Ethical Issues When Using Computers

Slides:



Advertisements
Similar presentations
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Using the computer appropriately.
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
INTERNET and CODE OF CONDUCT
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Intellectual Property
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
7/3/08 Created by Mae Thomas Property Rights There can be consequences if you violate others' intellectual property rights. (That is, if you copy something.
Principles and Rules of Copyright Copyright is protection for intellectual property.
Ethics And Computers. What are Ethics? Ethics Ethics are: Principles that guide behavior OR the rules of right and wrong behavior that you should follow.
Computer Technology, Mrs. Tom. Using technology in a safe, legal, and responsible way Netiquette – Proper etiquette used in electronic communications.
Computer Ethics for Computer Users
Computer Ethics, Privacy and Security. Computer Ethics Computers are involved to some extent in almost every aspect of our lives They often perform life-critical.
PREPARED BY: YOUR FIRST AND LAST NAME CURRENT DATE Ethics for Computer Use.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Copyright Basics. Intellectual Property Intellectual Property is a unique product or idea created by an individual or organization. Common types of protection.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
For Computer Use in Business
 A set of moral principles or values that govern behavior Personal decisions Personal morals & values  Unethical does not mean illegal.
The Ethical Use of Electronic Media. V Computer Ethics  Resources such as images and text on the Internet are copyrighted.  Plagiarism (using.
The Ethical Use of Electronic Media.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
COPYRIGHT ISSUES IN EDUCATION Presentation by Ben Hilt.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Copyright Law A Guide for Educators. Jolene Hartnett, RDH, BS Seattle Central College © 2015 Certain materials in this program are included under the.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
Computer Ethics Computer Technology 1 By Jill Einerson.
Computer Technology Timpview High School
Computer Technology RULES, LAWS, ETHICS By Megan Rees.
The Ethical Use of Electronic Media. Guilford County SciVis V
Ethics Self Imposed Right and Wrong Behavior Described as:
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
Creative Commons terms and definitions By Chelsey Maton.
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Ethical Issues. Introduction to Copyright, Plagiarism Get out your note sheet.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
Chapter 2 Ethical and Legal Issues © 2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Computer Software Heather Allen. Software Copyright Laws It is illegal for anyone to violate any of the rights provided by the copyright law to the owner.
Plagiarism, Fair Use and Copyright Laws
Computer Safety and Ethics
Computers Are Your Future Twelfth Edition
Using the computer appropriately
Ethical and Legal Issues
Ethical Issues When Using Computers
Using the computer appropriately.
The Ethical Use of Electronic Media.
Physical Safety Issues
The Ethical Use of Electronic Media
The Ethical Use of Electronic Media.
You will be given the answer. You must give the correct question.
Copyright.
Ethical and Legal Issues
Lesson 2- Ethical Use of Digital Resources
BCT 2.00 Analyze Technology Issues
Evaluate It - Lesson 3.
Copyright, Fair Use, and Creative Commons Licensing
Copyright, Fair Use, and Creative Commons Licensing
LEGAL TERMS IN DIGITAL MEDIA
Ethics Computer Technology.
The Ethical Use of Electronic Media.
Using the computer appropriately.
Using the computer appropriately.
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
Presentation transcript:

Ethical Issues When Using Computers The reason ethics are important in computing isn’t the computers; it is the information stored in the computers.

What are Information Ethics? The rules that define right and wrong behavior in the computing profession. They are the basis for trust and cooperation among workers and organizations.

What Information Ethics are not Laws that carry a criminal penalty Detailed instructions for every possible situation

An Ethical person . . . Has an inner sense of what is moral and is able to choose correct behavior in many different situations, including those that are new and different. In the absence of laws or rules, the Ethical person knows what is right or wrong.

Consequences of unethical choices Lost opportunities Destruction of trust Damage to people and things Possible criminal charges

Copyright © Copyrights are a form of protection for the authors of "original works of authorship," including literary, dramatic, musical, artistic, and certain other creative works. Defined as the rights possessed by the author of the work. These rights include: Copying Reselling Leasing Lending Publicly displaying or performing the work Transferring the copyright

Copyright Continued Any software or data created with a computer is owned by its creator and is automatically copyrighted as soon as it’s in any tangible form. “Tangible” means it’s recorded somehow. You cannot copyright a thought.

Trademark ™ A trademark protects a word, phrase, symbol or design (or a combination of these), that identifies and distinguishes the goods or services of one person or company from those of others.

Registered ® The registered trademark bug ® is used to indicate that your trademark is registered with the government, which gives you a wider range of statutory remedies in case of infringement. You only use the registered bug if you've actually registered the trademark formally, but you can use ™ freely. 

Places to look for Copyright notification Packaging containing one of these symbols: © Copyright ™ Trademark ® Registered Symbol stamped on the Disk or CD-ROM Execution of the program

Citing Information Technology has made information readily available. Thus, the issue of misusing information becomes a concern particularly when you use something and claim it as your own. Individuals creating “intellectual property” have the right to receive credit and be protected from the incorrect use of their creations.

“Fair Use” within Copyright Laws You can paraphrase or quote small portions of someone else’s work, provided that you give proper credit to the author for the material that you use.

Plagiarism If you don’t cite your work, you will probably give the impression to some of your readers that the material you borrowed originated with you. Plagiarism is a form of fraud. The dictionary defines fraud as “the act of deceiving or misrepresenting”.

Plagiarism Continued PLAGIARISM is extremely unethical, usually illegal, and always a serious violation of school policy. Don’t PLAGIARIZE, always give credit where credit is due.

Software Licenses When you buy software, you’re not buying the software itself. You’re buying permission to use the software. Breaking “this seal” means you agree to the terms of the license agreement.

Types of software licenses: Public Domain Freeware Shareware Open Source All rights reserved Creative Commons

Public Domain License This software has no owner and is not protected by copyright law. It was either created with public funds, or the ownership was forfeited by the creator Rare Unreliable Poor quality Virus-laden No cost? That may be exactly how much this software is worth.

Freeware License Some freeware is “really good stuff.” Pegasus Mail Freeware is copyrighted software that is licensed to be copied and distributed without charge. Freeware is free because the license says it is, but it’s still under the owner’s control. Some freeware is “really good stuff.” Pegasus Mail Eudora Light Netscape Internet Explorer Firefox

Shareware License The software is licensed for copying and sharing for a trial period, but payment must be made to the owner for permanent use. Some shareware trials expire on a certain date Purchasing (the right to use) the software may also get you a version with more powerful features and published documentation.

Open Source Examples include: Apache Linux Open Office PHP Miro VLC Free and Open Source software refers to the availability of source code. By providing the source code and stipulating that it remain open, programmers can add functionality and features to the software. Changes in the software must be available to other users. Examples include: Apache Linux Open Office PHP Miro VLC AbiWord

All Rights Reserved License May be used by the purchaser according the exact details spelled out in the license agreement. You can’t legally use it--or even possess it-- without the owner’s permission.

All Rights Reserved Characteristics Operate on one PC at a time Make one back-up copy of the software Permission stays with the software Software is not guaranteed for any particular purpose

Creative Commons A Creative Commons (CC) license is one of several public copyright licenses that enable the free distribution of an otherwise copyrighted work. A CC license is used when an author wants to give people the right to share, use and build upon a work that they have created. CC provides an author flexibility to specify who can use the work (for example, they might choose to allow only non-commercial uses of their own work).

Acceptable Use Policy A policy that is established by computer owners regarding acceptable use of the computer. Mountain Crest High School has an Acceptable Use Policy. You signed this AUP, before you were given your login account, giving you access to use the computers.

AUP Guidelines Computer use is a privilege, not a right. These terms are set up by the owners of the computers. By signing the AUP you agreed to these terms.

AUP Guidelines continued Typical AUP guidelines include: Password and Login information Where to store your files Ethical Conduct Not using someone else’s login and password Not using the network for commercial use No illegal activities No obscenity No downloads

School Computers Cannot be used for the following purposes: Commercial purposes (own business) Religious (promote religion) Political (endorse candidates)

Inappropriate Email Uses Spamming: Bulk, mass or repeated mailings. Many copies to one destination or one copy to many destinations. Flaming: Email message that expresses a strong opinion or criticism Trolling: Sending messages that contain statements intending to bait an argument or confrontation. Phishing: A form of criminal activity to fraudulently acquire sensitive information such as credit card details and passwords while masquerading as a trustworthy person or business.

E-mail Messages (as defined by receiver) Nuisance: Messages that continue after the recipient asks that they stop and are defined as a nuisance and are illegal. Harassment: Nuisance messages that are intimidating or threatening are even more illegal.

Conclusion Information Ethics is not just knowing how to make use of computers, it is making good decisions regarding professional and social conduct, specifically when information/computers are involved.