COMPUTER AND IT ETHICS: PERCEPTION OF COMPUTER SCIENCE MAJORS Linda Weiser Friedman Zicklin School of Business, Baruch College and the Graduate Center.

Slides:



Advertisements
Similar presentations
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Advertisements

The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
What is identity theft, and how can you protect yourself from it?
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Internet Safety/Cyber Ethics
Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Possible WebQuest type links  
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
By: Catherine Tingle. What is it?  Netiquette refers to appropriate and safe interactions online.
IT security By Tilly Gerlack.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
ARE THE FOLLOWING SITUATIONS ETHICAL?. Your new computer comes with Microsoft Office 2003 already installed on it. Included in your box of software is.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Staying Safe Online A Practical Guide for Middle School Students.
Information provided by Microsoft CYBERETHICS.
Computer Ethics A Necessity for the new era. Why is Computer Ethics Important? The creation and existence of new questions that older laws cannot answer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Safety and Security issues of using ICT Alys brooks.
Laws Jamie Dunn.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
INTRODUCTION & QUESTIONS.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Understanding the dangers of living online.  Personal networking (Facebook, MySpace, etc.)  Research information  Download music  Gaming  Instant.
Information Systems Design and Development Security Risks Computing Science.
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
ETHICS Internet And Online Community Week 10.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Computer Ethics, Viruses, and Copyrights
Copyright Computer crime and cyber security.
Misuses of ICT Malpractice and crime © Folens 2008.
MALWARE Autumn Mattis.
CHAPTER FOUR OVERVIEW SECTION ETHICS
MODUS OPERANDI OF CYBER CRIME
Internet And Online Community Week 10
Lesson 2- Protecting Yourself Online
Computer Ethics, Viruses, and Copyrights
BCT 2.00 Analyze Technology Issues
Computer Ethics, Viruses, and Copyrights
Internet Safety Vocabulary
Computer Ethics, Viruses, and Copyrights
Social Issues in Computing
Social Issues in Computing
CHAPTER FOUR OVERVIEW SECTION ETHICS
Part 7 Q31 to Q35 of National 5 Prelim
Lesson 2- Protecting Yourself Online
Presentation transcript:

COMPUTER AND IT ETHICS: PERCEPTION OF COMPUTER SCIENCE MAJORS Linda Weiser Friedman Zicklin School of Business, Baruch College and the Graduate Center of CUNY Hershey H. Friedman Business Program, Department of Economics Brooklyn College, CUNY

CAN ETHICS BE TAUGHT? Sorry, we don’t really answer this question Sorry, we don’t really answer this question We do study the perceptions of future IT professionals as to the standards of ethics in their chosen field Does a standard course in ethics affect these perceptions?

THE STUDY A self-administered questionnaire was given to 115 students taking an advanced computer course and majoring in Computer Science. The sample: 64.3% male; 69.5% younger than 26-years old. 79 said they had not taken a course in ethics, 23 had taken an ethics course, and 9 were not sure. The ethics course all except three had taken was a course taught by the Philosophy department.

The Survey Four 5-point rating scales – –“How ethical are computer professionals?” – –“How ethical are college professors?” – –“How ethical are you?” – – Rate the ethics of 15 IT-related behaviors One open-ended question –the most unethical practices in the computer industry –asked respondents to name the most unethical practices in the computer industry

THE RESULTS

How Ethical are Computer Professionals? FREQ% extremely ethical (1) ethical (2) Somewhat ethical (3) Slightly ethical (4) Not at all ethical (5) Mean Standard Deviation n=

How Ethical Are College Professors? FREQ% extremely ethical (1) ethical (2) Somewhat ethical (3) Slightly ethical (4) Not at all ethical (5) Mean Standard Deviation n=

How Ethical Are You? FREQ% extremely ethical (1) ethical (2) Somewhat ethical (3) Slightly ethical (4) Not at all ethical (5) Mean Standard Deviation n=

Ethics of Various Behaviors Factor Mean s.d. (n= ) Stealing someone’s identity Spreading malicious virus Creating a malicious Hacking into database without permission Sending spam Getting into payroll records to see how much others earn Promising customers more than the technology can deliver Copying copyrighted software Piggybacking onto someone else’s Internet service Selling shareware Load program on more computers than it is licensed for Doing personal work on company time Copying music CD Giving friends access to your computer account Giving old version of software to others

Rating the Ethics of Various Behaviors: Does an Ethics Course Make a Difference? d.f.p Wilks Λ = 0.86, F = ,

Open-Ended Question For this question, subjects were asked what, in their opinion, were the most unethical practices in the computer industry. The “top” responses: creating and spreading viruses, worms, etc. (24 mentions); identity theft and fraud (24 mentions); hacking (10 mentions); spamming (9 mentions); overpricing / overcharging for software (7 mentions); downloading copy-written software, movies, etc. (4 mentions); spyware distribution (4 mentions).

Discussion Questions?