Computers Are Your Future © 2008 Prentice-Hall, Inc.

Slides:



Advertisements
Similar presentations
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Advertisements

Information Technology INT1001
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
ICT Ethics 2 ICT 139.
An Introduction of Multimedia Etiquette Nicole Huang.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
Understanding Business Ethics
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Computers Are Your Future © 2005 Prentice-Hall, Inc.
INTERNET and CODE OF CONDUCT
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Computer ethics.
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
7/3/08 Created by Mae Thomas Property Rights There can be consequences if you violate others' intellectual property rights. (That is, if you copy something.
Computer Ethics.
Objective 5.02 Understand ethics and ethical decision-making.
Computer Ethics for Computer Users
Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Computer Ethics Christina McCorkle.
Computer Ethics, Privacy and Security. Computer Ethics Computers are involved to some extent in almost every aspect of our lives They often perform life-critical.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
COMPUTER ETHICS Do you know the difference between right and wrong?
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
Ethics. Ethics are the principles and standards we use to decide how to act.
Ethics.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
HOSPITALITY & TOURISM 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
Computer Ethics Computer Technology 1 By Jill Einerson.
ETHICS IN USING COMPUTER
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Professional Ethics and Responsibilities Part-II
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Ethical Issues. Introduction to Copyright, Plagiarism Get out your note sheet.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Computers Are Your Future
Internet Etiquette or Netiquette
Computer Safety and Ethics
Computers Are Your Future Twelfth Edition
Internet Etiquette or Netiquette
Internet Etiquette or Netiquette
Unit 3- Introduction to Computer Ethics
Lesson 2- Ethical Use of Digital Resources
Ethics & Privacy CSCI 101.
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
CS-480b Network Security Dick Steflik
Presentation transcript:

Computers Are Your Future © 2008 Prentice-Hall, Inc.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 2 Computers Are Your Future Spotlight 1 Ethics

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 3 Computer Ethics  Computers cause new ethical problems.  Computer ethics uses basic ethical principles to help you make the right decisions.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 4 Ethical Principles  Ethical principles are tools that are used to think through difficult situations.  Three useful ethical principles:  An act is ethical if, were everyone to act the same way, society as a whole would benefit from it.  An act is ethical if people are treated as ends and not as a means to ends.  An act is ethical if it is fair to all parties involved.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 5 Your School’s Code of Conduct  Read the Acceptable Use Policy.  Respect yourself.  Respect others.  Respect academic integrity.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 6 Ten Commandments of Computer Ethics 1.Don’t use a computer to harm other people. 2.Don’t interfere with other people’s computer work. 3.Don’t snoop around in other people’s files. 4.Don’t use a computer to steal. 5.Don’t use a computer to bear false witness.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 7 Ten Commandments of Computer Ethics (continued) 6.Don’t copy or use proprietary software for which you have not paid. 7.Don’t use other people’s computer resources without authorization or proper compensation. 8.Don’t appropriate other people’s intellectual output. 9.Do think about the social consequences of the program you write or the system you design. 10. Do use a computer in ways that show consideration and respect for your fellow humans.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 8 Netiquette Netiquette:  Guidelines that involve showing respect for others and yourself while you are online

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 9 Mailing List Netiquette  Read the discussions for the past few days before posting questions.  Read the Frequently Asked Questions (FAQs) list before posting questions.  Don’t belittle people for grammatical errors.  Don’t post inflammatory messages.  Learn how to unsubscribe from the list.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 10 Netiquette  Promptly respond to messages.  Delete messages after you read them.  Speak of others professionally and courteously.  Run your computer’s antivirus program on any received or sent.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 11 Netiquette (continued)  Keep your messages short and to the point.  Don’t type in all capital letters.  Spell check your message before sending it.  Be careful with sarcasm and humor in your message.  Be mindful of the recipient’s reaction when you request a return receipt; this feature can be annoying and intrusive.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 12 Internet Relay Chat Netiquette  Listen to the discussion for a while before joining it.  Learn the commonly used abbreviations.  Don’t flood the channel with text.  Don’t harass others with unwanted invitations.  Be careful if you are asked to type in a command; it may have unexpected results.  Use the ignore command when someone is bothering you.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 13 Computer Games: Too Much Violence? Splatter games emphasize all-out violence.  Some say this type of game increases violent behavior.  Others say it provides an outlet for violent feelings.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 14 Computer Ethics for Organizations  A business must protect its data from:  Loss or damage  Misuse or errors  Unauthorized access  Backup procedures are used to protect data from loss.  It is the organization’s responsibility to ensure that its data is as complete as possible.  Divulging customer data without asking permission is considered unethical behavior by privacy advocates.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 15 Whistle-blowing Whistle-blowing refers to employees reporting their company’s dangerous or illegal acts to regulatory agencies or the press.  Some laws exist to protect whistle-blowers, but many find themselves unemployed and blacklisted.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 16 Computer Ethics for Computer Professionals  The field of computer ethics specifies ethical codes for computing professionals.  The core of a computer professional’s code of ethics is to preserve and protect human life from harm. CODES OF CONDUCT AND GOOD PRACTICE FOR CERTIFIED COMPUTING PROFESSIONALS The essential elements relating to conduct that identify a professional activity are: ·A high standard of skill and knowledge ·A confidential relationship with people served ·Public reliance upon the standards of conduct in established practice ·The observance of an ethical code Excerpt from the Code of Ethics of the Institute for Certification of Computing Professionals

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 17 The ACM Code of Conduct A computing professional:  Contributes to society and human well-being  Avoids harm to others  Is honest and trustworthy  Is fair and takes action not to discriminate on the basis of race, sex, religion, age, disability, or national origin  Honors property rights, including copyrights and patents  Gives proper credit when using the intellectual property of others  Respects the right of other individuals to privacy  Honors confidentiality

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 18 Safety First Programmers can produce programs with errors.  Computer experts agree that the liability for a program failure should be shared among the programmer, the software company, and the organization that buys the software.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 19 It’s Not Just Unethical, It’s Illegal, Too Types of legal problems that arise from computer use include:  Plagiarism  Software piracy  Copyright infringement

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 20 Plagiarism Plagiarism:  Unauthorized and/or uncited use of someone else’s intellectual property Intellectual property rights:  An individual’s ownership over original works Legal implications of plagiarism:  Dismissal from school  Lawsuits

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 21 Plagiarism Copyright infringement:  Plagiarism of copyrighted material Fair use doctrine:  States that a brief selection from copyrighted work can be used for commentary, parody, news reporting, research, and education.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 22 Libel Libel is the publication of a false statement that injures one’s business or reputation.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 23 Software Piracy  Selling software that contains all or part of a commercial software program  Using shareware beyond its evaluation period  Violating the terms of a software license  Making copies of site-licensed programs for personal use  Giving or selling commercial software to others

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 24 Software and Copyrights  Public domain software can be copied, sold, and modified.  Shareware is copyrighted software that can be used without a license for a specified time.  Trial versions can be copied.  When the evaluation period ends, you must pay a registration fee for continued use of the software.  Commercial software is copyrighted.  You must purchase the software to use it.  Organizations purchase a site license to use the software on all of their computers.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 25 Software and Copyrights (continued)  General Public License (GPL) specifies that anyone may freely copy, use, and modify the software, but it cannot be sold for profit.  Copyright protection schemes thwart the illegal use of programs.  Machine dependent programs can only be used on the machine on which they were originally installed.

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 26 Are You Guilty of Software Piracy?  Incorporating all or part of a GPL program in a commercial program that you sell  Continuing to use shareware after expiration without paying  Violating terms of software license  Making copies of site-licensed programs  Giving or selling copies of commercial software to others

Computers Are Your Future Spotlight 1 © 2008 Prentice-Hall, Inc. Slide 27 File Sharing: Music, Movies, and More  An increasing number of Internet users are making illegal copies of music.  Rationalizations copyright violators use:  “It’s OK to download MP3 files if I only keep them for 24 hours.”  “It’s free advertising for the band.”  “It’s legal because I don’t charge any money for sharing them.”