Ethical Use of Computers

Slides:



Advertisements
Similar presentations
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Advertisements

Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
INTERNET and CODE OF CONDUCT
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
Computer Ethics.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Cyber crime & Security Prepared by : Rughani Zarana.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Software Piracy and Copyright Considerations Laura Larsson Research Librarian Health Services University of Washington revised October 21, 1998
 In most countries of the world, the “information revolution” has altered many aspects of life significantly: commerce, employment, medicine, security,
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Computers Designed by Terry Wilhelmi Joseph Jacquard Jacquard’s Loom in 1810 Emphasized three computer concepts: 1. Instructions - used punched cards.
Unethical use of Computers and Networks
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Investigating & analysing ICT issues and ethical dilemmas.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, Sixth Edition Chapter 9, Part 10 Satisfying Customer Needs.
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Social Issues. Employment change Computer Ethics Privacy Piracy Computer Crime Computer Viruses Data Protection and security.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cyber Law And Ethics And Ethics.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Information Security and Privacy in HRIS
Computer Ethics IT Fundamentals Battlefield High School.
Software piracy and software patents
Privacy and the Law.
Legal and ethical issues
MGMT 452 Corporate Social Responsibility
18 USC § 1030 Computer Fraud and Abuse Act
Chapter 10 Cyberlaw, Social Media, and Privacy
Crimes against Property
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Internet And Online Community Week 10
Five Unethical Uses of Computers
Learning Area 1 Information And Communication Technology and Society
BCT 2.00 Analyze Technology Issues
Internet Safety and Acceptable Use Policies.
– Communication Technology in a Changing World
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
Computer Programming I
Copyright, Designs and Patents Act 1988
Social Issues in Computing
Computers Tools for an Information Age
Social Issues in Computing
Communication Technology in a Changing World
Computers Tools for an Information Age
The Legalities of Technicalities task 4
Computers Tools for an Information Age
Presentation transcript:

Ethical Use of Computers Presented by Mr. Wilhelmi

Crimes Using Computers Computer Crime Theft of Services Theft of Property Financial Crimes Software

Computer Crime A criminal act that is accomplished through the use of a computer A criminal act that poses a greater threat to a computer user than it would to a non- computer user Kinds of activity: Perpetrate acts of deceit, theft, or concealment to provide financial, business-related, property, or service advantages Threats to computer itself – sabotage, theft

Theft of Services Using a company’s computer after working hours Obtaining inside information on a business/corporation Making unauthorized changes to data (grades) Theft of valuable computer time and the data stored on the system

Theft of Property Computer itself Computer parts for assembly later Stealing merchandise from a company whose orders are processed by computers Software Illegally copying software, music, etc.

Financial Crimes Creating illegal checks by an employee “Round-off fraud” – an employee collects the fractions of cents in customers’ accounts due to applicable interest rate allocations

Software Software piracy – stealing commercial software either outright or illegally copying it for personal use or for resale Commercial software – software ordinarily purchased at a store, via Internet or mail Copyrighted – we purchase right to use software Constitution in 1790 – protects rights of authors US Copyright Office & courts in 1964 – established that computer programs are the “writing of an author”

Laws Copyright Act of 1976 “It is illegal to make unauthorized copies of a copyrighted computer program.” Software Piracy and Counterfeiting Amendment of 1983 Added to the Copyright Act of 1976 Commercially copying and selling pirated software is a felony

Ethics A set of moral principles or values that are designed to guide human conduct Dealing with what is good and bad, ethics represents a pattern of personal conduct that is acceptable to society Computer ethics The standard of moral conduct in computer use A way in which the “spirit” of laws can be carried to other computer-related activities Individual license - use only one program on one computer at a time

Privacy and Confidentiality of Information Privacy – keeping personal information personal; protecting it from improper use Computer Fraud and Abuse Act (1986) Obtaining records from financial institutions Electronic Communication Privacy Act (1986) Prohibits the interception of data communications Computer Matching and Privacy Protection Act (1988) Regulates use of data for eligibility of federal benefits

Ethics A set of moral principles or values that are designed to guide human conduct