Download presentation
Presentation is loading. Please wait.
Published byFay Mosley Modified over 8 years ago
2
What is computer ethics? Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.
3
Hacking Copyright Infringement of software E-democratic technology Some questions in computer ethics
4
Ethical standards Association for Computing Machinery (ACM) code of ethics –Ethical behavior among computing professionals –Learned society –Founded in 1947
5
Computers in the Workplace: Are They Used Ethically? Then typewriters, filing cabinets, and correction fluid were the norm. Replaced by desktop and portable computers, database management systems, and word processing software. Benefits: You are already familiar with some of the benefits of using computers in the workplace
6
Two types: Crimes that target computer networks or devices directly, Crimes facilitated computer networks or devices, the primary target of which is independent of the computer network or device
7
COMPUTER CRIME Examples of crimes that primarily target computer networks or devices would include, Examples of crimes that primarily target computer networks or devices would include, Malware (malicious code) Malware Denial-of-service attacks Denial-of-service attacks Denial-of-service attacks Computer viruses Computer viruses Computer viruses
8
Examples of crimes that merely use computer networks or devices would include; Examples of crimes that merely use computer networks or devices would include; Cyber stalking Cyber stalking Cyber stalking Fraud and identity theft Fraudidentity theft Fraudidentity theft Phishing scams Phishing scams Phishing scams Information warfare Information warfare Information warfare
9
Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent.
10
A denial-of-service attack (DoS attack) or distributed denial-of- service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users.
11
computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. malwareadware spywaremalwareadware spyware
12
Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used.
13
Spyware is a type of malware that is installed on computers and collects little bits information at a time about users without their knowledge
14
Cyberstalking is the use of the Internet or other electronic means to stalk someone.
15
a fraud is an intentional deception made for personal gain or to damage another individual
16
criminal fraud include : Banckruptcy fraud benefit fraud False advertising False billing False insurance claims forgery Health fraud Identity theft Marriage fraud taking payment for goods sold online, by mail or phone, such as tickets, with no intention of delivering them Tax fraud, (tax evasion), tax evasiontax evasion
17
Identity theft Five categories: –business/commercial identity theft –criminal identity theft –financial identity theft –identity cloning –medical identity theft
18
Techniques for obtaining personal information Researching about the victim in government Remotely reading information from an RFID chip on a smart card, RFID-enabled credit card, or passport. Stealing payment or identification cards Stealing personal information from computers and computer databases Advertising bogus job offers
19
phishing is the criminally fraud process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
20
Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. –Collection of tactical information, –Assurance(s) that one's own information is valid, –spreading of propaganda or disinformation to demoralizethe enemy and the public
21
Television and radio transmission(s) can be jammed. Television and radio transmission(s) can be hijacked for a disinformation campaign. Logistics networks can be disabled. Enemy communications networks can be disabled. Stock exchange transactions can be sabotaged, either with electronic intervention, leaking sensitive information or placing disinformation. sabotaged
22
Computer security
23
What is computer security? Why should I care about computer security? Who would want to break into my computer at home? How easy is it to break into my computer?
24
Information security is concerned with three main areas: Confidentiality - information should be available only to those who rightfully have access to it Integrity -- information should be modified only by those who are authorized to do so Availability -- information should be accessible to those who need it when they need it
25
Electronic Commerce Act Electronic commerce, commonly known as (electronic marketing) e- commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks computer networkscomputer networks
26
Cybercrimes
27
The Department of Justice categorizes computer crime in three ways : The computer as a target The computer as a weapon The computer as an accessory
28
Personal responsibility Contribute to society and human well-being Avoid harm to others Be honest and trustworthy Be fair and take action not to discriminate Honor property rights including copyrights and patent
29
Give proper credit for intellectual property Respect the privacy of others Honor confidentiality
30
Social network service
31
A social network service focuses on building and reflecting of social networks or social relations among people, e.g., who share interests and/or activities. A social network service essentially consists of a representation of each user (often a profile), his/her social links, and a variety of additional services.
32
Philippine IT Related Laws Ten Commandments of Computer Ethics Other Emerging Issues in IT
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.