Ethics

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

Ethics and Safety

Measures in
Computing

By Adarsh Patil and Gautam Mutha
Internet

 The Internet is the world’s largest computer
network.
 It is a network of millions of computers connected to
each other , all over the world.
 It has become very popular tool for searching
sharing information and conducting online
transactions.
Advantages of the
Internet

 Information: The internet is a vast reservoir of
knowledge.
 Communication: The main advantage of the internet
is faster communication.
 Learning: It is very easy for anybody to learn
anything using the internet.
 Entertainment: Movies, songs, videos, games are
available on the internet.
Disadvantages of
Internet

 Time wastage: Some people waste a lot of time on the
internet simply visiting one website after another.
 Health problems: People spend hours surfing on the
internet.
 Hacking: The information important to us such as or
credit card details our bank passwords can be easily
taken by hackers.
 Virus attack: The malware or virus threats spread
mostly due to the internet.
Computing Ethics

Ethics are principles standard of human conduct. Cyber
ethics is a code of behaviour to be observed while using
computers and working on the internet.
Unethical Practices

There are many types unethical practices:-
 Plagiarism: We should respect and acknowledge the
originators of the ideas, and their work. Plagiarism is
presenting someone else’s work or ideas as your
own.
 Most schools and universities have a well laid out
punishment for students found plagiarising.
Cyberbullying

Cyberbullying is when a person uses digital technology
to another person harass and scare the person.

Example: Ajay sends mean text messages to a grade 5


student of his school.
Hacking

 Hacking is a term used to describe actions taken by
someone to gain unauthorised access to a computer.
Spam

We all keep receiving unwanted e-mails with subjects
such as “limited times deals “ , “Hurry up shop now !
“ , “Get rich Quick”. These emails are called spam .
We can use the following features provided by most of
the e-mail service providers like Gmail, Yahoo, etc.
Spam folder
Report Spam/Mark as Spam
Phising

Many a times we get e-mails messeges that appear to
come from a bank asking us to reveal sensitive
information like our password, credit card detail is
called phising.
Individual Right To
Privacy

We should not reveal our personal details online. This
includes our real name, address, photographs, phone
numbers, school and town in which we live.

Steps to protect Privacy


Password
Use secure Wi-Fi
Software Piracy

When we buy software, we do not become the owner of
software. We just buy a license to use the software.
Most software. Marketed are copyrighted. This means
they belong to the developer of software.
Intellectual Prperty
Rights

We always feel our house, our jewellery, our furniture,
our car is our property. Any tangible this we own
becomes our property.
Cybercrime

Earlier crimes were committed by the criminals when
they were physically present at the place of occurrence
of crimes but now the criminals can commit crime from
anywhere in the world using teconolgy.
Digital Footprint

When we walk in forest, we see footprints and we
know that deer or an elephant must have walked in
that area in the recent past. Similarily people leave
footprints on muddy ground or a beach when they
walk on it. A digital footprint is the trail that we live
when we visit the internet. A digital footprint is
everything on the internet about us. When we make a
post, we leave a print.

You might also like