it 113 finalized module

21
IT 113 Ethics for IT Professionals PROF. REYNAN E. DEMAFELIZ SKSU – INFORMATION TECHNOLOGY DEPARTMENT Stanford Encyclopedia Of Philosophy Computers Professionals For Social Responsibility Computer Ethics - code of ethics in computing Computer Ethics — Information Security Education and Awareness

Upload: reynan-espinosa-demafeliz

Post on 17-Jul-2016

53 views

Category:

Documents


1 download

DESCRIPTION

NOT MINE

TRANSCRIPT

Page 1: IT 113 Finalized Module

IT 113 Ethics for IT ProfessionalsPROF. REYNAN E. DEMAFELIZ

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Stanford Encyclopedia Of PhilosophyComputers Professionals For Social Responsibility

Computer Ethics - code of ethics in computingComputer Ethics — Information Security Education and Awareness

Page 2: IT 113 Finalized Module

What is Ethics? - refers to the standards and rules that

"should" be followed and it helps us to regulate our conduct in a group or with a set of individuals.

Since the term, Ethics is a relative term, it is branched under philosophy, which states how users of World Wide Web should make decisions regarding their conduct.

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 3: IT 113 Finalized Module

What is Ethics and its Value in IT? In very simple term ethics is nothing more than your belief towards the action and happening situations.

As the world is adopting the new technology the need of ethics arises to sustain the proper growth and to minimize the risk of wrong uses.

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 4: IT 113 Finalized Module

Ethics...Derived from the Greek word “ethos”, which means “custom”, “habit”, and “way of living”

Definition: "the discipline and practice of applying value to human behavior, resulting in meaningful conduct.“

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 5: IT 113 Finalized Module

Computer Ethics is a new branch of ethics that is growing and changing rapidly as computer technology also grows and develops.defined as the set of moral principles that govern the usage of computers a set of moral principles that govern individual or a group on what is acceptable behavior while using a computer.

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 6: IT 113 Finalized Module

Why do we need Computer Ethics ?The growth of the WWW (World Wide Web) has created several novel legal issues . The existence of new questions that older laws cannot answer and traditional laws are outdated/anachronistic in this world. Thus, a more coherent body of law is needed to govern Internet and computers.

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 7: IT 113 Finalized Module

Beginning of IT and Evaluation of Ethics for IT

Information Technology gets its huge popularity after year 1995 when Microsoft Company initially launched the office programs for computers.

Today whole world is relying on such office suites.

Page 8: IT 113 Finalized Module

For purposes of this Code, the following terms are defined as follows: Information Technology - the preparation, collection, creation, transport, retrieval, storage, access, presentation and transformation of electronic information in all its forms including but not limited to, voice, graphics, text, video, data and image. Information Technology Professional - one who develops or provides information technology products and/or services to the public.

Code of Cyber Ethics for IT Professionals

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 9: IT 113 Finalized Module

Code of Cyber Ethics Information stored on the computer should be treated as seriously as

written or spoken word. Privacy should not be violated. In case of academic use, it is known

plagiarism. Information from public viewing should not be modified or deleted or

inaccessible since these are considered as destructive acts. Intrusive software such as "worms" and "viruses" which are destructive

to the computer system is also illegal. Congesting somebody’s system with a lot of unwanted information is

also unethical. Sending obscene and crude messages through mail or chat is also

forbidden. Sending sexually explicit content, message or pictures is also forbidden.

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 10: IT 113 Finalized Module

What Ethics can be Followed in IT? Never Piracy Online… Follow Up the Social Reputation… Never Harm the Public Websites… Closure of Digital Hacking… Certify Websites Who Deal with Payments… Never Do Fraudulent Activities… Never Give Misguided Information… Never Steal Information online for Reproduction… Never Create a False Evidence Using IT… Utilizing the IT in a Manner to Get Benefits Only…

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 11: IT 113 Finalized Module

I will use my special knowledge and skills for the benefit of the public. I will serve employers and clients with integrity, subject to an overriding responsibility to the public interest, and I will strive to enhance the competence and prestige of the professional. By these, I mean:

I will promote public knowledge, understanding and appreciation of information technology; I will consider the general welfare and public good in the performance of my work; I will advertise goods or professional services in a clear and truthful manner;

 I will comply and strictly abide by the intellectual property laws, patent laws and other related laws in respect of information technology;

I will accept full responsibility for the work undertaken and will utilize my skills with competence and professionalism;  

I will make truthful statements on my areas of competence as well as the capabilities and qualities of my products and services;  

I will not disclose or use any confidential information obtained in the course of professional duties without the consent of the parties concerned, except when required by law;  

I will try to attain the highest quality in both the products and services I offer;  

I will not knowingly participate in the development of Information Technology Systems that will promote the commission of fraud and other unlawful acts;

I will uphold and improve the IT professional standards through continuing professional development in order to enhance the IT profession.

PREAMBLE

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 12: IT 113 Finalized Module

1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 13: IT 113 Finalized Module

IMPACT OF COMPUTERIZATIONo Computers are often far more efficient than humans in

performing many tasks. o In the industrialized world many workers already have been

replaced by computerized devices ; bank tellers, auto workers, telephone operators,

typists, graphic artists, security guards, assembly-line workers, and on and on. o Even professionals like medical doctors, lawyers, teachers,

accountants and psychologists are finding that computers can perform many of their traditional professional duties quite effectively.

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 14: IT 113 Finalized Module

ETHICAL PROBLEMS RELATED TO COMPUTERS - Privacy

•Computers create a false sense of security•People do not realize how vulnerable information stored on computers are

- Property•Physical property•Intellectual property•Data as property

- Access •Access to data

- Accuracy◦ Accuracy of information stored

- Hacking, cracking and virus creation - Software piracy

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 15: IT 113 Finalized Module

Computer Crimes •Illegal access •Illegal Interuption •Data Interfare •System Interference •Misuse Of Devices •Electronic Fraud

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 16: IT 113 Finalized Module

How do cyber criminals acts? •Target of the crime •Medium of the attack (Methods)- Brute force attack (dictionary based)- Phishing- Key logging- Hardware bypassed - Data Tampering- Programming Techniques

•Tool SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 17: IT 113 Finalized Module

Types of Cyber Criminals•Outsiders •Insiders

Reasons for Computer Crime ;•ECONOMIC •IDEOLOGICAL •PSYCHOLOGICAL •EGOCENTRIC

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 18: IT 113 Finalized Module

What is a Computer Virus? - are small software programs that are designed to spread from one computer to another and to interfere with computer operation.

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 19: IT 113 Finalized Module

How Computer Virus Spread-out? –Spread through E-mail Attachments,

–Instant Messaging messages, –Funny Images, –Audio and Videos files, –Downloading files from Internet, –Programmable Greeting cards and many more.

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 20: IT 113 Finalized Module

Steps to help avoid Viruses ; •Use an Internet firewall, •Subscribe to industry standard antivirus software,

•Never open an e-mail attachment from someone you don't know,

•Scan each and every attachment, •Observe rules to be followed, while surfing net

SKSU – INFORMATION TECHNOLOGY DEPARTMENT

Page 21: IT 113 Finalized Module

What is Piracy? Today people are becoming rare who purchase things online. Everyone is searching things for free and piracy word commenced from here only.

Reselling Media Downloading from a website Taping songs Buying a used book or CD Watching broadcast television but skipping commercials