Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
COMP6005 An Introduction to Computing An Introduction to Computing Privacy and Ethical Issues.
Ethics of Copyright Infringement Thomas H. Mak CS 301.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
By: Lauren Monteith, Derek Love, Cole Howell, and Reggie Jones.
 Provide a basis for determining who in the organization should control access to a particular item of information.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Chapter 3 Ethics, Privacy & Security
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Ethics & Responsibility
Intellectual Property
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Computer Ethics.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Your Interactive Guide to the Digital World Discovering Computers 2012.
CISB 412 Social and Professional Issues Understanding Intellectual Property.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Mrs. Jefferson Business Information Management I.
Computer Ethics for Computer Users
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Discuss techniques to prevent unauthorized computer access and use
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Security Issues and Ethics in Education
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Investigating & analysing ICT issues and ethical dilemmas.
history, hardware, software, safety, and computer ethics
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
IT in Business Issues in Information Technology Lecture – 13.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Chapter 5 Digital Safety and Security Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Intellectual Property an iSafe © Lesson By: Angelica.
Security and Ethics Safeguards and Codes of Conduct.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
COMPUTER ETHICS AND LEGAL ISSUES
Copyright, Designs and Patents Act What does it cover? The Copyright, Designs and Patents Act covers work.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ETHICS IN USING COMPUTER
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
CHAPTER 10 Digital Security Copyright © Cengage Learning. All rights reserved.
Computer Ethics IT Fundamentals Battlefield High School.
Copyright Computer crime and cyber security.
Chapter 16 – Careers in Information Technology
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chapter Nine (Part 1).
Learning Area 1 Information And Communication Technology and Society
Chapter 13 Security and Ethical Challenges.
Social Issues in Computing
Social Issues in Computing
Ethics & Privacy CSCI 101.
Ethical Use of Computers
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
Presentation transcript:

Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?

Computer Ethics Standards that determine whether an action is good or bad Moral guidelines that govern the use of computers and information systems

Six areas of Computer Ethics Unauthorized use of computers and networks Software Theft Information Accuracy Intellectual Property Rights Codes of Conduct Information Privacy

Unauthorized Use Use of computer or its data for unapproved or possibly illegal activities Employee using an organization’s computer to send personal Gaining access to a bank computer and making an unauthorized transfer

Safeguards against Unauthorized Access and Use Disable file and print sharing on Internet connections Firewalls Intrusion detection software

Software Theft Occurs when: Intentionally erases programs When an employee is fired Downloading something you didn’t pay for Illegally copies a program (Piracy) Unauthorized and illegal duplication of copyrighted software Video

Intellectual Property Unique and original works such as: Ideas Inventions Art Writings Processes Company names Logos

Intellectual Property Rights Rights to which creators are entitled for their work Copyright Protects works of authors and artists Piracy-software, movies and music

IT Code of Conduct Written guideline that helps determine whether a specific computer action is ethical or unethical Examples: Computers may not be used to harm other people Computers may be used to steal Employees may not copy or use software illegally

Information Privacy Right of individuals and companies to deny or restrict the collection and use of information about them Banks Doctors Magazine subscriptions Retail stores-credit files

The End!