© Paradigm Publishing Inc. 14-1 Chapter 14 Computer Ethics.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Legal and Ethical Issues: Privacy and Security Chapter Five.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Chapter 14 Computer Ethics. Ethics vs. Laws Laws = External rules established by society Ethics = Internal or unspoken rules we use to determine the right.
© Paradigm Publishing Inc Chapter 14 Computer Ethics.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Chapter 11 Security and Privacy: Computers and the Internet.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
A Guide to Digital Citizenship
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Cyber Crimes.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
Computer Programming I
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Donette Mullinix ED 505 UWA Clipart:
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Security Issues and Ethics in Education
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Digital Citizenship Created By: Kelli Stinson June 2011.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
© Paradigm Publishing, Inc Chapter 14 Computer Ethics Chapter 14 Computer Ethics.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Computer Ethics Chapter 14 – Computers: Understanding Technology.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Digital Citizenship Jacinta Little ED 505. Table of Contents Definition of Digital Citizenship………………………… Slides 3-4 Social networking…………………………………………
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Julie Latham Digital Citizenship: An Informational Guide.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Privacy, Security and Ethics
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Issues for Computer Users, Electronic Devices, Computer and Safety.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
CHAPTER FOUR OVERVIEW SECTION ETHICS
The Issues with Technology in education
CHAPTER FOUR OVERVIEW SECTION ETHICS
Student User Agreement and Policy 2022
Presentation transcript:

© Paradigm Publishing Inc Chapter 14 Computer Ethics

© Paradigm Publishing Inc Presentation Overview The Role of Ethics Privacy Protection Issues Property Protection Issues Personal and Social Issues Defining Software Companies’ ResponsibilitiesDefining Software Companies’ Responsibilities

© Paradigm Publishing Inc The Role of Ethics What are ethics? –Ethics are rules used to determine the right and wrong things to do in our lives. –Normative ethics is determining a standard or “norm” of ethical rule that affects ethical behavior. –Applied ethics is determining how normative ethics are applied to controversial real-life situations. –Computer ethics deal with new ethical situations raised by computer technology.

© Paradigm Publishing Inc The Role of Ethics The Source of Ethics –Moral realism – believes ethics are not based on subjective human reasoning but on objective foundations –Moral relativism (situational ethics) – believes that ethics differ from society to society, from person to person, and from situation to situation

© Paradigm Publishing Inc Privacy Protection Issues Public Information Availability –Database companies comb personal information such as birth records and marriage licenses and provide this information to anyone with a credit card and access to the Web. –Other personal information such as salaries, and controversial information such as criminal records and sex offender information, has and does appear on Web sites.

© Paradigm Publishing Inc Privacy Protection Issues Threats to Privacy of Wireless Communications –Wireless communications devices such as cell phones and PDAs are extremely vulnerable to interception by others. –Traditional methods of computer security don’t work well for wireless devices. Wireless devices often don’t require authentication to ensure the identity of the user and the device. Encryption technology places an undue burden on the already limited battery power and memory of wireless devices.

© Paradigm Publishing Inc Cleaning cookies Link to Cookies VideoLink to Cookies Video

© Paradigm Publishing Inc Privacy Protection Issues Commercial Threats to Privacy Cookies –small program created and placed on a computer’s hard drive by Web sites –can remember passwords and User IDs –can also remember user preferences

© Paradigm Publishing Inc Privacy Protection Issues Commercial Threats to Privacy Global Unique Identifiers (GUID) –identification number that can be coded into both hardware and software –makes it possible to track down the originators of messages or ideas on the Internet, especially those that are controversial or unpopular

© Paradigm Publishing Inc Privacy Protection Issues Commercial Threats to Privacy Location Tracking –can track cell phones and handheld computers –Global Positioning Chips (GPS) can pinpoint the location of a cell phone within a few dozen feet –useful as navigational aids, monitoring devices, or dispatching of services to closest unit –anyone could track you down or figure where you are at any given time

© Paradigm Publishing Inc Privacy Protection Issues Protection from Commercial Threats to Privacy Industry Self-regulation –privacy statement promises an e-tailer will protect the confidentiality of customer information –third-party organizations (BBBOnLine, TRUSTe) lend greater credibility to privacy statement –new software lets users designate that files sent to others have one-time-only viewing rights, cannot be copied, and can be viewed for a specific time period

© Paradigm Publishing Inc Privacy Protection Issues Government Threats to Privacy Eavesdropping –FBI developed Internet wiretap programs (Omnivore, Carnivore, DCS1000) to intercept communications while ignoring other messages it is not authorized to intercept. –USA PATRIOT Act allows law enforcement agencies to eavesdrop on private telephone messages and to intercept and read messages.

© Paradigm Publishing Inc Privacy Protection Issues Protection from Government Threats to Privacy –Main concern is that innocent messages may be misinterpreted and senders and recipients may face criminal charges. –NSA restricts use of encryption programs but, due to rapid advances in technology, government control will no doubt fail to be effective.

© Paradigm Publishing Inc Privacy Protection Issues Workplace Threats to Privacy Software programs allow employers to monitor employees by – tracking the number and type of keystrokes employees enter on their keyboards – reading messages sent and received – capturing what is on an employee’s computer screen at any given time

© Paradigm Publishing Inc Privacy Protection Issues Protection from Workplace Threats to Privacy –If a company has pledged to respect any aspect of employee privacy, it must by law keep that pledge. –Privacy advocates and the American Civil Liberties Union question the need to monitor employees without warning and without limit.

© Paradigm Publishing Inc Property Protection Issues Intellectual Property –includes anything that can be created by the agency of the human mind –patent awards ownership of an idea or invention to its creator for a fixed number of years –copyright protects artistic and literary endeavors –World Intellectual Property Organization (WIPO) administers international treaties dealing with intellectual property

© Paradigm Publishing Inc Property Protection Issues Fair Use allows use of another person’s material without permission if – originator is acknowledged – use is for noncommercial purposes – involves only limited excerpts of protected material

© Paradigm Publishing Inc Property Protection Issues Digital Millennium Copyright Act (DMCA) –brings U.S. copyright law in line with WIPO treaties –prohibits circumvention of copyright protection systems –clarifies concept of Fair Use as it applies to digital works –deals with issue of an ISP’s liability for hosting copyrighted materials

© Paradigm Publishing Inc Property Protection Issues Damage Due to Hacking and Viruses and Phishing – Identity theft is theft of personal credit card information and other private data – Phishing uses sophisticated tricks to “fish” for user’s financial information and passwords – Virus creates various sorts of damage to the user’s computer or to software running on it

© Paradigm Publishing Inc Property Protection Issues Protection from Hacking and Viruses and Phishing – deal only with merchants who encrypt credit card numbers and other private data – never open from an unknown source – install an antivirus program to destroy viruses found on a computer – install firewall software to protect against Internet- connected computer hackers

© Paradigm Publishing Inc Personal and Social Issues Gambling Online –attracts growing number of gamblers, including adults and teenagers who are prohibited by law from visiting brick and mortar casinos –U.S. House of Representatives passed legislation allowing authorities to work with Internet providers to block access to gambling Web sites and prevent gamblers from using credit cards

© Paradigm Publishing Inc Personal and Social Issues Protecting Freedom of Speech –hate speech sites incite hatred against people of certain races, religions, or beliefs; they may also post dangerous material such as information for making drugs or bombs –pornography sites provide pornography on the Internet with few if any restrictions

© Paradigm Publishing Inc Personal and Social Issues Protecting against Unwanted Material –Child Pornography Prevention Act of 1996 enacts harsh penalties for those distributing or possessing child pornography –Children’s Internet Protection Act (CIPA) requires public schools and libraries install Internet filtering software on their computers –Consortium for School Networking recommends school districts adopt an acceptable use policy to guide users and administrators about Internet use

© Paradigm Publishing Inc Personal and Social Issues Demographics of U.S. Internet Users –Age 65+ – 26% –African Americans – 57% –Caucasians – 70% –Did not finish high school – 29% –College graduates – 89%