Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

PRESENTED BY: KULDIP SHARMA CS-III B

WHAT

IS CYBER ETHICS? WHAT ARE THE ISSUES RELATED TO CYBER ETHICS? WHAT ARE THE COMPONENTS OF CYBER ETHICS? WHAT ARE CYBER ETHICAL CONCERNS?

CYBER ETHICS IS THE ANALYSIS OF NATURE AND SOCIAL IMPACT OF COMPUTER TECHNOLOGY AND THE CORESPONDING FORMULATION AND JUSTIFICATION OF POLICIES FOR THE ETHICAL USE OF SUCH TECHNOLOGY.

PRIVACY

ACCESSIBILITY

ACCURACY

PROPERTY

PRIVACY TELLS ABOUT WHAT INFORMATION ABOUT ONES SELF OR ONES ASSOCIATIONS MUST A PERSION REVEL TO OTHERS UNDSR WHAT CONDITIONS AND WHAT SAFEGUARDS.

ACCURACY TELLS US ABOUT WHO IS RESPONSIBLE FOR THE AUTHENTICITY,FIDELITY AND ACCURACY OF INFORMATION. IT TELLS US WHO IS TO BE HEALD ACCOUNTABLE FOR ERRORS IN INFORMATION.

IT TELLS US WHO OWNS INFORMATION? WHAT ARE THE JUST AND FAIR PRICES FOR ITS EXCHANGE? WHO OWNS THE CHANNELES, ESPECIALLY THE AIRWAYS THROUGH WHICH INFORMATION IS TRANSMITTED.

WHAT INFORMATION DOES A PERSION OR AN ORGANIZATION HAVE A RIGHT OR A PRIVILEGE TO OBTAIN, UNDER WHAT CONDITIONS AND WITH WHAT SAFEGUARDS.

HONESTY RESPECT CONFIDENTIALITY PROFESSIONALISM RESPONSIBILITY COMMUNICATION OBEYING THE LAW

PIRACY PLAGIARISM CYBER BULLYING CYBER-LIBEL WORMS AND VIRUSES

VIOLATING PRIVACY
CYBER-STALKING

IT REFERS TO UNAUTHORISED DUPLICATION AND DISTRIBUTION OF ITEM SUCH AS GAMES, DVD, SOFTWARE, MUSIC ETC.

PLAGIARISM IS PRESENTING SOME ONE ELSE WORK AS YOUR OWN, THIS INCLUDES WORK REPRESENTED IN HARD COPY IN DISK OR ON THE INTERNET.

WHEN THE INTERNET, CELL PHONES OR OTHER DEVICES ARE USE TO SEND OR POST TEXT IMAGES INTENDED TO HURT OR EMBRASS ANOTHER PERSON.

IT IS THE DELIBERATE MISREPRESENTATION OF PEOPLE OR EVENTS, FALSE STATEMENTS THAT HARM ANOTHERS REPUTATION. CYBERLIBEL IS A CATCHPHRASE FOR DEFAMATION THAT TAKES PLACE THROUGH THE INTERNET.

COMPUTER VIRUSES ARE SIMILER TO THE BILOGICAL VIRUSES IN THE WAY THEY MULTIPLY IN THE NUMBER AND IN THE WAY THEY NEED A HOST TO SERVIVE.

CYBER STALKING CAN BE DEFINED AS THE REPEATED ACTS HARASSMENT OR THREATINING BEHAVIOR OF THE CYBER CRIMINALS TOWARDS THE VICTIM BY USING INTERNET SERVICES.

You might also like