+ All Categories
Home > Documents > Computer Ethics 3

Computer Ethics 3

Date post: 03-Jun-2018
Category:
Upload: jasvinder-singh-it-trainer
View: 225 times
Download: 0 times
Share this document with a friend

of 18

Transcript
  • 8/12/2019 Computer Ethics 3

    1/18

    Computer Ethics, Privacy andSecurity

    By Urvi Amin

    IXARoll No: 36

  • 8/12/2019 Computer Ethics 3

    2/18

  • 8/12/2019 Computer Ethics 3

    3/18

    Ethics Ethics are standards of moral conduct

    Standards of right and wrong behavior

    A gauge of personal integrity

    The basis of trust and cooperation inrelationships with others

  • 8/12/2019 Computer Ethics 3

    4/18

  • 8/12/2019 Computer Ethics 3

    5/18

    Computer Ethics

    Computer ethics are morally acceptable use of

    computers

    i.e. using computers appropriately

    Standards or guidelines are important in thisindustry, because technology changes aremuch faster than the legal systems ability tokeep up

  • 8/12/2019 Computer Ethics 3

    6/18

    Computer Ethics Four primary issues

    Privacyresponsibility to protect data about

    individuals Accuracy- responsibility of data collectors to

    authenticate information and ensure its accuracy

    Property- who owns information and software

    and how can they be sold and exchanged Access- responsibility of data collectors to control

    access and determine what information a personhas the right to obtain about others and how the

    information can be used

  • 8/12/2019 Computer Ethics 3

    7/18

  • 8/12/2019 Computer Ethics 3

    8/18

    Software PiracySPA (Software Publishers Association) policessoftware piracy and mainly targets:

    Illegal duplicationSale of copyrighted software

    Companies that purchase single copies and loadthe software on multiple computers or networks

    Penalties (for primary user of PC) may includefines up to $250,000 and/or imprisonment up to 5years in jail

  • 8/12/2019 Computer Ethics 3

    9/18

  • 8/12/2019 Computer Ethics 3

    10/18

    Gaining access to a website, a software program,a server, or some other type of system usually

    require a password and username.

    If the username or password entered is incorrect,an Unauthorized Access message may bedisplayed.

    This means the user attempted to access thesystem and the authorization (username orpassword) was not valid and access was notgranted.

    Unauthorized access

  • 8/12/2019 Computer Ethics 3

    11/18

  • 8/12/2019 Computer Ethics 3

    12/18

    Ethics for Computer

    ProfessionalsComputer Professionals:

    Are experts in their field,

    Know customers rely on their knowledge, expertise,and honesty,

    Understand their products (and related risks) affectmany people,

    Follow good professional standards and practices, Maintain an expected level of competence and are

    up-to-date on current knowledge and technology,and

    Educate the non-computer professional

  • 8/12/2019 Computer Ethics 3

    13/18

  • 8/12/2019 Computer Ethics 3

    14/18

    Information Ownership

    Issues / Intellectual Property

    Illegal software copying (pirating)

    Infringement of copyrights by copying ofpictures or text from web pages

    Plagiarism by copying text from other sourceswhen original work is expected

  • 8/12/2019 Computer Ethics 3

    15/18

    Computer Crime Computer criminals -using a computer to

    commit an illegal act

    Who are computer criminals?

    Employeesdisgruntled or dishonest --thelargest category

    Outside users - customers or suppliers Hackers and crackers - hackers do it for

    fun but crackers have malicious intent

    Organized crime - tracking illegal enterprises,

    forgery, counterfeiting

  • 8/12/2019 Computer Ethics 3

    16/18

    Types of Computer Crime Damage to computers, programs or files

    Viruses - migrate through systems attached tofiles and programs

    Worms - continuously self-replicate

    Theft

    Of hardware, software, data, computer time

    Software piracy - unauthorized copies ofcopyrighted material

    View/Manipulation

    Unauthorized entry and harmless message

    still illegal

  • 8/12/2019 Computer Ethics 3

    17/18

    Computer security involves protecting:

    information, hardware and software

    from unauthorized use and damage and

    from sabotage and natural disasters

    Computer Security

  • 8/12/2019 Computer Ethics 3

    18/18

    Personal Responsibility

    of Users Conserve

    Turn computers off at end of work day

    Use screen savers Recycle

    Most of the paper we use is eligible

    Dispose of old parts via recycling programsmost computer parts are dangerous inlandfills

    Educate

    Know the facts about ecological issues


Recommended