 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.

Slides:



Advertisements
Similar presentations
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Advertisements

Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Ethics for Teacher Candidates Teresa Chen Department of Advanced Studies in Education and Counseling California State University, Long Beach.
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
Understanding Business Ethics
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Computer Ethics for Computer Users
Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Ethics, Computing, and the Internet
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Ethics Business Law Sunny Hills High School Mrs. Larsen.
ICS131 – Ethics 11/17/03. IEEE-CS and ACM 1.PUBLIC - Software engineers shall act consistently with the public.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
COMPUTER ETHICS AND LEGAL ISSUES
ETHICS IN USING COMPUTER
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Computers Are Your Future
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
Internet Etiquette or Netiquette
Note addresses of authors: Floridi – Faculty of Philosophy
The Legal System and Ethics in Information Security
Internet Etiquette or Netiquette
Unit 3- Introduction to Computer Ethics
Introduction to Computer Ethics
Ethics & Privacy CSCI 101.
Introduction to Computer Ethics
Computer Ethics.
Presentation transcript:

 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History of Computer Ethics as a field of study  Computer Ethics: Standards of Conduct  Ten Commandments of Computer Ethics  Netiquette PRELIM

 Define computer ethics and information ethics  Identify areas of ethical problems and issues  Discuss computer ethics as an academic discipline.  Determine the computer ethics standards of conduct. I ntroduction to Computer Ethics

 A branch of philosophy that deals with computing-related moral dilemmas  defines ethical principles for computer professionals  professionals must try to avoid unethical behavior whether it is illegal or legal I ntroduction to Computer Ethics

 Today there are numerous illegal and unethical actions that can arise through computer usage  Plagiarism and copyright infringement  Software Piracy  Computer crimes, unauthorized computer access I ntroduction to Computer Ethics

 As a professional you should  Safeguarding secure information  Use and the Internet responsibly I ntroduction to Computer Ethics

 Applying this to:  Direct interaction  Personal correspondence  Telephone  Print media  Radio and television I ntroduction to Computer Ethics

 How it might differ when using a computer:  Scope  Speed  “It seems different with a computer” I ntroduction to Computer Ethics

 Personal intrusion  Privacy  Morals  Dishonesty  Security  Resources  Intellectual property  Inappropriate use  Technology and social responsibility I ntroduction to Computer Ethics

 Computers in the Workplace  Computer Crime  Privacy and Anonymity  Intellectual Property  Professional Responsibility  Globalization I ntroduction to Computer Ethics

 The world of ethics is gray  Ethical conflict is characterized by  Intense feelings  Rapid development I ntroduction to Computer Ethics

1. Do not use a computer to harm other people. 2. Do not interfere with other people's computer work. 3. Do not snoop around in other people's computer files. 4. Do not use a computer to steal. 5. Do not use a computer to bear false witness. 6. Do not copy or use proprietary software for which you have not paid. 7. Do not use other people's computer resources without authorization or proper compensation. 8. Do not use other people's intellectual output. 9. Think about the social consequences of the program you are writing or the system you are designing. 10. Always use a computer in ways that insure consideration and respect for your fellow humans. I ntroduction to Computer Ethics

 The conventions of politeness recognized on Usenet, in mailing lists and .  The most important rule of netiquette is "Think before you post".  Re-read and edit your carefully before you send. Check the spelling and grammar.  When responding to a newsgroup posting, quote the minimum necessary to give some context to your reply and be careful to attribute the quote to the right person.  Only send to the necessary recipients.  is permanent and can be saved forever! I ntroduction to Computer Ethics