9.1 Audience Appreciation

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Our Digital World Second Edition
Implications and Security Issues of the Internet By Neelesh Patel.
IT Ethics of Internet Service Providers and Internet Content Providers Andrew Meyenn Wesley College Melbourne, Australia © 2006 The College Board. All.
Digital Content Solutions Digital content management technology has transformed the way to manage content and knowledge, in this knowledge era. Research.
Cyber bullying and internet safety Parents meeting: staying safe online.
Fair Use of Material A SIMPLE GUIDE TO UNDERSTANDING THE LIMITATIONS OF USING AND SHARING MATERIAL BELINDA GOMEZ.
Understanding Issues in Implementing Technology in the Classroom Legal, Ethical, Social, and Human Issues National Educational Technology Standards for.
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
VISD Acceptable Use Policy
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
IT Job Roles Task 20. Software Engineer Job Description Software engineers are responsible for creating and maintaining software of various different.
 Provide a basis for determining who in the organization should control access to a particular item of information.
Describe ethical considerations resulting from technological advances.
General Purpose Packages
Computer Ethics.
5-1 Ethics To examine the role of ethical behavior in business finance. 2. To illustrate the role of unethical behavior in the downfall of.
John Marshall Acceptable Computer and Internet Use Questions should be directed to Mrs. Jorgenson, Media Specialist or Mrs. Olsen, Lab Para, Techmaster,
1 SOFTWARE AND HARDWARE INTERACTION Morrison / Wells.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Copyright & Licensing. 2/18 Presentation Outline Copyright Law Software and copyright Licensing Software Piracy Copyright and the Internet.
Section 6 Theory Software Copyright, Viruses and Hacking.
Computer Ethics for Computer Users
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
This Presentation Evening is designed to inform you about any potential threats that your children could find themselves when online. At no point is it.
Intellectual Property Software Piracy. Copying of software in large quantities for resale Illegal copying by businesses and individuals for their own.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Unit 1 – Improving Productivity. 1.1Why did you use a computer? What other systems / resources could you have used? In my PowerPoint I used a computer.
Moral, Social and Ethical issues associated with the Internet
ETHICS and COMPUTERS An Overview 23/04/2017.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Ethical and Legal Practices in INFORMATION TECHNOLOGY.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Digital Citizenship Eagle Ridge’s School Policy. Expectations for Students  Students are invited to use their personal devices as directed by their teacher.
Internet crime By: Brandon Murphy & Cameron Martin.
Breaking the law. The danger Either knowingly or otherwise, children and young people can fall foul of the law or get into trouble with other Internet.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Using Computers: Legal and Ethical Issues Objectives and Guidelines We Must Follow.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Mail to: SOCIAL MEDIA MARKETING TO BOOST RETURN ON INVESTMENT  Social Medias are indirectly connected with ROI. Social media's.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Security issues regarding data transfer
Joe Patterson. What are legal and ethical constraints? Legal Constraints  Legal constraints are legal laws that allow certain groups to control the media.
 Callum Saunders Task 5. Different types of research. There are two key types of research, these are quantitative research and qualitative research.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Legal and ethical issues
Legislation in ICT.
Starter: Unscramble 6. Altulcru 5. Saclio 1. Lgeal 4. Icecomno
Copyright & Licensing.
Online platforms Brussels, September 2016.
Chapter 11 crime and security in the networked economy
Topic 5: Online Communities Press F5 to view!
Learning Area 1 Information And Communication Technology and Society
Copyright, Designs and Patents Act 1988
Legislation in ICT.
Presentation transcript:

9.1 Audience Appreciation 9.2 Legal, Moral, Ethical and Cultural Appreciation

Audience Expectations Use of multimedia and interactive content Audience Appreciation It is very important to tailor an ICT solution to the proposed audience. A number of factors need to be taken into consideration to ensure the ICT solution is suitable for its target audience. The following methods can be used to find out more about the potential target audience. Interviews Questionnaires Market Research Based on the research the ICT team will have a clearer idea about the following factors: Once the ICT team are aware of the customer needs then they can take the following into consideration: Use of Language Use of colours Usability Target Audience Age Target Audience Age Audience Experience Audience Experience Level of complexity Audience Expectations Audience Expectation Audience Knowledge Audience Knowledge Use of multimedia and interactive content

Legal, Moral, Ethical and Cultural Appreciation Copyright laws protect software in very much the same way as music CDs, Video etc. Software Piracy is a continuous issue for software developers and measures have been put in place to make it more difficult to use illegal copies of software. It is illegal to: Make a software copy to sell or give away. Rent out software. Use a software on a network on multiple computers. Use name or branding of copyrighted software on another software without permission. Using code from copyright software without permission and then passing the software on as your own to sell. Measures from software developers to prevent the use of illegal software: Use of a Product Key when installing software. Online Activation to ensure legitimate product key has been used. Software CD/DVD must be in the drive whilst software is being used. Making users agree to terms of conditions before installation of software.

Legal, Moral, Ethical and Cultural Appreciation When creating an ICT solution consideration also has to be taken regarding legal, morality, ethics and cultural issues. Legal: Ensure copyright laws are abided by including not using any coding or branding from existing copyrighted software. Morality: To distinguish from right or wrong. Sometimes it may not be illegal to carry out an act however it could be against your morals. For example setting up a fake website to deceive is not illegal but questions your level of morality. Ethics: Is to break a code of conduct. One example could be to leak information to a rival software publisher or to the press about new software ideas. Culture: When software is released in different cultures then care must be taken so that people are not offended. For example certain use of words could be offence to one culture and not to another. If certain computer games mock religion or cultural beliefs then again this could cause offence.

Should the internet be policed? Advantages Disadvantages The debate continues on to whether the internet should be policed. The following are some reasons why some users of the internet believes the internet needs policing: Recent hacks on major co-operations (Sony/QNB) Sharing of terrorist material. Abuse in chat rooms, social media including Twitter. Grooming social media platforms. Should the internet be policed? Advantages Disadvantages To protect vulnerable users gaining access to undesirable websites. To prevent illegal material (software, videos) be openly posted and shared by web users. To bring to justice those users who continually misuse the internet for their personal gain. It would be extremely difficult and expensive to police the internet. Infrastructure including staff and offices would have to be required. Would be difficult to enforce different rules in different countries. Could go against freedom of speech.