DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Privacy on the WEB Privacy on the WEB Group 0227 Efrain Castro, Dinesh Parmer, Michael Raiford Robert Reich, Kim Walker, Claudia Worme.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 3. Data Protection and Privacy Reference: Discovering Computers 2003/2004 Course Technology, Thomson Learning Chapter 12 Note: The privacy laws in HK.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Security, Privacy, and Ethics Online Computer Crimes.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
COMP6005 An Introduction to Computing An Introduction to Computing Privacy and Ethical Issues.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
INTERNET and CODE OF CONDUCT
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Personal Data Privacy and The Internet by Stephen Lau Privacy Commissioner for Personal Data, Hong Kong SAR at the Joint Conference of the OECD, HCOPIL,
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
By: Mr Hashem Alaidaros MKT 445 Lecture 3 Title: Affiliate Marketing.
Operational Data Tools Chapter Eight. Copyright © Houghton Mifflin Company. All rights reserved.8–28–2 Chapter Eight Learning Objectives To learn database.
Issues Raised by ICT.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Ethical Issues in Information Technology First Annual Conference on Ethics and Technology Chicago, 1996 Mary Malliaris.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Computer Legislation The need for computer laws Go to Contents.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Protecting Students on the School Computer Network Enfield High School.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
The Ethics of Electronic Marketing. “ Marketers must accept responsibility for the consequences of their activities and make every effort to ensure that.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
COASPTD Social and Ethical Issues. Collecting Data needs to be free from bias. Bias means that data is unfairly skewed or gives too much weight to a particular.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Privacy, Security and Ethics
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Any criminal action perpetrated primarily through the use of a computer.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
COOKIES Gloria Soria Network Security COSC 356. What is a Cookie? A cookie is a piece of text that a Web Server can store on a user's hard disk. Cookies.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
CSCI-235 Micro-Computer Applications Privacy & Security I.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
E-commerce Business uses of internet, e-commerce & e-business, e-marketing, e-payments etc.
Internet and security.
Latest Updates on BlackHawk Mines Music : Privacy Policy
Chapter 10: Privacy, Security, and Ethics
HOW DO I KEEP MY COMPUTER SAFE?
INFS 452 – Computer Ethics & Society
Presentation transcript:

DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on the web could be wrong. Sometimes, the company providing access to information may not be the creator. Then Who is responsible for the accuracy of information? Alter output greatly(e.g.photographs) changes meaning /content

INFORMATION PRIVACY The right of individuals/companies to deny or restrict the collection and use of information about them. Companies collect and use confidential data stored in online database without people authorization.Many web sites collect data, customise advertisements and send you Technique to collect your data are : Electronic profile – register magazine subscription, product warranty(12:27-28) Cookies – small file that a web site send to your browser and your hard disk stores it. The next time you visit the web site,your browser retrieves it from your hard disk and sent data in it to the web site. It is used to track users preference, store your password, the frequency of visiting a site/items in your shopping carts.(10:24, 12:28-30) Spyware -program placed on your computer without user knowledge that secretly collects information about users.(12:31) Spam -Internet junk mail (2:37,10:25, 12:31) Employee monitoring(controversal) –employers claim s send from employee computer is part of company property.(12:23,3.32)

INFORMATION OF PRIVACY-Personal Data Privacy Ordinance) individuals has the rights To have their personal data collected in a manner which is lawful and fair and to be informed of the purposes for which the data are to be used. To consent( 同意 )to a change of use of the data To have their personal data kept accurate, up-to-date,secure and confidential and for no longer than necessary To obtain a copy of their personal data held by a data user and to require correction of any inaccuracy To ascertain a data user’s personal data policy and practices To know that the data is being collected Possible cases that privacy is threatened Unauthorized access ( 提取 ) to people’s information Unauthorized use and spread of people’s information Unauthorized modification ( 更改 )of people’s information

Example of information privacy Many web sites collect data about you so they can customize( 美化 ) advertisements and send you personalized messages Some employers monitor your computer usage and messages When you fill out a form such as a magazine subscription or click an advertisement on the Web, your information enter a database. The Merchants then sell contents of their databases to other parties