0% found this document useful (0 votes)
69 views15 pages

Professional Practices Lecture 2

This document discusses several issues in computer ethics, including intellectual property rights, privacy concerns, and how computers affect society. It addresses intellectual property categories like patents, trademarks, and copyright. Common computer ethics issues are also examined, such as software piracy, hacking, spamming, plagiarism, and file privacy. The document concludes that as technology advances, computer ethics aims to establish standards around computers' growing influence.

Uploaded by

MohSin WaHeeD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views15 pages

Professional Practices Lecture 2

This document discusses several issues in computer ethics, including intellectual property rights, privacy concerns, and how computers affect society. It addresses intellectual property categories like patents, trademarks, and copyright. Common computer ethics issues are also examined, such as software piracy, hacking, spamming, plagiarism, and file privacy. The document concludes that as technology advances, computer ethics aims to establish standards around computers' growing influence.

Uploaded by

MohSin WaHeeD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

PROFESSIONAL PRACTICES

LECTURE 2
INTRODUCTION
 Ethics is a set of moral principles that govern
the behavior of a group or individual.
 likewise, computer ethics is set of moral
principles that regulate the use of computers.
Common issues of computer ethics
Some common issues of computer ethics include
intellectual property rights such as copyrighted
electronic content, privacy concerns, and how
computers affect society.
INTELLECTUAL PROPERTY
Intellectual property refers to creations of the intellect
(hence, the name): inventions, literary and artistic works,
symbols, names, images, and designs used in commerce
are a part of it.
Intellectual property is usually divided into two branches,
namely industrial property which broadly speaking
protects inventions and copyright, which protects
literary and artistic works.
CATEGORISING INTELLECTUAL
PROPERY
 Intellectual property is divided into two categories:
 Industrial property, which includes inventions (patents),
trademarks, industrial designs, commercial names,
designations and geographic indications
specific brands) etc. (location
 Copyright, which includes literary and artistic works such
as novels, poems and plays, films, musical works, artistic
works such as drawings, paintings, photographs,
sculptures, and architectural designs.
Copy rights
Copyright is a legal concept, enacted by most
governments, giving the creator of an
original
work exclusive rights to it, usually for a limited
time.
NETIQUETTES
Netiquettes are about the the various risks related to
using the Internet.
It is about proper ways in which to use a network and to
determine whether information is reliable, while
emphasizing four important points given in next slides.
REAL PEOPLE EXIST BEHIND THE
COMPUTERS
You are dealing with people, not machines. So think
twice before you click on Send button in the mail/chat
window
You are not the only one using the network
Keep these other people in mind when you say something on
a network.

Hacking is an attempt to exploit a computer system or a private


network inside a computer. Simply put, it is the unauthorized
access to or control over computer network security systems
for some illicit purpose.
AVOID SPAMMING
 Spamming is sending unsolicited bulk and/or
commercial messages over the Internet.
 Spamming is morally bad if it is intended to destroy and
done by infringing on the right of privacy of others.
 It could be good if the message sent benefits the
recipients, like giving out warnings or useful information
to others.
SOFTWARE PRIVACY
 Software piracy is morally bad when someone reproduces
a copy of the software and sells it for profit, produces
exactly the same or similar version without giving proper
credit to the original author, or simply produces it and
distributes it to others.
 It is not immoral to copy the software if someone who
has a licensed copy of the software and simply makes a
backup copy of the original. One back-up copy of the
commercial software can be made, but the back-up copy
cannot be used except when the original package fails or
is destroyed.
CREATION OF WORMS AND
COMPUTER VIRUS
 Creation of worms and computer viruses is morally bad
when it is intended for malicious purposes like to steal
information or destroying of data.
 However, it could be used like a vaccine – poison to kill
another poison – to cure or prevent a potentially
destructive system from wreaking havoc in the network.
The way some worms and viruses work could be used to
gather information that could help protect the majority of
computer users.
PLAGIARISM
 Plagiarism is copying someone else's work and then
passing it off as one's own. It is morally bad because it is
an act of stealing.
 Copying programs written by other programmers and
claiming it as your own could be an act of plagiarism. It
involves lying, cheating, theft, and dishonesty.
FILE PRIVACY
Any computer document produced either by an individual
in his private home or in his office should remain private.
No one has should open any document unless authorized
by the individual who created the file himself.
CONCLUSION
As technology advances, computers continue to have a
greater impact on society. Therefore, computer ethics
promotes the discussion of how much influence
computers should have in areas such as artificial
intelligence and human communication. As the world
of computers evolves, computer ethics continues to
create ethical standards that address new issues raised
by new technologies.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy