Sie sind auf Seite 1von 18

IT for PROFESSIONAL ETHICS

 How does it affect individuals and businesses?


 How individuals protect their private information?
 What steps businesses and corporations take to secure information?
 What steps the government takes to secure information.
 What are ethics, & why are ethics necessary in the world today ?
 What is the value of ethics in information technology?
 Also who is responsible for ensuring their compliance ?
Primarily, ethics are the code of conduct that
management & professional organizations institute, &
professionals follow, to ensure that they protect the
privacy & earn the trust of the customers.
Professional Ethics

Professional ethics encompass the personal, and


corporate standards of behavior expected by
professionals.
Discrete Components in some
professional ethical approach

Honesty
Objectivity
Integrity
Respect
Transparency
Obedience to the law
Accountability
Loyalty
Confidentiality
Ethical Issues

Property Privacy

Accuracy Access
Property

Physical property
Intellectual property
Data as property
o Piracy
o Plagiarism -the taking of ideas, writing and drawings or other similar
intellectual property created by others and presenting it as your own.
TYPES OF PIRACY

End User Piracy


Client – Server Piracy
 Internet Piracy
Hard-Disk Piracy
Software Counterfeiting
Privacy

Computers create a false sense of security


People do not realize how vulnerable information
stored on computers are
Accuracy

 The very nature of the IT industry is the collection & analysis of day
 Major hindrances to information accuracy
 Today we are producing so much information about so many people
& their activities that our exposure to problems of inaccuracy is
enormous
 2nd barrier to accuracy is the community of the internet itself.
 The issue is that there is no control, no peer review, and no obstacle to
keep the accurate information from being overshadowed by the
disinformation
 The posters of the inaccurate information are not held liable for their
lack of ethics
What Ethics can be Followed in IT?

 Never Piracy Online...


 Follow Up the Social Reputation...
 Never Harm the Public Websites...
 Closure of Digital Hacking...
 Certify Websites Who Deal with Payments...
 Never Do Fraudulent Activities...
 Never Give Misguided Information...
 Never Steal Information online for Reproduction...
 Never Create a False Evidence Using IT...
 Utilizing the IT in a Manner to Get Benefits Only...
Computer Crime

IT Infrastructure
Illegal access
Illegal Interruptions
Data Interfere
System Interference
Misuse Of Devices
Electronic Fraud
Reasons for Computer Crime

 ECONOMIC
 IDEOLOGICAL
 PSYCHOLOGICAL
 EGOCENTRIC
Methods of Attacks

 Data tampering
 Programming Techniques
 Other Methods
Types of Computer Criminal

 Outsiders
 Insiders
COMPUTER ETHICS

 A new branch of ethics that is growing and changing rapidly


as computer technology also grows and develops.
- R.SUMAN

 A philosophy that includes a set of ethical values that a


computer user should adhere to.
- https://techspirited.com

Computer ethics defined as the application of classical


ethical principles to the use of computer technology.
10 Commandments of Computer Ethics

1. Thou shalt not use a computer to harm other people.


2. Thou shalt not interfere with other people's computer
work.
3. Thou shalt not snoop around in other people's files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
10 Commandments of Computer Ethics

6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people's computer resources without
authorization.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you
write.
10.Thou shalt use a computer in ways that show consideration and
respect.

Das könnte Ihnen auch gefallen