+ All Categories
Home > Documents > By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines...

By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines...

Date post: 21-Dec-2015
Category:
View: 214 times
Download: 0 times
Share this document with a friend
Popular Tags:
12
By Connie Lopez By Connie Lopez
Transcript

By Connie LopezBy Connie Lopez

Main PointsMain Points1.1. Computer Technology Arises ConcernsComputer Technology Arises Concerns

2.2. Computer Ethics & Guidelines that Computer Ethics & Guidelines that Govern the morally acceptable use of Govern the morally acceptable use of Computers in our societyComputers in our society

3.3. Privacy Issues related to the InternetPrivacy Issues related to the Internet

4.4. Computer Crime & the CriminalsComputer Crime & the Criminals

5.5. Ways to Protect your SecurityWays to Protect your Security

6.6. Common Types of Physical & mental Common Types of Physical & mental Illnesses arising from Computer useIllnesses arising from Computer use

7.7. Ways to protect the Computer Industry Ways to protect the Computer Industry

Most Significant Concerns

Privacy-What are our threats to personal privacy & How can we protect ourselves?

Security-How can we access to our personal data be controlled?

2nd Most Significant Concerns

Ergonomics-What are the physical & mental risks of technology & can they be eliminated?

Environment-What can we do to minimize the impact of technology on our environment?

Computer Ethics & Guidelines Computer Ethics & Guidelines

Privacy-Privacy- concerns concerns the collection & the collection & use of data about use of data about individualsindividuals

Accuracy-Accuracy- relates relates to the to the responsibility of responsibility of those who collect those who collect data to ensure that data to ensure that the data is correctthe data is correct

Property-Property- relates to relates to who owns data and who owns data and right of softwareright of software

Access-Access- relates to relates to the responsibility the responsibility of those who have of those who have data to control and data to control and who is able to use who is able to use the datethe date

Privacy IssuesPrivacy Issues

• Large Databases gather detailed personal information on individuals that are public & non-public, however, this raises concerns about:

Identity Theft – illegal assumption of someone’s identity for economic gain

Mistaken Identity - an electronic profile of one person is switched with another

The Internet & the WebWeb activity is monitored by:

Traditional Cookies-When you first visit a site, a cookie is

deposited and begins to monitor your activities, but when you exit site it becomes a dormant

Ad Network or

Adware cookies-Monitors your activities,

however, deposits itself on your hard disk and compiles and marks your information

Computer CriminalsComputer CriminalsA computer crime is an illegal action in which A computer crime is an illegal action in which

the perpetrator uses special knowledge of the perpetrator uses special knowledge of computer technology, there are five types:computer technology, there are five types:

Employees- largest category, mainly because Employees- largest category, mainly because they have easier access.they have easier access.

Outsider Users- sometimes have access to Outsider Users- sometimes have access to company’s computers systems. company’s computers systems.

Hackers & Crackers- Hackers gain Hackers & Crackers- Hackers gain unauthorized access to computers for fun or unauthorized access to computers for fun or for a challenge and Crackers access for a challenge and Crackers access computers for malicious purposes.computers for malicious purposes.

Organized Crime- counterfeiters and forgers.Organized Crime- counterfeiters and forgers. Terrorists- potentially crash satellites and Terrorists- potentially crash satellites and

wage economic warfare.wage economic warfare.

Computer CrimeComputer Crime

Viruses-Programs that migrate throughNetworks and operating systems And once activated they can alter or Delete files.

Worms-Are special type of viruses which do not attach to filesOr programs. Rather it fills a computer with self-replicatinginformation

Trojan Horses-Programs that come into a computer Disguised as something else. They are not Viruses but in fact carry viruses.

Measures to Protect your Computer SecurityMeasures to Protect your Computer Security

Use ENCRYPTING, by coding all messages sent over a network

Use RESTRICTING, by limiting access to unauthorized persons

Use ANTICIPATING, by preparing for disasters by ensuring physical security and data security

Use BACKING UP, by routinely copying data and storing it at a remote location

Physical Health & Mental Physical Health & Mental RisksRisks• Eyestrain & Headaches-Eyestrain & Headaches- Monitors require using Monitors require using

your eyes at a close range which can create your eyes at a close range which can create eyestrain, headaches, and double vision. Make eyestrain, headaches, and double vision. Make sure screen is 3-4x higher than room light.sure screen is 3-4x higher than room light.

• Back & Neck pain-Back & Neck pain- Many people work at Many people work at monitors and keyboard that are in improper monitors and keyboard that are in improper positions which can cause back pain and neck positions which can cause back pain and neck pain. Make sure you are able to adjust your chair.pain. Make sure you are able to adjust your chair.

• Repetitive stain injury-Repetitive stain injury- it is a number of it is a number of injuries such as carpal tunnel syndrome which injuries such as carpal tunnel syndrome which results in shake hands that require surgery.results in shake hands that require surgery.

• NoiseNoise- computer can be noisy. Acoustical tile & - computer can be noisy. Acoustical tile & sound-muffling covers are available for reducing sound-muffling covers are available for reducing the noise to co-workers.the noise to co-workers.

The EnvironmentThe Environment

The computer environment has responded to

the Energy Star program with the GreenPC……..

How Can U help..

You can help by:

CONSERVING, RECYCLING, & EDUCATING!


Recommended