la1 1.2

15
LEARNING AREA 1 Information and Communication Technology and Society 1.2 Computer Ethics and Legal Issues

Upload: nur-zulaikha

Post on 30-Mar-2016

216 views

Category:

Documents


0 download

DESCRIPTION

presentation

TRANSCRIPT

Page 1: LA1 1.2

LEARNING AREA 1

Information and Communication Technology and Society

1.2 Computer Ethics and Legal Issues

Page 2: LA1 1.2

1.2.1 Definition

1.2.1.1 Define Computer ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law

1.2.1.2 Differentiate between ethics and law

1.2.1.3 State the need for intellectual property laws

Page 3: LA1 1.2

1.2.1.1

Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law

Page 4: LA1 1.2

Computer Ethics

Is a system of moral standards or moral values used as a guideline for computer users.

Page 5: LA1 1.2

Code of Ethics

A written set of guidelines issued by an organization to its workers and management to help them conduct their action in accordance to its primary values and ethical standards.

Page 6: LA1 1.2

Intellectual Property

Is the property that results from original creative thought, as patents, copyright material, and trademarks.

Page 7: LA1 1.2

Privacy

Is the right of individuals and companies to deny or restrict the collection and use of information about them.

Page 8: LA1 1.2

Computer Crime

Are any illegal acts that involves computers.

Page 9: LA1 1.2

Cyber Law

Is any law relating to protect the Internet and other online communication technology.

Page 10: LA1 1.2

1.2.1.2 Differentiate between Ethics and Law

• As a guideline to computer users. • As a rule to control computer users.

• Computer users are free to follow or ignore the code of ethics.

• Computer users must follow the regulations and law.

• Universal, can be applied anywhere, around the world.

• Depends on the country and state where the crime is committed.

• To produce ethical computer users. • To prevent misuse of computers.

• Not following the code of ethics are considered immoral.

• Disobeying the law is considered a crime.

Page 11: LA1 1.2

1.2.1.3 State the Need for Intellectual Property Law

There are four different types of Intellectual Property protection. They are patents for invention, trademarks for brand identity, designs for product appearance and copyright for material. Intellectual property law is needed for:

•to establish and safeguard the intellectual property which refers to work created by inventors, authors and artists.

•as business today continues to expand globally.

Page 12: LA1 1.2

1.2.2 Privacy

1.2.2.1 Ways to protect privacy.

1.2.2.2 Authentication and verification methods/technologies.

Page 13: LA1 1.2

1.2.2.1 Ways to protect privacyPrivacy can be protected by privacy law and utilities software.

(a) Privacy law - Malaysia emphasises on the following:

• Security services to review the security policy.

• Security Management to protect the resources.

• Security Mechanism to implement the required security services.

• Security Objects, the important entities within the system environment.

(b) Utilities software

Example: anti-spam program, firewall, anti-spyware and antivirus.

Page 14: LA1 1.2

1.2.2.2 Authentication and Verification Methods/Technology

Methods of AuthenticationTwo commonly used methods are biometric device and callback system.

• Biometric device is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. Biometric devices include Fingerprint Recognition, Facial Recognition, Hand Geometry, Iris Scanning, Retinal Scanning, Voice Recognition & Signature Verification.

• Callback system refers to the checking system that authenticates the user.

Page 15: LA1 1.2

Methods of Verification

There are two methods used, which are user identification and processed object.

• User identification refers to the process of validating the user.

• Processed object refers to something the user has such as identification card, security token and cell phone.