logging in or signing up Ethics : Information Technology vimalslnk Download Post to : URL : Related Presentations : Let's Connect Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 13756 Category: Entertainment License: All Rights Reserved Like it (4) Dislike it (0) Added: March 28, 2009 This Presentation is Public Favorites: 7 Presentation Description Ethics plays important role in information technology, if misused can create a lots of problems. Comments Posting comment... By: rocky.daryani (37 month(s) ago) but it is way to welth Saving..... Post Reply Close Saving..... Edit Comment Close By: imnothing4u (38 month(s) ago) it is very good dear thanks ........................ Saving..... Post Reply Close Saving..... Edit Comment Close By: ritu_maan (45 month(s) ago) its good but its too long. Saving..... Post Reply Close Saving..... Edit Comment Close Premium member Presentation Transcript Throughout the ages man has struggled with the Subj. of Right & Wrong, Ethics & Justice` ` : Throughout the ages man has struggled with the Subj. of Right & Wrong, Ethics & Justice` ` Ethics and Information Tech. Slide 2: Ethics and Information Technology Contents : Contents What is Ethics and Information Technology?? Ethical issues relating to computer application Security Threats Computer Viruses Cyber Crime Software piracy and Hacking Computer crime prevention Case Study Ethical dilemmas and consideration Ethics and Information Tech. Ethics : Ethics Derived from the Greek word “ethos”, which means “custom”, “habit”, and “way of living” Definition: "the discipline and practice of applying value to human behavior, resulting in meaningful conduct.“ Ethics and Information Tech. Cont………. : Cont………. Professional Ethics: concerns one's conduct of behavior and practice when carrying out professional work, e.g., consulting, researching, teaching and writing. A computing professional must understand Cultural, social, legal, and ethical issues in computing. Responsibility and possible consequences of failure. Ethics and Information Tech. Computer Ethics : Computer Ethics Computer ethics defined as the application of classical ethical principles to the use of computer technology. Ethical problems related to computers: Privacy Computers create a false sense of security People do not realize how vulnerable information stored on computers are Property Physical property Intellectual property (in both copyright and patent) Data as property Ethics and Information Tech. Slide 7: Access Access to computing technology Access to data Accuracy Accuracy of information stored Hacking, cracking and virus creation Software piracy Ethics and Information Tech. The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. : The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. 1) Thou shalt not use a computer to harm other people. 2) Thou shalt not interfere with other people's computer work. 3) Thou shalt not snoop around in other people's files. 4) Thou shalt not use a computer to steal. 5) Thou shalt not use a computer to bear false witness. Ethics and Information Tech. Slide 9: 6) Thou shalt not use or copy software for which you have not paid. 7) Thou shalt not use other people's computer resources without authorisation. 8) Thou shalt not appropriate other people's intellectual output. 9) Thou shalt think about the social consequences of the program you write. 10) Thou shalt use a computer in ways that show consideration and respect. Ethics and Information Tech. Computer Virus : Computer Virus Ethics and Information Tech. What is Computer Virus? : What is Computer Virus? Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. Ethics and Information Tech. Spreading of Virus : Spreading of Virus Virus are most easily spread, Spread through E-mail Attachments, Instant Messaging messages, Funny Images, Audio and Videos files, Downloading files from Internet, Greeting cards and many more. Ethics and Information Tech. Steps to help avoid Viruses : Steps to help avoid Viruses Use an Internet firewall, Subscribe to industry standard antivirus software, Never open an e-mail attachment from someone you don't know, Scan each and every attachment, Rules to be followed, while surfing net Ethics and Information Tech. COMPUTER CRIMES : COMPUTER CRIMES Ethics and Information Tech. TYPES OF COMPUTER CRIMES : TYPES OF COMPUTER CRIMES TARGET OF THE CRIME MEDIUM OF THE ATTACK TOOL INTIMIDATE OR DECEIVE Ethics and Information Tech. Types of Computer Criminal : Types of Computer Criminal Outsiders Insiders Ethics and Information Tech. REASON FOR COMPUTER CRIME : REASON FOR COMPUTER CRIME ECONOMIC IDEOLOGICAL PSYCHOLOGICAL EGOCENTRIC Ethics and Information Tech. METHODS OF ATTACK : METHODS OF ATTACK DATA TEMPERING Programming Techniques OTHER METHODS Ethics and Information Tech. Computer Crime can be Defined as : Computer Crime can be Defined as IT Infrastructure Illegal access Illegal Interuption Data Interfare System Interfrence Misuse Of Devices Electronic Fraud Ethics and Information Tech. Software piracy and Hacking : Software piracy and Hacking Ethics and Information Tech. What is PIRACY??????? : What is PIRACY??????? Reselling Media Downloading from a website Taping songs Buying a used book or CD Watching broadcast television but skipping commercials Ethics and Information Tech. Types of PIRACY : Types of PIRACY End User Piracy Client – Server Piracy Internet Piracy Hard-Disk Piracy Software Counterfeiting Ethics and Information Tech. End-User Piracy : End-User Piracy This occurs when a company employee reproduces copies of software without authorization Copying disk for installation and distribution Swapping disks in or outside the workplace Ethics and Information Tech. Client-Server Piracy : Client-Server Piracy This type of piracy occurs when too many employees on a network are using a central copy of a program at the same time. System Overuse Ethics and Information Tech. Internet Piracy : Internet Piracy This occurs when software is downloaded from the Internet The same purchasing rules should apply to online software purchase as for those bought in traditional ways. Pirate website Unauthorized transfer of copyrighted program Ethics and Information Tech. Hard-Disk Loading : Hard-Disk Loading This occurs when a business who sells new computers loads illegal copies of software onto the hard disks to make the purchase of the machines more attractive. Value Added Resellers (VAR) Ethics and Information Tech. Software Counterfeiting : Software Counterfeiting This type of piracy is the illegal duplication and sale of copyrighted material with the intent of directly imitating the copyrighted product. Ethics and Information Tech. HACKER : HACKER Some one who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers . Ethics and Information Tech. What HACKER do??????? : What HACKER do??????? SYSTEM Access confidential information Threaten someone from YOUR computer Broadcast your confidential letters or materials . Store illegal material Ethics and Information Tech. Evils of Hacking : Evils of Hacking Compromise the security of system without permission from an authorized party, usually with the intent of accessing computers connected to the network. Ethics and Information Tech. Advantage of Hacking : Advantage of Hacking To determine problem and weakness for program Creation of firewall Useful for military purpose and spying Better computer security Ethics and Information Tech. Computer crime prevention : Computer crime prevention Ethics and Information Tech. Slide 33: Computer crime is becoming ever prevalent in our society. More and more companies and individuals rely on the service and resources provided through networks computers. Ethics and Information Tech. TYPES OF COMPUTER CRIME PREVENTION : TYPES OF COMPUTER CRIME PREVENTION Internet crime prevention Prevention of cyber crime Prevention of computer crime in banking IT security Computer crime prevention law Hi tech crime prevention law Computer crime preventing on line fraud World risk investigation and terrorist prevention Ethics and Information Tech. Case Study of sole remaining supplier : Case Study of sole remaining supplier Ethics and Information Tech. Key points of Case Study : Key points of Case Study Introduction Background (pacemaker) Lack of dexterity in installation of pacemaker Serious consequences Transistor making company decided to pull its hand out of business Ethics and Information Tech. Key points of Case Study : Key points of Case Study Realization of problem Ethical dilemma Different views in board of director Theory of utilitarianism solution Ethics and Information Tech. ETHICALDILEMMAS ANDCONSIDERATIONS : ETHICALDILEMMAS ANDCONSIDERATIONS Ethical dilemmas in IT : Ethical dilemmas in IT Dilemmas are discussed in relation to four areas- Privacy Information accuracy Access to information Intellectual property rights Ethical dilemmas in relation to IT : Ethical dilemmas in relation to IT PLAGIARISM-The taking of ideas,writing and drawings or other similar intellectual property created by others and presenting it as your own. NETIQUETTE-A set of rules (mainly unwritten) to follow while you are online. SOME IMPORTANT VIEWS : SOME IMPORTANT VIEWS Internet offers great riches for the future,but poses many threats. Technology requires vigilance. Considerations regarding information ethics influence personal decisions,professional practice and public policy. EFFECTIVE WAY OUT OF SUCH DILEMMAS : EFFECTIVE WAY OUT OF SUCH DILEMMAS CONCLUSION : CONCLUSION Presented By:Solanki Vimal S.BinapaniNishant RanjanArchanaRajnish ChoubeyJyoti Singh : Presented By:Solanki Vimal S.BinapaniNishant RanjanArchanaRajnish ChoubeyJyoti Singh Ethics and Information Tech. You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.