Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.

Similar presentations


Presentation on theme: "Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information."— Presentation transcript:

1 Computer Ethics

2 Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information that is either not personal or carries your permission for use.Public Data: information that is either not personal or carries your permission for use. Private Data: Information such as credit card numbers or security passwords mean only for personal use.Private Data: Information such as credit card numbers or security passwords mean only for personal use.

3 Ethics Notes (Cont.) Intellectual Property : a product created out of someone’s own thoughts or ideas.Intellectual Property : a product created out of someone’s own thoughts or ideas. Copyright: legal protection for written intellectual propertyCopyright: legal protection for written intellectual property Patent: legal protection for product designs and inventionsPatent: legal protection for product designs and inventions

4 Ethics Notes (Cont.) Trademark: legal protection of logos and symbols.Trademark: legal protection of logos and symbols. Software Piracy: is the unauthorized reproduction or duplication of a software programSoftware Piracy: is the unauthorized reproduction or duplication of a software program Commercial Software: copyrighted software available for purchase.Commercial Software: copyrighted software available for purchase.

5 Ethics Notes (Cont.) Share Ware: copyrighted software that is distributed free of charge on a trial basis. A nominal fee is charged if the user decides to keep it.Share Ware: copyrighted software that is distributed free of charge on a trial basis. A nominal fee is charged if the user decides to keep it. Free Ware: copyright software that is given away free of charge but is still the property of the owner and the user doesn't have the right to distribute copies just the owner.Free Ware: copyright software that is given away free of charge but is still the property of the owner and the user doesn't have the right to distribute copies just the owner.

6 Ethics Notes (Cont.) Public Domain Software: software donated for public use, which can be freely copied and distributed.Public Domain Software: software donated for public use, which can be freely copied and distributed. Software License: Legal permission to use softwareSoftware License: Legal permission to use software –Single User – Good for one computer or person. –Multi-User – Good for a select number of people or computers. –Site License – Good for any computer at your organization.

7 Ethics Notes (Cont.) Plagiarism:Plagiarism: Plagiarism is the act of copying someone else's work and publishing it as your own. This includes text, media, and even ideas. Is it Plagiarism? Spam: e-mail version of junk mailSpam: e-mail version of junk mail

8 Ethics Notes (Cont.) Hacking: is the unauthorized use of a computer or programHacking: is the unauthorized use of a computer or program Spyware:Spyware: capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet.

9 Ethics Notes (Cont.) Sabotage: deliberately causing damage to property (hardware or software).Sabotage: deliberately causing damage to property (hardware or software). Malware: Any harmful programMalware: Any harmful program Computer Virus: a computer program designed to harm a computer’s hardware and/or software usually by replicating itself and delivering harmful data.Computer Virus: a computer program designed to harm a computer’s hardware and/or software usually by replicating itself and delivering harmful data.

10 Ethics Notes (Cont.) Computer Worm: destructive code that bores it way through a computer's files. It can move from computer to computer, dropping off segments of itself as it goes.Computer Worm: destructive code that bores it way through a computer's files. It can move from computer to computer, dropping off segments of itself as it goes. Computer Bomb: destructive code that is set to activate at a certain time or when a specific action is taken.Computer Bomb: destructive code that is set to activate at a certain time or when a specific action is taken.

11 Ethics Notes (Cont.) Trojan Horse :Trojan Horse : destructive code that gains access to a computer disguised as something such as a desirable software program. Once inside the computer, the Trojan horse can do its damage but it cannot spread from disk to disk or computer to computer.

12 Ethics Notes (Cont.) Anti-Spyware Program: Program designed to find and remove spyware from a computer system.Anti-Spyware Program: Program designed to find and remove spyware from a computer system. Virus Protection Program: software designed to protect a computer system from viruses, usually containing a virus disinfectant program and an anti-virus program.Virus Protection Program: software designed to protect a computer system from viruses, usually containing a virus disinfectant program and an anti-virus program.

13 Ethics Notes (Cont.) Virus Disinfectant Program: a program used to search for viruses that may be established on a hard drive (doesn't automatically search).Virus Disinfectant Program: a program used to search for viruses that may be established on a hard drive (doesn't automatically search). Anti Virus Program: a program that automatically checks each floppy disk as it is inserted into the disk drive and scans all data from telecommunications devices to locate and give warning of any virus that may be likely to enter a computer.Anti Virus Program: a program that automatically checks each floppy disk as it is inserted into the disk drive and scans all data from telecommunications devices to locate and give warning of any virus that may be likely to enter a computer.


Download ppt "Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information."

Similar presentations


Ads by Google