40

COMPUTER ETHICS

Embed Size (px)

DESCRIPTION

PROFESSIONAL ETHICS

Citation preview

Page 1: COMPUTER ETHICS
Page 2: COMPUTER ETHICS

THE LSPU MISSION AND VISION

Page 3: COMPUTER ETHICS

MISSION

“The University shall serve a center of excellence in agriculture, fisheries, forestry, science, engineering and

industrial technology, teacher education, information technology and other related fields in arts and sciences. It also serves as research

and extension services centers in its fields of expertise.”

Page 4: COMPUTER ETHICS

VISION

“A premier university in CALABARZON, offering academic programs and

related services designed to respond to the requirements of the Philippines and the global economy particularly

Asian countries”

Page 5: COMPUTER ETHICS
Page 6: COMPUTER ETHICS

COMPUTER ETHICS

Page 7: COMPUTER ETHICS

What is a Computer Ethics:

…………..Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct..

Page 8: COMPUTER ETHICS

Introduction:

A computer system consists not only of software , hardware, data/information and procedures, but also people (the users of computer system). Because computers systems are the products of human efforts, we cannot trust them anymore than we trust people. People can use computer systems for both good and bad purposes, and they may appreciate them or be suspicious of them when they use them.

Page 9: COMPUTER ETHICS

…..…….But regardless of how they use them or how they feel

about them, most people realize that computers have changed the way we live.

Page 10: COMPUTER ETHICS
Page 11: COMPUTER ETHICS

What are the consequences of the

widespread presence of the computer technology??

Page 12: COMPUTER ETHICS

.…..The threats to computers and communication

systems…….

Page 13: COMPUTER ETHICS

Introduction:

Information technology can be disabled by a number of occurrences. It

may be harmed by people, procedural, and software errors; by electromechanical

problems; and by “dirty data”. It may be threatened by natural hazards and by civil

strife and terrorism. Criminal acts perpetrated against computers include theft of hardware, software, time and

services, and information; and crimes of malice and destruction…

Page 14: COMPUTER ETHICS

….Computers may be harmed by viruses. Computers can also be used as

instruments of crime. Criminals may be employees, outside users, hackers, crackers,

and professional criminals…

Page 15: COMPUTER ETHICS
Page 16: COMPUTER ETHICS

Is computer technology creating more problems

than its solving??

Page 17: COMPUTER ETHICS

The threats to computers and communications systems…

Errors and AccidentsNatural and Other HazardsCrimes Against Information

TechnologyCrimes Using Information

TechnologyVirus

Page 18: COMPUTER ETHICS

Errors and Accidents

Page 19: COMPUTER ETHICS

…….In general, errors and accidents in computer systems may be classified

as People Errors, Procedural Errors, Software Errors,

Electromechanical Problems, and “Dirty Data” problems….

Page 20: COMPUTER ETHICS

People Errors

Recall that one part of computer system is the people who manage it or run it…

Page 21: COMPUTER ETHICS

Procedural Errors

Some spectacular computer failures have occurred because someone didn’t follow procedures..

Page 22: COMPUTER ETHICS

Software Errors

We are forever hearing about “Software Glitches” or software

bugs. A Software Bug is an error in a program that causes it

to malfunction..

Page 23: COMPUTER ETHICS

Electromechanical Problems

Absence of Electricity or power failure causing the system

not to work ..

Page 24: COMPUTER ETHICS

Dirty Data

Is Data that is incomplete, outdated or otherwise inaccurate

that causes errors in the computer system..

Page 25: COMPUTER ETHICS

Natural and Other Hazards

Page 26: COMPUTER ETHICS

Natural Hazards

What ever is harmful to property and to people, is harmful to computers and communication system. This certainly includes natural disasters…………Natural Hazards can disable all the electronic systems we take for granted…

Page 27: COMPUTER ETHICS

Civil Strife and Terrorism

Page 28: COMPUTER ETHICS

Crimes Against Computers and

Communications

Page 29: COMPUTER ETHICS

Information-technology Crime can be of two types:

1. Illegal act perpetrated against computers or telecommunications..

2. Use of computers or telecommunications to accomplish an illegal act..

Page 30: COMPUTER ETHICS

Crimes against information technology include theft….

1. Theft of Hardware2. Theft of Software3. Theft of Time and Services4. Theft of Information5. Theft of Malice and Destruction

Page 31: COMPUTER ETHICS

Crimes Using Computers and Communications……

Computers and communications or information technology has also been used to solve crimes….……..Just as a car can be used to assist in a crime, so can a computer or communication system..

Page 32: COMPUTER ETHICS

VIRUSES

Page 33: COMPUTER ETHICS

Viruses

Viruses are a form of high-tech maliciousness. Computer

Viruses are “Deviant” programs that can cause destruction to

computers that contract them…

Page 34: COMPUTER ETHICS

They are passed in two ways…….

1. Via an Infected Diskette

2. Via a Network

Page 35: COMPUTER ETHICS

Some common forms of Viruses…

Boot-sector VirusFile VirusWormLogic BombTrojan HorsePolymorphic VirusVirus Mutation Engines

Page 36: COMPUTER ETHICS
Page 37: COMPUTER ETHICS

Antivirus Software

Scans a computer’s hard disk, diskettes, and main memory to

detect viruses, and sometimes, to destroy them…..

Page 38: COMPUTER ETHICS

Computer Criminals

Page 39: COMPUTER ETHICS

What kind of people are perpetrating most of the Information Technology???

EmployeesOutside UsersHackersCrackersProfessional Criminals

Page 40: COMPUTER ETHICS