computer ethics

18
Doing the Right Thing Computer Ethics

Upload: benjamin-sangalang

Post on 29-Jun-2015

168 views

Category:

Education


1 download

DESCRIPTION

ICT Computer Ethics

TRANSCRIPT

Page 1: Computer ethics

Doing the Right Thing

Computer Ethics

Page 2: Computer ethics
Page 3: Computer ethics

Plagiarism

• Downloading somebody else’s works as if it were your own.

• Plagiarism is a serious offense. The more famous you get, the more you’re at risk.

• In college writing, it’s fine to make use of someone else’s effort as long as you use your own words and give credit.

• Plagiarizing copyrighted materials is called copyright infringement

Page 4: Computer ethics

Privacy & Encryption

• Privacy – refers to an individual’s ability to restrict or eliminate the collection, use, and sale of confidential personal information.

• Encryption – refers to a coding or scrambling process by which a message is rendered unreadable by anyone except the intended recipient. Coded Message

Page 5: Computer ethics

Cipher text• Refers to a coded message

Decode the message below

V YBIR LBH

ORYC BRX WRR

A B C D E F J H I J K L M N O P Q R S T U V W X Y Z

Page 6: Computer ethics

Global Unique Identifiers (GUID)• A unique identification number that is generated

by a computer hardware component or a program.

Page 7: Computer ethics

Privacy at Work. (Things to Remember)

• Except in the case of an emergency, never use your employer’s telephone system for professional calls. Make all such calls from a pay telephone.

• Never use the e-mail account your employer gives you for professional purposes. Get your own account with an Internet Service Provider (ISP), and be sure to send and receive all personal mail from your home computer.

• Assume that everything you do while you’re at work – whether it’s talking on the phone, using your computer, taking a break, or chatting with co-workers is being monitored and recorded.

Page 8: Computer ethics

Protecting your Privacy OnlineTo safeguard your privacy on the internet do the following:

• Browse anonymously by surfing from sites such as “The Anonymizer” or “The-cloak”

• Disable cookies on your Web browser or use cookie management software, such as Junkbuster.

• Use a “throw-away” e-mail address on a free Web-based service such as Hotmail.

• Tell children not to divulge any personal information to strangers online without first asking permision.

• Don’t fill out site registration form unless you see a privacy policy statement indicating that the information you supply will not be sold to third parties.

Page 9: Computer ethics

Computer Crime: Tools and Techniques

• Password guessing

• Shoulder surfing

• Packet sniffers

• Dumpster diving

• Social Engineering

• Superuser status

Page 10: Computer ethics

SALAMI SHAVING AND DATA

• Salami Shaving – a programmer alters a program so that it subtracts a very small amount of money from each account.

• Data Diddling- insiders modify data so that it’s difficult or impossible to tell that they’ve stolen fund or equipment.

Page 11: Computer ethics

COMPUTER VIRUSES• Computer Virus - a computer program that can copy itself and

infect a computer without permission or knowledge of the user.• File infectors – attached themselves to a program file.• Boot sector virus – propagates by means of in infected program, but

it installs itself at the beginning of a hard drive.• Macro Virus – Take advantage of the automatic command

execution capabilities• Executable File- program that can run on a given computer

Platform.• E-mail Attachment-a computer file that is included with an e-mail

message.Plain Text – safe file

Page 12: Computer ethics

MORE ROGUE PROGRAMS• Time bombs- also called logic bombs, are designed to sit harmlessly

on a system until a certain event or set of circumstance causes the program to become active.

• Worm – resembles a computer virus in that it can spread from one computer to another. Can propagate over a computer network.

• Trojan Horse – is disguised as a useful program, but it contains hidden instructions to perform a malicious task instead. Sometimes a trojan horse is disguised as a game or a utility program that users will find appealing.

Page 13: Computer ethics

ATTACKERS• Hackers – computer hobbyist who enjoy pushing computer system to

their limits

• Crackers – obsessed with gaining entry to highly secure computer systems

• Cyber Gang – bring crackers together by means of the internet and physical meetings.

• Computer virus Author - Makers of Computer Viruses

• Disgruntled Employees – Kick out employees

• Fraud Artist - Swindlers & Shills

Page 14: Computer ethics

Cyberstalkers & Sexual Predators• Cyberstalking – define as the use of the internet e-mail, and other

electronic communication media to harass or threaten a person repeatedly.

• Cybersex - a virtual sex encounter in which two or more persons connected remotely via a computer network send one another sexually explicit messages describing a sexual experience. It is a form of role-playing in which the participants pretend they are having actual sexual relations

Page 15: Computer ethics

INFORMATION WARFARE

• IW – the use of information technologies to corrupt or destroy an enemy’s information and industrial infrastructure.

• Electronic Warfare – The use of electronic device to destroy or damage computer system.

• Network Warfare – hacker-like attacks on the nation’s network infrastructure, including the electronic banking system.

• Structural Sabotage – Attacks on information systems that support transportation, finance, energy and telecommunication.

Page 16: Computer ethics

Spotlight Ethics

• Plagiarism – The presentation of Somebody else’s work as if it were your own.• At some colleges, plagiarism can get you thrown out of school on

the first offense.

• Copyright Infringement – Plagiarizing copyrighted material.

Page 17: Computer ethics

Ten Commandments for Computer Ethics1. Thou shalt not use computer to harm other people.

2. Thou shalt not interfere with other people’s computer work.

3. Thou shalt not snoop around in other people’s files.

4. Thou shalt not use a computer to steal.

5. Thou shalt not use a computer to bear false witness.

6. Thou shalt not copy or use propriety software for which you have not paid.

7. Thou shalt not use other people’s computer resources without authorization or proper compensation.

8. Thou shalt not appropriate other people’s intellectual output.

9. Thou shalt think about the social consequences of the program you write or the system you design.

10. Thou shalt use a computer in ways that show consideration and respect for your fellow Humans.

Page 18: Computer ethics

Summary• Respecting yourself

• Respecting Others

• Respecting Academic Integrity