Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.

Slides:



Advertisements
Similar presentations
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Advertisements

Northside I.S.D. Acceptable Use Policy
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
Computer Technology Day 18
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Security, Privacy, and Ethics Online Computer Crimes.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Ethics of Copyright Infringement Thomas H. Mak CS 301.
Game March 22, 2005Ashley Irvin/ Copyright Copyright and Plagiarism for Students Exploring the world of copyright and plagiarism.
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Describe ethical considerations resulting from technological advances.
General Purpose Packages
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Warrior Wednesday DIGITAL CITIZENSHIP.
By: Catherine Tingle. What is it?  Netiquette refers to appropriate and safe interactions online.
Welcome to Causey Computer Lab! Computer Applications Mrs. Clements.
Mrs. Jefferson Business Information Management I.
Computer Ethics for Computer Users
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
Cyberspace Rules for Mrs. Johnson’s Kindergarten Class These are the rules we will use to learn, play, and have fun on the internet.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Staying Safe Online A Practical Guide for Middle School Students.
Digital Citizenship Created By: Kelli Stinson June 2011.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Digital Citizenship Project Amanda Friscia University of West Alabama ED 505--Fall 2011 Online.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Computer Crimes Career & Technology Education Department.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Digital Citizenship By: Michael Morgan. Netiquette on Social Media Sites  The rules of etiquette that apply when communicating over computer networks,
The Ethical Use of Electronic Media. V Computer Ethics  Resources such as images and text on the Internet are copyrighted.  Plagiarism (using.
The Ethical Use of Electronic Media.
Lesson 15 : Networks And The Internet
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
Digital Citizenship Project Kimberly Robbins. “Advances in computer technology and the Internet have changed the way America works, learns, and communicates.
Revision Q1: Explain the term HACKING?
Julie Latham Digital Citizenship: An Informational Guide.
DIGITAL CITIZENSHIP. Digital Citizenship covers 9 areas according to Mike Ribble, an expert in the field.  Etiquette  Communication  Literacy  Access.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Lecture 27 Intellectual Property. Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes.
Internet Safety, Netiquette, Copyright Law, and Ethics
COPYRIGHT TERMS BROADCAST LAW. AUTHOR/ARTIST The creator of a work.
The Ethical Use of Electronic Media. Guilford County SciVis V
Intellectual Property Rights TrademarksTrademarks: protects novel marks & designs used in marketing & advertising for an indefinite period as long as in.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
WHEN SHARING IS NOT CARING: INTERNET ETHICS By Baikgopodi “Bai” Ditiso Presented at CLTD– 09 May 2016.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Plagiarism, Fair Use and Copyright Laws
Computers Are Your Future Twelfth Edition
Computer Ethics and Research
DIGITAL CITIZENSHIP What You Should Know!.
IT Security  .
COPYRIGHT AND PLAGIARISM AT THE UNIVERSITY OF PRETORIA
Investigating the correct and legal way to use software
Digital Citizenship for Students and Educators
King Saud University- College OF Applied Studies
Copyright & Fair Use What You Need to Know!.
Presentation transcript:

Hectic Ethics Computer Applications Mrs. Wohleb

Objectives Students will be able to: Describe ethical considerations resulting from technological advances Hacking Privacy Restricted Sites Copyright Spreading Viruses Consequences Misuse of Technology Reliability of electronic information Netiquette

Hacking Unauthorized use of computer and network resources "hacker" originally meant a very gifted programmer Hacking is a felony in the United States and most other countries

Ethical Hacking Ethical hacking is the methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems operating environments Ethical hackers typically employ the same tools and techniques as criminal attackers, but they neither damage the target systems nor steal information

How Private is Your Information Unsolicited is not regulated by federal law at present A few companies are creating huge databases full of private information The federal government regulates only its own databases, leaving private database owners to decide how and when to distribute collected information

Privacy Privacy refers to the information on a computer as it relates to individuals and businesses Seeing private, protected and copyrighted electronic information is a part of working with computers Knowing how to ethically handle this information is what is important

Copyright A copyright is a property right attached to an original work of art or literature It grants the author or creator exclusive rights to reproduce, distribute, adapt, perform, or display the protected work

Restricted Sites A restricted web site or web area is a site that is only available for viewing by a certain group of people, such as students in a particular course Restrictions can be made according to the IP number, subnet or domain of machines, or by user name and password.

Help My Computer’s Sick A computer virus passes from computer to computer like a biological virus passes from person to person It must piggyback on top of some other program or document in order to get executed Once it is running, it is then able to infect other programs or documents

Consequences For those who intentionally cause damage by transmitting a virus, the punishment can amount to ten years in federal prison, plus a fine For those who transmit a virus with only "reckless disregard" to the damage it will cause, the maximum punishment stops at a fine and a year in prison

Misuse of Technology Includes Hacking using to intimidate or threaten students illegally downloading music plagiarizing information from the Internet using cellular phones during class time accessing pornographic Web sites and playing video games during class

Reliability One of the great things about the Internet is that anyone, no matter their age, education, or personal beliefs, etc. can publish information On the other hand, one of the problems with the Internet is that anyone, no matter their age, education, or personal beliefs, etc. can publish information That means that you, as the consumer of Internet information, must be especially careful when you are selecting materials to believe and to cite in an academic paper

Reliability Questions Who is the author or sponsor of the page Are there obvious reasons for bias Is contact information provided Is there a copyright symbol on the page Is the page a “zombie” Can you verify the information

Netiquette Simply stated, it's network etiquette -- that is, the etiquette of cyberspace Examples of Netiquette Do not type in all Caps Do not leave the subject field blank Refrain from formatting your with colored text and background colors Never give out phone numbers or personal information