+ All Categories
Home > Documents > 1. 2 Computer Ethics

1. 2 Computer Ethics

Date post: 07-Apr-2018
Category:
Upload: amalinanajwa
View: 222 times
Download: 0 times
Share this document with a friend

of 27

Transcript
  • 8/6/2019 1. 2 Computer Ethics

    1/27

    COMPUTER ETHICS AND

    LEGAL ISSUESDEFINITIONComputer Ethics

    Code of Ethics

    Intelectual Property

    Privacy

    Computer crime

    Cyber law

    Differentiate ethics and law

    Need for intellectual property laws

    PRIVACY

    Definition

    Ways to protect privacy

    Authentication andveryfication methods /

    technologies

    CONTROVERSIAL

    CONTENTS & CONTROLS

    Effects of controversial

    contents to society

    Ways of controlling

    access to controversial

    contents

  • 8/6/2019 1. 2 Computer Ethics

    2/27

    COMPUTER ETHICS

    Moral guidelines that govern the use of

    computers and information systems

    used ethical principles to determine theproper course of action to take in

    difficult situation. Although unethical acts may be

    immoral, they are not always illegal,although illegal acts almost always

    unethical MENU

  • 8/6/2019 1. 2 Computer Ethics

    3/27

    CODE OF ETHICS

    an IT code of conduct is a written

    guideline that helps determinewhether specific computer action isethical or unethical. Ethics, as youmay know, are standards or moral

    conduct.

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    4/27

    INTELECTUAL PROPERTY (IP) Unique and original works such as ideas

    inventions, writings, art, processes,company and product names and logos.

    Intellectual property rights are the rights towhich creator are entitled for their work.

    The owner of IP controls its use and isentitled to any benefits arising from suchuse.

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    5/27

    PRIVACY

    Concerns the collection and use of

    data about individuals.

    Information privacy refers to the right of

    individuals and companies to deny orrestrict the collection and use ofinformation about them.

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    6/27

    COMPUTER CRIMEis an illegal action in which the perpetrator uses special

    knowledge of computer technology.

    Computer crime once fell into a few simple categories, suchas software theft or data destruction.

    The dramatically increased access to networks has changedthe focus to damage that can be done by unscrupulous

    people with online access.

    MOST FREQUENTLY REPORTED COMPUTER CRIMES

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    7/27

  • 8/6/2019 1. 2 Computer Ethics

    8/27

    CYBER LAWCyber Law encompasses a wide variety

    of political and legal issues related to

    the internet and othercommunications technology, includingintellectual property, privacy,freedom of expression and

    jurisdiction

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    9/27

    Freedom of expression is the liberty to freely say whatare pleases, as well as the related liberty to hear what

    other have stated recently, It has been commonlyunder understood as encompassing all types ofexpression, including the freedom to create anddistribute movies, pictures, songs, dances and all otherforms of expressive communication.

    Privacy is the ability of an individual or group to stopinformation about themselves from becoming known topeople other than those they choose to give theinformation to.

    Jurisdiction is the power of the court to hear anddecide a a case before it.

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    10/27

    DIFFERENTIATE BETWEEN ETHICS

    AND LAWEthics Law

    - a discipline dealing with good

    and evil and with moral duty

    - moral principles or practice

    Example :

    Using and buying an illegal

    Installation CD

    - a rule of conduct or action

    established by custom or laid

    down and enforced by agoverning authority

    Example :

    Duplicating and selling any

    computer program without license

  • 8/6/2019 1. 2 Computer Ethics

    11/27

    NEED FOR INTELLECTUAL

    PROPERTY LAWS??????

    There are three important terms that

    are used in intellectual property laws.

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    12/27

    Copyright

    Copyright protection provides the creator of a literary orartistic work control over the use and distribution of thatwork.

    Patents

    Patents are designed to protect inventions andencourage inventors to innovate by granting the patentholder exclusive rights to the invention for 20 years.

    Trademarks

    A trademarks is a word, name, symbol, or device usedto distinguish one company and its products fromanother.

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    13/27

    COMPUTER PRIVACY Information privacy refers to the right of individuals

    and companies to deny or restrict the collection anduse of information about them.

    In the past, information privacy was easier tomaintain because information tended to be kept inseparate location. It is now, however technically andeconomically feasible to store large amount of relateddata about individuals in one database. Computers

    also can be used to monitor employees activities.

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    14/27

    Ten Commandments Of

    Computer EthicsCreated by the Computer Ethics Institute

    If Duplicated, Please Cite the Computer Ethics Institute

    1. Thou Shalt Not Use A Computer To Harm Other People.

    2. Thou Shalt Not Interfere With Other Peoples Computer Work.

    3. Thou Shalt Not Snoop Around In Other Peoples ComputerFiles.

    4. Thou Shalt Not Use A Computer To Steal.

    5. Thou Shalt Not Use A Computer To Bear False Witness.

    6. Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid.

    7. Thou Shalt Not Use Other Peoples Computer Resources Without Authorization Or

    Proper Compensation.

    8. Thou Shalt Not Appropriate Other Peoples Intellectual Output.

    9. Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or

    The System You Are Designing.

    10. Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect

    For YourFellow Humans.

  • 8/6/2019 1. 2 Computer Ethics

    15/27

    THE WAYS OF COMPUTER

    PRIVACY

    Password

    Encryption

    Email Privacy

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    16/27

    THE WAYS TO PROTECT

    PRIVACY

    Not just to protect the computer but to makesure that the computer issues by authorized

    worker or user only.

    PASSWORD

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    17/27

    THE WAYS TO PROTECT

    PRIVACY

    ENCRYPTION

    With public key encryption there are two keys, one

    public and the other private. The public key needs to be known.

    To send a message to a friend, you uses his publickey to encrypt the message.

    Your friend then uses his private key to decode themessage after receiving it.

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    18/27

    THE WAYS TO PROTECT

    PRIVACYEMAIL PRIVACY When you send a message by email, the message

    is broken into packets and the packets are sent out

    over the Internet. The number of packets depends on the size of

    message.

    Each message has the internet address of therecipient.

    This means there may be some places between thepackets could be intercepted and examined.

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    19/27

    User Identification (ID) and

    Passwords Possessed Objects

    Biometric Devices

    Callback System

    AUTHENTICATION AND VERIFICATION

    METHODS / TECHNOLOGIES

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    20/27

    User Identification (ID) and

    Passwords

    With a user ID and password, you are required to enter aword or series of characters that matches an entry in anauthorization file stored on the computer or a networkserver.

    Among the password guideline is it must exceed 8

    letters, a combination of two words, an initial numberadded t any parts in the password.

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    21/27

    Are any item that should be brought to enable

    achievement to computer such as badge, key

    or card.

    Possessed Objects

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    22/27

    Biometric Devices

    Confirm the success of the request by

    comparing body characters, hand size, eye

    retina or signature that with keeps is

    computerized such as fingerprint.

    If the digital code in the computer does not

    match the personal characteristic code,

    access is denied.

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    23/27

    Callback System

    It is an access control method sometimes

    used to authenticate remote users.

    To initiate the callback system, you call the

    computer and enter a user ID and password.

    If these entries are valid, the computer

    instructs you to hang up and then calls you

    back at the previously established number.

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    24/27

    EFFECTS OF CONTROVERSIAL

    CONTENTS TO SOCIETY Pornography

    The depiction of erotic behavioursexual excitement

    SlanderTo utter slander against defame

    OR

    To injule or destroy someone reputation bylibel or slander

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    25/27

    Ways of controlling access to

    controversial contents Filtering

    Process of restricting access to certain material on the

    web.

    Many bussiness use content filtering to limit employees Webaccess.

    Some schools, libraries and parents use content filtering torestrict access to minor.

    One approach to content filtering is through a rating systemof the Internet Content Rating Association (ICRA)

    Another approach to content filtering is to use web filteringsoftware.

    MENU

  • 8/6/2019 1. 2 Computer Ethics

    26/27

  • 8/6/2019 1. 2 Computer Ethics

    27/27

    Web filtering software

    A program that restricts access to specified

    Web sites. Some also filter sites that use a

    spesific words.


Recommended