Computer Ethics Computer Technology 1 By Jill Einerson.

Slides:



Advertisements
Similar presentations
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Computer Technology Day 18
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Social and Ethical Issues Piracy & Copyright. Piracy.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
VISD Acceptable Use Policy
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Intellectual Property
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
INTELLECTUAL PROPERTY COPYRIGHTS, PATENTS AND TRADE MARKS.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
7/3/08 Created by Mae Thomas Property Rights There can be consequences if you violate others' intellectual property rights. (That is, if you copy something.
Computer Ethics.
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
Ethics And Computers. What are Ethics? Ethics Ethics are: Principles that guide behavior OR the rules of right and wrong behavior that you should follow.
Computer Technology, Mrs. Tom. Using technology in a safe, legal, and responsible way Netiquette – Proper etiquette used in electronic communications.
Computer Ethics for Computer Users
Computer Ethics, Privacy and Security. Computer Ethics Computers are involved to some extent in almost every aspect of our lives They often perform life-critical.
PREPARED BY: YOUR FIRST AND LAST NAME CURRENT DATE Ethics for Computer Use.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
For Computer Use in Business
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
Intellectual Property Basics
Intellectual Property What’s legal?. Discuss Terms  intellectual property, plagiarism, copyright-patent-trademark, public domain, fair use  piracy,
The Ethical Use of Electronic Media. V Computer Ethics  Resources such as images and text on the Internet are copyrighted.  Plagiarism (using.
The Ethical Use of Electronic Media.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
1.The Nature, Impact, and Issue of Information Technology 1.5Basic Legal Framework relating to the Use of IT.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Computer Technology Timpview High School
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computer Technology RULES, LAWS, ETHICS By Megan Rees.
The Ethical Use of Electronic Media. Guilford County SciVis V
Ethics Self Imposed Right and Wrong Behavior Described as:
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
Computer Software Heather Allen. Software Copyright Laws It is illegal for anyone to violate any of the rights provided by the copyright law to the owner.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Plagiarism, Fair Use and Copyright Laws
Computer Safety and Ethics
Computers Are Your Future Twelfth Edition
Using the computer appropriately
Ethical Issues When Using Computers
Physical Safety Issues
Using the computer appropriately.
The Ethical Use of Electronic Media.
Physical Safety Issues
The Ethical Use of Electronic Media
You will be given the answer. You must give the correct question.
Ethical Issues When Using Computers
Lesson 2- Ethical Use of Digital Resources
LEGAL TERMS IN DIGITAL MEDIA
Ethics Computer Technology.
The Ethical Use of Electronic Media.
Using the computer appropriately.
Physical Safety Issues
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
Presentation transcript:

Computer Ethics Computer Technology 1 By Jill Einerson

Ethics Issues in Computing

What are ethics? Used to determine the “right” and “wrong” thing to do What you “should” do in a certain situation Pair Share: Is this ethical? Why or Why Not? (Scenario #2 from your assignment)

Why are ethics important in computing? Information stored in computers can be valuable and private We generate information and often misuse it. A new branch of ethics called computer ethics Computer users need to know what is expected of them

3 Categories of Ethics Professional Ethics Professional ethics are needed in the workplace Policies don’t cover all possible situations A sense of what is moral is needed to apply ethics to various situations

3 Categories of Ethics Social Ethics Defined by society and its existing primary values Pair Share: What values existing in Utah might be different in another state? How about the U.S. vs another country?

3 Categories of Ethics Individual Defined by personal heritage Family values How you were raised can heavily influence your decisions

The Law

Are Ethics the Same as Laws? Obey the principle behind the law, not just the law itself Do you speed when you drive? Why or why not? Laws are external rules that are punishable Ethics are based on principles and values No global punishment for being unethical

Defamation What is libel? A written statement or picture intended to damage someone’s reputation Tort (civil wrong) Consequences = lawsuit What is slander? An oral statement intended to damage someone’s reputation Tort (civil wrong) Consequences = lawsuit

Copyright

What is the copyright law? Based on ethical principles, but is punishable! Gives rights to the author of a work Copying, reselling, leasing, lending, renting, distributing Publicly displaying or performing Transferring the copyright to someone else Copyright Protection – any software or data from a computer is copyrighted as soon as it is in a tangible form. Tangible form = means it is recorded somehow Software cannot be legally copied without permission.

Software Licensing

5 Types of Software Licensing You buy permission to use the software, not the software itself. A.Public Domain B.Freeware C.Shareware D.Open Source E.All Rights Reserved

Public Domain Not protected by copyright law Created with public funds Can be unreliable Usually poor quality and has viruses Copyrights can expire and become public domain especially in books and music

Freeware Some examples are: Protected by copyright May be copied and distributed free of charge Still under owner’s control Cannot sale or modify without permission

Shareware Free for a limited time Can charge a fee for permanent use May turn itself off after a period of time (30 day trial) Some features are not available unless you purchase or upgrade

Open Source Free software Source code is available or “free” for anyone to modify Can add functionality and features to software Can resell it Most commercial products have an open source competitor Some examples are: Linux, Gimp, OpenOffice, Firefox

All Rights Reserved Some examples are: Windows, Quickbooks, Adobe Protected by copyright laws Only for use by purchasers Must have owner’s permission to use it

Software Piracy Software piracy is the illegal copying of software Estimated $39 billion/year lost globally First offense = $250,000 and 5 years in jail $ loss to publishers result in higher cost to consumers If my friend is pirating software, why should I care? He’ll be the one who gets in trouble, right?

Creative Commons Software License A public copyright license that enables free distribution of a copyrighted work Gives users the right to share, use and add to a created work This license protects the people who use or redistribute the author’s work

InteIntellectual Property Exclusive rights are recognized for creations of the mind such as: Inventions Discoveries Designs Some common types of Intellectual rights include: copyright, trademarks, patents, trade dress and trade secrets Trademark - is a word or symbol that indicates ownership and is used exclusively by the owner

Plagiarism

What is plagiarism? To be safe, always cite the source even when no copyright symbol is evident! Plagiarism is fraud. Accidental plagiarism is negligence. Both are unethical and illegal! Plagiarism is the unlawful use of another’s ideas or words Give proper credit to the author for the material you use Pair Share: What is the difference between paraphrasing and quoting?

Privacy

Public vs. Private Information Public Can be used without your permission Name Address Courses at School Debts You Owe Police Report Involvement Private Cannot be used without owner’s permission Medical Records Grades Social Security # Tax Returns

Abuse of Inappropriate Spamming – unsolicited mail sent to promote a product or service Flaming- unkind messages to discourage more spam Trolling- messages designed to provoke anger or fights Phishing- pretending to be a trustworthy business to obtain personal information Illegal Nuisance – messages that continue after the recipient asks that they stop Harassment- messages that are threatening or intimidating

Acceptable Use Policy (AUP) AUP – outlines what is acceptable or prohibited by computer users. Legal documents that should be understood and followed Guidelines for: Personal computer files and documents Personal and private information Ethical conduct

References Google Images Wikipedia