COMPUTER ETHICS Do you know the difference between right and wrong?

Slides:



Advertisements
Similar presentations
Hart District Acceptable Use Policy Acceptable Use Policy.
Advertisements

Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Ethics for Teacher Candidates Teresa Chen Department of Advanced Studies in Education and Counseling California State University, Long Beach.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
Understanding Business Ethics
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Computer ethics.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Digital Ethics Scenarios From: johnson.com/ethics/ johnson.com/ethics/ Doug Johnson, Director of Media and Technology.
Computer Ethics for Computer Users
Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
ARE THE FOLLOWING SITUATIONS ETHICAL?. Your new computer comes with Microsoft Office 2003 already installed on it. Included in your box of software is.
Cyberspace Rules for Mrs. Johnson’s Kindergarten Class These are the rules we will use to learn, play, and have fun on the internet.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Ethics, Computing, and the Internet
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Computer Ethics CSCI 101 Kara kelly. Ethics Ethics can be defined as a discipline in which one attempts to identify, organize, analyze, and justify human.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Ethics Scenarios Ms. Lindsay. Ethics Scenario 1  Ben’s Game:  Jerry borrows Ben’s game disks for Monster Truck Rally II and installs them on his home.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
Responsible & Ethical Use of Technology Oak Valley Middle School Adapted from: Johnson, D. (1999). Teaching Students Right from Wrong in the.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
1. Fake But Funny Bill has created an 'alternative' BHS Web site. His site satirizes school activities, contains doctored photos of staff members, and.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
The History of Computers Hardware, Software, Programs, Computers Safety Tips, and Computer Ethics.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ETHICS IN USING COMPUTER
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
Ethical Uses of Computer
Unit 3- Introduction to Computer Ethics
Ethics & Privacy CSCI 101.
Presentation transcript:

COMPUTER ETHICS Do you know the difference between right and wrong?

ETHICS A practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct

SITUATION 1 A student locates a story, recopies it in his own writing, and submits it to the teacher as his own work. RIGHT?WRONG?

WRONG!!!!!!!

SITUATION 2 A students uses the copy and paste commands to place large parts of an electronic encyclopedia article into an assigned paper. She turns the paper in as her own work. RIGHT?WRONG?

WRONG!!!!!!!

SITUATION 3 A student steals a book from a local store. She says the only reason she stole it was that she did not have the money to purchase it. RIGHT?WRONG?

WRONG!!!!!!!

SITUATION 4 A student makes copy of a software program borrowed from another student to use on his computer at home. RIGHT?WRONG?

WRONG!!!!!!!

SITUATION 5 A boy finds a magazine with sexually explicit photographs and brings it to school. He shows its contents to others in class who become upset. RIGHT?WRONG?

SITUATION 6 A girl downloads a sexually explicit picture from a site on the Internet on a computer in the school library. Her classmates can easily view the computer screen. RIGHT?WRONG?

WRONG!!!!!!!

SITUATION 7 A student steals a set of keys and uses them to gain access to the school office where she changes her grades and views and grades of other students. RIGHT?WRONG?

WRONG!!!!!!!

SITUATION 8 A student finds the teacher’s password to the school’s information system and uses it to change his grades and view the grades of other students. RIGHT?WRONG?

WRONG!!!!!!!

ACTIONS THAT ARE ETHICAL include: Promote the general health of society Maintain or increase individual rights and freedoms Protect individuals from harm Treat all human beings as having value and treat them with respect Uphold religious, social, cultural and government laws

THE 3 Ps of TECHNOLOGY ETHICS Privacy I will protect my privacy and respect the privacy of others. Property I will protect my property and respect the property of others a(P)propriate use I will use my technology in constructive ways and in ways which do not break the rules of my family, church, school or government.

VIOLATIONS OF COMPUTER ETHICS Software Bootlegging A. Illegal B. No Support or Updates C. Obtaining viruses D. Stealing from Programmers SOFTWARE ACT OF 1980 All software is copyrighted User can make one backup copy Violations can result in court awards up to $100,000

VIOLATIONS OF COMPUTER ETHICS Viruses Programs that are written to make your computer sick

VIOLATIONS OF COMPUTER ETHICS Hacker A person who worms his/her way into another’s computer system

VIOLATIONS OF COMPUTER ETHICS Using inappropriately is not protected or private. If you are on “company time,” it IS ethical for a supervisor to look at your . Words/Message mistakes produce “quick to anger” problems Spamming

SITUATION A The principal suspects Paul of using his school account to send offensive message to other students. He asks the network manager to give him copies of Paul’s . ETHICAL? UNETHICAL?

ETHICAL!!

SITUATION B Jerry borrows Ben’s game disks for Monster Truck Rally and installs them on his home computer. He says he will erase the game if he does not like it or will buy the game for himself if he likes it. ETHICAL? UNETHICAL?

UNETHICAL!!

SITUATION C Jack’s class has been using the digital camera to take pictures for the school yearbook. Jack has discovered that he can use a computer program to change the photographs. He has used the program to make himself look like the tallest boy in the class and to blacken out the front tooth of a girl he doesn’t like. ETHICAL? UNETHICAL?

UNETHICAL!!

SITUATION D Betty downloads a solitaire card game from the Internet that is “shareware.” It can legally be used for 30 days and then Betty must delete it from her computer or send its author a fee. ETHICAL? UNETHICAL?

ETHICAL!!

SITUATION E John fills out a survey form on a computer game Web page. In the following weeks, he receives several advertisements in the mail as well as dozens of messages about new computer games. ETHICAL? UNETHICAL?

UNETHICAL!!

SITUATION F Just for fun, 13 year-old Alice tells the other people on her electronic mailing list that she is 20 years old and a nursing student. Others have begun ing her health-related questions. ETHICAL? UNETHICAL?

UNETHICAL!!

TEN COMMANDMENTS 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans.