Ethics and Online Issues

Slides:



Advertisements
Similar presentations
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Using the computer appropriately.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Introduction to Information Literacy 1 M06: Economic, Legal, and Social Issues for Use of Information See also: Chapter 7, Riedling.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
Computer Technology Day 18
Security, Privacy, and Ethics Online Computer Crimes.
Social and Ethical Issues Piracy & Copyright. Piracy.
Ethics and Online Issues
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
Canadian Copyright Act Became law in January 1924 and was amended in 1988 (Phase I) The second phase amendments were completed in 1997 when Bill C-32.
Vonda S. Beavers, Ed.D. Fall Take the quiz…. Jo Cool or Jo Fool?
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Licenses A Legal Necessity Copyright © 2015 – Curt Hill.
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
Ethics And Computers. What are Ethics? Ethics Ethics are: Principles that guide behavior OR the rules of right and wrong behavior that you should follow.
Computer Ethics for Computer Users
Computer Ethics, Privacy and Security. Computer Ethics Computers are involved to some extent in almost every aspect of our lives They often perform life-critical.
PREPARED BY: YOUR FIRST AND LAST NAME CURRENT DATE Ethics for Computer Use.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Professional Ethics Its not all about right & wrong.
Digital Citizenship Created By: Kelli Stinson June 2011.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
For Computer Use in Business
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Intellectual Property Basics
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computer Ethics Computer Technology 1 By Jill Einerson.
Computer Technology Timpview High School
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
Computer Technology RULES, LAWS, ETHICS By Megan Rees.
Ethics Self Imposed Right and Wrong Behavior Described as:
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Ethical Issues. Introduction to Copyright, Plagiarism Get out your note sheet.
A GUIDE TO COPYRIGHT & PLAGIARISM Key Terms. ATTRIBUTION Identifying the source of a work. For example, a Creative Commons "BY" or attribution license.
Computer Safety and Ethics
Computers Are Your Future Twelfth Edition
Using the computer appropriately
Ethical Issues When Using Computers
DIGITAL CITIZENSHIP What You Should Know!.
Using the computer appropriately.
Ethical Issues When Using Computers
Copyright.
Lesson 2- Ethical Use of Digital Resources
BCT 2.00 Analyze Technology Issues
Ethics and Online Issues
Using the computer appropriately.
Using the computer appropriately.
Copyright & Fair Use What You Need to Know!.
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
Presentation transcript:

Ethics and Online Issues Using the computer and online resources appropriately.

What are your responsibilities? What are ETHICS? What are your responsibilities? What are the rules? During this presentation you will learn about ethical issues concerning computer usage. Don’t get stuck doing something illegal with computers and/or online resources.

Don’t get hung up on these computer issues. Security Information Privacy Ethics

Security Computer Viruses Executable files that insert intrusive programs among other files Infect files on your computer Cause various kinds of damage to computer data

Security Unauthorized Access and Use Breaking into computer systems without proper access rights (Hacking) How would you feel about someone hacking into your computer? Movie example – The Net

Laws about vandalism Attempts to harm or destroy data or hardware of another user, agency, or network can be prosecuted to the full extent of the law.

Security Theft Hardware theft: Laptops stolen from cars Software and other theft: Downloading files from the Internet without permission (music, graphics, software) Piracy: Copying and installing computer programs (even for personal use) without permission

Security Computer Failures Crashes are an annoying fact of life when owning computers. What usually solves computer errors? REBOOTING Save often and backup files frequently to prevent loss of information Store backups offsite

Information Privacy

Information Privacy Beware of any site that asks for your Social Security #. Beware of any site that asks for specific personal information when you are not on a secure link.

Information Privacy Watchdog organizations and new laws governing business activity online may help protect you from certain abuses of Internet communications, but the best protection is your own good sense.” (Preparing for IC3 Certification, DDC)

Information Privacy Many items of information about you that you might not want generally known are defined as public and can be published without your permission. Some of these are your full name, your home address, your phone number, debts you owe, court judgments against you, courses you’ve taken, and police actions relating to you. Generally speaking, people who know where to look can find out a lot about you.” (USU Ethics Module)

Information Privacy Employers have the right to monitor your work and use of the computer at your place of employment. Time spent playing computer games or surfing the Internet during work hours is costly to a business and could be cause for reprimand or dismissal (firing).

Ethics

Standards of right and wrong Principles that guide your behavior What are ETHICS? Standards of right and wrong Principles that guide your behavior Don’t get stuck doing something illegal with your computer or online resources.

Code of Conduct A set of rules to guide behavior and decisions. A code of conduct can outline Professional behavior Doctor, Lawyer, Military, etc.

Ethics Information Accuracy Not everything that you read on the Internet is true!!! Make sure information is accurate before putting it on the Internet. No one polices the validity, accuracy, and reliability of the information on the Net.

Ethics Information Accuracy Plagiarism: Using another person’s ideas and presenting them as your own. Be sure to give credit where credit is due. Cite borrowed material with textual citations. Use material in a way that preserves the meaning and context intended by the author.

Ethics Acceptable Use Policy (AUP) Most educational institutions have a document that governs the use of the computers and networks owned by the institution. This document, commonly called an Acceptable Use Policy or AUP, outlines what types of uses are acceptable and which are prohibited.” (USU Ethics Module)

Ethics Internet Security and Privacy Company’s responsibilities: To protect information about business operations To protect employee and customer information

Ethics Objectionable Materials Deciding what to censor and for whom has been a very controversial subject. Companies may have legal liability if an employee performs certain types of activities online from a company computer.

Laws about nuisance or harassment It doesn’t matter if your intention was to be funny, or friendly, or something else. If the person you contact through the Internet is uncomfortable, STOP! Or it’s illegal!!!

opyright and Licensing Laws The right to control how your art, literature or other work is used. Intent: to advance the progress of knowledge by giving the creator an economic incentive to create new works. It has to be tangible to be copyrighted. A document may be copyrighted even if it doesn’t state that it is.

Fair Use Laws User must weight four factors: The purpose and character of the use The amount and substantiality of the portion used. The effect on the potential market for the copyrighted work. The nature of the copyrighted work

Copyright Issues Pertaining to Software Four Software Copyright Categories: Public Domain Freeware Shareware Copyrighted or All Rights Reserved

What is Copyright? Rights possessed by the author of a work. Just because something is on the Internet does not give anyone who views it the right to take ownership of it.

Public Domain Free software Can be used without restriction Not copyrighted or copyright has expired Rare Unreliable Poor quality Virus-laden No cost? That may be exactly how much this software is worth.

Freeware? Copyrighted software that is given away free by the author. Although it is available for free, the author retains the copyright, which means that you cannot do anything with it that is not expressly allowed by the author. Usually, the author allows people to use the software, but not sell it. Some freeware is “really good stuff.” Pegasus Mail Eudora Light Internet Explorer Netscape

Shareware Copyrighted software Distributed on the honor system Can be examined free of charge for a trial period and then you must pay for the software

Copyright or All Rights Reserved Software that is purchased Must abide by the restrictions of the license agreement

“Wonderful stuff!” Word Excel PowerPoint Access Illustrator MicroType QuarkXPress Fireworks Dreamweaver Vision Windows Quick Books ClickArt Freehand Flash In Design Quattro Pro Paint MP3 Point and Click PhotoShop Age of Empires WordPerfect Anti-Virus Camedia

Software License Agreement Excerpts from QuarkXPress software license agreement The software and accompanying documentation may not be transmitted electronically, including over the Internet, rented, loaned, leased, sold, distributed, made available, directly or indirectly, for USE by any other person or entity not covered by this License Agreement. Customers who have purchased a Single-User license may INSTALL and USE the SOFTWARE on one computer. IF YOU DO NOT ACCEPT THIS LICENSE AGREEMENT, DO NOT OPEN THE ENCLOSED PACKET OR BREAK THE SEAL ON THE CD-ROM The only right granted to the Customer is the right to USE the SOFTWARE and accompanying documentation in accordance with this License Agreement. The customer may not modify, translate, copy, reproduce, reverse engineer, disassemble, decompile, or otherwise derive source code from, the SOFTWARE or accompanying documentation, or use it as a basis for the preparation of other software programs

Even if you can. Even if no one will ever find out. Follow the license agreement or you will be breaking the law.

References Barquin, Ramon C. “In Pursuit of a Ten Commandments of Computer Ethics.” Computer Ethics Institute. Brookings University. www.brook.edu/. 1992. Bower, Kevin W. Ethics and Computing. IEEE Computer Society Press, 1996. Ethics Presentation. Computer Technology Committee. Davis School District. 2003. Hilton, Dr. Thomas, et. Al. “Ethics Teaching Module.” Utah State University. http://conlit.usu.edu/ethics modules.html. 23 October 2002. Simmons, Toni. Ethics Presentation. Utah State Office of Education. www.uen.org/lessonplan. 2003. Wray, Paul. Preparing for IC3 Certification. DDC Publishing Company. 2003.

Click on the Hand graphic below to find the answers for the Ten Commandments of Computer Ethics Study Guide. Use computer and online resources appropriately.

The END