COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Ethical and Social Issues in Information Systems
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
JCSD-aw Citizenship in an e-World Johnston Community School District.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
INTRODUCTION An ICT policy is in the final stages of being adopted; Provisions in the policy and related strategies which are meant to facilitate policy.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Department of Information System Faculty of Computing & Information Technology King Abdul Aziz University, Jeddah, KSA.
UNESCO ICTLIP Module 1. Lesson 71 Introduction to Information and Communication Technologies Lesson 7. What are the trends and issues in ICT development.
INTERNET and CODE OF CONDUCT
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Describe ethical considerations resulting from technological advances.
Digital Citizenship By: Miranda Scorver.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Joseph Pettaway ED505. What is Digital Citizenship? Concepts that aids individuals in learning and understanding how to use technology appropriately.
Mrs. Jefferson Business Information Management I.
Computer Legislation The need for computer laws Go to Contents.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Ethical Issue Computer Ethics. Why do we have to consider computer ethics? The advancements of computer/internet have significant influence on our lives.
Unethical use of Computers and Networks
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
According to netiquette simply refers to our behavior the internet.
BRADLEY BARNES DIGITAL CITIZENSHIP. NETIQUETTE ON SOCIAL MEDIA SITES Netiquette is the etiquette guidelines that govern behavior when communicating on.
history, hardware, software, safety, and computer ethics
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Ethical and Social Impact of Information Systems
IT in Business Issues in Information Technology Lecture – 13.
© 2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Ethics.
The Choices Program curriculum units and the contents of the electronic versions are copyrighted— 1989-present. These copyright protections extend to all.
Principles of LPSCS. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Copyright.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Digital Citizenship By Teneka Cannon. . Digital Etiquette also known as Netiquette Definition: a basic set of rule everyone should follow to make Internet.
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
Security and Ethics Safeguards and Codes of Conduct.
Ethical Implications In The Age Of Information
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
What is it and why should I care?. Copyright Basic Copyright InternetMultimedia Fair Use.
Acceptable Use Policy (Draft)
Ethical, Social, and Political Issues in E-commerce
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Learning Area 1 Information And Communication Technology and Society
BCT 2.00 Analyze Technology Issues
Chapter 13 Security and Ethical Challenges.
Ethical Use of Computers
Technological, Legal, and Ethical Considerations
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa

The definition of Computer Ethics ** Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society.

The definition of Computer Ethics (cont’d.) ** For example, while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics would suggest that it is wrong to do so without the author's approval. And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical.digital

The definition of Computer Ethics (cont’d.) ** As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies.

Computer crimes and Internet ** The growing use of computers and the Internet has achieved many goals for all users, and increased business efficiency, but there are fears that the ongoing risk of various crimes related to theft of information, fraud and destruction of data, look at the privacy of individuals, institutions and governments.

Computer crimes and Internet (cont’d.) ** The increasing use of computers and recently contributed to the emergence of Internet crimes arising in an environment of computers and networking environment.. Fraudulent access to the data.1. Fraud using credit cards.2. Copying programs.3 Incentive to commit various crimes of information are many, including:. The desire to excel and challenge of advanced technology.1. The pursuit of financial gain and blackmail.2. Political and ideological motives. 3. Act illegally.4. Hatred and revenge and revenge motives of employers.5

Hacker ** I knew the word hacker (clever) at the beginning computer user to the enthusiast for knowledge, but the term usually describes the people and the present time the computer system illegally to a defect in this system.

Computer Virus The definition of computer virus The virus is a program written in one programming language by one of the terrorists to cause damage to the computer system. The computer virus is a type of infringement on the computer systems. It is characteristic of the virus ability to penetrate the large files and proliferation, including the disappearance and destruction of these files and disable its work.

Intellectual Property Rights Intellectual property rights laws often prohibit: 1. Copies of materials or programs or quote from it only after obtaining prior written authorization from the author or his legal representative. 2. Removal or disruption of any protection technology used by the author (as a fraction of encryption or remove the password and other). 3. Publishing of computers, information networks, without taking the prior written permission of the author. 4. Attack on any financial or moral right of the copyright.

Ethics of computer and Internet. Has adopted many of the developed world to legislative regulations to protect the privacy of individuals and there are many of ethics must show by a computer user has stated a voluntary association of public interest ethics cite some of these are as follows: 1. To avoid offending others (spyware, viruses, send, distribute files are not moral others). 2. Sincerity in work and non-alignment of ideas.

Ethics of computer and Internet (cont’d.) 3. Respect property of others and intellectual property rights – 4.make the effort to achieve the best, most effective.. Respect the privacy of others vocational training, who saved the work of others objectively.. 7.The use of computers and systems when it is permitted.