computer ethics by anas habib
TRANSCRIPT
![Page 1: Computer Ethics By Anas Habib](https://reader031.vdocuments.site/reader031/viewer/2022020116/559e9eb31a28abc7048b473b/html5/thumbnails/1.jpg)
1Anas Habib
![Page 2: Computer Ethics By Anas Habib](https://reader031.vdocuments.site/reader031/viewer/2022020116/559e9eb31a28abc7048b473b/html5/thumbnails/2.jpg)
Topic: Computer Ethics & Society
Presented by: Anas Habib
2Anas Habib
![Page 3: Computer Ethics By Anas Habib](https://reader031.vdocuments.site/reader031/viewer/2022020116/559e9eb31a28abc7048b473b/html5/thumbnails/3.jpg)
EthicsAs with any powerful technology, computer can be use for both good or bad intentions. The standard that determine whether an action is good or bad are known as ethics.Computer Ethics are the moral guideline that govern the use of computer and information system.
3Anas Habib
![Page 4: Computer Ethics By Anas Habib](https://reader031.vdocuments.site/reader031/viewer/2022020116/559e9eb31a28abc7048b473b/html5/thumbnails/4.jpg)
HistoryNorbert WienerThe concept of computer ethics originated in
1950 when Norbert Wiener, an MIT professor and inventor of an information feedback system called "cybernetics", published a book called "The Human Use of Human Beings" which laid out the basic foundations of computer ethics and made Norbert Wiener the father of computer ethics.
4Anas Habib
![Page 5: Computer Ethics By Anas Habib](https://reader031.vdocuments.site/reader031/viewer/2022020116/559e9eb31a28abc7048b473b/html5/thumbnails/5.jpg)
Area of Computer Ethics
• Unauthorized use of Computer and network• Software theft• Information accuracy• Intellectual property rights• Code of conduct• Information piracy• Green computing
5Anas Habib
![Page 6: Computer Ethics By Anas Habib](https://reader031.vdocuments.site/reader031/viewer/2022020116/559e9eb31a28abc7048b473b/html5/thumbnails/6.jpg)
Unauthorized use of computer and networks
Unauthorized access is the use of computer or network without permission.
Unauthorized use is the use of computer or its data for unapproved or possibly illegal activities.
6Anas Habib
![Page 7: Computer Ethics By Anas Habib](https://reader031.vdocuments.site/reader031/viewer/2022020116/559e9eb31a28abc7048b473b/html5/thumbnails/7.jpg)
Software Theft
Steal Software
Media
Intentionally Erases
Programs
Illegally Copied a Program
Illegally register or activates a Program
7Anas Habib
![Page 8: Computer Ethics By Anas Habib](https://reader031.vdocuments.site/reader031/viewer/2022020116/559e9eb31a28abc7048b473b/html5/thumbnails/8.jpg)
Information Accuracy
Information accuracy is concern:Not all information on the web is correct because it is maintained by other people and companies.
User should evaluate the webpage before relying on its content.
Be aware that the organization providing access to the information may not be the creator of the information.
8Anas Habib
![Page 9: Computer Ethics By Anas Habib](https://reader031.vdocuments.site/reader031/viewer/2022020116/559e9eb31a28abc7048b473b/html5/thumbnails/9.jpg)
Intellectual property rights
• Intellectual property:It is a unique and original work such as ideas, inventions, art, writing, processes, company and product names, and logos.
• Intellectual property rights are the rights to which creator are entitle for their work.
• Copyright law issues led to the development of Digital right management (DRM), a strategy designed to prevent illegal distribution of movies, music and other digital content.
9Anas Habib
![Page 10: Computer Ethics By Anas Habib](https://reader031.vdocuments.site/reader031/viewer/2022020116/559e9eb31a28abc7048b473b/html5/thumbnails/10.jpg)
Code of conduct• An IT code of conduct is a written guideline that helps
determine whether a specific computer action is ethical or unethical.
1. Thou shalt not use a computer in ways that may harm people.2. Thou shalt not interfere with other people's computer work.3. Thou shalt not snoop around in other people's computer files.4. Thou shalt not use a computer to steal.5. Thou shalt not use a computer to bear false witness6. Thou shalt not copy or use proprietary software for which you have not paid.7. Thou shalt not use other people's computer resources without authorization
or proper compensation.8. Thou shalt not appropriate other people's intellectual output.9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing.10. Thou shalt always use a computer in ways that ensure consideration and
respect for your fellow humans.
10Anas Habib
![Page 11: Computer Ethics By Anas Habib](https://reader031.vdocuments.site/reader031/viewer/2022020116/559e9eb31a28abc7048b473b/html5/thumbnails/11.jpg)
Information Piracy
• Information Piracy refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
• It is important to safeguard your information.
11Anas Habib
![Page 12: Computer Ethics By Anas Habib](https://reader031.vdocuments.site/reader031/viewer/2022020116/559e9eb31a28abc7048b473b/html5/thumbnails/12.jpg)
Green Computing
• Green computing involves reducing electricity and environmental waste while using a computer.Green Computing Suggestion:
1. Use computer and devices that comply with ENERGY STAR program.2. Don’t leave the computer running overnight.3. Turn off the monitor, printer, and other devices when not in use.4. Use LCD instead of CRT monitor.5. Use paper less methods of communicating.6. Recycle papers.7. Buy recycled papers.8. Recycle toner cartridges.9. Recycle old computers, printer, and other devices.10. Telecommute to save gas.11. Use video conferencing and VoIP for meetings.
12Anas Habib
![Page 13: Computer Ethics By Anas Habib](https://reader031.vdocuments.site/reader031/viewer/2022020116/559e9eb31a28abc7048b473b/html5/thumbnails/13.jpg)
Anas Habib 13