Computers: Tools for an Information Age Chapter 9 Social and Ethical Issues in Computing: Doing the Right Thing.

Slides:



Advertisements
Similar presentations
The Woodlands High School
Advertisements

Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 9 Social and Ethical Issues in Computing: Doing the Right Thing.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Computer Technology Day 18
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Ergonomics & The Environment Derek Franks Comm 165.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Health and Safety The risks involved in working with ICT © Folens 2008.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
E-Commerce: Regulatory, Ethical, and Social Environments
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2005 by The McGraw-Hill Companies,
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
April 12, Using a screen saver saves my monitor and/or energy. Turning my computer off and on reduces the life of the hard drive. I can use blank.
Computers and the Individual lesson 29. This lesson includes the following sections: Ergonomics and Health Issues Privacy Issues.
Digital Citizenship: By: Forrest D. Jones
Module 12 Ethics and Security in Computing Some social issues in computing –Division issues, workplace issues, legal issues –protecting children on the.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
Module 13: Ethics and Security in computing Some social issues in computing Division issues, workplace issues, legal issues Division issues, workplace.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
Understanding Computers Ch.161 Chapter 16 Intellectual Property Rights, Ethics, Health, Access, and the Environment.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Module 5.2 Green, health and global e-communication issues
MODULE 3 SAFE USE OF COMPUTER. Virus and Antivirus A computer virus is a malware program that, when executed, replicates by inserting copies of itself.
9 Section D: Professional Ethics  Ethics Basics  IT Ethics  Ethical Decision Making  Whistleblowing Chapter 9: The Computer Industry: History, Careers,
Chapter 6 Computer-Aided Design and Drafting in Architecture.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Computers, the law and ethics  Lesson Objective: Understand some of the legal & ethical issues in developing computer systems  Learning Outcome: Know.
Understanding Computers, 12 th Edition, Enhanced Chapter 16 1 Intellectual Property Rights, Ethics, Health, Access, and the Environment.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Digital Citizenship Created By: Kelli Stinson June 2011.
Nick’s pages The Digital Divide The Digital Divide Work Place Issues Work Place Issues Home Nick’s pages.
The Computer Labs are a valuable tool for learning at Prattville High School While in the labs, students will Follow appropriate code of conduct. Adhere.
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
Legal issues Health issues.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Issues & Ethics Jaime Bahder.
3A-1 Ergonomics and Input Devices Ergonomics –Study of human and tool interaction –Concerned with physical interaction –Attempts to improve safety and.
Intro to Business, 7e © 2009 South-Western, Cengage Learning SLIDE1 CHAPTER Social Responsibility Government Protection Activities 4-3.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
Digital Citizenship Jacinta Little ED 505. Table of Contents Definition of Digital Citizenship………………………… Slides 3-4 Social networking…………………………………………
COMPUTERS AND THE INDIVIDUAL
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Security and Ethics Safeguards and Codes of Conduct.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Responsibility of businesses to do the right thing.
Health issues.
Unit 5 Ethics. Set of moral principles that govern decisions and actions.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
A GUIDE TO COPYRIGHT & PLAGIARISM Key Terms. ATTRIBUTION Identifying the source of a work. For example, a Creative Commons "BY" or attribution license.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
Computers and the Individual
Ethical and Legal Issues
Computers: Tools for an Information Age
A Gift of Fire Third edition Sara Baase
Legal and Ethical Issues in E-Commerce
E-Commerce: Regulatory, Ethical, and Social Environments
Computer Programming I
LEGAL TERMS IN DIGITAL MEDIA
The Issues with Technology in education
Computers and the Individual
Computers and the Individual
Presentation transcript:

Computers: Tools for an Information Age Chapter 9 Social and Ethical Issues in Computing: Doing the Right Thing

2 Objectives Identify the social issues and ethics in computing Understand the digital divide social issue and its effect in society List and describe the workplace issues Describe the international and national legal issues

3 Objectives List different methods that are already available for protecting children on the Internet Explain the significance of the ethics in computing Explain the significance of intellectual property rights

4 The Digital Divide Separates the computing haves from the have-notshaves from the have-nots Several initiatives exist to narrow the dividenarrow the divide

5 Haves vs. Have-Nots Those with access to computers and the Internet take advantage of personal and economic opportunities Those without access fall farther behind Major divisions within countries Between urban areas and rural ones Between rich and poor Major divisions among nations Between industrialized and non-industrialized nations Return

6 Narrowing the Divide Within the U.S. Universal Service Fund helps service providers to provide telecommunications services to rural areas E-Rate program provides rate subsidies for Internet access for schools and libraries Worldwide Africa ONE is creating a fiber optic network to connect the nations of Africa Return

7 Workplace Issues Healthy computing Employee monitoring Environmental concerns

8 Healthy Computing A number of health questions have been raised Harmful emissions from monitor Eyestrain from monitor Back pain from position of chair and desk Repetitive strain injury Return

9 Repetitive Strain Injury May affect workers who hold their hands over a keyboard for a long period of time Carpal tunnel syndrome is the most common form of RSI Causes Speed Repetition Awkward positioning Holding a static position for a long time Return

10 Ergonomics Refers to human factors related to the use of computers Ergonomic equipment Ergonomic behavior

11 Ergonomic Equipment Chair should be pneumatically adjustable Keyboard platform should be set to proper height Monitor must be adjustable Lighting should be adjusted to minimize glare on the screen Return

12 Ergonomic Behavior Ergonomic equipment must be used properly Turn the screen away from the window to reduce glare Cover your screen with a glare protector Place keyboard to avoid arm and wrist fatigue Use a raised rest for your wrist Position your seat back so back is supported Sit with your feet firmly on the floor Enlarge fonts so they are easier to see Take frequent breaks Return

13 Employee Monitoring Various tools allow an employer to monitor an employee’s performance Keystroke monitors measure keystrokes per second Other software tools monitor how long an employee is away from the computer Monitor the files stored on the hard drive Monitor the sites visited on the Internet Many companies have policies that notify employees about monitoring practices Return

14 Environmental Concerns Power consumption Computer supplies PC disposal Return

15 Reducing Power Consumption Energy Star standards Limit the power the system consumes when idle Energy management features Specify the amount of time the system will wait before turning off system components Return

16 Computer Supplies Use these strategies to reduce the amount of paper and toner cartridges used Don’t print out everything Use instead of faxing or sending a memo Use the back side of already used paper for draft copies Save heavyweight bond paper for critical items and use recycled paper for routine printing Make sure used paper is recycled rather than thrown in the trash Refill and reuse empty ink-jet and toner cartridges Return

17 PC Disposal Find ways to prolong the PC’s life Upgrade key components Give the PC to someone in the organization with more limited computing needs When you buy a new PC, reuse the keyboard, mouse, and monitor Donate usable equipment to charities and/or schools Return

18 Jurisdictional Issues International issues Applying national laws to a world-wide medium is a difficult process  It would be impossible to determine if the content of every Web site was legal according to the laws of every country Issues exist over which country’s court has jurisdiction National issues Issues exist over which locality’s court has jurisdiction Imposition of sales taxes on Internet transactions

19 Protecting Children on the Internet The Internet offers many opportunities for children There are also unsavory elements on the Internet Ways to protect children Blocking software Child monitoring Laws to protect children Laws

20 Blocking Software Used to prevent children from accessing sites on its updatable list of objectionable sites Blocks pornographic sites and sites with foul language Blocks sites requesting names, phone numbers, and credit card numbers Sometimes criticized for being overzealous Return

21 Child Monitoring Place the child’s computer in a public area instead of his or her bedroom Restrict usage when parents are not present Return

22 Laws to Protect Children Children’s Online Privacy Protection Act Requires Web sites that target children under 13 to post a privacy policy and obtain parental consent before collecting data Children’s Internet Protection Act Requires libraries receiving federal funding to implement blocking technology Neighborhood Children’s Internet Protection Act Requires libraries receiving the E-Rate discount to establish an Internet safety policy Return

23 Ethics in Computing Ethics – standards of moral conduct Used to help determine the proper course of action in difficult situations Computing Issues Computer ethics Professional ethics Programmer responsibility Ethical use of computers

24 Computer Ethics Ten Commandments of Computer Ethics Apply general ethical principles to computing Developed by the Computer Ethics Institute Return

25 Professional Ethics Relates to ethics of those whose work focuses on computer systems Code of Ethics and Professional Conduct developed by the Association for Computing Machinery Divided into sections General principles Professional responsibilities Guidelines for organizational systems Return

26 Programmer Responsibility Bug-free software does not exist Testing can only show the presence of bugs, not their absence Issues related to software quality How much testing is enough? How many minor bugs are acceptable in software about to be released? Return

27 Ethical Use of Computers Data quality Protecting customers’ personal data Digitally altering data Return

28 Data Quality Users are responsible for the quality of data entered into the system Procedures must be in place to detect and correct inaccurate information Return

29 Protecting Customers’ Data Particularly relevant to companies doing business over the Internet Develop privacy policies stating how data will be used Two approaches Opt-in policy – customers are notified of privacy policy and must agree before their data can be released Opt-out policy – customers are assumed to agree to the release of their data unless they specifically request it be kept private Return

30 Altering Reality Computers can alter photographs How much alteration is ethical? messages can be destroyed In a legal action, is this altering evidence? Return

31 Intellectual Property Rights Refers to results of intellectual activity in the industrial, scientific, literary, or artistic fields U.S. Copyright Act provides protection in three areas Copyrights Patents Trademarks

32 Copyrights Provides the creator of a literary or artistic work with control over its use and distribution Widespread distribution of music and videos over the Internet has created quite a controversy Defining fair use has been difficult Under fair use, you may use copyrighted works for limited purposes Digital issues Return

33 Digital Fair Use Issues Copy-protection schemes make it impossible to copy CDs and DVDs Users claim that violates their fair use rights Software Users may not modify copyrighted software Digital images Images on the Web may be downloaded and used as screen savers, but they may not be distributed or altered Plagiarism Work taken from the Internet must be cited if it is used in a paper or other presentation Return

34 Patents Designed to protect inventions and encourage inventors Grant patent holder exclusive rights to the invention Patent Office will grant patent protection to software algorithms and techniques Will also grant patents for business methods implemented in software Return

35 Trademarks A word, name, symbol, or device used to distinguish one company and its products from another Two issues in the digital arena Unauthorized use of one company’s trademarks on another’s Web site Cybersquatting – obtaining a domain name that includes another company’s trademark, then selling that domain name at a profit Return