Download presentation
Presentation is loading. Please wait.
Published byRichard Phillip Clark Modified over 9 years ago
1
COMPUTER ETHICS
2
What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society.
3
What is computer ethics? for example, while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics would suggest that it is wrong to do so without the author's approval. while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical.
4
SOFTWARE PIRACY Public domain - some software is free to use, copy, and/or change, but only do so if there is written notice that the software is in the public domain. Look for this notice in the “read me” files that accompany programs General Public License - GPL software has the same restrictions as public domain software, but cannot be sold for profit Shareware - using shareware programs is free, but it is illegal to copy or modify them without permission since they are copyrighted. Most shareware programs are really trial versions of the software, which must be paid for after the trial period has expired
5
SOFTWARE PIRACY When you purchase a copy of a software program, you are actually buying a software license, or in the case of an organization that needs many copies, a site license. A software license can only be copied for backup purposes while site licenses let the organization make a specific number of copies to be used within that organization only. Although it seems common, software piracy is a felony and shouldn’t be taken lightly
6
MP3’s Downloading and/or uploading music is a violation of copyright laws. It is not true that keeping the file for less than 24 hours is legal and it is a myth that uploading is legal if you have paid for the original work “Fair use” permits the use of a small section of a work if the copyright holder is reimbursed or has given permission for the use of his or her work. If you use more than 10 percent or 30 seconds of the original work, you are participating in copyright infringement
7
Plagiarism Plagiarism is presenting someone else’s work as your own; this includes work represented in hard copy, on disk, or on the internet Make sure you summarize, or at least change the order of the words when using someone else’s work Cite that work Copyright infringements can can cause some serious penalties
8
Respectful Use of Equipment and Internet Access A general rule when it comes to computer ethics is RESPECT
9
Respect Yourself Do not give out your passwords Don’t say or do anything that could damage your reputation, even if you think it’s impossible for someone to fin it or know it was you Protect your identity Log out of portals Don’t leave copies of your printed pages in a common printer
10
Respect Others Don’t harass or threaten anyone using a computer Don’t abuse your access to resources like storage space
11
Respect Academic Integrity Cite any information copied from the internet Ask permission to copy or modify software unless it is in the public domain
12
The Ten Commandments of Computer Ethics Thou shalt not use a computer to harm other people it is unethical to use a computer to harm another user. It includes harming or corrupting some other user's data or files. it is wrong to steal someone's personal information by means of a computer. It is unethical to manipulate or destroy the files of other people through the use of a computer. It iterates the fact that writing a programs intended to bring perform ethically wrong actions, is in itself unethical.
13
The Ten Commandments of Computer Ethics Thou shalt not interfere with other people's computer work. Viruses are small programs built with intent to harm or disrupt the useful computer programs. Some viruses aim at overloading the computer memory by an excessive use of computer resources. These viruses tend to fail a computer in executing the desired tasks. They lead to the dysfunction of a computer. The development or the spread of such malicious software is unethical.
14
The Ten Commandments of Computer Ethics Thou shalt not snoop around in other people's files it is unethical to read another person's email messages. Snooping around in another person's files or reading someone else's personal messages is the invasion of his/her privacy.
15
The Ten Commandments of Computer Ethics Thou shalt not use a computer to steal The stealing of sensitive information such as the personal information of the employees from an employee database, or breaking into bank accounts for the retrieval of confidential information is nothing less than robbery. An illegal electronic transfer of funds is one type of a fraud.
16
The Ten Commandments of Computer Ethics Thou shalt not use a computer to bear false witness. Computers are the easiest sources of spreading information to the masses by means of Internet. This also means that false news or rumors can spread speedily and easily through the Internet. Being involved in the circulation of incorrect information is unethical. Spreading the wrong information by means of Internet is like taking an undue advantage of technology.
17
The Ten Commandments of Computer Ethics Thou shalt not use or copy software for which you have not paid. Obtaining illegal copies of copyrighted software is unethical.
18
The Ten Commandments of Computer Ethics Thou shalt not use other people's computer resources without authorization. Breaking into some other user's password, thus indulging into his private space on the network is unethical. It is not ethical to hack passwords for gaining an unauthorized access to a passworded computer system.
19
The Ten Commandments of Computer Ethics Thou shalt not appropriate other people's intellectual output. Programs developed by a programmer in an organization are his/her property. Copying them and propagating them in one's own name is unethical. A creative work, a program or a design that a particular employee comes up with, is his/her ownership. It is the output of someone's intellect and efforts. Copying it with selfish intentions is indeed not ethical.
20
The Ten Commandments of Computer Ethics Thou shalt think about the social consequences of the program you write. it is the programmers responsibility to pay heed to the effects of his/her creation. In case of software, it is important for the programmer to realize the prospective use of the software. Writing a virus, when one knows that it is going to serve as a malware, is indeed unethical. If a particular content is intended for children or when children are prone to gain access to the content, it is necessary for the creator of such content to be careful about the social consequences it is bound to have.
21
The Ten Commandments of Computer Ethics Thou shalt use a computer in ways that show consideration and respect. In the real world, we face situations wherein we need to be courteous to our fellow mates. Many times, we need to cooperate with them and give each of the fellow individuals the consideration due. On similar lines, while interacting through a computer, a person needs to be nice to the ones he/she interacts with.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.