Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
Copyright Infringement
Social and Ethical Issues Piracy & Copyright. Piracy.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
HSC: All My Own Work Copyright.
By: Lauren Monteith, Derek Love, Cole Howell, and Reggie Jones.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Computers, the law and ethics  Lesson Objective: Understand some of the legal & ethical issues in developing computer systems  Learning Outcome: Know.
Computer Ethics for Computer Users
Security Issues, Ethics, & Emerging Technologies in Education
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1.The Nature, Impact and Issues of Information Technology 1.6Strategies used to Prevent Deliberate and Accidental Illegal Actions.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
IT in Business Issues in Information Technology Lecture – 13.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
HSC: All My Own Work What is copyright and what does it protect? How does it relate to me?
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
COASPTD Social and Ethical Issues. Collecting Data needs to be free from bias. Bias means that data is unfairly skewed or gives too much weight to a particular.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Security and Ethics Safeguards and Codes of Conduct.
Ethical Implications In The Age Of Information
Computer threats, Attacks and Assets upasana pandit T.E comp.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
8 – Protecting Data and Security
Copyright Computer crime and cyber security.
Ethical and Legal Issues
Legislation in ICT.
UNIT 19 Data Security 2.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
حقوق الملكية الفكرية إعداد الطالبة: مها عبدالله
BCT 2.00 Analyze Technology Issues
Legislation in ICT.
Group 2 module 2 obj 15 explain the meaning of terms related to the security of Information Technology Systems.
G061 - Network Security.
Presentation transcript:

Social and Ethical Issues

Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues that effect people as participants and as indirect users. These issues are broken down into the following categories:  Data Security  Data Accuracy  Copyright

Data Security The security of data and information is a major issue in any organisation. The cost of replacing data that is deliberately or accidentally damaged or lost can be an enormous issue. People who gain illegal access to information systems are referred to as hackers. Hackers are often involved in information theft or financial theft.

Data Security Information theft involves stealing data from one organisation and selling it to another organisation & financial theft involves illegally transferring money from one account to another. Computer crime is one of the most difficult issue in today’s society. One of the major issue is that computer crime is not viewed in the same lights by the community as other crimes, such as burglary or armed robbery.

Data Security Data security involves a series of safeguards to protect the data from deliberate or accidental damage. Some of these are listed below:  Passwords are secret words or number that are typed on the keyboard to gain access to a computer system  Objects such as a key, plastic card or badge can be required to gain access to the information system  Biometric devices are used to verify personal characteristics such as fingerprints, hand size, signature, eye and voice

Data Security  Data encryption is used to prevent data from being intercepted and read during transmission.  Firewalls are used on computer networks to check all data coming from outside sources (such as the Internet) for the purpose of verification and authentication  Backup procedures need to be secure and reliable  The weakest link is the security of any information system is the people in it

Data Accuracy In the past, publishing information was costly and there was less of it. Today, there is a huge amount of information and it is relatively easy to publish on the Internet. As a result, there is no guarantee that all information is accurate or reliable, and it is difficult to check it in a reasonable amount of time. In addition to the issue of responsibility, there are also concerns about the ethics of altering data.

Data Accuracy CONT... For example, photographs can be edited by adding, changing or removing parts of the images. A personal can be taken out of the photograph and another person added. Data Validation Data is collected to solve problems, meet needs or help decision-making. The accuracy of the data must be checked before it is processed into information

Data Validation Data validation also ensures that the data is up-to- date, current, complete and correctly entered. Data validation can be built into a software application such as:  Range checks – are used if the data is restricted to a small range of particular values. (e.g. 15/07/2010)  List checks – are used when the data can be compared to a set of accepted data (e.g. NSW in Australia and not WSN)  Type checks – are used to determine whether the data type is correct (e.g. Text input must be ABC not 123)  Check digit – is a number calculated from the digits of a code number and then added to that number as an extra digit

Copyright Copyright is the right to use, copy or control the work of authors and artists, including software developers, it is often indicated by the © symbol. Copyright ownership is automatic and applies whether or not the work is accompanied by the copyright symbol. Information published on the Internet is protected by copyright, just as it would be if it was in a book. Text and images obtained from a Web site should not be reproduced without acknowledgment.

Copyright CONT... Software developers are protected by copyright so that they receive money for the time, effort and investment spent in developing a program. When software is bought, it contains a licence agreement or registration card, which gives the user permission to make one backup copy. The user is not allowed to make other copies of the software without the permission of the copyright holder. When making illegal copies of software it can lead to software piracy or pirating.

Copyright CONT... Shareware software is provided free and can be copied and distributed, but the licence agreement requires users to pay for the shareware they use. Public domain software, or freeware, can be freely distributed and used. Shareware and public domain software are often distributed using the Internet.

Exercise 1.9 Who are hackers? What safeguards can be taken to protect data? What is data validation? List four different ways that data validation can be built into software What is copyright? Why are software copyright laws difficult to enforce?