What is computer ethics? Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.
Hacking Copyright Infringement of software E-democratic technology Some questions in computer ethics
Ethical standards Association for Computing Machinery (ACM) code of ethics –Ethical behavior among computing professionals –Learned society –Founded in 1947
Computers in the Workplace: Are They Used Ethically? Then typewriters, filing cabinets, and correction fluid were the norm. Replaced by desktop and portable computers, database management systems, and word processing software. Benefits: You are already familiar with some of the benefits of using computers in the workplace
Two types: Crimes that target computer networks or devices directly, Crimes facilitated computer networks or devices, the primary target of which is independent of the computer network or device
COMPUTER CRIME Examples of crimes that primarily target computer networks or devices would include, Examples of crimes that primarily target computer networks or devices would include, Malware (malicious code) Malware Denial-of-service attacks Denial-of-service attacks Denial-of-service attacks Computer viruses Computer viruses Computer viruses
Examples of crimes that merely use computer networks or devices would include; Examples of crimes that merely use computer networks or devices would include; Cyber stalking Cyber stalking Cyber stalking Fraud and identity theft Fraudidentity theft Fraudidentity theft Phishing scams Phishing scams Phishing scams Information warfare Information warfare Information warfare
Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent.
A denial-of-service attack (DoS attack) or distributed denial-of- service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users.
computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. malwareadware spywaremalwareadware spyware
Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used.
Spyware is a type of malware that is installed on computers and collects little bits information at a time about users without their knowledge
Cyberstalking is the use of the Internet or other electronic means to stalk someone.
a fraud is an intentional deception made for personal gain or to damage another individual
criminal fraud include : Banckruptcy fraud benefit fraud False advertising False billing False insurance claims forgery Health fraud Identity theft Marriage fraud taking payment for goods sold online, by mail or phone, such as tickets, with no intention of delivering them Tax fraud, (tax evasion), tax evasiontax evasion
Identity theft Five categories: –business/commercial identity theft –criminal identity theft –financial identity theft –identity cloning –medical identity theft
Techniques for obtaining personal information Researching about the victim in government Remotely reading information from an RFID chip on a smart card, RFID-enabled credit card, or passport. Stealing payment or identification cards Stealing personal information from computers and computer databases Advertising bogus job offers
phishing is the criminally fraud process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. –Collection of tactical information, –Assurance(s) that one's own information is valid, –spreading of propaganda or disinformation to demoralizethe enemy and the public
Television and radio transmission(s) can be jammed. Television and radio transmission(s) can be hijacked for a disinformation campaign. Logistics networks can be disabled. Enemy communications networks can be disabled. Stock exchange transactions can be sabotaged, either with electronic intervention, leaking sensitive information or placing disinformation. sabotaged
Computer security
What is computer security? Why should I care about computer security? Who would want to break into my computer at home? How easy is it to break into my computer?
Information security is concerned with three main areas: Confidentiality - information should be available only to those who rightfully have access to it Integrity -- information should be modified only by those who are authorized to do so Availability -- information should be accessible to those who need it when they need it
Electronic Commerce Act Electronic commerce, commonly known as (electronic marketing) e- commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks computer networkscomputer networks
Cybercrimes
The Department of Justice categorizes computer crime in three ways : The computer as a target The computer as a weapon The computer as an accessory
Personal responsibility Contribute to society and human well-being Avoid harm to others Be honest and trustworthy Be fair and take action not to discriminate Honor property rights including copyrights and patent
Give proper credit for intellectual property Respect the privacy of others Honor confidentiality
Social network service
A social network service focuses on building and reflecting of social networks or social relations among people, e.g., who share interests and/or activities. A social network service essentially consists of a representation of each user (often a profile), his/her social links, and a variety of additional services.
Philippine IT Related Laws Ten Commandments of Computer Ethics Other Emerging Issues in IT