Web Page Design and Development I Standards

Slides:



Advertisements
Similar presentations
Hart District Acceptable Use Policy Acceptable Use Policy.
Advertisements

© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Legislation in ICT.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Describe ethical considerations resulting from technological advances.
A Guide to Digital Citizenship
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
Principles and Rules of Copyright Copyright is protection for intellectual property.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered.
© Copyright © A Quick Guide. What does the law actually say? Introduced to protect people who have created original pieces of work. Books, Music, Films,
Digital Citizenship Project By: Tierra Collins EDU 505.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
6 th Grade. a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer.
Digital Citizenship Project Amanda Friscia University of West Alabama ED 505--Fall 2011 Online.
Digital Citizenship Project By Allen Naylor Ed 505.
BRADLEY BARNES DIGITAL CITIZENSHIP. NETIQUETTE ON SOCIAL MEDIA SITES Netiquette is the etiquette guidelines that govern behavior when communicating on.
Jeopardy: Digital Citizenship Please use presentation mode!
Digital Citizenship Project Lori Jones Franks University of West Alabama ED 505.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Digital Citizenship By: Michael Morgan. Netiquette on Social Media Sites  The rules of etiquette that apply when communicating over computer networks,
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Digital Citizenship Laura Locke ED 505. Netiquette on Social Media Sites  Netiquette is simply defined as “network etiquette.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
TEEN BREAKS COPYRIGHT LAW BRICEN GONZALEZ PD.7. DOWNLOADING UNAUTHORIZED MUSIC VIDEOS AND SOUND RECORDINGS -DOWNLOADING UNAUTHORIZED MUSIC VIDEOS AND.
Ethical Internet Use TECH 503 By A. Greenwell. Ethics in the Virtual World We all grow up learning the rules, regulations, and laws of the real world.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Digital Citizenship Project
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Digital Citizenship By Teneka Cannon. . Digital Etiquette also known as Netiquette Definition: a basic set of rule everyone should follow to make Internet.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Design 11 Mr. Jean September 12 th, The plan: Video clip of the day Rules of Copyright Design of our world (15minutes) Assignment #1 –Editing and.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
Computer Ethics, Viruses, and Copyrights
Computer Safety and Ethics
Misuses of ICT Malpractice and crime © Folens 2008.
DIGITAL CITIZENSHIP What You Should Know!.
What is copyright law?.
Legislation in ICT.
Ethical issues in relation to Copyright
Video: Digital citizenship is defined as the norms of appropriate,
Computer Ethics, Viruses, and Copyrights
Internet Safety and Acceptable Use Policies.
Computers and the Internet
Computer Ethics, Viruses, and Copyrights
Copyright law.
Internet Safety Vocabulary
Computer Ethics, Viruses, and Copyrights
Computer Security.
Social Issues in Computing
Social Issues in Computing
Legislation in ICT.
ICT Communications Lesson 3: Internet Life and Privacy
Student User Agreement and Policy 2022
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Copyright, Design and Patents Act (1988)
Presentation transcript:

Web Page Design and Development I Standards Standard A Safety and Ethics –6 Discuss computer crimes, terms of use, and legal issues such as copyright laws, fair use laws, and ethics pertaining to scanned and downloaded clip art images, photographs, documents, video, recorded sounds and music, trademarks, and other elements for use in Web publications.

Computer Crimes Hacking (gaining unauthorized access) Phishing (trying to gain sensitive information) Computer Viruses (malicious attacks on a computer) Cyberstalking (stalking someone using technology) ID theft(taking someones ID and using it as your own) Cyberextortion (locking a system and making someone pay for access) Cyberwarfare(penetrating an enemies computes to cause damage) Electronic Spamming (sending unsolicited messages) Facilitate Realtime Crimes (arranging real crimes ) Cyberbullying (using social sites to attack and individual) Jamming Networks(disabling systems by overloading) Salami Slicing/Penny Shaving (stealing small amounts)

Terms of Use Rules which one must agree to abide by in order to use a service. Can consist of disclaimers Release website owners from liability if you miss-use their site

Legal Issues Copyright-law that protects original works of authorship. https://ed.sc.gov/agency/programs-services/36/documents/CopyrightforEducators.pdf http://www.copyright.gov/title17/ Fair Use Laws https://www.law.cornell.edu/uscode/text/17/107 Ethics

http://www.ehow.com/info_7806377_five-unethical-uses-computers.html https://www.ics.uci.edu/ugrad/policies/Computer_Ethics.php http://smallbusiness.chron.com/examples-unethical-behavior-organization-13629.html