尊敬的 微信汇率:1円 ≈ 0.046239 元 支付宝汇率:1円 ≈ 0.04633元 [退出登录]
SlideShare a Scribd company logo
Computer
Ethics
 Computer ethics are morally acceptable use of computers.
 i.e. using computers appropriately
 Standards or guidelines are important in this industry,
because technology changes are outstripping the legal
system’s ability to keep up.
 Cyber-ethics:
The study of moral, legal, and social issues involving
cybertechnology
Computer Ethics
 Computers in the Workplace
 Computer Crime
 Privacy and Anonymity
 Intellectual Property
 Professional Responsibility
 Computers as an engineering tool
 Autonomous computers
 Other issues
Computer Ethics Issues
LOST JOBS: Economic incentives to replace humans with
computerized devices are very high
NEW JOBS: Computer industry already has generated a
wide variety of new jobs
ALTERED JOBS:
“de-skilling”
New skilled jobs
Computers in the Workplace
Four primary issues
Privacy – responsibility to protect data about individuals
Accuracy - responsibility of data collectors to authenticate
information and ensure its accuracy
Property - who owns information and software and how can
they be sold and exchanged
Access - responsibility of data collectors to control access and
determine what information a person has the right to obtain about
others and how the information can be used
Computer Ethics – Primary Issues
Spreading information without consent
Some large companies use medical records and credit records
as a factor in important personnel decisions
Spreading inaccurate information
Mistakes in one computer file can easily migrate to others
Inaccurate data may linger for years
Problems with Large Databases
Internet issues
Inflammatory interchange of messages via internet (email, chat
rooms, etc.)
Chain mail
Virus warning hoaxes
“Spam” – unsolicited, bulk email
Information on internet includes hate, violence, and information
that is harmful for children
• How much of this should be regulated?
• Do filters solve problems or create more?
Is web site information used for course work and research
reliable?
Internet Content Issues
Privacy
Inappropriate access
Hacking
Ethical hacking
Legal responses
• Free Software Foundation –
Software ownership should not be allowed at all.
One can own the following aspects of a program:
• source code
• object code
• algorithm
• look and feel
Copyright infringement
IPR
 Software developers (or the companies they work for) own their
programs.
 Software buyers only own the right to use the software according to
the license agreement.
 No copying, reselling, lending, renting, leasing, or distributing is legal
without the software owner’s permission.
Copyright Laws
 There are four types of software licenses:
 Public Domain
 Freeware
 Shareware
 All Rights Reserved
Software Licenses
 Public domain software has no owner and is not protected by
copyright law.
 It was either created with public funds, or the ownership was
forfeited by the creator.
 Can be copied, sold, and/or modified
 Often is of poor quality/unreliable
Public Domain License
 Freeware is copyrighted software that is licensed to be copied and
distributed without charge.
 Freeware is free, but it’s still under the owner’s control.
 Examples:
 Eudora Light
 Netscape
Freeware License
• A shareware software license allows you to use the software for a
trial period, but you must pay a registration fee to the owner for
permanent use.
• Some shareware trials expire on a certain date
• Payment depends on the honor system
• Purchasing (the right to use) the software may also get you a
version with more powerful features and published documentation.
Shareware License
 May be used by the purchaser according the exact details spelled
out in the license agreement.
 You can’t legally use it--or even possess it-- without the owner’s
permission.
All Rights Reserved License
 SPA (Software Publishers Association) polices software piracy and
mainly targets:
 Illegal duplication
 Sale of copyrighted software
 Companies that purchase single copies and load the software on multiple
computers or networks
 They rely on whistle-blowers.
 Penalties (for primary user of PC) may include fines up to $250,000
and/or imprisonment up to 5 years in jail
Software Piracy
• Bug-free software is difficult to produce
• It must be carefully designed, developed, and tested
• Mistakes generated by computers can be far reaching
• Commenting and documenting software is required for effective
maintenance throughout the life of the program
System Quality
5 aspects of computer crime
Malicious kinds of software, or "programmed threats", provide a significant
challenge to computer security.
"viruses
"worms"
"Trojan horses"
"logic bombs"
"bacteria" or "rabbits" which multiply rapidly and fill up the computer's memory.
Computer crimes, such as / embezzlement or planting of logic bombs /, are
normally committed by /trusted personnel/ who have permission to use
the computer system. Computer security, therefore, must also be concerned
with the actions of trusted computer users.
COMPUTER CRIME can be costly for cleanup and investigation
Computer Crime
• Computer criminals -using a computer to commit an illegal act
• Who are computer criminals?
• Employees – disgruntled or dishonest --the largest category
• Outside users - customers or suppliers
• “Hackers” and “crackers” - hackers do it “for fun” but crackers have
malicious intent
• Organized crime - tracking illegal enterprises, forgery, counterfeiting
Computer Crime
• Damage to computers, programs or files
• Viruses - migrate through systems attached to files and programs
• Worms - continuously self-replicate
• Theft
• Of hardware, software, data, computer time
• Software piracy - unauthorized copies of copyrighted material
• View/Manipulation
• “Unauthorized entry” and “harmless message” still illegal
Types of Computer Crime
Computers as an Engineering Tool
• Computer Design Tools
• Integration of Computers into Engineered Systems
Autonomous Computers
• Autonomy refers to the ability of a computer to make decisions
without the intervention of humans.
• Stock trading
• Military weapons
Computer ethics: other issues
• Health Conditions.
Engineers who supervise computer personnel or design computer terminals
should check that ergonomic considerations are in effect to reduce back
problems,
provide wrist support, offer good keyboard layouts to prevent carpal tunnel
syndrome, and offer good lighting and flicker control.
• Computer Failures.
Failures can occur because of errors in hardware or software. Hardware errors do
not occur often, and when they do they usually do so quite obviously. An exception
was Intel’s highly touted Pentium chip, introduced in 1993. It produced very slight
and rare errors in floating-point arithmetic. Perhaps more serious was the loss of
confidence Intel suffered by not revealing the error before it was detected by a
user.
 Rapid Change:
 Reduced response time to competition
 Maintaining Boundaries:
 Family, work, leisure
 Dependence And Vulnerability
 Employment:
 Re-engineering job loss
 Equity & Access:
 Increasing gap between haves and have nots
 Health Issues
Quality of Life Issues
 Ergonomics:
 helps computer users to avoid physical and mental health risks
 and to increase productivity
 Avoid eyestrain and headache
 Take regular breaks every couple of hours
 Control ambient light and insure adequate monitor brightness
 Avoid back and neck pain
 Have adjustable equipment with adequate back support
 Keep monitor at, or slightly below eye level
Ergonomics and Physical Health Issues
• Avoid effects of electromagnetic fields (VDT radiation)
• Possible connection to miscarriages and cancers, but no statistical support
yet
• Use caution if pregnant
• Avoid repetitive strain injury (RSI)
• Injuries from fast, repetitive work
• Carpal tunnel syndrome (CTS) - nerve and tendon damage in hands and
wrists
Physical Health Issues
• Microcomputers are the greatest user of electricity in the
workplace
• “Green” PCs
• System unit and display - minimize unnecessary energy consumption and
power down when not in use
• Manufacturing - avoids harmful chemicals in production, focus on
chlorofluorocarbons (CFC’s) which some blame for ozone layer depletion
The Environment
• Conserve
• Turn computers off at end of work day
• Use screen savers
• Recycle
• Most of the paper we use is eligible
• Dispose of old parts via recycling programs – most computer parts are dangerous
in landfills
• Educate
• Know the facts about ecological issues
Personal Responsibility of Users
• Computer professionals find themselves in a variety of professional
relationships with other people.
• Association for Computing Machinery (ACM) and the Institute of Electrical
and Electronic Engineers (IEEE), have established codes of ethics, curriculum
guidelines and accreditation requirements.
Professional Responsibility and Code of Ethics
• According to the Association for Computing Machinery (ACM) code, a
computing professional:
• Contributes to society and human well-being
• Avoids harm to others
• Is honest and trustworthy
• Is fair and takes action not to discriminate
• Honors property rights, including copyrights and patents
• Gives proper credit when using the intellectual property of others
• Respects other individuals’ rights to privacy
• Honors confidentiality
The ACM Code of Conduct
THANK YOU!!

More Related Content

Similar to Computer Ethics_Satyajit Patil.pptx

Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
Fizaril Amzari Omar
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
Fizaril Amzari Omar
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
Online
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
jonspav
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
GooglePay16
 
Chap11
Chap11Chap11
Chap11
Aman Sharma
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
Haa'Meem Mohiyuddin
 
Chap11
Chap11Chap11
Chap11
nitin_009
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
rizwanshafique4321
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
AnkitTripathi159
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
Questions of Ethics in Software Development
Questions of Ethics in Software DevelopmentQuestions of Ethics in Software Development
Questions of Ethics in Software Development
Jane Prusakova
 
cyberhygiene regular hygien of computer at office
cyberhygiene regular hygien of computer at officecyberhygiene regular hygien of computer at office
cyberhygiene regular hygien of computer at office
RajeshKumarSharma71
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
Kaley Hair
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
GAURAV. H .TANDON
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systems
Einar Landre
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems
Einar Landre
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
ChristoanSmit
 
Cyber ethics.pptx
Cyber ethics.pptxCyber ethics.pptx
Cyber ethics.pptx
GagandeepSinghJass
 

Similar to Computer Ethics_Satyajit Patil.pptx (20)

Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Questions of Ethics in Software Development
Questions of Ethics in Software DevelopmentQuestions of Ethics in Software Development
Questions of Ethics in Software Development
 
cyberhygiene regular hygien of computer at office
cyberhygiene regular hygien of computer at officecyberhygiene regular hygien of computer at office
cyberhygiene regular hygien of computer at office
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systems
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
Cyber ethics.pptx
Cyber ethics.pptxCyber ethics.pptx
Cyber ethics.pptx
 

Recently uploaded

INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASICINTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
GOKULKANNANMMECLECTC
 
CSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdfCSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdf
Ismail Sultan
 
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
dulbh kashyap
 
🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...
🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...
🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...
AK47
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
sexytaniya455
 
BBOC407 Module 1.pptx Biology for Engineers
BBOC407  Module 1.pptx Biology for EngineersBBOC407  Module 1.pptx Biology for Engineers
BBOC407 Module 1.pptx Biology for Engineers
sathishkumars808912
 
Covid Management System Project Report.pdf
Covid Management System Project Report.pdfCovid Management System Project Report.pdf
Covid Management System Project Report.pdf
Kamal Acharya
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Balvir Singh
 
TENDERS and Contracts basic syllabus for engineering
TENDERS and Contracts basic syllabus for engineeringTENDERS and Contracts basic syllabus for engineering
TENDERS and Contracts basic syllabus for engineering
SnehalChavan75
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
EMERSON EDUARDO RODRIGUES
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
ShivangMishra54
 
comptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdfcomptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdf
foxlyon
 
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Tsuyoshi Horigome
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
LokerXu2
 
Technological Innovation Management And Entrepreneurship-1.pdf
Technological Innovation Management And Entrepreneurship-1.pdfTechnological Innovation Management And Entrepreneurship-1.pdf
Technological Innovation Management And Entrepreneurship-1.pdf
tanujaharish2
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Poonam Singh
 
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEERDELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
EMERSON EDUARDO RODRIGUES
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
MuhammadJazib15
 
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
sonamrawat5631
 

Recently uploaded (20)

INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASICINTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
 
CSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdfCSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdf
 
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
 
🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...
🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...
🔥Photo Call Girls Lucknow 💯Call Us 🔝 6350257716 🔝💃Independent Lucknow Escorts...
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
Call Girls Nagpur 8824825030 Escort In Nagpur service 24X7
 
BBOC407 Module 1.pptx Biology for Engineers
BBOC407  Module 1.pptx Biology for EngineersBBOC407  Module 1.pptx Biology for Engineers
BBOC407 Module 1.pptx Biology for Engineers
 
Covid Management System Project Report.pdf
Covid Management System Project Report.pdfCovid Management System Project Report.pdf
Covid Management System Project Report.pdf
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
 
TENDERS and Contracts basic syllabus for engineering
TENDERS and Contracts basic syllabus for engineeringTENDERS and Contracts basic syllabus for engineering
TENDERS and Contracts basic syllabus for engineering
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
 
comptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdfcomptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdf
 
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
 
Technological Innovation Management And Entrepreneurship-1.pdf
Technological Innovation Management And Entrepreneurship-1.pdfTechnological Innovation Management And Entrepreneurship-1.pdf
Technological Innovation Management And Entrepreneurship-1.pdf
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
 
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEERDELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
 
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
 

Computer Ethics_Satyajit Patil.pptx

  • 2.  Computer ethics are morally acceptable use of computers.  i.e. using computers appropriately  Standards or guidelines are important in this industry, because technology changes are outstripping the legal system’s ability to keep up.  Cyber-ethics: The study of moral, legal, and social issues involving cybertechnology Computer Ethics
  • 3.  Computers in the Workplace  Computer Crime  Privacy and Anonymity  Intellectual Property  Professional Responsibility  Computers as an engineering tool  Autonomous computers  Other issues Computer Ethics Issues
  • 4. LOST JOBS: Economic incentives to replace humans with computerized devices are very high NEW JOBS: Computer industry already has generated a wide variety of new jobs ALTERED JOBS: “de-skilling” New skilled jobs Computers in the Workplace
  • 5. Four primary issues Privacy – responsibility to protect data about individuals Accuracy - responsibility of data collectors to authenticate information and ensure its accuracy Property - who owns information and software and how can they be sold and exchanged Access - responsibility of data collectors to control access and determine what information a person has the right to obtain about others and how the information can be used Computer Ethics – Primary Issues
  • 6. Spreading information without consent Some large companies use medical records and credit records as a factor in important personnel decisions Spreading inaccurate information Mistakes in one computer file can easily migrate to others Inaccurate data may linger for years Problems with Large Databases
  • 7. Internet issues Inflammatory interchange of messages via internet (email, chat rooms, etc.) Chain mail Virus warning hoaxes “Spam” – unsolicited, bulk email
  • 8. Information on internet includes hate, violence, and information that is harmful for children • How much of this should be regulated? • Do filters solve problems or create more? Is web site information used for course work and research reliable? Internet Content Issues
  • 10. • Free Software Foundation – Software ownership should not be allowed at all. One can own the following aspects of a program: • source code • object code • algorithm • look and feel Copyright infringement IPR
  • 11.  Software developers (or the companies they work for) own their programs.  Software buyers only own the right to use the software according to the license agreement.  No copying, reselling, lending, renting, leasing, or distributing is legal without the software owner’s permission. Copyright Laws
  • 12.  There are four types of software licenses:  Public Domain  Freeware  Shareware  All Rights Reserved Software Licenses
  • 13.  Public domain software has no owner and is not protected by copyright law.  It was either created with public funds, or the ownership was forfeited by the creator.  Can be copied, sold, and/or modified  Often is of poor quality/unreliable Public Domain License
  • 14.  Freeware is copyrighted software that is licensed to be copied and distributed without charge.  Freeware is free, but it’s still under the owner’s control.  Examples:  Eudora Light  Netscape Freeware License
  • 15. • A shareware software license allows you to use the software for a trial period, but you must pay a registration fee to the owner for permanent use. • Some shareware trials expire on a certain date • Payment depends on the honor system • Purchasing (the right to use) the software may also get you a version with more powerful features and published documentation. Shareware License
  • 16.  May be used by the purchaser according the exact details spelled out in the license agreement.  You can’t legally use it--or even possess it-- without the owner’s permission. All Rights Reserved License
  • 17.  SPA (Software Publishers Association) polices software piracy and mainly targets:  Illegal duplication  Sale of copyrighted software  Companies that purchase single copies and load the software on multiple computers or networks  They rely on whistle-blowers.  Penalties (for primary user of PC) may include fines up to $250,000 and/or imprisonment up to 5 years in jail Software Piracy
  • 18. • Bug-free software is difficult to produce • It must be carefully designed, developed, and tested • Mistakes generated by computers can be far reaching • Commenting and documenting software is required for effective maintenance throughout the life of the program System Quality
  • 19. 5 aspects of computer crime Malicious kinds of software, or "programmed threats", provide a significant challenge to computer security. "viruses "worms" "Trojan horses" "logic bombs" "bacteria" or "rabbits" which multiply rapidly and fill up the computer's memory. Computer crimes, such as / embezzlement or planting of logic bombs /, are normally committed by /trusted personnel/ who have permission to use the computer system. Computer security, therefore, must also be concerned with the actions of trusted computer users. COMPUTER CRIME can be costly for cleanup and investigation Computer Crime
  • 20. • Computer criminals -using a computer to commit an illegal act • Who are computer criminals? • Employees – disgruntled or dishonest --the largest category • Outside users - customers or suppliers • “Hackers” and “crackers” - hackers do it “for fun” but crackers have malicious intent • Organized crime - tracking illegal enterprises, forgery, counterfeiting Computer Crime
  • 21. • Damage to computers, programs or files • Viruses - migrate through systems attached to files and programs • Worms - continuously self-replicate • Theft • Of hardware, software, data, computer time • Software piracy - unauthorized copies of copyrighted material • View/Manipulation • “Unauthorized entry” and “harmless message” still illegal Types of Computer Crime
  • 22. Computers as an Engineering Tool • Computer Design Tools • Integration of Computers into Engineered Systems
  • 23. Autonomous Computers • Autonomy refers to the ability of a computer to make decisions without the intervention of humans. • Stock trading • Military weapons
  • 24. Computer ethics: other issues • Health Conditions. Engineers who supervise computer personnel or design computer terminals should check that ergonomic considerations are in effect to reduce back problems, provide wrist support, offer good keyboard layouts to prevent carpal tunnel syndrome, and offer good lighting and flicker control. • Computer Failures. Failures can occur because of errors in hardware or software. Hardware errors do not occur often, and when they do they usually do so quite obviously. An exception was Intel’s highly touted Pentium chip, introduced in 1993. It produced very slight and rare errors in floating-point arithmetic. Perhaps more serious was the loss of confidence Intel suffered by not revealing the error before it was detected by a user.
  • 25.  Rapid Change:  Reduced response time to competition  Maintaining Boundaries:  Family, work, leisure  Dependence And Vulnerability  Employment:  Re-engineering job loss  Equity & Access:  Increasing gap between haves and have nots  Health Issues Quality of Life Issues
  • 26.  Ergonomics:  helps computer users to avoid physical and mental health risks  and to increase productivity  Avoid eyestrain and headache  Take regular breaks every couple of hours  Control ambient light and insure adequate monitor brightness  Avoid back and neck pain  Have adjustable equipment with adequate back support  Keep monitor at, or slightly below eye level Ergonomics and Physical Health Issues
  • 27. • Avoid effects of electromagnetic fields (VDT radiation) • Possible connection to miscarriages and cancers, but no statistical support yet • Use caution if pregnant • Avoid repetitive strain injury (RSI) • Injuries from fast, repetitive work • Carpal tunnel syndrome (CTS) - nerve and tendon damage in hands and wrists Physical Health Issues
  • 28. • Microcomputers are the greatest user of electricity in the workplace • “Green” PCs • System unit and display - minimize unnecessary energy consumption and power down when not in use • Manufacturing - avoids harmful chemicals in production, focus on chlorofluorocarbons (CFC’s) which some blame for ozone layer depletion The Environment
  • 29. • Conserve • Turn computers off at end of work day • Use screen savers • Recycle • Most of the paper we use is eligible • Dispose of old parts via recycling programs – most computer parts are dangerous in landfills • Educate • Know the facts about ecological issues Personal Responsibility of Users
  • 30. • Computer professionals find themselves in a variety of professional relationships with other people. • Association for Computing Machinery (ACM) and the Institute of Electrical and Electronic Engineers (IEEE), have established codes of ethics, curriculum guidelines and accreditation requirements. Professional Responsibility and Code of Ethics
  • 31. • According to the Association for Computing Machinery (ACM) code, a computing professional: • Contributes to society and human well-being • Avoids harm to others • Is honest and trustworthy • Is fair and takes action not to discriminate • Honors property rights, including copyrights and patents • Gives proper credit when using the intellectual property of others • Respects other individuals’ rights to privacy • Honors confidentiality The ACM Code of Conduct
  翻译: