Presentation is loading. Please wait.

Presentation is loading. Please wait.

Using the computer appropriately.

Similar presentations


Presentation on theme: "Using the computer appropriately."— Presentation transcript:

1 Using the computer appropriately.
Ethics, Rules, and Laws Using the computer appropriately. S. Agarwal, St. Xavier’s College, Kolkata

2 What are ethics Standards of right and wrong behavior
A gauge of personal integrity The basis of trust and cooperation in relationships with others Back to Slide 1 S. Agarwal, St. Xavier’s College, Kolkata

3 What are ethics not? Laws that carry a criminal penalty
Detailed instructions for every possible situation Flexible and changing depending on each unique person or situation S. Agarwal, St. Xavier’s College, Kolkata

4 Where do ethics come from?
Values of a society Values of a school, business, or organization Values from family and heritage Values of an individual S. Agarwal, St. Xavier’s College, Kolkata

5 An ethical person . . . Has an inner sense of what is moral and
S. Agarwal, St. Xavier’s College, Kolkata

6 is able to choose correct behavior in many different situations, including those that are new and different. S. Agarwal, St. Xavier’s College, Kolkata

7 What follows an unethical choice?
Lost opportunities Destruction of trust Damage to people and things And ? S. Agarwal, St. Xavier’s College, Kolkata

8 Ethics vs. morality Morality refers to the rules and standards governing our conduct in society. Ethics: The philosophical study of morality. Analogy: Society= a town full of people driving car Morality is the road network, the traffic rules and regulations Ethics is the observation and evaluation of the drivers’ conduct: Ethical (staying on the road) or unethical (taking short cuts, speeding, drunk driving etc). S. Agarwal, St. Xavier’s College, Kolkata

9 What is Computer Ethics?
An attempt at definitions: Computer ethics is concerned with standards of conduct applying to the use of computers. Computer ethics can be understood as that branch of applied ethics which studies and analyzes social and ethical impacts of information technology. S. Agarwal, St. Xavier’s College, Kolkata

10 Why do we need computer ethics?
New technology poses new problems. The growth of the Internet has created several new legal issues  Traditional laws are outdated/anachronistic in cyberspace Some main concerns in computer ethics today are questions of copyright privacy censorship Example: My MSc. thesis was copied and parts were published under a different name. Is this something I should anticipate since I published my work on the Internet without any copyright restrictions? S. Agarwal, St. Xavier’s College, Kolkata

11 Basic Ethical Principles
The same in all professions and other aspects of life Honesty Responsibility Fairness Tolerance There are cultural differences. Example: In Poland it is unethical to throw away bread. Ethics change with the times and a change in laws S. Agarwal, St. Xavier’s College, Kolkata

12 New technology = new ethical problems
Traditional rules of conduct are not always applicable to a new medium A question that often arises: Should a device, a technique or technology be restricted because people can use it for illegal or harmful actions as well as beneficial ones? Example Mobile phones now come equipped with cameras. It can be misused in several ways and cause a moral threat to the society, children and teen agers, speacialy the students. Question : Should students be allowed to take their mobile phones to school or not? S. Agarwal, St. Xavier’s College, Kolkata

13 The ’Ten Commandments of Computer Ethics’
THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE. THOU SHALT NOT INTERFERE WITH OTHER PEOPLE'S COMPUTER WORK. THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE'S COMPUTER FILES. THOU SHALT NOT USE A COMPUTER TO STEAL. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS. THOU SHALT NOT COPY OR USE PROPRIETARY SOFTWARE FOR WHICH YOU HAVE NOT PAID. THOU SHALT NOT USE OTHER PEOPLE'S COMPUTER RESOURCES WITHOUT AUTHORIZATION OR PROPER COMPENSATION. THOU SHALT NOT APPROPRIATE OTHER PEOPLE'S INTELLECTUAL OUTPUT. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU ARE WRITING OR THE SYSTEM YOU ARE DESIGNING. THOU SHALT ALWAYS USE A COMPUTER IN WAYS THAT INSURE CONSIDERATION AND RESPECT FOR YOUR FELLOW HUMANS. S. Agarwal, St. Xavier’s College, Kolkata

14 INTERNET ETHICS AND OBJECTIONABLE MATERIALS
Three categories of objectionable material Pornographic material Racist literature Illegal acts Incorrect, inappropriate, or dangerous material Inaccurate information S. Agarwal, St. Xavier’s College, Kolkata

15 What are rules Specific guidelines about appropriate use of computers as outlined in . . . Acceptable Use Policies (AUPs) Professional Codes of Ethics Classroom Disclosures Back to Slide 1 S. Agarwal, St. Xavier’s College, Kolkata

16 with . . . consequences and punishments issued by the computer owners if rules are violated. This way to AUP S. Agarwal, St. Xavier’s College, Kolkata

17 S. Agarwal, St. Xavier’s College, Kolkata

18 What are laws Regulations passed by state and federal bodies that protect against some forms of misuse of computers and information resources. Back to Slide 1 S. Agarwal, St. Xavier’s College, Kolkata

19 So what if I break the law?
You may not be discovered, this time, but next time . . . A serial number may be traced A help line may become suspicious An acquaintance may report you A web address may record your visits And more . . . S. Agarwal, St. Xavier’s College, Kolkata

20 And just like that, you’re a criminal . . .
with a record and maybe a fine and maybe even a jail sentence when you’re convicted of breaking the law. S. Agarwal, St. Xavier’s College, Kolkata

21 Copyright laws. Software developers own their programs.
Software buyers only own the right to use the software according to the license agreement. No copying, reselling, lending, renting, leasing, or distributing is legal without the software owner’s permission. S. Agarwal, St. Xavier’s College, Kolkata

22 Copyright vs. Plagiarism
One who violates copyright breaks laws that protect the rights of the creator of an original work Violation of copyright law may results in fines, imprisonment, or both Plagiarism One who plagiarizes breaks a moral code by claiming credit for the work of someone else Plagiarism may result in academic dismissal or loss of job. S. Agarwal, St. Xavier’s College, Kolkata

23 Software licenses: Four types
Public Domain Freeware Shareware All Rights Reserved S. Agarwal, St. Xavier’s College, Kolkata

24 Public Domain License This software has no owner and is not protected by copyright law. It was either created with public funds, or the ownership was forfeited by the creator. Rare Unreliable Poor quality Virus-laden No cost? That may be exactly how much this software is worth. S. Agarwal, St. Xavier’s College, Kolkata

25 Freeware License Freeware is copyrighted software that is licensed to be copied and distributed without charge. Freeware is free because the license says it is, but it’s still under the owner’s control. Some freeware is “really good stuff.” Pegasus Mail Eudora Light Netscape Internet Explorer S. Agarwal, St. Xavier’s College, Kolkata

26 Shareware License Some shareware trials expire on a certain date
The software is licensed for copying and sharing for a trial period, but payment must be made to the owner for permanent use. Some shareware trials expire on a certain date Payment depends on the honor system Purchasing (the right to use) the software may also get you a version with more powerful features and published documentation. S. Agarwal, St. Xavier’s College, Kolkata

27 All Rights Reserved License
May be used by the purchaser according the exact details spelled out in the license agreement. You can’t legally use it--or even possess it-- without the owner’s permission. S. Agarwal, St. Xavier’s College, Kolkata

28 Software License Agreement
Excerpts from QuarkXPress software license agreement The software and accompanying documentation may not be transmitted electronically, including over the Internet, rented, loaned, leased, sold, distributed, made available, directly or indirectly, for USE by any other person or entity not covered by this License Agreement. Customers who have purchased a Single-User license may INSTALL and USE the SOFTWARE on one computer. IF YOU DO NOT ACCEPT THIS LICENSE AGREEMENT, DO NOT OPEN THE ENCLOSED PACKET OR BREAK THE SEAL ON THE CD-ROM The only right granted to the Customer is the right to USE the SOFTWARE and accompanying documentation in accordance with this License Agreement. The customer may not modify, translate, copy, reproduce, reverse engineer, disassemble, decompile, or otherwise derive source code from, the SOFTWARE or accompanying documentation, or use it as a basis for the preparation of other software programs S. Agarwal, St. Xavier’s College, Kolkata

29 Even if no one will ever find out.
Even if you can. Even if no one will ever find out. Follow the license agreement or you will be breaking the law. S. Agarwal, St. Xavier’s College, Kolkata

30 Software piracy. Conviction of a first offense can result in a fine of up to ,000. and a jail sentence of up to five years. S. Agarwal, St. Xavier’s College, Kolkata

31 S. Agarwal, St. Xavier’s College, Kolkata

32 Laws about nuisance or harassment.
It doesn’t matter if your intention was to be funny, or friendly, or something else. If the person you contact through the Internet is uncomfortable, Or it’s illegal. STOP! S. Agarwal, St. Xavier’s College, Kolkata

33 Laws concerning fraud or plagiarism.
Individuals who create “intellectual property” have the right to receive credit Owners of recorded works deserve to be protected from the incorrect use of their creations S. Agarwal, St. Xavier’s College, Kolkata

34 Be sure to give credit where credit is due.
Cite borrowed material with textual citations and a references slide using an accepted format. Use material in a way that preserves the meaning and context intended by the author S. Agarwal, St. Xavier’s College, Kolkata

35 Laws about vandalism. Attempts to harm or destroy data or hardware of another user, agency, or network can be prosecuted to the full extent of the law. S. Agarwal, St. Xavier’s College, Kolkata

36 Laws about privacy. Private information cannot be legally used without permission from its owner. Information is owned by the person it describes. Medical records and school grades are protected by privacy laws. S. Agarwal, St. Xavier’s College, Kolkata

37 Other categories of personal information have become more public in recent years. Courts have not set a consistent precedent to preserve the privacy of your full name, address, telephone numbers, debts you owe, court judgments against you, courses you’ve taken, and police actions relating to you. S. Agarwal, St. Xavier’s College, Kolkata

38 Don’t share personal information without that person’s permission.
Be ethical. Don’t share personal information without that person’s permission. S. Agarwal, St. Xavier’s College, Kolkata

39 Always consider ethics, rules, and laws as you choose how to behave when using computers.
S. Agarwal, St. Xavier’s College, Kolkata

40 THANKS… S. Agarwal, St. Xavier’s College, Kolkata


Download ppt "Using the computer appropriately."

Similar presentations


Ads by Google