Computing & Ethics

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

1

COMPUTING & ETHICS

COMPUTIN
G & ETHICS
2
COMPUTING & ETHICS

INTRODUCTION
3

The advancement of the


I n f o r m a t i o n Te c h n o l o g y fi e l d
has resulted in the world
w i t n e s s i n g t r e m e n d o u s l y,
brilliant changes. IT is a
powerful tool if used correctly
in the right hands. It unleashes
the creativity and ideas which
were previously thought to be
u n h e a r d o f. H o w e v e r, e v e r y
rose has its thorn and the
same can be said for the IT
fi e l d . L e t u s s e e h o w :
4

ETHICAL ISSUES
IN COMPUTING
Ethics is a set of moral principles that
govern the behaviour of a group or
individual.
Similarly, computer ethics is a set of moral principles that
COMPUTING & ETHICS

regulate the use of computers. Some ethical values are:

• Do not use the computer to harm other people’s data

• Do not use the software unless you pay for this software

• It is wrong to claim ownership of a work that is the


output of someone else’s intellect.

The significance of computer ethics that are discussed


includes societal well-being, honesty and trustworthiness,
safeguard of data, privacy respect, creation of job
opportunities. The need for computer ethics is a result of
the adverse effects brought by computers in society.
5

INTELLECTUAL
PROPERTY RIGHT
Intellectual property rights (IPR) refers to the legal
rights given to the inventor or creator to protect
his invention or creation for a certain period of
time
COMPUTING & ETHICS

Intellectual software has the following properties:

• Software Patent: A software patent is a patent that protects computer


software. Patent laws can be used to restrict freedom of copying, use,
distribution and modification of published information.

• Software Copyright: Software copyright is the legal protection for code


meant to be read by a machine. It is used by software developers and
owners to keep people from copying their intellectual property without
permission or from using it in any way they haven't agreed to.

• Trademark: A trademark is a type of intellectual property consisting of a


recognizable sign, design, or expression that identifies products or
services from a particular source and distinguishes them from others.
6

DATA PROTECTION
ON THE INTERNET
D a t a p r o t e c t i o n c a n b e d e fi n e d a s t h e
security or protection of data or
information on the internet from
computer viruses, spammers or hackers
COMPUTING & ETHICS

The Data Protection Act (1988) plays an important role in


taking care of users and protecting their personal
information. We must take care of the following points to
protect data:

• Do not disclose passwords

• Do not download unwanted software

• Do not read unwanted emails, as they may carry viruses

• Install high quality antivirus programs


7

SPAM
Unwanted messages which come into your mailbox
are called Spam and they may carry viruses.
COMPUTING & ETHICS

Ways to stop spam:


• Installing good antivirus software
• Avoid reading e-mail messages from
unrecognized senders and delete them.
8

SOFTWARE PIRACY
Software piracy means illegal copying,
reproduction distribution or use of
software. It is also known as act of
stealing legally protected software
COMPUTING & ETHICS

Some forms of piracy are:

• Licensed user duplication for unlicensed users:


Refers to copying/distribution of software
without proper license.

• Illegal internet distribution: When ordering a


software, make sure it is from an authorized
distributor or else there is no guarantee if the
9

CYBER CRIME
COMPUTING & ETHICS

Cybercrime is any activity involving a


computer, network or networked device for
criminal means. Cybercrime may harm
someone's security or finances.
10

REASONS FOR
CYBER CRIME
Most cybercrime is committed
by cybercriminals or hackers who
COMPUTING & ETHICS

want to make money. However,


occasionally cybercrime aims to
damage computers or networks for
reasons other than profit. These
could be political or personal.
Cybercrime can be carried out by
individuals or organizations.
11

CYBER CRIMINALS
The categories of cyber criminals are:

• Organised hackers: Refers to those who are


COMPUTING & ETHICS

organized together to fulfil certain objectives

• Professional hackers: Refers to hackers mostly


employed by business organisations to hack
the websites of their rivals and get credible,
reliable and valuable information.

• Discontent employees: Refers to people who


have been sacked by their employers or are
dissatisfied with their employers.
12

PREVENTION OF CYBER CRIME


COMPUTING & ETHICS
13

CYBER LAWS
India’s cyber laws are contained in
the Information technology Act
COMPUTING & ETHICS

2000. The act came into effect after


getting clearance from both the
houses of parliament in May 2000.
The bill received the assent of the
President of India in August 2000 as
the IT Act 2000.
14

ADVANTAGES OF CYBER LAWS


COMPUTING & ETHICS
15

HACKING
H a c k i n g c a n b e d e fi n e d a s a n a t t e m p t
to exploit a computer system. It
mainly involves unauthorized access.
COMPUTING & ETHICS

The reasons for hacking are:

• Theft of service

• To take valuable files

• Thrill and excitement

• Psychologically Disturbed

• For knowledge and experiment


16

MALICIOUS CODE
COMPUTING & ETHICS

Malicious code is any type of code that


causes harm to a computer system or
network. This includes viruses, worms,
Trojan horses, ransomware, logic bomb,
and other malicious programs. Malicious
code is the language used by threat
actors to communicate with computers.
17
PROTECTION AGAINST
MALICIOUS INTENT
AND MALICIOUS
CODE
The ways to protect our computer system are:

• Use high quality antivirus


COMPUTING & ETHICS

• If you are downloading a potentially corrupted


software, stop the download immediately

• Avoid usage of unauthorized software

• Avoid using memory cards and USB of others


as it may be infected

• Do not open potential spam e-mails


18
COMPUTING & ETHICS

YOU
THANK

You might also like