Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Value Education: Module: 3 Computer Ethics

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 6

Value Education

Module: 3 Computer Ethics


Computer Ethics
Computer Ethics is a part of practical philosophy, which deals with
how computing professionals should make decisions regarding
professional and social conduct.

The concept originated in 1950 by Norbert Wiener.

Later by 1970, a medical practitioner and researcher called Walter


Manner observed that ethical decisions are much harder to make in
the context of computer. He then formally introduced Computer
Ethics as a separate branch of study.
Computer Ethics to be followed
• Generating / consciously spreading computer viruses is unethical
• Computer should not be used to dehumanize individual
• Text document on the net may be protected by encryption
• It should not be used for robbery or to steal money from somebody
else’s account
• One should not snoop around in other people’s files
• The internet can spread untruth and false information
• Hacking is unethical
Cyber Crime
• It refers to any crime that involves a computer and a network. The
computer may have been used in the commission of a crime. The other
word is net crime. It includes cracking, encroachment of one’s privacy,
interception of confidential news and etc.
It targets computer networks / devices:
Examples:
• Viruses & Malware
• Phishing: Attempt to acquire sensitive information such as usernames,
passwords and credit card details (masquerading a trustworthy identity)
• Spam: Unsolicited sending of bulk emails for commercial purposes
• Cyber Bullying: to use Cyber Technology to harass other people
deliberately
Cyberspace
Cyberspace is the rapidly growing network of
computing and communication technologies that
have profoundly altered our lives. We carry out
myriad social, economic and political transactions
through Cyberspace. But the very technology that
enables these transactions also makes detailed,
cumulative and invisible observation of our selves.
The continuous surveillance of all our cyber activities
present a serious threat to information privacy.
Cyberspace
Technology can enhance individual freedom through
increased anonymity and privacy. At the same time,
the users of new technologies have employed
themselves to violate autonomy and human dignity of
other users. Often women are the target of these
people.

You might also like