Sunteți pe pagina 1din 27

Ethics in IT

Information ethics is the field that investigates the ethical issues arising from the development and application of information technologies.

Ethical standards
One of the most definitive sets of ethical standards is the Association for Computing Machinery Code of Ethics. The code is a standard governing ethical behavior among computing professionals. It covers the core set of computer ethics from professional responsibility to the consequences of technology in society. Another computer ethics body is the British Computer Society, which has published a code of conduct and code of practice for computer professionals in the UK.

Ethical dilemma
o One set of issues deals with some of the new ethical dilemma that have emerged, or taken on new form, with the rise of the Internet and Social Networking. o There are now many ways to gain information about others that were not available, or easily available, before the rise of computers.

o The use of Internet as a tool for abuse; spreading child porn, harassment of others, and other challenges

Ethical Issues Inherent With Workplace Stress


By Michael Lee
The most common reason for workplace stress is the pressure of having to do too much work within a limited time scope. Concept of Ethics Samples of Ethical Issues Inherent With Workplace Stress Dealing With Ethical Issues Inherent With Workplace Stress There are three recommended steps to deal with a dilemma of this nature: 1) Are you taking legal actions? 2) Is the decision fair for both parties involved?

ETHICAL ISSUES IN IT

Computer Virus

Ethics and Information Tech.

What is Computer Virus?


Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.

Ethics and Information Tech.

Spreading of Virus
Virus are most easily spread, Spread through E-mail Attachments, Instant Messaging messages, Funny Images, Audio and Videos files, Downloading files from Internet, Greeting cards and many more.
Ethics and Information Tech.

Steps to help avoid Viruses


Use an Internet firewall, Subscribe to industry standard antivirus software, Never open an e-mail attachment from someone you don't know, Scan each and every attachment, Rules to be followed, while surfing net

Ethics and Information Tech.

COMPUTER CRIMES

Ethics and Information Tech.

TYPES OF COMPUTER CRIMES


Hacking Phishing Computer Viruses Cyberstalking Identity Theft
Ethics and Information Tech.

Types of Computer Criminal


Outsiders Insiders

Ethics and Information Tech.

REASON FOR COMPUTER CRIME


Capacity to store data in comparatively small space Easy to access Complex Negligence Loss of evidence
Ethics and Information Tech.

Who are the COMPUTER CRIMINALS ?


Children and adolescents between the age group of 6 18 years Organised hackers Professional hackers / crackers Discontented employees-

Software piracy and Hacking

Ethics and Information Tech.

What is PIRACY???????
oReselling Media o Downloading from a website o Taping songs oBuying a used book or CD oWatching broadcast television but skipping Ethics and Information Tech. commercials

Types of PIRACY
o Counterfeiting o Internet Piracy o End User Piracy o Client-Server Overuse o Hard-Disk Loading

Ethics and Information Tech.

HACKER
Some one who bypasses the systems access controls by taking advantage of security weaknesses left in the system by developers .

Ethics and Information Tech.

What HACKER do???????


SYSTEM Access confidential information Threaten someone from YOUR computer Broadcast your confidential letters or materials . Store illegal material

Ethics and Information Tech.

Advantage of Hacking
To determine problem and weakness for program Creation of firewall Useful for military purpose and spying Better computer security

Ethics and Information Tech.

Ten commandments of Computer Ethics by Dr. Ramon C. Barquin


1. Do Not Use A Computer To Harm Other People. 2. Do Not Interfere With Other Peoples Computer Work. 3. Do Not Snoop Around In Other Peoples Computer Files. 4. Do Not Use A Computer To Steal.

5. Do Not Use A Computer To Bear False Witness. 6. Do Not Copy Or Use Proprietary Software For Which You have Not Paid. 7. Do not Use Other Peoples Computer Resources Without Authorization Or Proper Compensation.

8. Do Not Appropriate Other Peoples Intellectual Output.

9. Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing. 10. Always Use A Computer In Ways That ensure Consideration And Respect For Your Fellow Humans.

Problems
New ethical considerations may be required with technology capabilities: Email spamming Digital photography

o Pornography access o Intellectual property o Globalization of the organization

Challenges
o Network security o Fraud o Free trade o Software accuracy and reliability.

S-ar putea să vă placă și