Download - ethics and IT
-
8/7/2019 ethics and IT
1/32
-
8/7/2019 ethics and IT
2/32
EthicsEthics
Derived from the Greek word Derived from the Greek word ethos, which, which
means means custom, , habit, and , and way of living
Definition:Definition: "the discipline and practice of applying
value to human behavior, resulting in meaningful
conduct.
-
8/7/2019 ethics and IT
3/32
Cont.Cont.
Professional Ethics:Professional Ethics:concerns one's conduct of behaviorand practice when carrying out professional work,
e.g., consulting, researching, teaching and writing.
Acomputing professional must understand
Cultural, social, legal, and ethical issues in computing.Cultural, social, legal, and ethical issues in computing. Responsibility and possible consequences of failure.Responsibility and possible consequences of failure.
-
8/7/2019 ethics and IT
4/32
Computer EthicsComputer Ethics
Computer ethics definedComputer ethics definedas the application of classical ethicalprinciples to the use of computer technology.
Ethical problems related to computers:Ethical problems related to computers:
PrivacyPrivacy Computers create a false sense of securityComputers create a false sense of security
People do not realize how vulnerable information stored onPeople do not realize how vulnerable information stored oncomputers arecomputers are
PropertyProperty Physical propertyPhysical property
Intellectual property (in both copyright and patent)Intellectual property (in both copyright and patent)
Data as propertyData as property
-
8/7/2019 ethics and IT
5/32
AccessAccess
Access to computing technologyAccess to computing technology
Access to dataAccess to data
AccuracyAccuracy
Accuracy of information storedAccuracy of information stored
Hacking, cracking and virus creationHacking, cracking and virus creation
Software piracySoftware piracy
-
8/7/2019 ethics and IT
6/32
Ethical
dilemmas
in IT
Privacy
Accessibility
Accuracy
Property
Involves right of
accessing the required
info. As well as true
payment of charges to
access the information
Degree of privacy and
dissemination of
information about
individual.
The information which
is viable and being
accessed is now much
more accurate
&authenticate.
Talks about
ownership &
value of
information.
-
8/7/2019 ethics and IT
7/32
TheTenCommandments of computer ethics have been defined
by theComputer Ethics Institute.
1) One should not use a computer to harm otherpeople.
2) One should not interfere with other people's
computer work. 3) One should not snoop around in other people's files.
4) One should not use a computer to steal.
5) One should not use a computer to bear falsewitness.
-
8/7/2019 ethics and IT
8/32
6) One should not use or copy software for which you
have not paid.
7) One should not use other people's computer
resources without authorization.
8) One should not appropriate other people'sintellectual output.
9) One should think about the social consequences of
the program you write. 10) One should use a computer in ways that show
consideration and respect.
-
8/7/2019 ethics and IT
9/32
Some threats to information system are:Some threats to information system are:--
ComputerAbuses:ComputerAbuses:-- hacking Id & sending mail throughhacking Id & sending mail through
hacked id.hacked id.
Computer crime:Computer crime:--Hacking , theftHacking , theft
Loss:Loss:-- of data information.of data information.
Theft of equipmentTheft of equipment
Theft of dataTheft of data
Equipment malfunctions:Equipment malfunctions:-- virus in excel sheetvirus in excel sheet Environmental hazardsEnvironmental hazards
Destruction from virusesDestruction from viruses
Errors in handling & usage of data.Errors in handling & usage of data.
-
8/7/2019 ethics and IT
10/32
Security
ethics
HealthHealth
CrimeCrime
IndividualityIndividuality
Working
conditions
Working
conditions
EmploymentEmployment
PrivacyPrivacy
-
8/7/2019 ethics and IT
11/32
Computer VirusComputer Virus
-
8/7/2019 ethics and IT
12/32
What isComputer Virus?What isComputer Virus?
Computer viruses are small software programs that
are designed to spread from one computer to another
and to interfere with computer operation.
-
8/7/2019 ethics and IT
13/32
Spreading of VirusSpreading of Virus
Virus are most easily spread,Virus are most easily spread,
Spread through ESpread through E--mailAttachments,mailAttachments,
Instant Messaging messages,Instant Messaging messages, Funny Images,Funny Images,
Audio and Videos files,Audio and Videos files,
Downloading files from Internet,Downloading files from Internet,
Greeting cards and many more.Greeting cards and many more.
-
8/7/2019 ethics and IT
14/32
Steps to help avoid VirusesSteps to help avoid Viruses
Use anUse an Internet firewallInternet firewall,,
Subscribe toSubscribe to industry standard antivirusindustry standard antivirus
softwaresoftware,, Never open an eNever open an e--mail attachment from someonemail attachment from someone
you don't know,you don't know,
Scan each and every attachment,Scan each and every attachment, Rules to be followed, while surfing netRules to be followed, while surfing net
-
8/7/2019 ethics and IT
15/32
Software piracy andSoftware piracy and
HackingHacking
-
8/7/2019 ethics and IT
16/32
What isWhat is
PIRACY???????PIRACY???????Reselling MediaReselling Media
Downloading from a websiteDownloading from a website
Taping songsTaping songs
Buying a used book orCDBuying a used book orCD
Watching broadcast television but skipping commercialsWatching broadcast television but skipping commercials
-
8/7/2019 ethics and IT
17/32
Types of PIRACYTypes of PIRACY
End User PiracyEnd User Piracy
ClientClient Server PiracyServer Piracy
Internet PiracyInternet Piracy
HardHard--Disk PiracyDisk Piracy
SoftwareCounterfeitingSoftwareCounterfeiting
-
8/7/2019 ethics and IT
18/32
EndEnd--User PiracyUser Piracy
This occurs when a company employee reproducesThis occurs when a company employee reproduces
copies of software without authorizationcopies of software without authorization
Copying disk for installation and distributionCopying disk for installation and distribution
Swapping disks in or outside the workplaceSwapping disks in or outside the workplace
-
8/7/2019 ethics and IT
19/32
ClientClient--Server PiracyServer Piracy
This type of piracy occurs when too many employeesThis type of piracy occurs when too many employees
on a network are using a central copy of a program aton a network are using a central copy of a program at
the same time.the same time.
System OveruseSystem Overuse
-
8/7/2019 ethics and IT
20/32
Internet PiracyInternet Piracy
This occurs when software is downloaded from theThis occurs when software is downloaded from the
InternetThe same purchasing rules should apply toInternetThe same purchasing rules should apply to
online software purchase as for those bought inonline software purchase as for those bought in
traditional ways.traditional ways.
Pirate websitePirate website
Unauthorized transfer of copyrighted programUnauthorized transfer of copyrighted program
-
8/7/2019 ethics and IT
21/32
HardHard--Disk LoadingDisk Loading
This occurs when a business who sells new computersThis occurs when a business who sells new computers
loads illegal copies of software onto the hard disks toloads illegal copies of software onto the hard disks to
make the purchase of the machines more attractive.make the purchase of the machines more attractive.
ValueAdded Resellers (VAR)ValueAdded Resellers (VAR)
-
8/7/2019 ethics and IT
22/32
SoftwareCounterfeitingSoftwareCounterfeiting
This type of piracy is the illegal duplication and saleThis type of piracy is the illegal duplication and sale
of copyrighted material with the intent of directlyof copyrighted material with the intent of directly
imitating the copyrighted product.imitating the copyrighted product.
-
8/7/2019 ethics and IT
23/32
HACKERHACKER
Some one who bypasses the systems access controls bySome one who bypasses the systems access controls bytaking advantage of security weaknesses left in thetaking advantage of security weaknesses left in the
system by developers .system by developers .
-
8/7/2019 ethics and IT
24/32
What HACKER do???????What HACKER do???????
SYSTEMSYSTEM
Access confidential informationAccess confidential information
Threaten someone fromYOUR computerThreaten someone fromYOUR computer Broadcast your confidential letters or materials .Broadcast your confidential letters or materials .
Store illegal materialStore illegal material
-
8/7/2019 ethics and IT
25/32
Evils of HackingEvils of Hacking
Compromise the security of system without permissionCompromise the security of system without permission
from an authorized party, usually with the intent offrom an authorized party, usually with the intent of
accessing computers connected to the network.accessing computers connected to the network.
-
8/7/2019 ethics and IT
26/32
Advantage of HackingAdvantage of Hacking
To determine problem and weakness for programTo determine problem and weakness for program
Creation of firewallCreation of firewall
Useful for military purpose and spyingUseful for military purpose and spying Better computer securityBetter computer security
-
8/7/2019 ethics and IT
27/32
Privacy issuesPrivacy issues
ITmakes it technically and economically feasible toITmakes it technically and economically feasible to
collect ,store, integrate , interchange and retrievecollect ,store, integrate , interchange and retrieve
data and information quickly and easily.data and information quickly and easily.
However , the power of information technology toHowever , the power of information technology to
store and retrieve information can have a negativestore and retrieve information can have a negative
effect on the right to privacy of every individual.effect on the right to privacy of every individual.
-
8/7/2019 ethics and IT
28/32
Employment issuesEmployment issues
The impact of ITon employment is a major ethical concern and isThe impact of ITon employment is a major ethical concern and is
directly related to the use of computers to achieve automation of workdirectly related to the use of computers to achieve automation of work
activities.activities.
Use of EUse of E-- business technologies has created new jobs and increasedbusiness technologies has created new jobs and increased
productivity , while also causing a significant reduction in some typesproductivity , while also causing a significant reduction in some types
of job opportunities.of job opportunities.
Jobs created by some EJobs created by some E--business systems may require different types ofbusiness systems may require different types of
skills and education than do the jobs that areskills and education than do the jobs that are elliminatedelliminated . Therefore ,. Therefore ,
individuals may become unemployed unless they can be retained for newindividuals may become unemployed unless they can be retained for new
ositions or new res onsibilities.ositions or new res onsibilities.
-
8/7/2019 ethics and IT
29/32
Challenges inChallenges in WWorkingorking
conditionsconditions
IThas eliminated monotonous tasks in the office and theIThas eliminated monotonous tasks in the office and the
factory that formerly had to be performed by people.factory that formerly had to be performed by people.
People require to concentrate on more challenges andPeople require to concentrate on more challenges and
interesting assignments, upgrades the skill level of the workinteresting assignments, upgrades the skill level of the work
to be informed, and creates challenging jobs requiring highlyto be informed, and creates challenging jobs requiring highly
developed skills in the computer industry and withindeveloped skills in the computer industry and within
computercomputer--using organizations.using organizations.
-
8/7/2019 ethics and IT
30/32
Health issuesHealth issues
Heavy use of computer is reportedly causing healthHeavy use of computer is reportedly causing health
problems like:problems like:--
Job stressJob stressDamaged arm and neck musclesDamaged arm and neck muscles
Eye strainEye strain
radiation exposureradiation exposureEven death by computerEven death by computer-- caused accidentscaused accidents
-
8/7/2019 ethics and IT
31/32
Individuality issuesIndividuality issues
EE--business systems concerns their negativity effect onbusiness systems concerns their negativity effect on
the individuality of people.the individuality of people.
Widespread use of personal computers and theWidespread use of personal computers and the
internet has dramatically improved the developmentinternet has dramatically improved the development
of peopleof people-- oriented and personalized informationoriented and personalized information
system.system.
-
8/7/2019 ethics and IT
32/32