0% found this document useful (0 votes)
41 views6 pages

Value Education: Module: 3 Computer Ethics

Computer ethics deals with how computing professionals should make ethical decisions regarding professional and social conduct. The concept originated in 1950 by Norbert Wiener, and was later formally introduced as a separate field of study by Walter Manner in 1970 who observed that ethical decisions are harder in the context of computer technology. Cyberspace raises privacy concerns as the detailed, cumulative and invisible observation of users' online activities enabled by technology presents a serious threat to information privacy, while also enhancing individual freedom through anonymity if privacy is protected.

Uploaded by

Sumit Katre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views6 pages

Value Education: Module: 3 Computer Ethics

Computer ethics deals with how computing professionals should make ethical decisions regarding professional and social conduct. The concept originated in 1950 by Norbert Wiener, and was later formally introduced as a separate field of study by Walter Manner in 1970 who observed that ethical decisions are harder in the context of computer technology. Cyberspace raises privacy concerns as the detailed, cumulative and invisible observation of users' online activities enabled by technology presents a serious threat to information privacy, while also enhancing individual freedom through anonymity if privacy is protected.

Uploaded by

Sumit Katre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Value Education

Module: 3 Computer Ethics


Computer Ethics
Computer Ethics is a part of practical philosophy, which deals with
how computing professionals should make decisions regarding
professional and social conduct.

The concept originated in 1950 by Norbert Wiener.

Later by 1970, a medical practitioner and researcher called Walter


Manner observed that ethical decisions are much harder to make in
the context of computer. He then formally introduced Computer
Ethics as a separate branch of study.
Computer Ethics to be followed
• Generating / consciously spreading computer viruses is unethical
• Computer should not be used to dehumanize individual
• Text document on the net may be protected by encryption
• It should not be used for robbery or to steal money from somebody
else’s account
• One should not snoop around in other people’s files
• The internet can spread untruth and false information
• Hacking is unethical
Cyber Crime
• It refers to any crime that involves a computer and a network. The
computer may have been used in the commission of a crime. The other
word is net crime. It includes cracking, encroachment of one’s privacy,
interception of confidential news and etc.
It targets computer networks / devices:
Examples:
• Viruses & Malware
• Phishing: Attempt to acquire sensitive information such as usernames,
passwords and credit card details (masquerading a trustworthy identity)
• Spam: Unsolicited sending of bulk emails for commercial purposes
• Cyber Bullying: to use Cyber Technology to harass other people
deliberately
Cyberspace
Cyberspace is the rapidly growing network of
computing and communication technologies that
have profoundly altered our lives. We carry out
myriad social, economic and political transactions
through Cyberspace. But the very technology that
enables these transactions also makes detailed,
cumulative and invisible observation of our selves.
The continuous surveillance of all our cyber activities
present a serious threat to information privacy.
Cyberspace
Technology can enhance individual freedom through
increased anonymity and privacy. At the same time,
the users of new technologies have employed
themselves to violate autonomy and human dignity of
other users. Often women are the target of these
people.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy