Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

U.N. Human Rights Council Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
PowerPoint Presentation Possible Topics Related to General Education Area VI Computer Science Appendix B.
Challenges to freedom of expression The right to freedom of expression is a “foundation right” in society. It protects the right to: -Express ourselves.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
JCSD-aw Citizenship in an e-World Johnston Community School District.
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
Public Information Online. Timothy WhitneyCaroline Aaron.
September 2001Chapter 16: Public policy: Regulation1 Chapter 16. Public Policy: Regulation  Questions Answered in this Chapter: –How is the Internet currently.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
J. Chansavang. Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
 Provide a basis for determining who in the organization should control access to a particular item of information.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Computer ethics.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
How Well Do You Know Copyright? Connie Murphy Hylton High School Library 2008.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
How can you protect yourself from online identity theft?
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Mrs. Jefferson Business Information Management I.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Ethical Issue Computer Ethics. Why do we have to consider computer ethics? The advancements of computer/internet have significant influence on our lives.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
CYBER CRIME.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Digital Citizenship Created By: Kelli Stinson June 2011.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
Security and Ethics Privacy Employment Health Crime Working
Chapter 9: The Internet and World Wide Web Two contrasting views: Media Critic Marshall McCLuhan: the Internet would help create a “global village” of.
Jeopardy: Digital Citizenship Please use presentation mode!
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Julie Latham Digital Citizenship: An Informational Guide.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Privacy, Security and Ethics
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
COMPUTER ETHICS AND LEGAL ISSUES
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
Issues for Computer Users, Electronic Devices, Computer and Safety.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Privacy and the Law.
Add video notes to lecture
Ethical, Social, and Political Issues in E-commerce
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Learning Area 1 Information And Communication Technology and Society
BCT 2.00 Analyze Technology Issues
Presentation transcript:

Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone can voice their opinions, share their ideas, demonstrate new technologies, publish software applications, and connect with others.

QUESTIONS Why is there a need for cyber ethics? How can learning cyber ethics change the way students use the internet? What influences lead an individual to perform unethical acts or participate in cybercrime activities?  How can parents and educators know what students are doing in the internet?

CYBER ETHICS

Definition is a code of behavior on the Internet. study of ethics pertaining to computer networks, encompassing user behavior and what networked computers are programmed to do, and how this affects individuals and society.

Cyber Ethical Questions Include "Is it OK to display personal information about others on the Internet (such as their online status or their present location via GPS)?” "Who owns digital data (such as music, movies, books, web pages, etc.) and what should users be allowed to do with it?"

Cyber Ethical Questions "Is access to the Internet a basic right that everyone should have?"

CYBER ISSUES

PRIVACY Warren and Brandeis defined privacy as "central to dignity and individuality and personhood. Privacy is also indispensable to a sense of autonomy. there should be an area of an individual's life that is totally under his or her control, an area that is free from outside intrusion.

PRIVACY It has three elements: secrecy (protection of personalized information from being freely distributed), anonymity (protection from undesired attention), and solitude (lack of physical proximity of an individual to others)" (Gavison, 1984)

ISSUES Credit card information, social security numbers, phone numbers, mothers' maiden names, addresses and phone numbers freely collected and shared over the internet may lead to a loss of Privacy.

ISSUES Fraud and impersonation Identity theft  typically in order to access resources or obtain credit and other benefits in that person's name

RECOMMENDATIONS Exclude sensitive unique identifiers from database records such as social security numbers, birth dates, hometown and mothers' maiden names. Exclude phone numbers that are normally unlisted.

Private Data Collection Data warehouses are used today to collect and store huge amounts of personal data and consumer transactions.

ISSUES Personal information can be gathered from corporate websites and social networking sites to initiate a reverse lookup. SOLUTION: LifeLock and JPMorgan Chase have begun to capitalize on selling identity theft protection insurance.

PROPERTY One philosophy of the internet is centered around the freedom of information.

ISSUES The controversy over ownership occurs when the property of information is infringed upon or uncertain.

Intellectual Property Rights  Rights given to persons over the creations of their minds. They usually give the creator an exclusive right over the use of his/her creation for a certain period of time.

ISSUES The emergence of compression technology like NAPSTER and communications protocol like BITTORRENT. Supporters of restrictions on file sharing argue that we must protect the income of our artists and other people who work to create our media.

ISSUES Software Ownership closed source software distributed under restrictive licenses or for free and open source software (Freeman & Peace, 2004).

SECURITY  Establish rules and measures to use against attacks over the Internet.

ISSUES Is it better to protect the common good of the community or rather should we safeguard the rights of the individual? identity theft, cyber crimes and computer hacking.

Accessibility, Censorship and Filtering small to large scales, whether it be a company restricting their employees' access to cyberspace by blocking certain websites or on a larger scale where a government creates large firewalls which censor and filter access to certain information available online frequently from outside their country to their citizens and anyone within their borders

EXAMPLE Golden Shield Project, also referred to as the Great Firewall of China, a censorship and surveillance project set up and operated by the People's Republic of China.

Freedom of Information the freedom to seek, obtain and impart information brings up the question of who or what, has the jurisdiction in cyberspace. is commonly subject to limitations dependant upon the country, society and culture concerned.

GAMBLING Due to its controversy gambling is either banned or heavily controlled on local or national levels.

ISSUE Between these extremes lies a multitude of opinions on what types of gambling the government should permit and where it should be allowed to take place.

ASSIGNMENT Practice using Cyber Ethics in and out of the school premises.