1. 2 computer ethics
TRANSCRIPT
-
8/6/2019 1. 2 Computer Ethics
1/27
COMPUTER ETHICS AND
LEGAL ISSUESDEFINITIONComputer Ethics
Code of Ethics
Intelectual Property
Privacy
Computer crime
Cyber law
Differentiate ethics and law
Need for intellectual property laws
PRIVACY
Definition
Ways to protect privacy
Authentication andveryfication methods /
technologies
CONTROVERSIAL
CONTENTS & CONTROLS
Effects of controversial
contents to society
Ways of controlling
access to controversial
contents
-
8/6/2019 1. 2 Computer Ethics
2/27
COMPUTER ETHICS
Moral guidelines that govern the use of
computers and information systems
used ethical principles to determine theproper course of action to take in
difficult situation. Although unethical acts may be
immoral, they are not always illegal,although illegal acts almost always
unethical MENU
-
8/6/2019 1. 2 Computer Ethics
3/27
CODE OF ETHICS
an IT code of conduct is a written
guideline that helps determinewhether specific computer action isethical or unethical. Ethics, as youmay know, are standards or moral
conduct.
MENU
-
8/6/2019 1. 2 Computer Ethics
4/27
INTELECTUAL PROPERTY (IP) Unique and original works such as ideas
inventions, writings, art, processes,company and product names and logos.
Intellectual property rights are the rights towhich creator are entitled for their work.
The owner of IP controls its use and isentitled to any benefits arising from suchuse.
MENU
-
8/6/2019 1. 2 Computer Ethics
5/27
PRIVACY
Concerns the collection and use of
data about individuals.
Information privacy refers to the right of
individuals and companies to deny orrestrict the collection and use ofinformation about them.
MENU
-
8/6/2019 1. 2 Computer Ethics
6/27
COMPUTER CRIMEis an illegal action in which the perpetrator uses special
knowledge of computer technology.
Computer crime once fell into a few simple categories, suchas software theft or data destruction.
The dramatically increased access to networks has changedthe focus to damage that can be done by unscrupulous
people with online access.
MOST FREQUENTLY REPORTED COMPUTER CRIMES
MENU
-
8/6/2019 1. 2 Computer Ethics
7/27
-
8/6/2019 1. 2 Computer Ethics
8/27
CYBER LAWCyber Law encompasses a wide variety
of political and legal issues related to
the internet and othercommunications technology, includingintellectual property, privacy,freedom of expression and
jurisdiction
MENU
-
8/6/2019 1. 2 Computer Ethics
9/27
Freedom of expression is the liberty to freely say whatare pleases, as well as the related liberty to hear what
other have stated recently, It has been commonlyunder understood as encompassing all types ofexpression, including the freedom to create anddistribute movies, pictures, songs, dances and all otherforms of expressive communication.
Privacy is the ability of an individual or group to stopinformation about themselves from becoming known topeople other than those they choose to give theinformation to.
Jurisdiction is the power of the court to hear anddecide a a case before it.
MENU
-
8/6/2019 1. 2 Computer Ethics
10/27
DIFFERENTIATE BETWEEN ETHICS
AND LAWEthics Law
- a discipline dealing with good
and evil and with moral duty
- moral principles or practice
Example :
Using and buying an illegal
Installation CD
- a rule of conduct or action
established by custom or laid
down and enforced by agoverning authority
Example :
Duplicating and selling any
computer program without license
-
8/6/2019 1. 2 Computer Ethics
11/27
NEED FOR INTELLECTUAL
PROPERTY LAWS??????
There are three important terms that
are used in intellectual property laws.
MENU
-
8/6/2019 1. 2 Computer Ethics
12/27
Copyright
Copyright protection provides the creator of a literary orartistic work control over the use and distribution of thatwork.
Patents
Patents are designed to protect inventions andencourage inventors to innovate by granting the patentholder exclusive rights to the invention for 20 years.
Trademarks
A trademarks is a word, name, symbol, or device usedto distinguish one company and its products fromanother.
MENU
-
8/6/2019 1. 2 Computer Ethics
13/27
COMPUTER PRIVACY Information privacy refers to the right of individuals
and companies to deny or restrict the collection anduse of information about them.
In the past, information privacy was easier tomaintain because information tended to be kept inseparate location. It is now, however technically andeconomically feasible to store large amount of relateddata about individuals in one database. Computers
also can be used to monitor employees activities.
MENU
-
8/6/2019 1. 2 Computer Ethics
14/27
Ten Commandments Of
Computer EthicsCreated by the Computer Ethics Institute
If Duplicated, Please Cite the Computer Ethics Institute
1. Thou Shalt Not Use A Computer To Harm Other People.
2. Thou Shalt Not Interfere With Other Peoples Computer Work.
3. Thou Shalt Not Snoop Around In Other Peoples ComputerFiles.
4. Thou Shalt Not Use A Computer To Steal.
5. Thou Shalt Not Use A Computer To Bear False Witness.
6. Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid.
7. Thou Shalt Not Use Other Peoples Computer Resources Without Authorization Or
Proper Compensation.
8. Thou Shalt Not Appropriate Other Peoples Intellectual Output.
9. Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or
The System You Are Designing.
10. Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect
For YourFellow Humans.
-
8/6/2019 1. 2 Computer Ethics
15/27
THE WAYS OF COMPUTER
PRIVACY
Password
Encryption
Email Privacy
MENU
-
8/6/2019 1. 2 Computer Ethics
16/27
THE WAYS TO PROTECT
PRIVACY
Not just to protect the computer but to makesure that the computer issues by authorized
worker or user only.
PASSWORD
MENU
-
8/6/2019 1. 2 Computer Ethics
17/27
THE WAYS TO PROTECT
PRIVACY
ENCRYPTION
With public key encryption there are two keys, one
public and the other private. The public key needs to be known.
To send a message to a friend, you uses his publickey to encrypt the message.
Your friend then uses his private key to decode themessage after receiving it.
MENU
-
8/6/2019 1. 2 Computer Ethics
18/27
THE WAYS TO PROTECT
PRIVACYEMAIL PRIVACY When you send a message by email, the message
is broken into packets and the packets are sent out
over the Internet. The number of packets depends on the size of
message.
Each message has the internet address of therecipient.
This means there may be some places between thepackets could be intercepted and examined.
MENU
-
8/6/2019 1. 2 Computer Ethics
19/27
User Identification (ID) and
Passwords Possessed Objects
Biometric Devices
Callback System
AUTHENTICATION AND VERIFICATION
METHODS / TECHNOLOGIES
MENU
-
8/6/2019 1. 2 Computer Ethics
20/27
User Identification (ID) and
Passwords
With a user ID and password, you are required to enter aword or series of characters that matches an entry in anauthorization file stored on the computer or a networkserver.
Among the password guideline is it must exceed 8
letters, a combination of two words, an initial numberadded t any parts in the password.
MENU
-
8/6/2019 1. 2 Computer Ethics
21/27
Are any item that should be brought to enable
achievement to computer such as badge, key
or card.
Possessed Objects
MENU
-
8/6/2019 1. 2 Computer Ethics
22/27
Biometric Devices
Confirm the success of the request by
comparing body characters, hand size, eye
retina or signature that with keeps is
computerized such as fingerprint.
If the digital code in the computer does not
match the personal characteristic code,
access is denied.
MENU
-
8/6/2019 1. 2 Computer Ethics
23/27
Callback System
It is an access control method sometimes
used to authenticate remote users.
To initiate the callback system, you call the
computer and enter a user ID and password.
If these entries are valid, the computer
instructs you to hang up and then calls you
back at the previously established number.
MENU
-
8/6/2019 1. 2 Computer Ethics
24/27
EFFECTS OF CONTROVERSIAL
CONTENTS TO SOCIETY Pornography
The depiction of erotic behavioursexual excitement
SlanderTo utter slander against defame
OR
To injule or destroy someone reputation bylibel or slander
MENU
-
8/6/2019 1. 2 Computer Ethics
25/27
Ways of controlling access to
controversial contents Filtering
Process of restricting access to certain material on the
web.
Many bussiness use content filtering to limit employees Webaccess.
Some schools, libraries and parents use content filtering torestrict access to minor.
One approach to content filtering is through a rating systemof the Internet Content Rating Association (ICRA)
Another approach to content filtering is to use web filteringsoftware.
MENU
-
8/6/2019 1. 2 Computer Ethics
26/27
-
8/6/2019 1. 2 Computer Ethics
27/27
Web filtering software
A program that restricts access to specified
Web sites. Some also filter sites that use a
spesific words.