© Paradigm Publishing, Inc. 14-1 Chapter 14 Computer Ethics Chapter 14 Computer Ethics.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Hart District Acceptable Use Policy Acceptable Use Policy.
POSSIBLE THREATS TO DATA
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Legal and Ethical Issues: Privacy and Security Chapter Five.
Chapter 14 Computer Ethics. Ethics vs. Laws Laws = External rules established by society Ethics = Internal or unspoken rules we use to determine the right.
© Paradigm Publishing Inc Chapter 14 Computer Ethics.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Boyertown Area School District Acceptable Use Policy.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
KUSD Student Acceptable Use Policy School Board Policy #6633.
INTERNET and CODE OF CONDUCT
E-Commerce: Regulatory, Ethical, and Social Environments
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Chapter 11 Security and Privacy: Computers and the Internet.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Cyber Crimes.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Electronic Use Policies.   Social Media  Internet.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Donette Mullinix ED 505 UWA Clipart:
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Security Issues and Ethics in Education
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Digital Citizenship Created By: Kelli Stinson June 2011.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Digital Citizenship Project By Allen Naylor Ed 505.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Computer Ethics Chapter 14 – Computers: Understanding Technology.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Topic 5: Basic Security.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Digital Citizenship Jacinta Little ED 505. Table of Contents Definition of Digital Citizenship………………………… Slides 3-4 Social networking…………………………………………
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Legal Issues Now that we have looked at ethics, some of these issues are also dealt by the law. We will consider laws in the following catagories: Intellectual.
Privacy, Security and Ethics
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© Paradigm Publishing Inc Chapter 14 Computer Ethics.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Computer Programming I
Presentation transcript:

© Paradigm Publishing, Inc Chapter 14 Computer Ethics Chapter 14 Computer Ethics

© Paradigm Publishing, Inc Presentation Overview The Role of Ethics Privacy Protection Issues Property Protection Issues Personal and Social Issues Defining Software Companies’ ResponsibilitiesDefining Software Companies’ Responsibilities Developing Personal Ethical Guidelines

© Paradigm Publishing, Inc The Role of Ethics What are ethics? –Ethics are the rules we use to determine the right and wrong things to do in our lives. –Normative ethics involves determining a norm of ethical rule that underlies ethical behavior. –Applied ethics refers to the application of normative ethical beliefs to real-life issues. –Computer ethics deals with ethical issues related to computers.

© Paradigm Publishing, Inc The Role of Ethics The Source of Ethics –In moral realism, ethical principles are thought to have objective foundations; that is, they are not based on subjective human reasoning. –In moral relativism (also known as situational ethics), ethical issues are thought to be subjective.

© Paradigm Publishing, Inc Privacy Protection Issues Public Information Availability –Database companies comb personal information such as birth records and marriage licenses and provide this information to anyone with a credit card and access to the Web. –Other personal information such as salaries, and controversial information such as criminal records and sex offender information, also appears on the Internet.

© Paradigm Publishing, Inc Privacy Protection Issues Threats to Privacy from Interception of Wireless Communications –Wireless communications devices are extremely vulnerable to interception by others. –Traditional methods of computer security don’t work well for wireless devices. Wireless devices often don’t require authentication to ensure the identity of the user and the device. Encryption technology doesn’t work well because of the devices’ limited battery power and memory.

© Paradigm Publishing, Inc Privacy Protection Issues Commercial Threats to Privacy Cookies A cookie is a small data file created and placed on a computer’s hard drive by a Web site. They are meant for the convenience of Internet users and can remember user IDs and passwords. They can also be used to record user interests and preferences, which can then be used by companies to target advertisements.

© Paradigm Publishing, Inc Privacy Protection Issues Commercial Threats to Privacy Global Unique Identifiers A global unique identifier (GUID) is an identification number that can be coded into both hardware and software. The use of GUIDs would eliminate any anonymity Internet users now enjoy. With GUIDs, it would always be possible to track down the originators of unpopular or controversial messages—a severe blow to Internet privacy.

© Paradigm Publishing, Inc Privacy Protection Issues Commercial Threats to Privacy Location Tracking Most cell phones are equipped with Global Positioning System (GPS) chips that can pinpoint their locations. GPS chips are useful as navigational aids and monitoring devices, and can promote safety. GPS chips and other location tracking technology can also be used to target advertisements and to figure out where any person is at any given time, which can encroach on the right to privacy.

© Paradigm Publishing, Inc Privacy Protection Issues Protection from Commercial Threats to Privacy Industry Self-Regulation A privacy statement promises that an e-tailer will protect the confidentiality of any information a customer reveals. –Third-party organizations like the BBBOnLine lend greater credibility to privacy statements. New software lets users designate that files sent to others have one-time-only viewing rights, cannot be copied, or can only be viewed for a few hours’ time.

© Paradigm Publishing, Inc Privacy Protection Issues Major Privacy Protection Laws

© Paradigm Publishing, Inc Privacy Protection Issues Major Privacy Protection Laws (continued)

© Paradigm Publishing, Inc Privacy Protection Issues Government Threats to Privacy Eavesdropping To better monitor messages, the FBI developed a series of Internet wiretap programs named Omnivore, Carnivore, and DCS1000. The USA PATRIOT Act allows law enforcement agencies to eavesdrop on private telephone messages and to intercept and read messages. Some fear that innocent messages will be misinterpreted, resulting in criminal charges.

© Paradigm Publishing, Inc Privacy Protection Issues Government Threats to Privacy Encryption Restrictions Encryption software makes it harder for the government to monitor messages. The FBI has warned that its role in protecting the nation will be negatively affected by this. The NSA restricted the use of encryption programs for many years, but control was loosened due to commercial interests in protecting consumer data. Given the rapid advances in technology, government control of encryption probably will not be effective.

© Paradigm Publishing, Inc Privacy Protection Issues Workplace Threats to Privacy Software programs allow employers to monitor employees by Tracking the number and type of keystrokes employees enter on their keyboards Reading messages sent and received Capturing what is on an employee’s computer screen at a given time

© Paradigm Publishing, Inc Privacy Protection Issues Protection from Workplace Threats to Privacy –If a company has pledged to respect any aspect of employee privacy, it must keep that pledge. –Privacy advocates and the American Civil Liberties Union (ACLU) question the need to monitor employees without warning and without limit.

© Paradigm Publishing, Inc Privacy Protection Issues Fair Electronic Monitoring Policy for Employers (proposed by the ACLU)

© Paradigm Publishing, Inc Property Protection Issues Intellectual Property –Intellectual property includes anything that can be created by the human mind. –A patent awards ownership of an idea or invention to its creator for a fixed number of years. This allows the inventor the right to charge others for the use of the invention. –A copyright protects artistic and literary endeavors.

© Paradigm Publishing, Inc Property Protection Issues Intellectual Property The World Intellectual Property Organization (WIPO) is a specialized agency of the United Nations dealing with intellectual property rights. The WIPO administers international treaties dealing with intellectual property. The WIPO divides intellectual property into two categories: industrial property and copyright.

© Paradigm Publishing, Inc Property Protection Issues WIPO Intellectual Property Classifications

© Paradigm Publishing, Inc Property Protection Issues Fair Use Under Fair Use law, it is permissible to use another person’s material without permission as long as this use Is acknowledged Is for noncommercial purposes Involves only limited excerpts of protected material

© Paradigm Publishing, Inc Property Protection Issues Fair Use and the Digital Millennium Copyright Act The Digital Millennium Copyright Act (DMCA) brings U.S. copyright law in line with WIPO treaties to which the U.S. is a signatory. It prohibits the circumventing of copyright protection systems. It clarifies the concept of Fair Use for digital works. It deals with the issue of an ISP’s liability for hosting copyrighted materials.

© Paradigm Publishing, Inc Property Protection Issues Damage Due to Hacking, Phishing, and Viruses –Identity theft is theft of personal data which is then used to assume that person’s identity and make purchases in his or her name. –Phishing uses sophisticated tricks to “fish” for users’ financial information and passwords. –Viruses cause damage to a user’s computer or the software running on it.

© Paradigm Publishing, Inc Property Protection Issues Protection from Hacking, Phishing, and Viruses Consumers can protect themselves by Dealing only with merchants who encrypt credit card numbers and other private data Never opening s from unknown sources Installing antivirus programs to destroy viruses Installing firewall software to protect against Internet-connected computer hackers

© Paradigm Publishing, Inc Personal and Social Issues Gambling Online –Online gambling is attracting a growing number of gamblers, including teenagers. –The Internet gambling industry is based almost entirely outside the United States. –The U.S. House of Representatives passed legislation allowing authorities to work with Internet providers to block access to online gambling and prevent users from using credit cards to gamble.

© Paradigm Publishing, Inc Personal and Social Issues Protecting Freedom of Speech –Hate speech sites incite hatred against people of certain races, religions, or beliefs. They may also post dangerous material such as information for making drugs or bombs. –Cyberbullying is sending harassing texts, e- mail messages, or photos with the purpose of harming another person’s reputation. –Pornography sites contain sexually explicit material or script deemed harmful by society.

© Paradigm Publishing, Inc Personal and Social Issues Protecting Against Unwanted Material –The Child Protection Pornography Prevention Act of 1996 enacts harsh penalties for those distributing or possessing child pornography. –The Children’s Internet Protection Act (CIPA) requires public schools and libraries to install Internet filtering software on their computers.

© Paradigm Publishing, Inc Personal and Social Issues Protecting Against Unwanted Material –A filtering program can prevent access to sites, keep track of sites visited, limit connection time, etc. Certain organizations provide schools with guidelines for evaluating Internet filtering programs. –The Consortium for School Networking recommends that every school adopt an acceptable use policy to guide Internet use.

© Paradigm Publishing, Inc Personal and Social Issues Bridging the Digital Divide –The gap between those who have access to computers and the Internet and those who do not has been called the digital divide. –Only 5 percent of the population in developing countries has Internet access.

© Paradigm Publishing, Inc Personal and Social Issues Demographics of U.S. Internet Users According a 2008 report by the Pew Internet & American Life Project, English-speaking Hispanic Americans lead the U.S. in Internet usage, with 80 percent online. Caucasian Americans – 75% African Americans – 59% Spanish-dominant Hispanics – 32%

© Paradigm Publishing, Inc Defining Software Companies’ Responsibilities Protecting Against Poorly Designed Software –Bad software costs U.S. businesses an estimated $100 billion in lost productivity annually. –Customers may sue if bad software causes damages, but a better solution is for companies to produce better software in the first place.

© Paradigm Publishing, Inc Defining Software Companies’ Responsibilities Improving Accessibility –In late 2000, the government issued new rules requiring almost all government websites to be fully accessible to the disabled. –Hardware must also be adapted to accommodate the disabled. Apple Computer has pioneered these efforts with the invention of the “sticky keys” feature.

© Paradigm Publishing, Inc Defining Software Companies’ Responsibilities Software Engineering Code of Ethics and Professional Practice

© Paradigm Publishing, Inc Developing Personal Ethical Guidelines All Internet users should read, think about, and consider adapting for their own use a computer code of ethics. The following are the top ten themes found in effective codes of ethics:

© Paradigm Publishing, Inc On the Horizon Based on the information presented in this chapter and your own experience, what do you think is on the horizon?