Download presentation
Presentation is loading. Please wait.
Published byNoah Young Modified over 9 years ago
1
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics
2
2 2 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Learning Objectives 7.5Explain the terms copyright and fair use, and list common ways that copyrights are violated for software, music, and images 7.6List at least three preferred behaviors prescribed by netiquette, and contrast the ethical versus unethical use of online student resources 7.7Describe ethical and unethical ways that computers are used at work
3
3 3 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Piracy vs. Forgery Piracy: In the context of computing, acquiring copies of protected digital creations without the permission of the creatorPiracy: In the context of computing, acquiring copies of protected digital creations without the permission of the creator –Among the most widespread forms of unethical computer use Forgery: making copies that appear to be real and selling those copies to unsuspecting buyers as legitimate productsForgery: making copies that appear to be real and selling those copies to unsuspecting buyers as legitimate products
4
4 4 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Intellectual Property Intellectual property: Ideas, writing, music, art and other kinds of mind-based products intended to be used in a commercial wayIntellectual property: Ideas, writing, music, art and other kinds of mind-based products intended to be used in a commercial way –Piracy is stealing intellectual property –Evidence of theft may not be obvious –Intellectual-property laws
5
5 5 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Copyright and Fair Use Copyright: A legal concept that grants rights and control to the owner of any published workCopyright: A legal concept that grants rights and control to the owner of any published work Fair use: A limited set of circumstances in which copyrighted material can be used without first obtaining permissionFair use: A limited set of circumstances in which copyrighted material can be used without first obtaining permission
6
6 6 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Copyright Lifetimes Copyright lasts for the life of the creator and 70 years after the person’s deathCopyright lasts for the life of the creator and 70 years after the person’s death Anything published before 1923 in the United States is considered not to be copyrightedAnything published before 1923 in the United States is considered not to be copyrighted When a copyright expires, the work enters the public domainWhen a copyright expires, the work enters the public domain
7
7 7 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Software Licensing Personal software license: Legal permission granted to one person to use the programPersonal software license: Legal permission granted to one person to use the program Multi-user license: Legal permission to install and use a program on a certain number of computersMulti-user license: Legal permission to install and use a program on a certain number of computers –Site license: Allows the software to be installed and used on any computer in a building or corporate campus –Enterprise license: Permits installation and use on any computer within a company
8
8 8 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Software Piracy End-user piracy: A legitimate purchaser makes unauthorized copiesEnd-user piracy: A legitimate purchaser makes unauthorized copies Internet piracy: Use of the Web and Internet resources to host and distribute software copiesInternet piracy: Use of the Web and Internet resources to host and distribute software copies Manufacturer piracy: Installation of unauthorized copies of a program onto the manufacturer’s computersManufacturer piracy: Installation of unauthorized copies of a program onto the manufacturer’s computers
9
9 9 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Protections Against Piracy Focus on mitigating damage from piracyFocus on mitigating damage from piracy Dongle: Hardware device that is included with software and plugs into a computer portDongle: Hardware device that is included with software and plugs into a computer port Software-based copy protectionSoftware-based copy protection Internet-based copy protectionInternet-based copy protection
10
10 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Downloading and Sharing Music Most media sharing systems are based on peer-to- peer networksMost media sharing systems are based on peer-to- peer networks –The bitTorrent protocol links users to cooperatively contribute small pieces of the complete file to the copier Some people see file sharing as a clear violation of others’ ownership rightsSome people see file sharing as a clear violation of others’ ownership rights Other people see no harm in file sharingOther people see no harm in file sharing
11
11 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Other Legal and Social Risks Nothing posted on the Internet is truly privateNothing posted on the Internet is truly private Spiders or Web crawlers: Automated software programs run by search engine and other companies to constantly sift through, catalog, and sometimes store information they find on websitesSpiders or Web crawlers: Automated software programs run by search engine and other companies to constantly sift through, catalog, and sometimes store information they find on websites Minimize personally identifying informationMinimize personally identifying information Incendiary opinions and hateful speech can come back to haunt the writer years laterIncendiary opinions and hateful speech can come back to haunt the writer years later
12
12 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Personal Computing Ethics Computer misuse and abuseComputer misuse and abuse –Hacking Netiquette: The set of online behaviors considered polite and properNetiquette: The set of online behaviors considered polite and proper –Discourages abusive speech, rudeness Acceptable use policy (AUP): Document that attempts to encode and formalize the practice of ethical computer use for an institution or companyAcceptable use policy (AUP): Document that attempts to encode and formalize the practice of ethical computer use for an institution or company
13
13 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Personal Computing Ethics Online student notes and essay databanksOnline student notes and essay databanks –Many school-related websites are legitimate and beneficial –Other sites support cheating and the illusion of accomplishment –Efforts to stop cheating- Some schools require students to submit work to services like Turnitin
14
14 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Professional Computing Ethics While employees are being paid, they should be focused on workWhile employees are being paid, they should be focused on work Personal use of company computers also can create risks for companiesPersonal use of company computers also can create risks for companies Employer protections:Employer protections: –Creating AUPs that identify forbidden and permitted behaviors –Tracking employees’ keystrokes and Web activity –Monitoring e-mail and other communications
15
15 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Workplace Electronic Communication General principles apply:General principles apply: –Thinking before speaking –Treat others with respect Workplace communication generally has to meet a higher standard of politenessWorkplace communication generally has to meet a higher standard of politeness Inappropriate types of workplace communicationInappropriate types of workplace communication –Carelessly sharing nonprofessional material –E-mail with complaints that should be kept private
16
16 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Whistleblowing Whistleblowing: Pointing out a major internal problemWhistleblowing: Pointing out a major internal problem –Although it tends to reflect high ethical concerns, it can make life difficult for the whistleblower. –State and federal laws protect whistleblowers in some situations –Any complaints should be fully documented and pursued through proper channels
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.