Social and Ethical Issues of Information Technology

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 41

Social And Ethical Issues Of Information

Technology `
Contents

What is Ethics and Information Technology??

Ethical issues relating to computer application

Security Threats

Computer Viruses

Cyber Crime

Software piracy and Hacking

Computer crime preention

Case Study

Ethical dilemmas and consideration


Ethics

Derived from the Greek word ethos, which means


custom, habit, and way of living

Definition: "the discipline and practice of


applying alue to human behaior!
resulting in meaningful conduct.
Cont.

"rofessional Ethics# concerns one's conduct of behavior and


practice when carrying out professional work, e.g., consulting,
researching, teaching and writing.

A computing professional must understand

Cultural, social, legal, and ethical issues in computing.

Responsibility and possible consequences of failure.


Computer Ethics

Computer ethics defined as the application of classical


ethical principles to the use of computer technology.

Ethical problems related to computers:

Privacy

Computers create a false sense of security

People do not realie how vulnera!le information stored on


computers are

Property

Physical property

"ntellectual property #in !oth copyri$ht and patent%

Data as property

Access

Access to computing technology

Access to data

Accuracy

Accuracy of information stored

Hacking, cracking and virus creation

Software piracy
The Ten Commandments of computer ethics have been defined by
the Computer Ethics Institute.

1) Thou shalt not use a computer to harm other people.

2) Thou shalt not interfere with other people's computer


work.

3) Thou shalt not snoop around in other people's files.

4) Thou shalt not use a computer to steal.

5) Thou shalt not use a computer to bear false witness.

6) Thou shalt not use or copy software for which you have
not paid.

7) Thou shalt not use other people's computer resources


without authorisation.

8) Thou shalt not appropriate other people's intellectual


output.

9) Thou shalt think about the social consequences of the


program you write.

10) Thou shalt use a computer in ways that show


consideration and respect.
Computer Virus
What is Computer Virus?

Computer viruses are small software programs that are designed to


spread from one computer to another and to interfere with
computer operation.
Spreading of Virus

Virus are most easily spread,

Spread through E-mail Attachments,

Instant Messaging messages,

Funny Images,

Audio and Videos files,

Downloading files from Internet,

Greeting cards and many more.


Steps to help avoid Viruses

&se an "nternet firewall,

'u!scri!e to industry standard antivirus software,

(ever open an e)mail attachment from someone you


don*t know,

'can each and every attachment,

+ules to !e followed, while surfin$ net


COMPUTER CRIMES
TYPES OF COMPUTER CRIMES

TARGET OF THE CRIME

MEDIUM OF THE ATTACK

TOOL

INTIMIDATE OR DECEIVE
Types of Computer Criminal

Outsiders

Insiders
REASON FOR COMPUTER CRIME

ECONOMIC

IDEOLOGICAL

PSYCHOLOGICAL

EGOCENTRIC
METHODS OF ATTACK

DATA TEMPERING

Programming Techniques

OTHER METHODS
Computer Crime can be Defined
as

", "nfrastructure

"lle$al access

"lle$al "nteruption

Data "nterfare

'ystem "nterfrence

-isuse .f Devices

/lectronic 0raud
Software piracy and Hacking
What is
PIRACY???????

Reselling Media

Downloading from a website

Taping songs

Buying a used book or CD

Watching broadcast television but skipping commercials


Types of PIRACY

End User Piracy

Client Server Piracy

Internet Piracy

Hard-Disk Piracy

Software Counterfeiting

End-User Piracy

This occurs when a company employee reproduces copies of


software without authorization

Copying disk for installation and distribution

Swapping disks in or outside the workplace


Client-Server Piracy

This type of piracy occurs when too many employees on a network


are using a central copy of a program at the same time.

System Overuse
Internet Piracy

This occurs when software is downloaded from the Internet The


same purchasing rules should apply to online software purchase as
for those bought in traditional ways.

Pirate website

Unauthorized transfer of copyrighted program


Hard-Disk Loading

This occurs when a business who sells new computers loads illegal
copies of software onto the hard disks to make the purchase of the
machines more attractive.

Value Added Resellers (VAR)


Software Counterfeiting

This type of piracy is the illegal duplication and sale of copyrighted


material with the intent of directly imitating the copyrighted
product.
HACKER

Some one who bypasses the systems access controls by taking


advantage of security weaknesses left in the system by developers .
What HACKER do???????

SYSTEM

Access confidential information

Threaten someone from YOUR computer

Broadcast your confidential letters or materials .

Store illegal material


Evils of Hacking

Compromise the security of system without permission from an


authorized party, usually with the intent of accessing computers
connected to the network.
Advantage of Hacking

To determine problem and weakness for program

Creation of firewall

Useful for military purpose and spying

Better computer security


Computer crime prevention
Computer crime is becoming ever prevalent in our society. More
and more companies and individuals rely on the service and
resources provided through networks computers.
TYPES OF COMPUTER CRIME
PREVENTION

Internet crime prevention

Prevention of cyber crime

Prevention of computer crime in banking

IT security

Computer crime prevention law

Hi tech crime prevention law

Computer crime preventing on line fraud

World risk investigation and terrorist prevention


Case Study
of sole remaining supplier
Key points of Case Study

Introduction

Background (pacemaker)

Lack of dexterity in installation of pacemaker

Serious consequences

Transistor making company decided to pull its hand out of


business
Key points of Case Study

Realization of problem

Ethical dilemma

Different views in board of director

Theory of utilitarianism

solution
ETHICAL
DILEMMA
A!D
C"!IDERATI"!
Ethica# di#emmas in IT
Dilemmas are discussed in relation to four areas)

Privacy

"nformation accuracy

1ccess to information

"ntellectual property ri$hts


Ethica# di#emmas in re#ation to IT

P21G"1+"'-),he takin$ of ideas,writin$ and


drawin$s or other similar intellectual property created
!y others and presentin$ it as your own.

(/,"3&/,,/)1 set of rules #mainly unwritten% to


follow while you are online.
"ME IMP"RTA!T $IEW

"nternet offers $reat riches for the future,!ut poses


many threats.

,echnolo$y re4uires vi$ilance.

Considerations re$ardin$ information ethics influence


personal decisions,professional practice and pu!lic
policy.

You might also like