Presentation is loading. Please wait.

Presentation is loading. Please wait.

What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding.

Similar presentations


Presentation on theme: "What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding."— Presentation transcript:

1

2 What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.

3  Hacking  Copyright Infringement of software  E-democratic technology Some questions in computer ethics

4 Ethical standards  Association for Computing Machinery (ACM) code of ethics –Ethical behavior among computing professionals –Learned society –Founded in 1947

5 Computers in the Workplace: Are They Used Ethically?  Then typewriters, filing cabinets, and correction fluid were the norm.  Replaced by desktop and portable computers, database management systems, and word processing software.  Benefits: You are already familiar with some of the benefits of using computers in the workplace

6 Two types:  Crimes that target computer networks or devices directly,  Crimes facilitated computer networks or devices, the primary target of which is independent of the computer network or device

7 COMPUTER CRIME Examples of crimes that primarily target computer networks or devices would include, Examples of crimes that primarily target computer networks or devices would include,  Malware (malicious code) Malware  Denial-of-service attacks Denial-of-service attacks Denial-of-service attacks  Computer viruses Computer viruses Computer viruses

8 Examples of crimes that merely use computer networks or devices would include; Examples of crimes that merely use computer networks or devices would include;  Cyber stalking Cyber stalking Cyber stalking  Fraud and identity theft Fraudidentity theft Fraudidentity theft  Phishing scams Phishing scams Phishing scams  Information warfare Information warfare Information warfare

9  Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent.

10  A denial-of-service attack (DoS attack) or distributed denial-of- service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users.

11  computer virus is a computer program that can copy itself and infect a computer.  The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. malwareadware spywaremalwareadware spyware

12  Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used.

13  Spyware is a type of malware that is installed on computers and collects little bits information at a time about users without their knowledge

14  Cyberstalking is the use of the Internet or other electronic means to stalk someone.

15  a fraud is an intentional deception made for personal gain or to damage another individual

16 criminal fraud include :  Banckruptcy fraud  benefit fraud  False advertising  False billing  False insurance claims  forgery  Health fraud  Identity theft  Marriage fraud  taking payment for goods sold online, by mail or phone, such as tickets, with no intention of delivering them  Tax fraud, (tax evasion), tax evasiontax evasion

17 Identity theft  Five categories: –business/commercial identity theft –criminal identity theft –financial identity theft –identity cloning –medical identity theft

18 Techniques for obtaining personal information  Researching about the victim in government  Remotely reading information from an RFID chip on a smart card, RFID-enabled credit card, or passport.  Stealing payment or identification cards  Stealing personal information from computers and computer databases  Advertising bogus job offers

19  phishing is the criminally fraud process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

20  Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. –Collection of tactical information, –Assurance(s) that one's own information is valid, –spreading of propaganda or disinformation to demoralizethe enemy and the public

21  Television and radio transmission(s) can be jammed.  Television and radio transmission(s) can be hijacked for a disinformation campaign.  Logistics networks can be disabled.  Enemy communications networks can be disabled.  Stock exchange transactions can be sabotaged, either with electronic intervention, leaking sensitive information or placing disinformation. sabotaged

22 Computer security

23  What is computer security?  Why should I care about computer security?  Who would want to break into my computer at home?  How easy is it to break into my computer?

24 Information security is concerned with three main areas: Confidentiality - information should be available only to those who rightfully have access to it Integrity -- information should be modified only by those who are authorized to do so Availability -- information should be accessible to those who need it when they need it

25 Electronic Commerce Act  Electronic commerce, commonly known as (electronic marketing) e- commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks computer networkscomputer networks

26 Cybercrimes

27 The Department of Justice categorizes computer crime in three ways :  The computer as a target  The computer as a weapon  The computer as an accessory

28 Personal responsibility  Contribute to society and human well-being  Avoid harm to others  Be honest and trustworthy  Be fair and take action not to discriminate  Honor property rights including copyrights and patent

29  Give proper credit for intellectual property  Respect the privacy of others  Honor confidentiality

30 Social network service

31  A social network service focuses on building and reflecting of social networks or social relations among people, e.g., who share interests and/or activities.  A social network service essentially consists of a representation of each user (often a profile), his/her social links, and a variety of additional services.

32  Philippine IT Related Laws  Ten Commandments of Computer Ethics  Other Emerging Issues in IT


Download ppt "What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding."

Similar presentations


Ads by Google