Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.

Slides:



Advertisements
Similar presentations
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Advertisements

Information Technology INT1001
ICT Ethics 2 ICT 139.
An Introduction of Multimedia Etiquette Nicole Huang.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
Understanding Business Ethics
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Computers Are Your Future © 2005 Prentice-Hall, Inc.
INTERNET and CODE OF CONDUCT
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Computer ethics.
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Computer Ethics for Computer Users
Computer Ethics Christina McCorkle.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Computer Ethics, Privacy and Security. Computer Ethics Computers are involved to some extent in almost every aspect of our lives They often perform life-critical.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
COMPUTER ETHICS Do you know the difference between right and wrong?
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Computer Ethics CSCI 101 Kara kelly. Ethics Ethics can be defined as a discipline in which one attempts to identify, organize, analyze, and justify human.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Ethics.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ETHICS IN USING COMPUTER
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Lecture. 1.What are ethics? Why needed? 2.Islamic code of ethics 3.Network etiquette (8 broad rules) 4.Brief overview of ACM code of ethics 5.How to acquire.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Ethical Issues. Introduction to Copyright, Plagiarism Get out your note sheet.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Computer Ethics IT Fundamentals Battlefield High School.
Computers Are Your Future
Internet Etiquette or Netiquette
Computers Are Your Future Twelfth Edition
Internet Etiquette or Netiquette
Internet Etiquette or Netiquette
Unit 3- Introduction to Computer Ethics
Ethics & Privacy CSCI 101.
Computer Ethics.
Presentation transcript:

Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel

NEXT SLIDE Spotlight 5: Ethics: Standards of Information Age Conduct Copyright © 2003 Prentice Hall, Inc

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 3 Computer Ethics Ethics is the branch of philosophy concerned with what’s right or wrong. Ethics is the branch of philosophy concerned with what’s right or wrong. Computer ethics deals with computing-related moral dilemmas and the ethical principals for computer professionals. Computer ethics deals with computing-related moral dilemmas and the ethical principals for computer professionals.

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 4 Avoiding: Computer-Related Legal Problems Most organizations have an Acceptable Use Policy for computer use. Most organizations have an Acceptable Use Policy for computer use. Types of legal problems that arise from computer use include: Types of legal problems that arise from computer use include: Plagiarism Plagiarism Software Piracy Software Piracy Copyright Infringement Copyright Infringement

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 5 Plagiarism Plagiarism is the use of someone else’s intellectual property. Plagiarism is the use of someone else’s intellectual property. Intellectual property refers to an individual’s rights in creating original works. Intellectual property refers to an individual’s rights in creating original works. Copyright infringement is plagiarizing copyrighted material. Copyright infringement is plagiarizing copyrighted material. Legal implications of plagiarism: Legal implications of plagiarism: Dismissal from school Dismissal from school Law suits Law suits

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 6 Software Piracy Public domain software can be copied, sold, and modified. Public domain software can be copied, sold, and modified. Shareware is copyrighted software. Shareware is copyrighted software. Trial versions can be copied. Trial versions can be copied. Shareware is meant to be evaluated for a period of time and then a registration fee is paid for continued use. Shareware is meant to be evaluated for a period of time and then a registration fee is paid for continued use. Commercial software is copyrighted. Commercial software is copyrighted. You must purchase the software in order, to use it. You must purchase the software in order, to use it. Organizations purchase a site license to use the software on all of their computers. Organizations purchase a site license to use the software on all of their computers.

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 7 Illegal Software Actions Selling software that contains all or part of a commercial software program. Selling software that contains all or part of a commercial software program. Using shareware beyond the evaluation period. Using shareware beyond the evaluation period. Violating the terms of a software license. Violating the terms of a software license. Making copies of site-licensed programs for personal use. Making copies of site-licensed programs for personal use. Giving or selling commercial software to others. Giving or selling commercial software to others.

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 8 Copyright Infringement An increasing number of Internet users are making illegal copies of music. An increasing number of Internet users are making illegal copies of music. Rationalizations copyright violators use: Rationalizations copyright violators use: It’s OK to download MP3 files if I only keep them for 24 hours. It’s OK to download MP3 files if I only keep them for 24 hours. It’s free advertising for the band. It’s free advertising for the band. It’s legal because I don’t charge any money for sharing them. It’s legal because I don’t charge any money for sharing them. Fair use doctrine states that a brief selection from copyrighted work can be used for commentary, parody, news reporting, research, and education. Fair use doctrine states that a brief selection from copyrighted work can be used for commentary, parody, news reporting, research, and education.

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 9 Introducing Ethics Ethics is concerned with what’s right or wrong in moral dilemma contexts. Ethics is concerned with what’s right or wrong in moral dilemma contexts. Ethical principals help people through moral dilemmas. Ethical principals help people through moral dilemmas. Computer ethics deal with the ethical principals associated with moral dilemmas caused by computer use. Computer ethics deal with the ethical principals associated with moral dilemmas caused by computer use.

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 10 Computer Ethics for Computer Users When using the college’s computers: When using the college’s computers: Respect yourself. Respect yourself. Respect others. Respect others. Respect academic integrity. Respect academic integrity.

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 11 Ten Commandments of Computer Ethics 1.Thou shalt not use a computer to harm other people. 2.Thou shalt not interfere with other people’s computer work. 3.Thou shalt not snoop around in other people’s files. 4.Thou shalt not use a computer to steal. 5.Thou shalt not use a computer to bear false witness. 6.Thou shalt not copy or use proprietary software for which you have not paid. 7.Thou shalt not use other people’s computer resources without authorization or proper compensation. 8.Thou shalt not appropriate other people’s intellectual output. 9.Thou shalt think about the social consequences of the program you write or the system you design. 10.Thou shalt use a computer in ways that show consideration and respect for your fellow humans.

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 12 Netiquette Netiquette refers to the guidelines that involve showing respect for others and yourself while being online. Netiquette refers to the guidelines that involve showing respect for others and yourself while being online. I

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 13 Mailing List Netiquette Read the discussions for the past few days before posting questions. Read the discussions for the past few days before posting questions. Read the Frequently Asked Questions (FAQs) list before posting questions. Read the Frequently Asked Questions (FAQs) list before posting questions. Don’t belittle people for grammatical errors. Don’t belittle people for grammatical errors. Don’t post inflammatory messages. Don’t post inflammatory messages. When agreeing with something don’t waste others time by saying “Me too.” When agreeing with something don’t waste others time by saying “Me too.” Learn how to unsubscribe from the list. Learn how to unsubscribe from the list.

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 14 Netiquette Promptly respond to messages. Promptly respond to messages. Delete messages after you read them. Delete messages after you read them. Don’t send messages you wouldn’t want others to read. Don’t send messages you wouldn’t want others to read. Speak of others professionally and courteously. Speak of others professionally and courteously. Run you computer’s anti-virus program on any received or sent. Run you computer’s anti-virus program on any received or sent. Keep the message short and to the point. Keep the message short and to the point. Don’t type in all capital letters. Don’t type in all capital letters. Spell check your message before sending it. Spell check your message before sending it. Be careful with sarcasm and humor in your message. Be careful with sarcasm and humor in your message. Be mindful when you request a return receipt. Be mindful when you request a return receipt.

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 15 Internet Relay Chat Netquette Learn the commonly used abbreviations. Learn the commonly used abbreviations. Listen to the discussion for a while before joining it. Listen to the discussion for a while before joining it. Don’t flood the channel with text. Don’t flood the channel with text. Don’t harass others with unwanted invitations. Don’t harass others with unwanted invitations. Be careful if you are asked to type in a command. It may be a trick. Be careful if you are asked to type in a command. It may be a trick. Use the ignore command when being bothered. Use the ignore command when being bothered.

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 16 Computer Ethics for Computer Professionals The field of computer ethics specifies ethical codes for computing professionals. The field of computer ethics specifies ethical codes for computing professionals. Computer professionals create products that affect people and may expose them to risk. Computer professionals create products that affect people and may expose them to risk. The core of a computer professional’s code of ethics is to preserve and protect human life from harm. The core of a computer professional’s code of ethics is to preserve and protect human life from harm.

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 17 The ACM Code of Conduct The Association for Computing Machinery (ACM) developed an innovative code of conduct. The Association for Computing Machinery (ACM) developed an innovative code of conduct. According to the ACM code, a computing professional: According to the ACM code, a computing professional: Contributes to society and human well-being Contributes to society and human well-being Avoids harm to others Avoids harm to others Is honest and trustworthy Is honest and trustworthy Is fair and takes action not to discriminate on the basis of race, sex, religion, age, disability, or national origin Is fair and takes action not to discriminate on the basis of race, sex, religion, age, disability, or national origin Honors property rights, including copyrights and patents Honors property rights, including copyrights and patents Gives proper credit when using the intellectual property of others Gives proper credit when using the intellectual property of others Respects other individuals’ rights to privacy Respects other individuals’ rights to privacy Honors confidentiality Honors confidentiality

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 18 Programmer Liability Programmers can produce programs with errors. Programmers can produce programs with errors. Computer experts agree that the liability for a program failure should be shared among the programmer, software company, and the organization that buys the software. Computer experts agree that the liability for a program failure should be shared among the programmer, software company, and the organization that buys the software. A new field called software engineering is applying the principles of mainstream engineering to software production. A new field called software engineering is applying the principles of mainstream engineering to software production. Fault-tolerant systems are being developed that continue working when a problem occurs. Fault-tolerant systems are being developed that continue working when a problem occurs.

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 19 Computer Ethics in Business A business must protect its data from: A business must protect its data from: Loss or damage Loss or damage Misuse or error Misuse or error Unauthorized access Unauthorized access Backup procedures are used to protect data from loss. Backup procedures are used to protect data from loss. It is the organization’s responsibility to ensure that its data is as complete as possible. It is the organization’s responsibility to ensure that its data is as complete as possible. Divulging customer data without asking permission is considered unethical behavior by privacy advocates. Divulging customer data without asking permission is considered unethical behavior by privacy advocates.

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 20 Whistle-blowing Whistle-blowing refers to employees reporting their company’s dangerous or illegal acts to regulatory agencies or the press. Whistle-blowing refers to employees reporting their company’s dangerous or illegal acts to regulatory agencies or the press. Some laws exist to protect whistle-blowers but many find themselves unemployed and blacklisted. Some laws exist to protect whistle-blowers but many find themselves unemployed and blacklisted.

NEXT SLIDE Copyright © 2003 Prentice Hall, Inc 21 THE END