Computer Ethics
Computer Ethics
Computer Ethics
Introduction
• Ethics is a set of moral principals that govern the behavior of a group
or individual.
• Likewise, computer ethics is set of moral principles that regulate the
use of computers.
Common Issues of computer Ethics
• Some common issues of computer ethics include intellectual property
rights such as copyright electronic content, privacy concerns, and how
computers affect society.
• For Example: while it is easy to duplicate copyright electronic or
digital content, computer ethics would suggest that it is wrong to do
so without the author's approval.
• While it may be possible to access someone’s personal information on
a computer system, computer ethics would advice that such an action
is unethical.
Intellectual
• You have certainly heard the word property before: it is generally
used to mean a possession, or more specifically it is something to
which the owner has legal rights.
• You might have also encountered the phrase intellectual property. The
term has become more common during the past few years, specially
in the context of computer ethics but what exactly does it refers to?
Cont..
• Intellectual property refers to creation of the intellect (hence: the
name): invention, literary and artistic works, symbols, names, images
and design used in commerce are a part of it.
• Intellectual property is usually divided into two branches, namely
industrial property which broadly speaking protects inventions and
copyright, which protects literary and artistic works.
Categorizing intellectual property
• Intellectual property is divided into two categories
• Industrial property: which includes inventions (patents), trademarks,
industrial design, commercial names, designations and geographic
indications.
• Copyright: which includes artistic works such as novels, poems and
plays, films, musical works, artistic works such as drawings, paintings,
photographs, architectural designs.
Copyright
• Copyrights is a legal concept, enacted by most governments, giving
the creator of an original work exclusive rights to it, usually for a
limited time.
History of copyright
• Its origin in Britain were from a reaction to printers monopolies at the
beginning of the 18th century.
• Charles II of England was concerned by the unregulated copying of
books and passed the licensing of the press act 1662 by Act of
parliament.
Copyright on Internet
• But what if work made available to the public on the Internet? Are
they at all protected by copyright? Once again, Yes! For works made
available over a communications network. The copyright protects
original authorship.
• But according to the copyright law, it does not protect ideas,
procedures, systems or methods of operation. This means that once
such an online work has been made public, nothing in the copyright
laws prevents others from developing another work based on similar
principles, or ideas.
NETIQUETTES
• Netiquette is short for “Network Etiquette” just like etiquette which is
a code of polite behavior in society, netiquettes is a code of good
behavior on the Internet.
• Netiquette are about the various risks related to using the internet.
• It is about proper ways in which to use a network and to determine
whether information is reliable.
Real people exist behind the
computers
• You are dealing the people, not machines, so think twice before you
click on send button in mail or chat.
• You are not the only one using the network, keep these other people
in mind when you say something on a network.
Protect your Privacy
• Just as you would in the real world, be aware of risks, fraud and false
information which exists on the internet. Use common sense when
deciding whether information is valid or not.
Plagiarism
• It is copying someone else work and then passing It off as one’s own.
• Copying program written by other programmer and claiming it as your
own could be an act of plagiarism. It involves lying, cheating, fraud.
File Privacy
• Any computer document produced either by an individual in his
private home or in his office should remain private. No one has should
open any document unless authorized by the individual who created
the file himself.
Computer ethical hacking
• An ethical hacker is usually employed by an organization who trusts
him or her to attempt to penetrate network and computer systems,
using the same methods as a hacker, for the purpose of finding and
fixing computer security vulnerabilities.
A certified ethical hacker has obtained a certification in how to look for
the weaknesses and vulnerabilities in target systems and uses the same
knowledge and tools as a hacker.
Conclusion
• As technology advances, computers continue to have a greater
impacts on society. Therefore, computer ethics promotes the
discussion of how much influence computers should have in areas
such as artificial intelligence and human communication. As the world
of computers evolves, computer ethics continues to create ethical
standards that address new issues raised by new technologies.