Social, Legal & Ethical Aspects of Computing.
-
Upload
muhammad-sulaiman -
Category
Education
-
view
49 -
download
2
Transcript of Social, Legal & Ethical Aspects of Computing.
![Page 1: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/1.jpg)
1
![Page 2: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/2.jpg)
Social, Legal & Ethical Aspects of Computing.
Group # 6
Faizan-u-Rehman 57 Arbaz Mateen 66 Hafiz Sohaib 86 Kashif Razzaq 58 Tariq Ali 98
2
![Page 3: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/3.jpg)
ContentsSocial Computing.Legal & Ethical Aspects.Cyber Law.First Cyber Crime.Cyber Ethics.IP (Intellectual Property).Slander.Plagiarism.Copyright Law.NR3C.10 Notorious Cyber Crimes.
3
![Page 4: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/4.jpg)
Social Computing.
Social computing is an area of computer science that is concerned with the
intersection of social
behavior and
computational
systems. Social
computing is the
collaborative and
interactive aspect of online behavior.
4
![Page 5: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/5.jpg)
Legal and Ethical Aspects Of Computing.
Legal aspects of computing are related to the
overlapping areas of law and computing.
Computer Ethics is a system of moral standards
or moral values used as a guide line of computer
users.
5
![Page 6: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/6.jpg)
Privacy, Computer Crimes.
Privacy refers to the right of individuals and
companies to deny or restrict the collection and
use of information about them.
Computer Crime is any illegal acts involving
computers.
6
![Page 7: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/7.jpg)
Ethics.As a Guideline to computer user.Computer users are free to follow or ignore the code of ethics.Universal, can be applied to any
ware, all over the world. To produced ethical computer
users.Not follow ethics are
called immoral.
7
![Page 8: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/8.jpg)
Computer Law.As a Rule to control computer user.Computer users must follow the regulations and law.Depend on country where the crime is committed.To prevent misuse of computer.Not obeying law are
called crime.
8
![Page 9: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/9.jpg)
Cyber Law.Cyber Law: any laws relating to protect the internet and other online communication technologies.
9
![Page 10: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/10.jpg)
Cyber Law.
Why we need Cyber Law?Cyber law are made to force people to be good.To give protections against the misuse of computers
and computer criminal activities. Internet are being used every day by billions of people
around the globe.Growth rate in mobile and computer devices.Technology allows the user to bully from an unknown
location, 24 hours a day, 7 days a week.
10
![Page 11: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/11.jpg)
Example of Cyber abuse on the users:Sending a computer virus via E-Mail.Harassment through E-Mail or social media.Hacking into your School’s database to change your exam
results.Fake Accounts.
Cyber Law. 11
![Page 12: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/12.jpg)
Cyber Ethics.The most common problem isn’t hacking (illegally accessing web sites or other computers) or cracking. It’s the unauthorized downloading of games and software.
13
![Page 13: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/13.jpg)
Computer Crime.
Computer Fraud is the crime of obtaining money by
deceiving (to trick) people through the use of computer
such as E-Mail, program fraud, Investment schemes and
claim of expertise on certain fields.
Copying is a violation of the rights secured by a
copyright law. It occurs when you break the copyright laws
such as copying software or CD’s illegally.
14
![Page 14: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/14.jpg)
Computer Crime. (cont.)
Computer theft is defined as the unauthorized used of
another person’s property such as transfer of payment to
the wrong accounts, get online material with no cost and
tap into the data transmission lines.
Computer Attack is defined as any activities taken to
disrupt the equipment's of computers system, change
processing controls and corrupt stored data.
15
![Page 15: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/15.jpg)
Intellectual Property (IP).
Unique product of the human intellect that has commercial value.
e.g.
Books, Songs, Movies, Paintings, Formulas, Computers and programs etc.
16
![Page 16: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/16.jpg)
Intellectual Property Laws.
Intellectual Property
Patents
Trademark Design
Copyright
Patents for Inventions. Trademark for brand identity. Design for product appearance. Copyright for material.
17
![Page 17: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/17.jpg)
Privacy.
Way of making personal data more private.Install personal firewall.Purchases goods with cash, rather then credit card.Online public recode. Less use of Facebook.Avoid GPS tags in photo.
18
![Page 18: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/18.jpg)
Addiction.Internet Addiction.Social Media Addiction.
Facebook.Twitter.Google +.
Game addiction.General Computer
Addiction.
19
![Page 19: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/19.jpg)
Slander.Slander is the action or crime of making a false spoken statement damaging to a person's reputation.Can develop society that disregards on honesty and
truth.Can lead to bad
habits of spreading
rumors and untruth.Can cause people
to have negative
attitude towards
another person.
20
![Page 20: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/20.jpg)
Plagiarism. Plagiarism is copying someone else’s work and then
passing it off as one’s own. It is morally bad because it is
an act of stealing.
Copying programs written by other programmers and
claiming it as your own could be an act of plagiarism. It
involves laying, cheating, theft and dishonesty.
21
![Page 21: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/21.jpg)
Copyright Law.Copyright law are designed to protect the intellectual property of authors, artists, filmmakers, web designers etc. so that their own work isn’t stolen for someone else profit.
23
![Page 22: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/22.jpg)
Computer Viruses.Creation of worms and computer viruses is morally bad when it is intended for malicious purpose like to steal information or destroying of data.
24
![Page 23: Social, Legal & Ethical Aspects of Computing.](https://reader036.fdocuments.net/reader036/viewer/2022062515/55c354ccbb61eb8f4e8b47ce/html5/thumbnails/23.jpg)
Thank you
If you have any Question, you may ask NOW!