Sei sulla pagina 1di 34

m  


 
m 

› Ú  
   ethos


 customhabitway of living

› Ú  ñ  



ñ 

 
ñ  

  ñ 
 
   ñë


›  
ñ  concerns one's conduct of
behavior and practice when carrying out professional
work, e.g., consulting, researching, teaching and
writing.

› Y computing professional must understand


Cultural, social, legal, and ethical issues in computing.
Responsibility and possible consequences of failure.

  

› Computer ethics defined as the application of


classical ethical principles to the use of computer
technology.
he en Commandments of computer ethics have
been defined by the Computer Ethics Institute.
› 1) hou shalt not use a computer to harm other
people.
› 2) hou shalt not interfere with other people's
computer work.
› 3) hou shalt not snoop around in other people's files.
› 4) hou shalt not use a computer to steal.
› 5) hou shalt not use a computer to bear false
witness.
› ÿ) hou shalt not use or copy software for which you
have not paid.
› 7) hou shalt not use other people's computer
resources without authorisation.
› 8) hou shalt not appropriate other people's
intellectual output.
› 9) hou shalt think about the social consequences of
the program you write.
› 10) hou shalt use a computer in ways that show
consideration and respect.
rhat is Computer Virus?

› Computer viruses are small software programs that


are designed to spread from one computer to another
and to interfere with computer operation.
› the term "computer virus" is sometimes used as a
catch-all phrase to include all types of malware

› Eg : computer worms , trojan horses etc


wteps to help avoid Viruses

›  
     
      
›       
  
›  
   
 
r

åReselling Media

å Downloading from a website

å aping songs

åBuying a used book or CD

åratching broadcast television but skipping


commercials
ypes of software PIRYCY

› End User Piracy

› Client ² werver Piracy

› Internet Piracy

› Hard-Disk Piracy

› woftware Counterfeiting
End user piracy

› his occurs when a company employee reproduces


copies of software without authorization

å Copying disk for installation and distribution


åwwapping disks in or outside the workplace
Client-werver Piracy

› his type of piracy occurs when too many employees


on a network are using a central copy of a program at
the same time.
Internet piracy

› his occurs when software is downloaded from the


Internet he same purchasing rules should apply to
online software purchase as for those bought in
traditional ways.

åPirate website
åUnauthorized transfer of copyrighted program
Hard-Disk Loading

› his occurs when a business who sells new computers


loads illegal copies of software onto the hard disks to
make the purchase of the machines more attractive.
woftware Counterfeiting

› his type of piracy is the illegal duplication and sale


of copyrighted material with the intent of directly
imitating the copyrighted product
HYCKER

› wome one who bypasses the system·s access controls


by taking advantage of security weaknesses left in
the system by developers .
rhat HYCKER do???????

› wYwEM
 Yccess confidential information
 hreaten someone from YOUR computer
 Broadcast your confidential letters or materials .
 wtore illegal material
Ydvantage of Hacking

› o determine problem and weakness for program


› Creation of firewall
› Useful for military purpose and spying
› Better computer security
EHICYL PERwPECIVE OF I-IEw
INDUwRY
Unethical practices can be categorized on the basis of
1.privacy

2. Information handling

3. Dealing with intellectual property rights

4. rorking culture and environment in the


organization
he unethical practices categorized above can be carried out
by
1. I IEw organizations towards their clients customers
2. I IEw organizations towards their employees
3. Employees of I IEw organization towards their
organizations
4. Employees of I IEw organization towards their clients
5. I IEw Organizations employees together with their
clients customers harming other stake holders
   

› wolitude - an individuals desire to be left alone.


away from outside interference.
› Intimacy - the state of privacy one wants to enjoy
from the outside world.
› Ynonymity - a person's wish to be free from
external surveillance.
› Reserve - an individuals' desire to control
information about himself.
wome practices affecting the privacy

› cookies : Yn HP cookie is data stored on a user's


computer that assists in automated access to websites or
web features, or other state information required in
complex web sites. It may also be used for user-tracking
by storing special usage history data in a cookie

› wome web-oriented marketing-research organizations may


use this practice legitimately, for example: in order to
construct profiles of 'typical Internet users'. wuch
profiles, which describe average trends of large groups of
Internet users rather than of actual individuals, can then
prove useful for market analysis
COND«


  !
  

oday many people have digital cameras and post their


photos online. he people depicted in these photos
might not want to have them appear on the Internet.
Cont«.

    ! 
Internet users obtain Internet access through an
Internet service provider (IwP). Yll data transmitted
to and from users must pass through the IwP. hus,
an IwP has the potential to observe users' activities
on the Internet.


Ú  
Many programs and operating systems are set up to
perform data logging of usage. his may include
recording times when the computer is in use, or which
web sites are visited. If a third party has sufficient
access to the computer, legitimately or not, the user's
privacy may be compromised. his could be avoided
by disabling logging, or by clearing logs regularly.
Information security

› 1) employees at the lower level showing scant respect to


the information security process.

› Eg: employees sharing passwords with their colleagues


even though they are not allowed to do that

› 2) Yt call centres operators force the customers to part


their personal information even if it is not necessary.

› 3)sharing of confidential information about clients and


customers with unauthorized persons

  

4)Hacking: hackers disrupt the flow of information on the


internet by destabilizing the servers on which websites
are hosted.hey either publish false information ,or plant
viruses

5) I employees organizations helping their clients to


practice unethical transactions. rhile implementing I
systems ,the software engineers can incorporate or avoid
features that unethically hide information that can be
harmful to the customers employees stake holders
INELLECUYL PROPERY RIGHw

› woftware piracy is one of the major issues causing huge


losses to the I industry.
› wome of the I companies itself use pirated software.
› wmall companies buy only 1 license and install in many
computers. some single license agreement allows
installation of a particular software in 2 computers
provided it is used by a single user. It is for helping
people working from different locations.
› illegal use of intellectual properties like algorithms,
source code.some times these valuable information can be
passed to the competitors by the employeesë
r  

› Employees wasting companies resources and time by browsing


the internet for non business purposes ,sending frivolous
mails , gaming etc. his can lead to claiming overtime
compensation, which is not required to complete the task.

› Ynother issue is employee attrition.Young people with focus


on making money or growing in designations at a high pace,
resort to job hopping.

› he young employees in the I company claim allowances like


house rent and medical bills with fraudulent bills to get
income tax exemption.
› I companies compete among themselves for employees. Poaching
employees from the competitors is quite common in I industry. Even
though this is not illegal it has set an unprofessional culture in the
industry and employees do not have any remorse in leaving in middle
of their commitments.
› Companies resort to various means for retaining the employees and
some of the methods are unethical. wome of them are
› 1. Full salary offered during recruitment is not paid. Instead a
portion is withheld within the company and will be paid once the
employee completes a stipulated period of time.
› 2. wigning of bond from the employees for a stipulated period of time,
which takes away a person·s right to choose a better career.
3. Long hours of work are common in I industries. Yggressive bidding
of completion time by the companies to their customers that result in
unrealistic estimations and plans.

4. Monitoring the employees without informing them. In the name of


information security, some companies scan the e-mails of the
employees or plant spying programs. his amounts to a breach of
privacy of the employees.

5. I companies have brought in world class infrastructure to India


but still the working conditions are not ergonomic.Video operators·
distress syndrome, cumulative trauma disorder and carpal tunnel
syndrome due to repetitive stress on hands wrists are some of the
common work related disorders in I sector.
 


› HYCKING
› wPYM
› VIRUw DIwwEMINYION
› wOFrYRE PIRYCY
› PORNOGRYPHY
› IRC Crime
› NE EXORION
› PHIwHING
› wPOOFING
› CYBER wYLKING
› CYBER DEFYMYION
› wYLYMI YYCK
› CREDI CYRD FRYUD
   !!!"
 
!!#$
› m  
›  " 
 # $%%%  

   
&ë '   (  Ú  
$ë '   Ú     
)ë   *   
+ë   Ú!   
*  
HYNK YOU

Potrebbero piacerti anche