Download presentation
Presentation is loading. Please wait.
1
Computer Safety and Ethics
2
Viruses A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real programs Common viruses are (as attachments), trojan horses, or worms
3
How to Protect Your Computer From Virus Attacks
Installing virus protection software, such as Norton Anitvirus, MacAfee, AVG, or Kaspersky Avoid programs from unknown sources (especially on the Internet) Enable Macro Virus Protection (don’t run a macro unless you know what it does) Don’t double-click an attachment that runs an executable file (.exe). Other dangerous file extensions are .jpg, .com, or .pbs
4
Unethical Use of Computers
Identity Theft Cheating Plagiarism Cyber-bullying Pornography
5
Software Piracy Licensed user duplication for unlicensed users
Illegal Internet distribution Distributing versions to unauthorized markets Copying and using commercial software purchased by someone else What are the effects of software piracy?
6
Illegal Downloading Most peer-to-peer programs are legal. Sharing a lot of the materials on them is not. Some P2P software contains malware and will share everything on your computer, whether you intend it to or not. A general rule of thumb is to consider all content copyrighted unless you can prove otherwise (a site may include a statement that they have obtained permission, or may grant you permission to use the digital media). Lists of sites that provide legal downloading can be found at EDUCAUSE, RIAA, MPAA
7
Copyright Law Copyright gives the right to copy, adapt, and distribute original work. Usually given to the creator of the work. Does not have to be registered Copyright covers items such as books, maps, sheet music, paintings, photos (this includes clip art), sound recordings, motion pictures, and computer programs Copyright laws are partially standard, but not universally recognized. Applies to moral rights, such as the right to be credited for work
8
Copyright Typically lasts either 50 or 70 years (but can be as long as 120 years) after the death of the author. Some copyrights need to be periodically renewed. When a copyright expires, the work becomes part of public domain. The Digital Millennium Copyright Act was established specifically to deal with copyright of digital files and software programs What is open source software?
9
Fair Use Copyright does not prohibit all copying or replication
To decide fair use, the following are considered: the purpose and character of the use; the nature of the copyrighted work; the amount and substantialness of the portion used in relation to the copyrighted work as a whole; and the effect of the use upon the potential market for or value of the copyrighted work. Common fair uses include research and study, review and critique, parody and satire
10
How Does This Affect Us in the Classroom
Students may download images form the Internet for student projects but may not be reposted on the Internet without permission from the original author/artist Audio or video can be included as long as it is the shorter of 3 minutes or 10% or the original, and is not re-published.
11
Freeware, Shareware, Public Domain
Freeware is computer software that is available for no cost or for an optional fee (with restricted rights) Shareware is software provided to users without payment on a trial basis (either limited features or time) Public domain software has no ownership of copyright and can be used freely The most common type of software, obviously, is commercial. This is produced for sale.
12
Netiquette Short for network and etiquette, general guidelines for behaving on the Internet. Common rules include: Remember the human Adhere to the same standards of behavior online that you follow in real life Respect other people's time and bandwidth Make yourself look good online Share expert knowledge Help keep flame wars under control Respect other people's privacy Be forgiving of other people's mistakes
13
Protecting Business Confidentiality
Businesses routinely have access to sensitive information about their clients and customers involving everything from health data to finance to trade secrets Confidential information businesses collect on their employees, ranging from salaries to Social Security numbers Businesses must build appropriate technological safeguards into systems, back it up with clear non- disclosure policies and practices, and train employees to be careful about what they disclose
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.