Five Unethical Uses of Computers

Slides:



Advertisements
Similar presentations
Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.
Advertisements

Pirated Software: A Global Epidemic Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque, NM.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
JCSD-aw Citizenship in an e-World Johnston Community School District.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Security, Privacy, and Ethics Online Computer Crimes.
Ethics of Copyright Infringement Thomas H. Mak CS 301.
By: Amba Kasongo Section: 006 INTERNET CRIME: DISAGREEING WITH IDENTITY THEFT AND ONLINE MEDIA PIRACY.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Identity theft By: Blake D uncan.
Cyber Crimes.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
Unethical use of Computers and Networks
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Identity Theft.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Topic 5: Basic Security.
Web Page Design and Development I Standards Standard A Safety and Ethics – 3 Identify potential abuse and unethical uses of computers and networks.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Identity Theft How it happens and how to avoid it.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
You. are at risk for the fastest growing crimes crime.
Identity Theft One of America's fastest growing crimes.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused by identity.
Crimes Against Property Chapter 10. Arson and Vandalism Malicious burning of property Crime whether you own building or not May lead to other more, serious.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Protecting Your Assets By Preventing Identity Theft
Protecting Your Credit Identity
Computer Safety and Ethics
Security, Social and Legal Issues Regarding Software and Internet
Add video notes to lecture
Done by… Hanoof Al-Khaldi Information Assurance
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Protecting What’s Yours: Your Identity
Chapter 19.1 Cyberlaw and Cybercrime
A Project on CYBER SECURITY
Chapter 11 crime and security in the networked economy
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Internet And Online Community Week 10
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
When you get caught for Identity Theft
BCT 2.00 Analyze Technology Issues
Societal Issues in Computing (COMP466)
HOW DO I KEEP MY COMPUTER SAFE?
Top Five Computer Related Crimes
Social Issues in Computing
Protecting Your Identity
Faculty of Science IT Department By Raz Dara MA.
Social Issues in Computing
Ethical Use of Computers
LO1 - Know about aspects of cyber security
Commercial Data Processing
Presentation transcript:

Five Unethical Uses of Computers

Essential Question How can I use a computer unethically? What are the consequences for using a computer unethically? Is it wrong to share your music?

Unethical computer use is a violation of trust that can: Like a crowbar or hammer, computers are designed to make our lives and jobs easier. Just like a crowbar or hammer, computers can be used either as constructive tools or destructive weapons. Unethical computer use is a violation of trust that can: Damage finances and reputations; or Lead to serious consequences (e.g. Jail time). When computers are used in unethical ways, it is people who are harmed.

Identity Theft and Fraud Identity theft and fraud are: Characterized by criminal use of the victim's personal information such as a social security number, to assume the victim's identity. Identity thieves use the stolen personal information to: Create fake identifications Obtain credit cards or access other resources and benefits. The criminals may install malicious software to: Gain access to the victim's computer files and activity, or Target commercial and government computer systems to steal the personal information of hundreds or thousands of potential victims at once.

Financial Theft or Fraud Thieves and embezzlers can use computers to: Steal money from individuals or businesses. A thief can gain online access to an individual's bank account using: A victim's stolen password, PIN, or Personal information. Using stolen credit card information, a thief can: Order goods online and later sell those goods for cash. An employee with access to business accounting systems may: Falsify records or manipulate the systems to embezzle funds.

Digital Piracy The internet is often called The "information superhighway" because it allows people to find, share, and distribute information quickly and easily using computers. Not all that information is ethical or legal. Piracy is considered as: Distributing and accessing illegal copies of: Copyright-protected digital books, Movies, Music, Artwork, Software, and Other content. When digital products and works are pirated, the content creators lose money they would have otherwise earned had that work been legally purchased or licensed.

Information Theft Spies, criminals, and snoops can steal private or classified information by gaining unauthorized access to the victim's computer or inappropriately using computers to which they been given access. Their goals may be to: Leak or sell classified government documents, Use stolen personal information to extort a victim, Gain an advantage over a competitor, or Simply pry into the private life of a family member or coworker. Privacy invasion, spying and information theft may be punishable under a number of laws designed to protect individuals, businesses, or national security. Employees caught snooping or stealing data may lose their jobs even if their acts were technically legal.

Disruption to Computers or Services Disrupting a computer or network may involve: Using malicious software to make a computer unusable, or Using several computers to block access to a website, network or other resource. These types of attacks may be done to: Extort money from the victim, Make a political statement, or Force the victim into a specific action. Sometimes, the attackers commit these acts simply for entertainment.

Individual Practice Is it wrong to share your music? (discuss)