COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Introduction to Information Literacy 1 M06: Economic, Legal, and Social Issues for Use of Information See also: Chapter 7, Riedling.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
Social and Ethical Issues Piracy & Copyright. Piracy.
Copyright (c) 2003 by Prentice Hall Computers Tools for an Information Age Chapter 2 Applications Software: Getting the Work Done.
Computers Tools for an Information Age
Intellectual Property
1 Intellectual Property Includes the results of intellectual activities in the arts, sciences, and industry Includes the results of intellectual activities.
VISD Acceptable Use Policy
Jiahuan Liu MGQ B7. Definition A copyright provides legal protection to a written or an artistic work Protected work may include images, symbols, novels,
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
COMP 6005 An Introduction To Computing Session Two: Computer Software Acquiring Software.
ACCB 133 Information Technology and Accounting Applications Lecture 6: Application Software.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Ethics And Computers. What are Ethics? Ethics Ethics are: Principles that guide behavior OR the rules of right and wrong behavior that you should follow.
Computer Ethics for Computer Users
Unit 5- Computer Software.  Identify how hardware & software interact  Explain how a software program works  Describe the difference between application.
Development, Marketing, Licensing, and Distribution.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
Have you been reading your text?. Review Which computer is the most powerful?
PREPARED BY: YOUR FIRST AND LAST NAME CURRENT DATE Ethics for Computer Use.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Read more: piracy/
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
This was my first quiz (practice one) This one is actually the Final Quiz, but it will not work.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
For Computer Use in Business
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Ethics and Computers. Ethics Ethics are principles that guide behavior Community or Society Professional or School setting Individual Standards.
The Legalities of Technicalities By Kellie Birdwell.
Copyright and the Law For more information contact:
Software : Applications Software
APPLICATION SOFTWARE. Application Software  Application softwares are those softwares, which have been developed to solve a particular problem, to perform.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Module 1 – Lesson 6 Ms. Tracy. Bell Ringer What is the typical useful life for a personal computer?
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
Frequently Asked Questions about Copyright and Fair Use Gayle Y. Thieman, Ed.D. Portland State University Graduate School of Education.
Computer Ethics Computer Technology 1 By Jill Einerson.
Computer Technology Timpview High School
By: Ashley, Sabiha, and Roshaan. Software Piracy is the unauthorized copying of software. By buying the software, you become a licensed user rather than.
Copyright and the Law Your Name Goes Here.
Ethics Self Imposed Right and Wrong Behavior Described as:
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Ethical Issues. Introduction to Copyright, Plagiarism Get out your note sheet.
P1 - Software licenses. Different types of license and software Single-user license Multi-user license Proprietary software Freeware Shareware.
Task 1B By Rachael Shepherd. ContentGenerator Software Products -Penalty Shootout -On Target? -Walk the Plank -HoopShoot -Hole in One -En Garde -Interactive.
Chapter 3 Applications Software: Getting the Work Done.
Computer Software Heather Allen. Software Copyright Laws It is illegal for anyone to violate any of the rights provided by the copyright law to the owner.
Computer Safety and Ethics
Computers Are Your Future Twelfth Edition
Copyright law The law is in place to stop members of the pubic to make illegal copies of anyone else work. You wouldn’t able to get a version of software.
حقوق الملكية الفكرية إعداد الطالبة: مها عبدالله
BCT 2.00 Analyze Technology Issues
Information Technology Topic: The internet
Computers Tools for an Information Age
Ethics Computer Technology.
Computers Tools for an Information Age
Computers Tools for an Information Age
Student Name Student Class
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
Presentation transcript:

COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.

Always Use Proper Computer Ethics l Never copy anyone else’s work l Never plagiarize from an outside source l Do not make copies of a friend’s software to use on your personal computer

Single User License This is a license for only one computer.

Computer Piracy Copying someone else’s computer application, program, music, or video and using it as your own is called computer piracy.

Types of software are classified by the type of purchase. Installation beyond these rights is considered software piracy and carries with it penalties.

Type of Software l Freeware l Shareware l Single-User Copy l Lab-Pack l Network Version l Site License

Definitions l Freeware - published as a service to users and is public domain l Shareware - a minimal charge for the right to use the software from the developer or author

More Definitions l Single-User Copy - right to use on one machine l Lab-pack - right to use on number of machines (generally sold in packs of 5 for 5 PCs)

And More Definitions l Network version - right to load on the file server and to be accessed by all computers on the network l Site license - right to the software from the network onto EVERY machine at one site

What are these? l Computer-related vandalism l Computer virus l Piracy l Private data l Public data l Worm

Copyright laws protect programmers. The law says that it is illegal to make or distribute copies of copyrighted material, including software, without authorization.

Do not tamper with another person’s computer or computer work. A hacker is someone who purposefully destroys a computer system by introducing viruses or interferes with the function of the computer.

Types of Software l Open source (GPL) – Example: Firefox Free to use and modify, unlicensed l Freeware : Example - Audacity Music Editor Free to use, licensed l Shareware (Trialware) - Example Pinnacle Video Editor Trial Use, Small Fee to continue, Licensed l Commercial Software - Example MS Office Purchased, Licensed

Assignment l Go to and find three of the following. State the license type, trial duration (if any), and price (if any): l Open source (GPL) Free to use and modify, unlicensed l Freeware : Free to use, licensed l Shareware Trial Use, Small Fee to continue, Licensed l Commercial Software Purchased, Licensed