0% found this document useful (0 votes)
3 views19 pages

Computer Project '24

The document discusses the importance of computing and ethics, highlighting major ethical issues such as hacking, piracy, and individual privacy rights. It emphasizes the need for software ethics, accuracy of information, and protective measures against computer crimes. The presentation concludes with the '10 Commandments of Computer Ethics' to guide responsible computer use.

Uploaded by

avikagupta720
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views19 pages

Computer Project '24

The document discusses the importance of computing and ethics, highlighting major ethical issues such as hacking, piracy, and individual privacy rights. It emphasizes the need for software ethics, accuracy of information, and protective measures against computer crimes. The presentation concludes with the '10 Commandments of Computer Ethics' to guide responsible computer use.

Uploaded by

avikagupta720
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

COMPUTING AND

ETHICS

Made by AVIKA GUPTA


CONTENTS OF THIS PRESENTATION

● ACKNOWLEDGEMENTS
● INTRODUCTION
● COMPUTER ETHICS
● MAJOR ETHICAL ISSUES
● HACKING AND PIRACY
● GETTING PROTECTED
● COMPUTER CRIME
● 10 COMMANDMENTS OF COMPUTER
ETHICS
● BIBLIOGRAPHY
● THANK YOU
ACKNOWLEDGEMENT
I would like to express my Gratitude to the sources that have helped
me in writing this project.

I would like to express my Gratitude towards Sir Neeraj because of


whom this project depicts importance in the first place.

Also,this project would not have been completed without readers


such as myself and various websites on the internet that have
helped me a lot in writing and understanding this project.

Finally,I express my gratitude towards everyone.

Thank you..
INTRODUCTION
Ethics play an important role in our life styles and way of
doing things.In general we may define ethics as the field of
study that is concerned with question of value i.e. making
judgements about good or bad behaviour in any given
situation.

Ethics is concerned with what is good for individuals and


Society and is also describe as moral philosophy.

The term is derived from the Greek word ethos which means
custom Habitat character or disposition.

Ethics guides one’s behaviour in every field of life whether


business, education ,social behaviour or using computers.
1
Computers are capable of doing many
things as per the instructions given to it.
This quality makes computers a very
COMPUTER useful tool because the capability of
computers offer such strong temptations.
ETHICS We must be especially careful to use them
wisely. It is not the computers we should
be concerned about but the people whose
lives we can affect by our actions.
Software Ethics

Software ethics refer to ● Unauthorized copying Sometimes developers


ensuring that the software of software is illegal. dedicate the software to
being used is not pirated or the public domain which
unauthorised. The users of ● It deprives the
the computers should make software developers
means that the software
sure that they are not of a fair return of their is not subject to any
working with any work. copyright restrictions.
unauthorised copy of the
software. Unlike other ● Unauthorized copying It can be copied and
commodities, purchasing directly harms the shared freely. Such
does not give you ownership community. It results software are known as
rights for software ,rather it in price-rises,
gives usage rights only to the reduction in future
public domain software.
purchaser. supports and inhibits
the development of
new software
products
2

MAJOR These days, we can easily say that our


society is information society and our era
is information era. As we all know that
ETHICAL information is means to acquire
knowledge. In other words, we can say

ISSUES that information forms the intellectual


capital for a person or body. However,
there are many ethical issues involved with
the usage and availability of information.
INDIVIDUAL’S RIGHT TO PRIVACY

3 ISSUES RELATING TO THE


PRIVACY OF AN INDIVIDUAL:

➢ Collecting Information

➢ Storing Information

➢ Distributing Information
INTELLECTUAL PROPERTY RIGHTS

Intellectual
property rights THE INTELLECTUAL PROPERTY RIGHTS MUST BE
are the rights of PROTECTED FOR :
the owner of
information is to ➢ Encourages businesses and individuals to
exchanged,shar create new software applications, as well as
ed or
distributed.
improving existing applications.

➢ Ensures new ideas and technologies are


widely distributed.

➢ Promotes investment in the national


economy
ACCURACY OF INFORMATION

With the value and importance of information, it becomes


very necessary to ensure that the information is accurate.
When a user pays for some information or software he has
every right to ensure that the information or software being
given to him is authentic, authorised and accurate. The
ethical issue involved here is that the information owner
should make available the authentic, authorised and
accurate information to its purchaser.
3
Hacking refers to attempts to get
information from otherwise undisclosed
areas.
Piracy refers to the unauthorized
HACKING duplication of software.

AND Two major threats to security of software


and information resources are hacking and

PIRACY piracy. Where hacking refers to attempts to


gain information and piracy refers to
unauthorised duplication of software.
SOFTWARE PIRACY

COMMON FORMS OF SOFTWARE PIRACY ARE:

● SOFTLIFTING

● UPLOADING AND DOWNLOADING

● SOFTWARE COUNTERFEITING

● HARD DISK LOADING

● RENTING
4
COMMON FORMS OF ATTACK:

1. SPAMMING
2. COMPUTER VIRUSES
3. WORMS
4. MALWARE
GETTING 5.
6.
SPYWARE
ADWARE

PROTECTED 7.
8.
9.
TROJAN HORSES
SWEEPER
DENIAL OF SERVICES
10. PASSWORD GUESSING
11. PHISHING
PROTECTIVE MAINTENANCE
MEASURES
● TIMELY BACKUPS AT
● AUTHORIZATION REGULAR INTERVALS

● TRACING USER’S
HISTORY
● AUTHENTICATION
● SYSTEM SCANNING

● CHANGING PASSWORDS
● FIREWALL FREQUENTLY

● GOOD BROWSING
HABITS
TROUBLESHOOTING OR CURATIVE
MEASURES

➢ If someone has intentionally changed your data,


repeat it to the concerned authorities and try getting
it repaired.

➢ Reinstate data from backup copies and ask your


supervisor to ensure data safety and security
through enhanced security measures.

➢ In case it is the system’s fault, get it repaired. Keep


taking data backups regularly to avoid data loss.

➢ Reinstate data from backup copies and ask your


supervisor to ensure data safety and security
through enhance security measures.
5
COMPUTER CRIME OR ELECTRONIC
CRIME may include thefts in electronic
form.

They may include:

COMPUTER ●

Sabotage
Theft of Documentation
● Forging of data
CRIMES ●

Fraud in figures
Selling reports
● Embezzling funds
● Installing bugs
6 ● Thou shalt not use a computer to harm others

● Thou shalt not interfere with other people’s computer


work

10 ● Thou shalt not snoop around in other people’s computer


files

● Thou shalt not use a computer to steal

COMMAND ● Thou shalt not use a computer to bear false witness

● You shalt not copy or use proprietary software for which

MENTS OF ●
you have not paid

Thou shalt not use other people’s computer resources


without proper authorization

COMPUTER ● Thou shalt not appropriate other people’s intellectual


output

ETHICS ● Thou shalt think about the social consequences of the


program you are writing

● Thou shalt always use a computer in ways that insure


consideration and respect.
BIBLIOGRAPHY

THE SOURCES OF THIS


PROJECT ARE:

➔ SUMITA ARORA
COMPUTER
APPLICATION BOOK
FOR CLASS 9

➔ SITES USED:
britannica.com
chubb.com
THANK
YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy