Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
1 Social / Ethics NCDesk Societal and Ethical Issues.
1 Lesson 15 Evaluating Electronic Information Computer Concepts BASICS 4 th Edition Wells.
Stole it Straight from Wilkes County. Questions from 1.01.
Security, Privacy, and Ethics Online Computer Crimes.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
“Your trusted IP Professionals” 1 BY P. KANDIAH “CREATIVE EXPRESSION” BENEFITING FROM YOUR COPYRIGHT AND USING THE COPYRIGHT WORKS OF OTHERS.
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
Copyright Infringement
Copyright & Fair Use EducatorsStudents For Educators and their Students Presentation by Stephanie Huizinga.
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Viruses & Destructive Programs
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
Copyright Law Fair Use. First let’s see how much you know. 30/copyright/quiz.htmhttp://
Canadian Copyright Act Became law in January 1924 and was amended in 1988 (Phase I) The second phase amendments were completed in 1997 when Bill C-32.
Vonda S. Beavers, Ed.D. Fall Take the quiz…. Jo Cool or Jo Fool?
7/3/08 Created by Mae Thomas Property Rights There can be consequences if you violate others' intellectual property rights. (That is, if you copy something.
Ethics And Computers. What are Ethics? Ethics Ethics are: Principles that guide behavior OR the rules of right and wrong behavior that you should follow.
Intellectual Property Software Piracy. Copying of software in large quantities for resale Illegal copying by businesses and individuals for their own.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Copyright – What you should know! Matthew Mayo and Martha Nixon EDTC 6149.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
Digital Citizenship Project By Allen Naylor Ed 505.
Principles of Arts, Audio/Video Production Copyright Law ©
Digital Citizenship Project Lori Jones Franks University of West Alabama ED 505.
What is Copyright?. Copyright When you create an original piece of work such as a story, poem, drawing or other pieces of artwork, you own the copyright.
Digital Citizenship By: Michael Morgan. Netiquette on Social Media Sites  The rules of etiquette that apply when communicating over computer networks,
COPYRIGHT RULES AND REGULATIONS -- What do they permit?
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Copyright: What Every Teacher and Student Should Know Katie Amend Casey Moffett.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
1.The Nature, Impact, and Issue of Information Technology 1.5Basic Legal Framework relating to the Use of IT.
Computer Skills and Applications Computer Security.
By Sonya Gipson Spring Copyright is a law created to protect works of authors and artists. Exclusive rights are given to the creators (author or.
Objective: Students will be able to: identify the legal and ethical considerations involved in using the creative work of others and understand an individual’s.
By: Mallory Thornton.  Social code of website  Cyber term  Derived from network and etiquette.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Cyber Security By:Jerusa Miller July 7, What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet.
1. What is Copyright? What is Copyright 2. What is Copyrighted? What is Copyrighted 3. How does it Work? How does it Work? 4. What are the Fair use Exceptions?Exceptions?
Computer Technology Timpview High School
Ethical and Legal Technology Use By: Ashley Zickefoose.
Creative Commons License. What is Creative Commons? Straight from the horse’s mouth: A video from creativecommons.orgvideo.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Ethical Issues. Introduction to Copyright, Plagiarism Get out your note sheet.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
A GUIDE TO COPYRIGHT & PLAGIARISM Key Terms. ATTRIBUTION Identifying the source of a work. For example, a Creative Commons "BY" or attribution license.
Copyright Laws Laws designed to protect intellectual property rights.
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
Task 1B By Rachael Shepherd. ContentGenerator Software Products -Penalty Shootout -On Target? -Walk the Plank -HoopShoot -Hole in One -En Garde -Interactive.
Copyright and Fair Use Guidelines Presented by Misty Bellard.
Computer Software Heather Allen. Software Copyright Laws It is illegal for anyone to violate any of the rights provided by the copyright law to the owner.
Computer Safety and Ethics
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Unit A: Exploring Computer Systems
Related to data, hardware, and software
Copyright.
Lesson 2- Ethical Use of Digital Resources
BCT 2.00 Analyze Technology Issues
BROADCAST LAW COPYRIGHT TERMS.
Copyright & Fair Use What You Need to Know!.
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
Presentation transcript:

Ethics and Computer Invaders

What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately

Copyright Exclusive right of the owner to reproduce or distribute copies of their work U.S. Copyright Office ©

What can be copyrighted? Any work of art created by you! The owner of the work is the creator of the work. US Copyright Office: v/ Games Software Music, Lyrics Photographs Art work Drawings Poems, Magazines Essays, Books Dance Choreography

Site License Grants the user permission to make a certain number of copies to use on multiple machines

Piracy The illegal copying and distributing of software Difficult to prevent, because it is so easy to do

Fair Use Guidelines Allows the public to use portions of copyrighted work for certain purposes: 1.Education 2.News Reporting 3.Parody 4.Critical Comment Guidelines: –You can’t change the original content –Can only use a portion – 10% or 30 seconds.

Spyware and Adware Computer programs that monitor the browsing habits of users. They record the web sites you visit and the software you use. Side Effects: 1. Unwanted advertising onto your computer screen. 2. Internet freezing 3. Computer system slows down Copyright News Videos – 20/

Software Usage Commercial software 1.Owned or copyrighted by individuals or businesses 2.Purchased in a store 3.Permission needed to copy Shareware 1.Copyrighted 2.Available through mail order or internet 3.Distributed free of charge on a trial basis 4.Small fee required, usually the program is not expensive

Software Usage Continued… Freeware 1.Owner often retains rights 2.Cannot pass around copies 3.Given away free of charge Public-Domain Software 1.Not copyrighted 2.Free to copy and distribute 3.Often educational or government document.

Computer Invaders Trojan Horse Hacker

Trojan Horse Type of virus that gains access to your system disguised as something good Virus - purposefully programming destructive code to cause damage –Benign - like a cold, but no permanent harm –Malignant - like cancer, harmful

‘ Worm Virus’ - destructive code that bores its way through files, copying itself over and over again ‘Bomb Virus’ - destructive code set to go off at a certain time or date, or when a certain action occurs

Hacker Person who secretly gains access to others’ computer files without their permission

Virus Protection Virus Disinfectant Program –Gets rid of a virus Anti-Viral Program –Prevents viruses –Most expensive