Social Issues in Computing

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
The Internet.
INTERNET SAFETY.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Using internet and cell phones safely
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Ethics, Security, and Privacy What's Right, What's Wrong, and How Can You Protect Yourself? Chapter 7.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Issues Raised by ICT.
Computer and Society Introduction to: World Wide Web Wild Card
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Cyber Crimes.
By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Unethical use of Computers and Networks
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Monitoring Employees on Networks: Unethical or Good Business?
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
COMPUTER AND IT ETHICS: PERCEPTION OF COMPUTER SCIENCE MAJORS Linda Weiser Friedman Zicklin School of Business, Baruch College and the Graduate Center.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Ethical and Legal Practices in INFORMATION TECHNOLOGY.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Safety Internet Safety LPM
Safety and Security issues of using ICT Alys brooks.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Digital Citizen Project By: Frances Murphey Technology and Education.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
By Jessica Parkinson. Mobile phones have allowed our generation to connect with others all over the world. However, the potential threats are numerous,
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
DIGITAL CITIZENSHIP ED 505 TECHNOLOGY AND EDUCATION (REVISION)
Internet Safety.
Learn how to protect yourself against common attacks
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
COMPUTER CRIME.
Five Unethical Uses of Computers
BCT 2.00 Analyze Technology Issues
Chapter 13 Security and Ethical Challenges.
Social Issues in Computing
Ethical Use of Computers
Web Page Design and Development I Standards
Presentation transcript:

Social Issues in Computing How computers affect your life

Security Theft of Programs and Data: Pirated programs or music Copyright violations = using other’s work without permission Unauthorized access & use: copying information to sell, i.e. customers info stealing plans in development using business computer for personal activities Damage: to data or equipment, including viruses and worms Personal Safety: Stalking or personal attack by someone you met over the Internet Fraudulent accounts & identity theft

Privacy Danger: Large collections of data from varied locations are easily misused. Laws we need: collect only what info needed access restricted to employees with need-to-know personal info released to others only with permission info collected only when person knows it’s being collected and can check accuracy.

Unethical: Spam Spam = any unwanted or un-requested email. An increasing burden! Ads for products or web sites Solicitations for help or investment Pornography Chain letters Fakes to trick you into letting a virus/worm/trojan in Do you get spam and, if so, how many per week. Have you ever bought anything in response to a spam ad Do you keep chain letters going? Why? Do you use anti-spam software? If so, how well does it work for you? Have you ever received spam that looked like it was from YOU?

Can an activity be wrong and not be against the law? Ethics Is the action Right, Wrong, Criminal? Can an activity be wrong and not be against the law?