1
COMPUTING & ETHICS
COMPUTIN
G & ETHICS
2
COMPUTING & ETHICS
INTRODUCTION
3
The advancement of the
I n f o r m a t i o n Te c h n o l o g y fi e l d
has resulted in the world
w i t n e s s i n g t r e m e n d o u s l y,
brilliant changes. IT is a
powerful tool if used correctly
in the right hands. It unleashes
the creativity and ideas which
were previously thought to be
u n h e a r d o f. H o w e v e r, e v e r y
rose has its thorn and the
same can be said for the IT
fi e l d . L e t u s s e e h o w :
4
ETHICAL ISSUES
IN COMPUTING
Ethics is a set of moral principles that
govern the behaviour of a group or
individual.
Similarly, computer ethics is a set of moral principles that
COMPUTING & ETHICS
regulate the use of computers. Some ethical values are:
• Do not use the computer to harm other people’s data
• Do not use the software unless you pay for this software
• It is wrong to claim ownership of a work that is the
output of someone else’s intellect.
The significance of computer ethics that are discussed
includes societal well-being, honesty and trustworthiness,
safeguard of data, privacy respect, creation of job
opportunities. The need for computer ethics is a result of
the adverse effects brought by computers in society.
5
INTELLECTUAL
PROPERTY RIGHT
Intellectual property rights (IPR) refers to the legal
rights given to the inventor or creator to protect
his invention or creation for a certain period of
time
COMPUTING & ETHICS
Intellectual software has the following properties:
• Software Patent: A software patent is a patent that protects computer
software. Patent laws can be used to restrict freedom of copying, use,
distribution and modification of published information.
• Software Copyright: Software copyright is the legal protection for code
meant to be read by a machine. It is used by software developers and
owners to keep people from copying their intellectual property without
permission or from using it in any way they haven't agreed to.
• Trademark: A trademark is a type of intellectual property consisting of a
recognizable sign, design, or expression that identifies products or
services from a particular source and distinguishes them from others.
6
DATA PROTECTION
ON THE INTERNET
D a t a p r o t e c t i o n c a n b e d e fi n e d a s t h e
security or protection of data or
information on the internet from
computer viruses, spammers or hackers
COMPUTING & ETHICS
The Data Protection Act (1988) plays an important role in
taking care of users and protecting their personal
information. We must take care of the following points to
protect data:
• Do not disclose passwords
• Do not download unwanted software
• Do not read unwanted emails, as they may carry viruses
• Install high quality antivirus programs
7
SPAM
Unwanted messages which come into your mailbox
are called Spam and they may carry viruses.
COMPUTING & ETHICS
Ways to stop spam:
• Installing good antivirus software
• Avoid reading e-mail messages from
unrecognized senders and delete them.
8
SOFTWARE PIRACY
Software piracy means illegal copying,
reproduction distribution or use of
software. It is also known as act of
stealing legally protected software
COMPUTING & ETHICS
Some forms of piracy are:
• Licensed user duplication for unlicensed users:
Refers to copying/distribution of software
without proper license.
• Illegal internet distribution: When ordering a
software, make sure it is from an authorized
distributor or else there is no guarantee if the
9
CYBER CRIME
COMPUTING & ETHICS
Cybercrime is any activity involving a
computer, network or networked device for
criminal means. Cybercrime may harm
someone's security or finances.
10
REASONS FOR
CYBER CRIME
Most cybercrime is committed
by cybercriminals or hackers who
COMPUTING & ETHICS
want to make money. However,
occasionally cybercrime aims to
damage computers or networks for
reasons other than profit. These
could be political or personal.
Cybercrime can be carried out by
individuals or organizations.
11
CYBER CRIMINALS
The categories of cyber criminals are:
• Organised hackers: Refers to those who are
COMPUTING & ETHICS
organized together to fulfil certain objectives
• Professional hackers: Refers to hackers mostly
employed by business organisations to hack
the websites of their rivals and get credible,
reliable and valuable information.
• Discontent employees: Refers to people who
have been sacked by their employers or are
dissatisfied with their employers.
12
PREVENTION OF CYBER CRIME
COMPUTING & ETHICS
13
CYBER LAWS
India’s cyber laws are contained in
the Information technology Act
COMPUTING & ETHICS
2000. The act came into effect after
getting clearance from both the
houses of parliament in May 2000.
The bill received the assent of the
President of India in August 2000 as
the IT Act 2000.
14
ADVANTAGES OF CYBER LAWS
COMPUTING & ETHICS
15
HACKING
H a c k i n g c a n b e d e fi n e d a s a n a t t e m p t
to exploit a computer system. It
mainly involves unauthorized access.
COMPUTING & ETHICS
The reasons for hacking are:
• Theft of service
• To take valuable files
• Thrill and excitement
• Psychologically Disturbed
• For knowledge and experiment
16
MALICIOUS CODE
COMPUTING & ETHICS
Malicious code is any type of code that
causes harm to a computer system or
network. This includes viruses, worms,
Trojan horses, ransomware, logic bomb,
and other malicious programs. Malicious
code is the language used by threat
actors to communicate with computers.
17
PROTECTION AGAINST
MALICIOUS INTENT
AND MALICIOUS
CODE
The ways to protect our computer system are:
• Use high quality antivirus
COMPUTING & ETHICS
• If you are downloading a potentially corrupted
software, stop the download immediately
• Avoid usage of unauthorized software
• Avoid using memory cards and USB of others
as it may be infected
• Do not open potential spam e-mails
18
COMPUTING & ETHICS
YOU
THANK