Unethical use of Computers and Networks

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Crimes Against Property. Arson  Willful and malicious burning of another person’s property.  It’s a crime to burn a building, even by the owner.
Pirated Software: A Global Epidemic Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque, NM.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
JCSD-aw Citizenship in an e-World Johnston Community School District.
The Anti-Piracy Campaign: The Drag Behind Their Efforts Jamal Haskin.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Security, Privacy, and Ethics Online Computer Crimes.
Ethical Hacking by Shivam.
Ethics of Copyright Infringement Thomas H. Mak CS 301.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
By: Amba Kasongo Section: 006 INTERNET CRIME: DISAGREEING WITH IDENTITY THEFT AND ONLINE MEDIA PIRACY.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Identity theft By: Blake D uncan.
Cyber Crimes.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Crime & Malpractice AS Module Heathcote Ch. 10.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Chapter 10: Crimes Against Property
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Crimes Against Property Two subgroups: 1.Crimes in which property is destroyed 2.Crimes in which the property is stolen or taken against the will of the.
Topic 5: Basic Security.
By: Asfa Khan and Huda Mukhtar
Web Page Design and Development I Standards Standard A Safety and Ethics – 3 Identify potential abuse and unethical uses of computers and networks.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Identity Theft How it happens and how to avoid it.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Computer crimes.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
By: Ashley, Sabiha, and Roshaan. Software Piracy is the unauthorized copying of software. By buying the software, you become a licensed user rather than.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Crimes Against Property Chapter 10. Arson and Vandalism Malicious burning of property Crime whether you own building or not May lead to other more, serious.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Computer Safety and Ethics
Add video notes to lecture
The Disadvantages of ICT
A Project on CYBER SECURITY
Chapter 11 crime and security in the networked economy
When you get caught for Identity Theft
Five Unethical Uses of Computers
BCT 2.00 Analyze Technology Issues
Copyright, Designs and Patents Act 1988
Social Issues in Computing
Protecting Your Identity
Faculty of Science IT Department By Raz Dara MA.
Social Issues in Computing
Ethical Use of Computers
LO1 - Know about aspects of cyber security
Presentation transcript:

Unethical use of Computers and Networks Computers can be used either as constructive tools or destructive weapons. Unethical computer use is a violation of trust that can damage finances and reputations, and even lead to serious consequences, such as jail time. At the end of the day, when computers are used in unethical ways, it is people who are harmed.

Identity Theft and Fraud Identity theft and fraud are characterized by criminal use of the victim's personal information, such as a Social Security number, to assume the victim's identity. Identity thieves use the stolen personal information to create fake identifications, obtain credit cards or access other resources and benefits. The criminals may install malicious software to gain access to the victim's computer files and activity, or target commercial and government computer systems to steal the personal information of hundreds or thousands of potential victims at once.

Digital Piracy The Internet is often called the "Information Superhighway" because it allows people to find, share, and distribute information quickly and easily using computers. However, not all that information is ethical or legal. Distributing and accessing illegal copies of copyright-protected digital books, movies, music, artwork, software, and other content is a form of copyright infringement, commonly referred to as "piracy." When digital products and works are pirated, the content creators lose money they would have otherwise earned had that work been legally purchased or licensed.

Financial Theft and Fraud Thieves and embezzlers can use computers to steal money from individuals or businesses. A thief can gain online access to an individual's bank account using a victim's stolen password, PIN or personal information. Using stolen credit card information, a thief can order goods online and later sell those goods for cash. An employee with access to business accounting systems may falsify records or manipulate the systems to embezzle funds.

Information Theft Spies, criminals, and snoops can steal private or classified information by gaining unauthorized access to the victim's computer or inappropriately using computers to which they been given access. Their goals may be to leak or sell classified government documents, use stolen personal information to extort a victim, gain an advantage over a competitor, or simply pry into the private life of a family member or coworker. Privacy invasion, spying and information theft may be punishable under a number of laws designed to protect individuals, businesses, or national security. Employees caught snooping or stealing data may lose their jobs even if their acts were technically legal.

Disruption to Computers or Services Disrupting a computer or network may involve using malicious software to make a computer unusable or using several computers to block access to a website, network or other resource. These types of attacks may be done to extort money from the victim, make a political statement or force the victim into a specific action. Sometimes, the attackers commit these acts simply for entertainment.

Consequences of Illegal, Social, and Unethical uses of Information Technologies Types of Penalties include (but are not limited to): Fail a test/paper/project Suspension from school Expulsion from school Terminated from Employment Sued for damages Fines from local, state, or federal authorities Jail Time