Social and Ethical Issues of Information Technology
Transcript of Social and Ethical Issues of Information Technology
![Page 1: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/1.jpg)
Social And Ethical Issues Of Information Technology `
![Page 2: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/2.jpg)
![Page 3: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/3.jpg)
ContentsWhat is Ethics and Information Technology??Ethical issues relating to computer applicationSecurity Threats
Computer VirusesCyber CrimeSoftware piracy and HackingComputer crime preventionCase StudyEthical dilemmas and consideration
![Page 4: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/4.jpg)
EthicsDerived from the Greek word “ethos”, which
means “custom”, “habit”, and “way of living”
Definition: "the discipline and practice of applying value to human behavior, resulting in meaningful conduct.“
![Page 5: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/5.jpg)
Cont……….
Professional Ethics: concerns one's conduct of behavior and practice when carrying out professional work, e.g., consulting, researching, teaching and writing.
A computing professional must understand Cultural, social, legal, and ethical issues in
computing.Responsibility and possible consequences of
failure.
![Page 6: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/6.jpg)
Computer EthicsComputer ethics defined as the
application of classical ethical principles to the use of computer technology.
Ethical problems related to computers:Privacy
Computers create a false sense of securityPeople do not realize how vulnerable information stored on
computers areProperty
Physical propertyIntellectual property (in both copyright and patent)Data as property
![Page 7: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/7.jpg)
AccessAccess to computing technologyAccess to data
AccuracyAccuracy of information stored
Hacking, cracking and virus creationSoftware piracy
![Page 8: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/8.jpg)
The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute.
1) Thou shalt not use a computer to harm other people.
2) Thou shalt not interfere with other people's computer work.
3) Thou shalt not snoop around in other people's files.
4) Thou shalt not use a computer to steal.
5) Thou shalt not use a computer to bear false witness.
![Page 9: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/9.jpg)
6) Thou shalt not use or copy software for which you have not paid.
7) Thou shalt not use other people's computer resources without authorisation.
8) Thou shalt not appropriate other people's intellectual output.
9) Thou shalt think about the social consequences of the program you write.
10) Thou shalt use a computer in ways that show consideration and respect.
![Page 10: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/10.jpg)
Computer Virus
![Page 11: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/11.jpg)
What is Computer Virus?
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
![Page 12: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/12.jpg)
Spreading of VirusVirus are most easily spread,Spread through E-mail Attachments,
Instant Messaging messages,Funny Images,Audio and Videos files,Downloading files from Internet,Greeting cards and many more.
![Page 13: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/13.jpg)
Steps to help avoid VirusesUse an Internet firewall, Subscribe to industry standard antivirus software,Never open an e-mail attachment from someone
you don't know,Scan each and every attachment,Rules to be followed, while surfing net
![Page 14: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/14.jpg)
COMPUTER CRIMES
![Page 15: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/15.jpg)
TYPES OF COMPUTER CRIMESTARGET OF THE CRIME
MEDIUM OF THE ATTACK
TOOL
INTIMIDATE OR DECEIVE
![Page 16: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/16.jpg)
Types of Computer Criminal
Outsiders
Insiders
![Page 17: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/17.jpg)
REASON FOR COMPUTER CRIMEECONOMIC
IDEOLOGICAL
PSYCHOLOGICAL
EGOCENTRIC
![Page 18: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/18.jpg)
METHODS OF ATTACKDATA TEMPERING
Programming Techniques
OTHER METHODS
![Page 19: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/19.jpg)
Computer Crime can be Defined as IT InfrastructureIllegal accessIllegal InteruptionData InterfareSystem InterfrenceMisuse Of DevicesElectronic Fraud
![Page 20: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/20.jpg)
Software piracy and Hacking
![Page 21: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/21.jpg)
What is PIRACY???????
Reselling Media
Downloading from a website
Taping songs
Buying a used book or CD
Watching broadcast television but skipping commercials
![Page 22: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/22.jpg)
Types of PIRACYEnd User Piracy
Client – Server Piracy
Internet Piracy
Hard-Disk Piracy
Software Counterfeiting
![Page 23: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/23.jpg)
End-User Piracy
This occurs when a company employee reproduces copies of software without authorization
Copying disk for installation and distribution Swapping disks in or outside the workplace
![Page 24: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/24.jpg)
Client-Server PiracyThis type of piracy occurs when too many
employees on a network are using a central copy of a program at the same time.
System Overuse
![Page 25: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/25.jpg)
Internet PiracyThis occurs when software is downloaded
from the Internet The same purchasing rules should apply to online software purchase as for those bought in traditional ways.
Pirate website Unauthorized transfer of copyrighted program
![Page 26: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/26.jpg)
Hard-Disk LoadingThis occurs when a business who sells new
computers loads illegal copies of software onto the hard disks to make the purchase of the machines more attractive.
Value Added Resellers (VAR)
![Page 27: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/27.jpg)
Software CounterfeitingThis type of piracy is the illegal duplication
and sale of copyrighted material with the intent of directly imitating the copyrighted product.
![Page 28: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/28.jpg)
HACKER
Some one who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers .
![Page 29: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/29.jpg)
What HACKER do???????SYSTEMAccess confidential informationThreaten someone from YOUR computerBroadcast your confidential letters or
materials .Store illegal material
![Page 30: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/30.jpg)
Evils of HackingCompromise the security of system without
permission from an authorized party, usually with the intent of accessing computers connected to the network.
![Page 31: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/31.jpg)
Advantage of HackingTo determine problem and weakness for
programCreation of firewallUseful for military purpose and spyingBetter computer security
![Page 32: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/32.jpg)
Computer crime prevention
![Page 33: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/33.jpg)
Computer crime is becoming ever prevalent in our society. More and more companies and individuals rely on the service and resources
provided through networks computers.
![Page 34: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/34.jpg)
TYPES OF COMPUTER CRIME PREVENTIONInternet crime preventionPrevention of cyber crime Prevention of computer crime in banking IT security Computer crime prevention law Hi tech crime prevention lawComputer crime preventing on line fraud World risk investigation and terrorist
prevention
![Page 35: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/35.jpg)
Case Study of sole remaining
supplier
![Page 36: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/36.jpg)
Key points of Case StudyIntroductionBackground (pacemaker)Lack of dexterity in installation of pacemakerSerious consequences Transistor making company decided to pull its
hand out of business
![Page 37: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/37.jpg)
Key points of Case StudyRealization of problemEthical dilemma Different views in board of directorTheory of utilitarianismsolution
![Page 38: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/38.jpg)
ETHICALDILEMMAS ANDCONSIDERATIONS
![Page 39: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/39.jpg)
Ethical dilemmas in ITDilemmas are discussed in relation to four areas-PrivacyInformation accuracyAccess to information Intellectual property rights
![Page 40: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/40.jpg)
Ethical dilemmas in relation to IT
PLAGIARISM-The taking of ideas,writing and drawings or other similar intellectual property created by others and presenting it as your own.
NETIQUETTE-A set of rules (mainly unwritten) to follow while you are online.
![Page 41: Social and Ethical Issues of Information Technology](https://reader031.fdocuments.in/reader031/viewer/2022022413/577ccd2f1a28ab9e788bb9f3/html5/thumbnails/41.jpg)
SOME IMPORTANT VIEWS
Internet offers great riches for the future,but poses many threats.
Technology requires vigilance.Considerations regarding information ethics
influence personal decisions,professional practice and public policy.