Computer Ethics CSCI 101 Kara kelly. Ethics Ethics can be defined as a discipline in which one attempts to identify, organize, analyze, and justify human.

Slides:



Advertisements
Similar presentations
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Advertisements

Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
Adapted by Melinda Buterbaugh Teacher Librarian.  Be polite when you are sending messages to people.  Treat other people the way you would like to be.
An Introduction of Multimedia Etiquette Nicole Huang.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Ethics for Teacher Candidates Teresa Chen Department of Advanced Studies in Education and Counseling California State University, Long Beach.
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Spring 2010 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Privacy Concerns (Chapters [B]) Spring.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Computer Ethics for Computer Users
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Ethics, Computing, and the Internet
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
CSC Intro. to Computing Lecture 19: Ethics & Computers.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Ethics Business Law Sunny Hills High School Mrs. Larsen.
ICS131 – Ethics 11/17/03. IEEE-CS and ACM 1.PUBLIC - Software engineers shall act consistently with the public.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
Netiquette INFORMATION TECHNOLOGY AND ACQUIRING INFORMATION (JÄRVELÄ, RITVA-LIISA)
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
The History of Computers Hardware, Software, Programs, Computers Safety Tips, and Computer Ethics.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Internet Etiquette or Netiquette
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
Internet Etiquette or Netiquette
Ethical Uses of Computer
Note addresses of authors: Floridi – Faculty of Philosophy
Internet Etiquette or Netiquette
Unit 3- Introduction to Computer Ethics
Ethics & Privacy CSCI 101.
Presentation transcript:

Computer Ethics CSCI 101 Kara kelly

Ethics Ethics can be defined as a discipline in which one attempts to identify, organize, analyze, and justify human acts by applying certain principles to determine what is the right thing to do in a given situation. Involves freedom of making a choice and the responsibility for the results of the action

Computer ethics From the 1940s through the 1960s there was no discipline know as computer ethics. In the mid 1970s computer ethics was defined as a field in which one examines” ethical problems aggravated, transformed or created by computer technology. Computer revolution: – Stage 1:technological introduction – stage2: technological permeation (technology gets integrated into every day human activities)

10 commandments 1-- Thou shalt not use a computer to harm other people. This catch-all encompasses the remaining nine commandments. 2-- Thou shalt not interfere with other people's computer work. Sending an bomb -- thousands of messages to disable the recipient's in-box or server -- is an extreme example. Spreading false rumors online can also interfere with others' productivity. So can forwarding jokes without checking if recipients are receptive to them. 3-- Thou shalt not snoop around in other people's computer files. The weak security built into Windows 95 and 98 makes it easy to open the work of coworkers by walking up to their PCs.

4-- Thou shalt not use a computer to steal. A blatant example is hacking into a computer to loot a person's credit card number or a company's trade secrets. See Commandments 6, 7, and 8 for more subtle, and widespread, transgressions. 5-- Thou shalt not use a computer to bear false witness. Sending unsolicited, untargeted bulk e- mail messages, or spam, is bad in part because most spammers conceal their identity

6 -- Thou shalt not copy or use proprietary software for which you have not paid. Some organizations are tempted to buy one copy of a program and copy it onto many computers. Groups such as the Business Software Alliance go after such pirates tenaciously, and when caught they're hit with stiff fines and bad publicity. Using a shareware program long-term without registering it is also the equivalent of stealing it. Because so few people voluntarily register shareware, the authors of these programs have had to build in time limits for their use Thou shalt not use other people's computer resources without authorization or proper compensation. Some employees don't think twice about using their employer's computers or Internet connection for personal reasons. – Organizations are getting more protective of their computer possessions. Xerox recently fired about 40 employees for looking at pornographic Web sites at work. Once, I was nearly fired for using my employers computer fro freelance work.

8 -- Thou shalt not appropriate other people's intellectual output. The Internet makes it easy to copy others' words, artwork, music and HTML Thou shalt think about the social consequences of the program you are writing or the system you are designing. "Big Brother" programs let you capture the keystrokes or record the Web surfing of employees without their knowledge. Companies similarly can intercept any sent through their equipment. Morale can suffer if you don't inform employees of these practices beforehand Thou shalt always use a computer in ways that ensure" consideration and respect for your fellow humans. This is another good catch-all.

Illegal File sharing David Wright, Ph.D, director of curriculum innovation and e—learning at the University of Dayton – Students involved with illegal file sharing, and saturating the bandwith they have on campus. The more the student shared files, the less technology was available to everyone else. – Students can download file sharing software from the web at no charge. Programs such as eDonkey. Morpheus. Kazaa or limewrire enable student to illegally share music, videos and other files.

Works cited Computer Ethics 101. By: Dahl, Judy. Distance Education Report, 8/15/2005, Vol. 9 Issue 16, p3-8, 3p; (AN ) Computer Ethics 101. Ethics in Informatics. By: Curtin, Leah L.. Nursing Administration Quarterly, Oct-Dec2005, Vol. 29 Issue 4, p , 4p; (AN ) Ethics in Informatics. Remembering the Ten Commandments of Computer Ethics. By: Goldsborough, Reid. Community College Week, 11/15/99, Vol. 12 Issue 7, p17, 1/2p; (AN ) Remembering the Ten Commandments of Computer Ethics.