Computer Ethics IT Fundamentals Battlefield High School.

Slides:



Advertisements
Similar presentations
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Advertisements

Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
Security, Privacy, and Ethics Online Computer Crimes.
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
Understanding Business Ethics
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Computers Are Your Future © 2005 Prentice-Hall, Inc.
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Computer Ethics for Computer Users
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Ethics, Computing, and the Internet
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
CSC Intro. to Computing Lecture 19: Ethics & Computers.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Lesson 01: Computer Lab Regulations Lab Organisation
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Security and Ethics Safeguards and Codes of Conduct.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
 byte  short  int  long  float  double  boolean  char.
ETHICS IN USING COMPUTER
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
Note addresses of authors: Floridi – Faculty of Philosophy
The Legal System and Ethics in Information Security
Unit 3- Introduction to Computer Ethics
Ethics & Privacy CSCI 101.
Computer Ethics.
Privacy, Security, and Ethics
Presentation transcript:

Computer Ethics IT Fundamentals Battlefield High School

What are Ethics?  a branch of philosophy  based on reason rather than faith or tradition  identifies which actions in life are worth following  identifies which actions are right or wrong (morals)

What is Computer Ethics?  Computer ethics are the moral guidelines that govern the use of computers and information systems.  Six frequently discussed areas of computer ethics are: Unauthorized use of computers & networks Software theft (piracy) Information accuracy Intellectual property rights Codes of conduct Information privacy

Why is IT a challenge?  Read or change private documents, records,  Steal intellectual property  Commit fraud  Less chance of being seen or caught

Computer Crimes  Piracy, counterfeiting  Spam  Viruses, worms  Copying someone else’s work, cheating  Plagiarism

IT Code of Conduct (1-5) Volunteers to read 1.Do not use a computer to harm other people. 2.Do not interfere with other people’s computer work. 3.Do not snoop around in other people’s computer files. 4.Do not use a computer to steal. 5.Do not pretend to be someone else

IT Code of Conduct (6-10) 6.Do not copy or use proprietary software for which you have not paid. 7.Do not use other people’s computer resources without authorization or proper compensation. 8.Do not appropriate other people’s intellectual output. 9.Think about the social consequences of the program you are writing or the system you are designing. 10.Always use a computer in ways that ensure consideration and respect for your fellow humans.

References  Ethics – ME pdf pdf  Cybercrime.gov. Federal Computer Crime Cases Involving Teens.