Download presentation
Presentation is loading. Please wait.
Published byAshlee Ford Modified over 9 years ago
1
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
2
2 of 28 Quiz What is the difference between the internet and the world wide web?
3
3 of 28 Quiz (2) Why do we need protocols for communication between computers?
4
4 of 28 Quiz (3) Name the protocol on which all internet traffic is based.
5
5 of 28 Quiz(4) Name the protocol that WWW clients and servers use.
6
6 of 28 Quiz (5) What does the DNS keep a list of mappings of?
7
7 of 28 Quiz (6) What is encryption, and why do we need it?
8
8 of 28 Ethics What is morality? Informal rules for public interaction What conduct is “good” or “bad” What is Ethics? Study of moral, social and legal issues Moral rules Social guidelines Law Cyber-ethics: relates to Internet Computer Ethics: general computer use
9
9 of 28 Privacy versus Public Protection People's privacy should be protected: Communications, emails Web sites visited Physical location But what about: Terrorism and crime Paedophilia Employees misusing facilities Government special powers?
10
10 of 28 Censorship Censorship and the Internet Pornography Protection of children Filtering of inappropriate Internet traffic - how? Freedom of speech/expression Defamation Criminal activity Internet crosses borders Who is responsible?
11
11 of 28 Responsible Use of Information Business may keep information but only use for intended purpose Use personal information to deliver product? Yes Use personal information to advertise other products? Maybe Sell personal information to another business without permission? No
12
12 of 28 Safety Software and hardware creators responsible for safety: Medical equipment Robots Should they be liable for damages: Pentium Processor Therac-25 Machine Operating system crashes, vulnerabilities
13
13 of 28 Computer Security & Privacy Laws Privacy Act 1988 regulates: Collection Retention Use Disclosure Government Data-matching Sharing information between departments Use Tax File Number as key To prevent fraud
14
14 of 28 Your Rights? Under the Freedom of Information Act 1982 people have rights to: View information about themselves Consent to information use for other purposes Correct erroneous information about themselves Secret databases not permitted
15
15 of 28 Spam Spam (Unsolicited communications) Sell (often illegal) items without permission Try to trick you into providing some personal details, like banking information Deliver damaging software SPAM Filtering can help, but the problem remains. Spam examples
16
16 of 28
17
17 of 28
18
18 of 28
19
19 of 28
20
20 of 28
21
21 of 28
22
22 of 28 Spam (2) Spam Act of 2003 Unsolicited email must not be sent Commercial emails must include who sent them Ability to unsubscribe Address harvesting illegal
23
23 of 28 Electronic Transactions Electronic Transactions Act 1999: Electronic transactions are legal Not allowed to impersonate Not responsible if someone impersonates you Reality: Reasonably good privacy Slow uptake of authentication technologies There have been cases of identity theft…
24
24 of 28 Copyright Why have copyright? Financial rewards Protecting copyright owners Allowing sales Illegal to copy information that carries a copyright, including: Software Music & Video Others (e-books, photos, web pages etc.) C
25
25 of 28 Copyright (2) Music Some say yes, others say it increases sales. Does illegal sharing damage music industry? No. Copy music from CD I own? Maybe. Copy legal music to CD? Yes. Copy legal music to portable player? No. Share music? If authorised, Yes. Buy and download music?
26
26 of 28 Copyright Owners & Vendors Copyright owners are the creators such as musicians, artists and authors For software companies, programmers usually cede ownership to their employer Copyright vendors such as book publishers, recording companies, etc. make most of the money!
27
27 of 28 Intellectual Property Patents are like copyright, protect rights of creators, but managed differently Patents only apply to innovations, copyright applies to any written document, even a compilation Patents retire after 10-20 years, depending on the type, & the national law
28
28 of 28 Conclusions Rapid technological change has transformed business and many other aspects of our lives Rapid change challenges ethical, privacy and legal issues Laws will probably continue to trail behind the latest technological advances
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.