ethics and it

Upload: uvika-goel

Post on 08-Apr-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 ethics and IT

    1/32

  • 8/7/2019 ethics and IT

    2/32

    EthicsEthics

    Derived from the Greek word Derived from the Greek word ethos, which, which

    means means custom, , habit, and , and way of living

    Definition:Definition: "the discipline and practice of applying

    value to human behavior, resulting in meaningful

    conduct.

  • 8/7/2019 ethics and IT

    3/32

    Cont.Cont.

    Professional Ethics:Professional Ethics:concerns one's conduct of behaviorand practice when carrying out professional work,

    e.g., consulting, researching, teaching and writing.

    Acomputing professional must understand

    Cultural, social, legal, and ethical issues in computing.Cultural, social, legal, and ethical issues in computing. Responsibility and possible consequences of failure.Responsibility and possible consequences of failure.

  • 8/7/2019 ethics and IT

    4/32

    Computer EthicsComputer Ethics

    Computer ethics definedComputer ethics definedas the application of classical ethicalprinciples to the use of computer technology.

    Ethical problems related to computers:Ethical problems related to computers:

    PrivacyPrivacy Computers create a false sense of securityComputers create a false sense of security

    People do not realize how vulnerable information stored onPeople do not realize how vulnerable information stored oncomputers arecomputers are

    PropertyProperty Physical propertyPhysical property

    Intellectual property (in both copyright and patent)Intellectual property (in both copyright and patent)

    Data as propertyData as property

  • 8/7/2019 ethics and IT

    5/32

    AccessAccess

    Access to computing technologyAccess to computing technology

    Access to dataAccess to data

    AccuracyAccuracy

    Accuracy of information storedAccuracy of information stored

    Hacking, cracking and virus creationHacking, cracking and virus creation

    Software piracySoftware piracy

  • 8/7/2019 ethics and IT

    6/32

    Ethical

    dilemmas

    in IT

    Privacy

    Accessibility

    Accuracy

    Property

    Involves right of

    accessing the required

    info. As well as true

    payment of charges to

    access the information

    Degree of privacy and

    dissemination of

    information about

    individual.

    The information which

    is viable and being

    accessed is now much

    more accurate

    &authenticate.

    Talks about

    ownership &

    value of

    information.

  • 8/7/2019 ethics and IT

    7/32

    TheTenCommandments of computer ethics have been defined

    by theComputer Ethics Institute.

    1) One should not use a computer to harm otherpeople.

    2) One should not interfere with other people's

    computer work. 3) One should not snoop around in other people's files.

    4) One should not use a computer to steal.

    5) One should not use a computer to bear falsewitness.

  • 8/7/2019 ethics and IT

    8/32

    6) One should not use or copy software for which you

    have not paid.

    7) One should not use other people's computer

    resources without authorization.

    8) One should not appropriate other people'sintellectual output.

    9) One should think about the social consequences of

    the program you write. 10) One should use a computer in ways that show

    consideration and respect.

  • 8/7/2019 ethics and IT

    9/32

    Some threats to information system are:Some threats to information system are:--

    ComputerAbuses:ComputerAbuses:-- hacking Id & sending mail throughhacking Id & sending mail through

    hacked id.hacked id.

    Computer crime:Computer crime:--Hacking , theftHacking , theft

    Loss:Loss:-- of data information.of data information.

    Theft of equipmentTheft of equipment

    Theft of dataTheft of data

    Equipment malfunctions:Equipment malfunctions:-- virus in excel sheetvirus in excel sheet Environmental hazardsEnvironmental hazards

    Destruction from virusesDestruction from viruses

    Errors in handling & usage of data.Errors in handling & usage of data.

  • 8/7/2019 ethics and IT

    10/32

    Security

    ethics

    HealthHealth

    CrimeCrime

    IndividualityIndividuality

    Working

    conditions

    Working

    conditions

    EmploymentEmployment

    PrivacyPrivacy

  • 8/7/2019 ethics and IT

    11/32

    Computer VirusComputer Virus

  • 8/7/2019 ethics and IT

    12/32

    What isComputer Virus?What isComputer Virus?

    Computer viruses are small software programs that

    are designed to spread from one computer to another

    and to interfere with computer operation.

  • 8/7/2019 ethics and IT

    13/32

    Spreading of VirusSpreading of Virus

    Virus are most easily spread,Virus are most easily spread,

    Spread through ESpread through E--mailAttachments,mailAttachments,

    Instant Messaging messages,Instant Messaging messages, Funny Images,Funny Images,

    Audio and Videos files,Audio and Videos files,

    Downloading files from Internet,Downloading files from Internet,

    Greeting cards and many more.Greeting cards and many more.

  • 8/7/2019 ethics and IT

    14/32

    Steps to help avoid VirusesSteps to help avoid Viruses

    Use anUse an Internet firewallInternet firewall,,

    Subscribe toSubscribe to industry standard antivirusindustry standard antivirus

    softwaresoftware,, Never open an eNever open an e--mail attachment from someonemail attachment from someone

    you don't know,you don't know,

    Scan each and every attachment,Scan each and every attachment, Rules to be followed, while surfing netRules to be followed, while surfing net

  • 8/7/2019 ethics and IT

    15/32

    Software piracy andSoftware piracy and

    HackingHacking

  • 8/7/2019 ethics and IT

    16/32

    What isWhat is

    PIRACY???????PIRACY???????Reselling MediaReselling Media

    Downloading from a websiteDownloading from a website

    Taping songsTaping songs

    Buying a used book orCDBuying a used book orCD

    Watching broadcast television but skipping commercialsWatching broadcast television but skipping commercials

  • 8/7/2019 ethics and IT

    17/32

    Types of PIRACYTypes of PIRACY

    End User PiracyEnd User Piracy

    ClientClient Server PiracyServer Piracy

    Internet PiracyInternet Piracy

    HardHard--Disk PiracyDisk Piracy

    SoftwareCounterfeitingSoftwareCounterfeiting

  • 8/7/2019 ethics and IT

    18/32

    EndEnd--User PiracyUser Piracy

    This occurs when a company employee reproducesThis occurs when a company employee reproduces

    copies of software without authorizationcopies of software without authorization

    Copying disk for installation and distributionCopying disk for installation and distribution

    Swapping disks in or outside the workplaceSwapping disks in or outside the workplace

  • 8/7/2019 ethics and IT

    19/32

    ClientClient--Server PiracyServer Piracy

    This type of piracy occurs when too many employeesThis type of piracy occurs when too many employees

    on a network are using a central copy of a program aton a network are using a central copy of a program at

    the same time.the same time.

    System OveruseSystem Overuse

  • 8/7/2019 ethics and IT

    20/32

    Internet PiracyInternet Piracy

    This occurs when software is downloaded from theThis occurs when software is downloaded from the

    InternetThe same purchasing rules should apply toInternetThe same purchasing rules should apply to

    online software purchase as for those bought inonline software purchase as for those bought in

    traditional ways.traditional ways.

    Pirate websitePirate website

    Unauthorized transfer of copyrighted programUnauthorized transfer of copyrighted program

  • 8/7/2019 ethics and IT

    21/32

    HardHard--Disk LoadingDisk Loading

    This occurs when a business who sells new computersThis occurs when a business who sells new computers

    loads illegal copies of software onto the hard disks toloads illegal copies of software onto the hard disks to

    make the purchase of the machines more attractive.make the purchase of the machines more attractive.

    ValueAdded Resellers (VAR)ValueAdded Resellers (VAR)

  • 8/7/2019 ethics and IT

    22/32

    SoftwareCounterfeitingSoftwareCounterfeiting

    This type of piracy is the illegal duplication and saleThis type of piracy is the illegal duplication and sale

    of copyrighted material with the intent of directlyof copyrighted material with the intent of directly

    imitating the copyrighted product.imitating the copyrighted product.

  • 8/7/2019 ethics and IT

    23/32

    HACKERHACKER

    Some one who bypasses the systems access controls bySome one who bypasses the systems access controls bytaking advantage of security weaknesses left in thetaking advantage of security weaknesses left in the

    system by developers .system by developers .

  • 8/7/2019 ethics and IT

    24/32

    What HACKER do???????What HACKER do???????

    SYSTEMSYSTEM

    Access confidential informationAccess confidential information

    Threaten someone fromYOUR computerThreaten someone fromYOUR computer Broadcast your confidential letters or materials .Broadcast your confidential letters or materials .

    Store illegal materialStore illegal material

  • 8/7/2019 ethics and IT

    25/32

    Evils of HackingEvils of Hacking

    Compromise the security of system without permissionCompromise the security of system without permission

    from an authorized party, usually with the intent offrom an authorized party, usually with the intent of

    accessing computers connected to the network.accessing computers connected to the network.

  • 8/7/2019 ethics and IT

    26/32

    Advantage of HackingAdvantage of Hacking

    To determine problem and weakness for programTo determine problem and weakness for program

    Creation of firewallCreation of firewall

    Useful for military purpose and spyingUseful for military purpose and spying Better computer securityBetter computer security

  • 8/7/2019 ethics and IT

    27/32

    Privacy issuesPrivacy issues

    ITmakes it technically and economically feasible toITmakes it technically and economically feasible to

    collect ,store, integrate , interchange and retrievecollect ,store, integrate , interchange and retrieve

    data and information quickly and easily.data and information quickly and easily.

    However , the power of information technology toHowever , the power of information technology to

    store and retrieve information can have a negativestore and retrieve information can have a negative

    effect on the right to privacy of every individual.effect on the right to privacy of every individual.

  • 8/7/2019 ethics and IT

    28/32

    Employment issuesEmployment issues

    The impact of ITon employment is a major ethical concern and isThe impact of ITon employment is a major ethical concern and is

    directly related to the use of computers to achieve automation of workdirectly related to the use of computers to achieve automation of work

    activities.activities.

    Use of EUse of E-- business technologies has created new jobs and increasedbusiness technologies has created new jobs and increased

    productivity , while also causing a significant reduction in some typesproductivity , while also causing a significant reduction in some types

    of job opportunities.of job opportunities.

    Jobs created by some EJobs created by some E--business systems may require different types ofbusiness systems may require different types of

    skills and education than do the jobs that areskills and education than do the jobs that are elliminatedelliminated . Therefore ,. Therefore ,

    individuals may become unemployed unless they can be retained for newindividuals may become unemployed unless they can be retained for new

    ositions or new res onsibilities.ositions or new res onsibilities.

  • 8/7/2019 ethics and IT

    29/32

    Challenges inChallenges in WWorkingorking

    conditionsconditions

    IThas eliminated monotonous tasks in the office and theIThas eliminated monotonous tasks in the office and the

    factory that formerly had to be performed by people.factory that formerly had to be performed by people.

    People require to concentrate on more challenges andPeople require to concentrate on more challenges and

    interesting assignments, upgrades the skill level of the workinteresting assignments, upgrades the skill level of the work

    to be informed, and creates challenging jobs requiring highlyto be informed, and creates challenging jobs requiring highly

    developed skills in the computer industry and withindeveloped skills in the computer industry and within

    computercomputer--using organizations.using organizations.

  • 8/7/2019 ethics and IT

    30/32

    Health issuesHealth issues

    Heavy use of computer is reportedly causing healthHeavy use of computer is reportedly causing health

    problems like:problems like:--

    Job stressJob stressDamaged arm and neck musclesDamaged arm and neck muscles

    Eye strainEye strain

    radiation exposureradiation exposureEven death by computerEven death by computer-- caused accidentscaused accidents

  • 8/7/2019 ethics and IT

    31/32

    Individuality issuesIndividuality issues

    EE--business systems concerns their negativity effect onbusiness systems concerns their negativity effect on

    the individuality of people.the individuality of people.

    Widespread use of personal computers and theWidespread use of personal computers and the

    internet has dramatically improved the developmentinternet has dramatically improved the development

    of peopleof people-- oriented and personalized informationoriented and personalized information

    system.system.

  • 8/7/2019 ethics and IT

    32/32