Beruflich Dokumente
Kultur Dokumente
COLLEGE
JHANG
Department of Computer Science
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
o Philosophy-Pragmatism Philosophy-
Existentialism
o Philosophy-Logical Analysis
Final Term Course
Ethical use of Internet
Intellectual Copy Right
o Patents
o Trademarks
o Domain Names
o Registered Designs
o Alternatives to copyrights
Social Application of Rules and Ethics
o Ethical scenarios to use social networks
o Computer-Related Waste & Mistakes
o Computer Criminals
Ethical Decision Making
o Value Judgment
o Rights vs. Duties
Accountability and Auditing
o Need for Accountability
o Data Security
o Security benefits of Accountability
Auditing
o Auditing Principles
o Auditing Benefits
----------------------------------------------------------------------------------
Course Outline by GCUF
Objectives:
A Computing graduate as professional has some
responsibilities with respect to the society. This course develops
student understanding about historical, social, economic, ethical,
and professional issues related to the discipline of Computing. It
identifies key sources for information and opinion about
professionalism and ethics. Students analyze, evaluate, and
assess ethical and professional computing case studies.
Course Outline:
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
Professional Practice
----------------------------------------------------------------------
---
“Goodness without Knowledge is weak.
Knowledge without Goodness is Dangerous”
----------------------------------------------------------------------
---
What are computer ethics?
COMPUTER ETHICS
Ethics is a set of moral principles that govern the behavior
of a group or individual. Therefore, computer ethics is set of
moral principles that regulate the use of computers. Some
common issues of computer ethics include intellectual
property rights (such as copyrighted electronic content),
privacy concerns, and how computers affect society.
For example, while it is easy to duplicate copyrighted
electronic (or digital) content, computer ethics would suggest
that it is wrong to do so without the author's approval. And
while it may be possible to access someone's personal
information on a computer system, computer ethics would
advise that such an action is unethical.
As technology advances, computers continue to have a
greater impact on society. Therefore, computer ethics
promotes the discussion of how much influence computers
should have in areas such as artificial intelligence and human
communication. As the world of computers evolves, computer
ethics continues to create ethical standards that address new
issues raised by new technologies.
--------------------------------------------------------------
-----------
Explain the importance of computer ethics.
Importance of computer ethics
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
--------------------------------------------------------------
-----------
What are professional ethics?
Professional Ethics
Professionally accepted standards of personal and
business behavior, values and guiding principles. Codes of
professional ethics are often established by professional
organizations to help guide members in performing their job
functions according to sound and consistent ethical
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
principles.
--------------------------------------------------------------
-----------
What are moral and ethical problems?
Moral and ethical problems
The problems as ethical problems. ... Ethical dilemmas,
however, are defined rather more narrowly, as situations in
which, on moral grounds, persons ought both to do and not to
do something. Such a definition implies that issues of conflict
and choice are central to moral dilemmas.
--------------------------------------------------------------
-----------
What are ethical problems?
Ethical principles
Whatever the ethical theory under consideration, there are
four basic principles informing of biomedical ethics. They are:
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
For a layman, these two terms are same, but the fact is
that there is a difference between law and ethics. Read the
article carefully, to overcome your ambiguities.
Definition of Law
The law is described as the set of rules and regulation,
created by the government to govern the whole society. The
law is universally accepted, recognized and enforced. It is
created with the purpose of maintaining social order, peace,
justice in the society and to provide protection to the general
public and safeguard their interest. It is made after
considering ethical principles and moral values. The law is
made by the judicial system of the country. Every person in
the country is bound to follow the law. It clearly defines what
a person must or must not do. So, in the case of the breach of
law may result in the punishment or penalty or sometimes
both.
Definition of Ethics
By ethics, we mean that branch of moral philosophy
that guides people about what is good or bad. It is a
collection of fundamental concepts and principles of an ideal
human character. The principles help us in making decisions
regarding, what is right or wrong. It informs us about how to
act in a particular situation and make a judgment to make
better choices for ourselves. Ethics are the code of conduct
agreed and adopted by the people. It sets a standard of how
a person should live and interact with other people.
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
--------------------------------------------------------------
-----------
Hackers vs Crackers Infographics
What is your view about hackers?
The original use of the term hacker dates back to
1950s when at the Massachusetts Institute of Technology
some students had a strong desire of experimenting and
learning about technology. A hack back then meant
something very original and ingenious and solely meant to
explore the arena of computers and technology. Currently the
terms is used in a rather negative sense. And this is because
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
-----------
Explain different interests of hackers
The hackers are interested in knowing how things work.
They like to explore and discover the computer systems,
programming and the networks. While some hackers may
only be interested in learning the things others turn their
passion into their profession thus making them professional
hackers. They are essentially very well acquainted with all
sorts of software tools, techniques and codes that the
crackers know. They know how a cracker would attempt to
attack any content which is meant to be secure on the
websites and across computer systems. They design exactly
such software and tools that a cracker would use and then
they work on improving the system with more secure tools
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
-----------
What is your view about crackers?
We have learnt about the hackers, how they work, what
their interests are and what they do. Now when we talk of
crackers, we must know that crackers are also hackers. But
their ways of works differ a lot. While a hacker works totally
in the interest of a company or an individual, the cracker
works totally in an opposite manner. The purpose of a cracker
is to break the security of computers and networks. It is an
illegal activity. They make use of their knowledge to make
personal gains and breach the security across networks. They
acquire extensive knowledge and learning about computers,
their programming, software, codes and languages and use
them to break into computers for criminal gains.
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
-----------
-----------
Explain difference between hackers and crackers.
Hackers vs Crackers
There is a common view that the hackers build things
and the crackers break the things. These are basically two
entirely different terms. They may seem similar but there are
differences between how the two actually work. While
hackers have an advanced knowledge of the computer
related security crackers usually are not as skillful as hackers.
Very few of them are skilled enough to create their new
software and tools. So they generally rely on certain not so
reputed, in fact the disrepute websites to download several
automated programs to execute their deed. Hackers try to
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
-----------
What is the philosophy of ethics?
The philosophy of ethics is the study of the nature of the
cosmos and the proper response of humanity to that nature.
Philosophers analyze metaphysical theory, such as the
existence of God, the responsibility of people to others, and
the influence of biological impulses, and they try to
determine what gives authority to morality and what ethical
behavior looks like. "Ethics" usually refers to the actions of a
group, and "morality" of an individual, but the two words are
often used interchangeably.
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
and risks
Value Judgement:
Def: A value judgment (or value judgement) is a judgment of
the rightness or wrongness of something or someone, or of
the usefulness of something or someone, based on a
comparison or other relativity. As a generalization, a value
judgment can refer to a judgment based upon a particular set
of values or on a particular value system. A related meaning
of value judgment is an expedient evaluation based upon
limited information at hand, an evaluation undertaken
because a decision must be made on short notice.
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
thought or evidence.
Rights Vs Duties:
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
Rights:
A right is an expectation about something you deserve or a
way to act that is justified through a legal or moral
foundation. Humans have all types of rights, including legal,
moral, spiritual, natural and fundamental rights. Examples of
rights include the right to education provided by society or
the right to bear arms. Ethical behavior must recognize and
respect a series of rights that belong to each person, animal
or society.
Duties:
Duties are a direct result of the acceptance of rights. Each
person has a duty to uphold or respect another person’s
rights, just as he has the duty to uphold your rights. Once a
person accepts a right, or is told as in legal rights, he must
uphold that right for himself and others. For instance, you
have the right to free speech, but so does everyone around
you. Even if someone is saying something you do not agree
with, you have a duty to respect his right to say it. You have
a duty to respect, and sometimes defend, the rights of
others.
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
Understanding Accountability
Examples of Accountability
Needs of Accountability
Security in computer systems has been a major concern since the very beginning. Although
security has been addressed in various aspects, accountability is one of the main facets of
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
security that is lacking in today's computer systems. The ability not only to detect errors but
also to find the responsible entity/entities for the failure is crucial. In this paper, we intend to
provide a comprehensive investigation of the state‐of‐the‐art accountability research issues in
current information systems. Also, we study the various accountability tactics that are available
and how each one of them contributes to providing strong accountability of different aspects.
Finally, we examine the various merits and tradeoffs.
Micro Focus drives leadership in data security solutions with over 80 patents and
51 years of expertise. With advanced data encryption, tokenization, and key
management to protect data across applications, transactions, storage, and big data
platforms, Micro Focus simplifies the protection of sensitive data in even the most
complex use cases.
Cloud access security – Protection platform that allows you to move to the
cloud securely while protecting data in cloud applications.
Data encryption – Data-centric and tokenization security solutions that
protect data across enterprise, cloud, mobile and big data environments.
Hardware security module -- Hardware security module that guards financial
data and meets industry security and compliance requirements.
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
certain that the policy is being followed. Individuals must be aware of what is
expected of them and guide continual improvement. Every information asset
should be "owned" by an individual in the organization who is primarily
responsible each one.
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science
1
GOVERNMENT POSTGRADUATE 2
COLLEGE
JHANG
Department of Computer Science