Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

INTRODUCTION TO COMPUTER

ETHICS

12/19/2021 Prepared by Naluwooza Ruqqaiya 1


ETHICS
• Principles of right and wrong that individuals, acting as free
moral agents, use to make choices to guide their behaviors
• Refers to the standard and rules that should be followed and it
helps us to regulate our conduct in a group or with a set of
individuals
• Rules to follow in our interactions and our actions that affect
others
• Assumes people are rational and make free choices

12/19/2021 Prepared by Naluwooza Ruqqaiya 2


WHY STUDY ETHICS?
Not everyone can do what they want
Ethics can be seen as a way to decide the best thing to do
New problems accompany new technologies
 Email and spams
 www and pop-up ads for pornographic web sites
“Common wisdom” not always adequate. “Common wisdom”
may not exist for novel situations brought about by new
technologies

12/19/2021 Prepared by Naluwooza Ruqqaiya 3


THE ETHICAL POINT OF VIEW

Most everyone shares “core values”, desiring:


 Life
 Happiness
 Ability to accomplish goals

Two ways to view world


 Selfish point of view: consider only own self and its core
values
 Ethical point of view: respect other people and their core
values

12/19/2021 Prepared by Naluwooza Ruqqaiya 4


Ethics in Society
• Society
– An association of people organized under a
system of rules designed to advance the good
of its members over time
– Morality: Rules of conduct describing what
people ought and ought not to do
– Ethics: Philosophical study of morality, a
rational examination into people’s moral
belief’s and behavior

12/19/2021 Prepared by Naluwooza Ruqqaiya 5


DEFINING TERMS
Society
Association of people organized under a system of rules
Rules: advance the good of members over time
Morality
A society’s rules of conduct
What people ought / ought not to do in various situations
Value
Beliefs and/or attitudes about what is good or desirable
Based upon life experience, family, culture, religion,
profession, society

12/19/2021 Prepared by Naluwooza Ruqqaiya 6


DEFINITIONS CONT;

• Computer ethics is system of moral standards


or moral values used as a guideline for
computer users.
• Code of ethics these are guidelines in ICT that
help determine whether a specific computer
action is ethical or unethical.
• Intellactual property is works created by
inventors, authors, artists

12/19/2021 Prepared by Naluwooza Ruqqaiya 7


DEFINITIONS CONT;
• Privacy refers to the right of individuals and
companies to deny or restrict the collection
and the use of information about them.
• Computer crime is any illegal acts involving
computers.
• Cyber law any law relating to protect the
internet and other online communication
technologies.

12/19/2021 Prepared by Naluwooza Ruqqaiya 8


DIFFERENCE BETWEEN ETHICS AND LAWS
Ethics Laws

1. Act as guide lines to computer users Acts as rules to controls computer users.

2. Computer users are free to follow or Computer users must follow the
ignore the code of ethics regulations and law

3. Universal , can be applied any where all Depend on country and state where the
over the world. crime is committed.

4. To produced ethical computer users To prevent misuse of computers

5. Not following ethics are called immoral Not obeying laws are called crime

12/19/2021 Prepared by Naluwooza Ruqqaiya 9


Four types of intellectual property

• Patents- for inventions


• Trademarks- for brand identity
• Design- for product appearance
• Copy rights- for materials

12/19/2021 Prepared by Naluwooza Ruqqaiya 10


Privacy
Ways of making personal data more privates
• Install personal firewall
• Clear your history file when you are browsing
• Purchase goods with cash rather credit cards.

12/19/2021 Prepared by Naluwooza Ruqqaiya 11


Authentication
• Is a process where a user verifies their
identity. Authentication deals with the
problem of determining whether a user
should be allowed access to a particular
system.

12/19/2021 Prepared by Naluwooza Ruqqaiya 12


Four commonly used Authentication
methods
• User identification
• Possessed object
• Biometric device
• Callback system

12/19/2021 Prepared by Naluwooza Ruqqaiya 13


User identification

• Is a unique combination of characters (letter,


number or symbol) that identify a specific
user.
• Examples are pin numbers, passwords etc.

12/19/2021 Prepared by Naluwooza Ruqqaiya 14


Possessed object

• It is any item that you must carry to gain


access to computer of computer facility.
• examples are ATM cards, Credit cards, Smart
cards etc.

12/19/2021 Prepared by Naluwooza Ruqqaiya 15


Biometric device

• Is a device that translates personal characters


into digital code that is compared with the
digital code stored in a database
• Examples are
• Fingerprint reader
• Iris scanner
• Hand geometric scanner
• Signature verification system
12/19/2021 Prepared by Naluwooza Ruqqaiya 16

You might also like