Web Page Design and Development I Standards Standard A Safety and Ethics – 3 Identify potential abuse and unethical uses of computers and networks.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
The Internet.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Digital Citizenship By Bhavna. Plagiarism Plagiarism is illegal and can get you arrested. If a teacher finds out you used plagiarism he/she can fail you.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Digital Citizenship Project
A Guide to Digital Citizenship
Cyber Crimes.
Digital Citizenship By: Miranda Scorver.
By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
COMPUTER ETHICS Do you know the difference between right and wrong?
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Unethical use of Computers and Networks
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Digital Citizenship Created By: Kelli Stinson June 2011.
Digital Citizenship Project By Allen Naylor Ed 505.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
By: Asfa Khan and Huda Mukhtar
Ethical Internet Use TECH 503 By A. Greenwell. Ethics in the Virtual World We all grow up learning the rules, regulations, and laws of the real world.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Identity Theft How it happens and how to avoid it.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Issues for Computer Users, Electronic Devices, Computer and Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Computer Safety and Ethics
Add video notes to lecture
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
A Project on CYBER SECURITY
Appropriate Use of Technology
Five Unethical Uses of Computers
BCT 2.00 Analyze Technology Issues
Social Issues in Computing
Faculty of Science IT Department By Raz Dara MA.
Social Issues in Computing
Computer Security By: Muhammed Anwar.
LO1 - Know about aspects of cyber security
Presentation transcript:

Web Page Design and Development I Standards Standard A Safety and Ethics – 3 Identify potential abuse and unethical uses of computers and networks.

Identity Theft and Fraud Identity theft and fraud are characterized by criminal use of the victim's personal information, such as a Social Security number, to assume the victim's identity. Identity thieves use the stolen personal information to create fake identifications, obtain credit cards or access other resources and benefits. The criminals may install malicious software to gain access to the victim's computer files and activity, or target commercial and government computer systems to steal the personal information of hundreds or thousands of potential victims at once.

Digital Piracy The Internet is often called the "Information Superhighway" because it allows people to find, share, and distribute information quickly and easily using computers. Not all that information is ethical or legal. Distributing and accessing illegal copies of copyright- protected digital books, movies, music, artwork, software, and other content is a form of copyright infringement, commonly referred to as "piracy." When digital products and works are pirated, the content creators lose money they would have otherwise earned had that work been legally purchased or licensed.

Financial Theft and Fraud Thieves and embezzlers can use computers to steal money from individuals or businesses. A thief can gain online access to an individual's bank account using a victim's stolen password, PIN or personal information or order goods online and later sell those goods for cash. An employee with access to business accounting systems may falsify records or manipulate the systems to embezzle funds.

Information Theft Spies, criminals, and snoops can steal private or classified information by gaining unauthorized access to the victim's computer or inappropriately using computers to which they have been given access. Their goals may be to leak or sell classified government documents, use stolen personal information to extort a victim, gain an advantage over a competitor, or simply pry into the private life of a family member or coworker. Privacy invasion, spying and information theft may be punishable under a number of laws designed to protect individuals, businesses, or national security. Employees caught snooping or stealing data may lose their jobs even if their acts were technically legal.

Disruption to Computers or Services Disrupting a computer or network may involve using malicious software to make a computer unusable or using several computers to block access to a website, network or other resource. These types of attacks may be done to extort money from the victim, make a political statement or force the victim into a specific action. Sometimes, the attackers commit these acts simply for entertainment.

Good Citizenship DO’s Build your own brand Treat others the way you’d like to be treated. Share, but be fair Report and record bad behavior Listen & think first, talk later Debate Use Proper English Be Careful what you share Remember people might not be who they seem Be aware of your footprint

Good Citizenship DON’T’s Share images or videos with strangers Assume a false identity Don’t just retweet, be original Shout Get personal Fail to abide by the site rules Feed the trolls Steal others work Forget the human behind the screen trolling-can-happen-anyone

Inappropriate Computer Use Employees may use company computers to engage in unethical behavior. For example, an employee who is not permitted to use the Internet for personal reasons commits an unethical act by shopping online while at work. Random Internet surfing takes away from the time she spends on work-related activities. Employees sometimes use company to spread inappropriate websites or videos to co-workers, some of which could be deemed offensive by the recipients.

Time Misuse Unethical behavior can include "stealing" time from the company, as the company is compensating employees and receiving no productivity in return. In addition to time spent on aimless Internet surfing, time misuse can consist of extending breaks beyond the allotted time, congregating around the water cooler or engaging in lengthy gossip sessions during working time, falsifying time sheets, coming into work late or leaving early and running personal errands while traveling on company business.

Sexual Harassment and Bullying An employee could commit unethical behavior by sexually harassing co-workers. This could involve making lewd comments, touching inappropriately or making unwanted sexual advances. Bullying typically involves attempting to intimidate a co-worker by making demeaning comments about him, spreading gossip or even making verbal or physical threats. In general, a bully attempts to make the workplace as uncomfortable as possible for a co-worker. In some cases, ongoing bullying can escalate into violence in the workplace.

Illegal Acts Some unethical acts can also be illegal. For example, an employee who has access to a company's financial records, such as a bookkeeper or accountant, could use her access and expertise to embezzle company funds. An employee having access to personnel files, such as a human resources representative, could commit identity theft and use employees' Social Security numbers to raid bank accounts or fraudulently obtain credit cards. Enron scandal, top company executives used questionable accounting practices to manipulate the company's stock price for their own financial gain.

unethical-uses-computers.html unethical-uses-computers.html uter_Ethics.php uter_Ethics.php unethical-behavior-organization html unethical-behavior-organization html