.

8 Ten Commandments of Computer Ethics
9) Thou shalt think about the social consequences of the program you write:  You have to think about computer issues in a more general social framework: Can the program you write be used in a way that is harmful to society? For example, if you are working for an animation house, and are producing animated films for children, you are responsible for their contents. Do the animations include scenes that can be harmful to children? 10) Thou shalt use a computer in ways that show consideration and respect:  Just like public buses or banks, people using computer communications systems may find themselves in situations where there is some form of queuing and you have to wait for your turn and generally be nice to other people in the environment. The fact that you cannot see the people you are interacting with does not mean that you can be rude to them.

9 Some Scenarios a) Silvia has walked away from a lab computer without logging off. Masud sits down and, still logged in as Silvia. He reads and sends inflammatory messages out to a number of students and posts similar messages on the class newsgroup. Tamim had a report to write on “Business Communication”. He used several sources -- books, magazines, newspaper articles, and an electronic encyclopedia. But he did not list all these sources in his bibliography at the end of the report.

10 Some Scenario Aysha likes to play lots of practical jokes. Once she tried to log on to Rafi’s account, guessing his password was his wife’s name. She got directly into his account. She then wrote a program that would flash the message “There is no Escape” every time the escape key was pressed. Rafi found the joke in a few days and was mad. Joe is giving an on-line demonstration in which he uses software that was licensed for 90 days. Prior to giving the ethics scale seminar, he has noted that the license would expire. Rather than pay the licensing fee, he changes the date on his computer, effectively fooling the software into believing it is at the beginning of the licensing period.

11 Safe Use of Computer Acceptable Use of the Internet
Handling User Accounts & Passwords - Don't save your logon information Use Strong Password Use Public Computers Carefully Surfing the Web and e-Shopping Protecting Against Spam s, Use Antivirus Securing Your wireless Network Don't enter sensitive information into a public computer

12 What is Social Networking?
Social Networking is defined as: A phenomena defined by linking people to each other in some way by topicguru.com A social network service focuses on building online communities of people who share interests and/or activities, or who are interested in exploring the interests and activities of others by wikipedia.com This is where people develop networks of friends and associates. It forges and creates links between different people. A social network can form a key element of collaborating and networking by edublog.org Lets find out more……

13 The Top Social Networking Sites
There are many different social networking sites. The most popular are as follows: Facebook Twitter YouTube LinkedIn Google+ Pinterest Hi5 Orkut MySpace

14

15 So what's all the Hype? What exactly is Facebook®?
Facebook® is a “social networking website” Facebook® is a free service that allows you to create an online page to connect with friends, family, or make new friends with anyone anywhere. On your Facebook® page you can share pictures, personal information , messages, videos , join groups and add applications.

16

17 History Company Overview:
Facebook® was founded in 2004 by Harvard student Mark E. Zuckerberg with help from his roommates Dustin Moskovitz and Chris Hughes. Facebook® was originally for Harvard students then expanded to other colleges then to anyone over the age of 18, and now currently to anyone 13 years of age or older. Company Overview: “Facebook's mission is to give people the power to share and make the world more open and connected.”

18 Facebook® is a social networking website
Facebook® is a social networking website. You can access Facebook® by login into and this is what you will see….

19 Major points available on facebook.com:
Privacy Policy Major points available on facebook.com: You should have control over your personal information. Facebook® helps you share information with your friends and people around you. You choose what information you put in your profile, including contact and personal information, pictures, interests and groups you join. And you control the users with whom you share that information through the privacy settings on the Privacy page. Children between 13-18 Facebook® recommends that minors 13 years of age or older ask their parents for permission before sending any information about themselves to anyone over the Internet. Sharing Your Information with Third Parties Facebook® share your information with third parties under the following circumstances: 1) reasonably necessary to offer the service, 2) legally required or, 3) permitted by you.

20 Staying safe on Facebook®/ Internet
Available on : Some important safety tips when using Facebook®: Keep the amount of private information you post to a minimum. Never post information like your address, birthday, telephone number, class schedule, or anything else that you would not want a stranger to know. Keep your password a secret Make sure to adjust your privacy setting so only people you want to review you page can Be cautious about posting and sharing personal information, especially information that could be used to identify you or locate you offline, such as your address or telephone number Block and report anyone that sends you unwanted or inappropriate communications

21 Fun Facts Facebook® has over 200 million users
Over 70% of Facebook® users are outside the United States The average person has 120 friends on Facebook® More than 3.5 billion minutes are spent on Facebook® each day The fastest growing demographic is those 35 years old and older Slogan “Facebook® helps you connect and share with the people in your life.”

22 Relationships Does Matter in Business

23 Revenue as per Q1 2011: US$ 121 millions Slogan: Relationships Matter
Founder: Reid Hoffman Former board member of PayPal Founded on December 2002 Launched Date: May Revenue as per Q1 2011: US$ 121 millions Slogan: Relationships Matter Listed: NYSC May 2011

24

25 Responsible Use of Social Networking
Assume that EVERYONE has access to your profile. USE DISCRETION when putting pictures (or any content for that matter) on your profile Assume people WILL use the information on your profile to cause you harm Assume there are predators out there trying to FIND YOU You may be held RESPONSIBLE for inappropriate content on your profile

26 Questions/ Confusions?


Download ppt "Ethical Use of Computer"

Similar presentations


Ads by Google