computer ethics
DESCRIPTION
PROFESSIONAL ETHICSTRANSCRIPT
![Page 1: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/1.jpg)
![Page 2: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/2.jpg)
THE LSPU MISSION AND VISION
![Page 3: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/3.jpg)
MISSION
“The University shall serve a center of excellence in agriculture, fisheries, forestry, science, engineering and
industrial technology, teacher education, information technology and other related fields in arts and sciences. It also serves as research
and extension services centers in its fields of expertise.”
![Page 4: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/4.jpg)
VISION
“A premier university in CALABARZON, offering academic programs and
related services designed to respond to the requirements of the Philippines and the global economy particularly
Asian countries”
![Page 5: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/5.jpg)
![Page 6: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/6.jpg)
COMPUTER ETHICS
![Page 7: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/7.jpg)
What is a Computer Ethics:
…………..Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct..
![Page 8: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/8.jpg)
Introduction:
A computer system consists not only of software , hardware, data/information and procedures, but also people (the users of computer system). Because computers systems are the products of human efforts, we cannot trust them anymore than we trust people. People can use computer systems for both good and bad purposes, and they may appreciate them or be suspicious of them when they use them.
![Page 9: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/9.jpg)
…..…….But regardless of how they use them or how they feel
about them, most people realize that computers have changed the way we live.
![Page 10: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/10.jpg)
![Page 11: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/11.jpg)
What are the consequences of the
widespread presence of the computer technology??
![Page 12: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/12.jpg)
.…..The threats to computers and communication
systems…….
![Page 13: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/13.jpg)
Introduction:
Information technology can be disabled by a number of occurrences. It
may be harmed by people, procedural, and software errors; by electromechanical
problems; and by “dirty data”. It may be threatened by natural hazards and by civil
strife and terrorism. Criminal acts perpetrated against computers include theft of hardware, software, time and
services, and information; and crimes of malice and destruction…
![Page 14: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/14.jpg)
….Computers may be harmed by viruses. Computers can also be used as
instruments of crime. Criminals may be employees, outside users, hackers, crackers,
and professional criminals…
![Page 15: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/15.jpg)
![Page 16: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/16.jpg)
Is computer technology creating more problems
than its solving??
![Page 17: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/17.jpg)
The threats to computers and communications systems…
Errors and AccidentsNatural and Other HazardsCrimes Against Information
TechnologyCrimes Using Information
TechnologyVirus
![Page 18: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/18.jpg)
Errors and Accidents
![Page 19: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/19.jpg)
…….In general, errors and accidents in computer systems may be classified
as People Errors, Procedural Errors, Software Errors,
Electromechanical Problems, and “Dirty Data” problems….
![Page 20: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/20.jpg)
People Errors
Recall that one part of computer system is the people who manage it or run it…
![Page 21: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/21.jpg)
Procedural Errors
Some spectacular computer failures have occurred because someone didn’t follow procedures..
![Page 22: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/22.jpg)
Software Errors
We are forever hearing about “Software Glitches” or software
bugs. A Software Bug is an error in a program that causes it
to malfunction..
![Page 23: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/23.jpg)
Electromechanical Problems
Absence of Electricity or power failure causing the system
not to work ..
![Page 24: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/24.jpg)
Dirty Data
Is Data that is incomplete, outdated or otherwise inaccurate
that causes errors in the computer system..
![Page 25: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/25.jpg)
Natural and Other Hazards
![Page 26: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/26.jpg)
Natural Hazards
What ever is harmful to property and to people, is harmful to computers and communication system. This certainly includes natural disasters…………Natural Hazards can disable all the electronic systems we take for granted…
![Page 27: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/27.jpg)
Civil Strife and Terrorism
![Page 28: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/28.jpg)
Crimes Against Computers and
Communications
![Page 29: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/29.jpg)
Information-technology Crime can be of two types:
1. Illegal act perpetrated against computers or telecommunications..
2. Use of computers or telecommunications to accomplish an illegal act..
![Page 30: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/30.jpg)
Crimes against information technology include theft….
1. Theft of Hardware2. Theft of Software3. Theft of Time and Services4. Theft of Information5. Theft of Malice and Destruction
![Page 31: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/31.jpg)
Crimes Using Computers and Communications……
Computers and communications or information technology has also been used to solve crimes….……..Just as a car can be used to assist in a crime, so can a computer or communication system..
![Page 32: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/32.jpg)
VIRUSES
![Page 33: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/33.jpg)
Viruses
Viruses are a form of high-tech maliciousness. Computer
Viruses are “Deviant” programs that can cause destruction to
computers that contract them…
![Page 34: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/34.jpg)
They are passed in two ways…….
1. Via an Infected Diskette
2. Via a Network
![Page 35: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/35.jpg)
Some common forms of Viruses…
Boot-sector VirusFile VirusWormLogic BombTrojan HorsePolymorphic VirusVirus Mutation Engines
![Page 36: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/36.jpg)
![Page 37: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/37.jpg)
Antivirus Software
Scans a computer’s hard disk, diskettes, and main memory to
detect viruses, and sometimes, to destroy them…..
![Page 38: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/38.jpg)
Computer Criminals
![Page 39: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/39.jpg)
What kind of people are perpetrating most of the Information Technology???
EmployeesOutside UsersHackersCrackersProfessional Criminals
![Page 40: COMPUTER ETHICS](https://reader035.vdocuments.site/reader035/viewer/2022081413/5487329fb4af9f807b8b4797/html5/thumbnails/40.jpg)