ITGS Social & Ethical Issues

Slides:



Advertisements
Similar presentations
Voice over the Internet Protocol (VoIP) Technologies… How to Select a Videoconferencing System for Your Agency Based on the Work of Watzlaf, V.M., Fahima,
Advertisements

Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Adapted from David G Kay -- SIGCSE 2003 Intellectual Property -- Introduction What is Intellectual Property? Should creators be assured control of their.
Police 3.6 Politics and Government. DNA Data Collection.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Robert Crawford, MBA West Middle School
Application Layer. This graphic is taken from The Abdus Salam International Centre for Theoretical Physics.
E-Commerce: Regulatory, Ethical, and Social Environments
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Electronic Health Records 3.3 Health. Definition “An electronic health record (EHR) (also electronic patient record/computerised patient record/electronic.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
ITGS Standard Level Mr Gavin Johnson. ITGS The Diploma Programme information technology in a global society (ITGS) course is the study and evaluation.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IB Information Technology in the Global Society (ITGS) Paul Bui Sandy Munnell.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
1 Internet Ethics and Research Collaborations Between Industry and Universities Michael C. Loui Department of Electrical & Computer Engineering, and Coordinated.
1 ITGS – Networking and T. Near and Far: Local Area Network/LAN/, (hubs, switches) Metropolitan Area Network/MAN/ Wide Area Network/WAN/ (backbone) Administrators,
UARC Intellectual Property Management Burney Le Boeuf Director, Aligned Research Program of UARC Professor Emeritus UC Santa Cruz November 12, 2009.
ITGS Social & Ethical Issues
Clark County School District (CCSD)
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
Jeopardy Computer Internet Policy & Legal Potpourri Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Computer Ethics A Necessity for the new era. Why is Computer Ethics Important? The creation and existence of new questions that older laws cannot answer.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
IB Information Technology in a Global Society Introduction to the course ITGS H3 Mr Greenwood (JAG)
Information Ethics Prof. Madya Dr. Rozinah Jamaludin 11 March 2010.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY
(ITGS) INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY Group 3.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Police 3.6 Politics and Government. DNA Data Collection.
1 CS 502: Computing Methods for Digital Libraries Lecture 19 Interoperability Z39.50.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
By : Fiona Minear. What is a networks ? A network is a group of two or more computer systems linked together.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
IB TES Information Technology in a Global Society.
Computer Ethics Chapter 14 – Computers: Understanding Technology.
Invention &Innovation Protecting Your Ideas!. An Invention  An Invention is the creation of something new  An Inventor “comes upon” a new idea  Some.
Multimedia and Computers Introduction to Computers.
Critical Decisions, Myths & Lessons Learned in Networking What is important at the time may be only apparent with hindsight What seems important at the.
© 2010 Pearson Education, Inc. | Publishing as Prentice Hall. Computer Literacy for IC 3 Unit 3: Living Online Chapter 2: Searching for Information.
1 Lecture 1: Introduction Outline course’s focus intruder’s capabilities motivation for security worms, viruses, etc. legal and patent issues.
Terry Kim. IT system behind traffic control systems  Traffic lights based on timer system  Traffic lights based on sensor system  Combination of both.
Strand 1: Social and ethical significance SL/HL core Social and ethical considerations linked to specified IT developments. Students must study the following.
ACCEPTABLE USE POLICY Perry Township Schools. ISTE-T Standard, Description and Rationale Standard #4 Promote and Model Digital Citizenship and Responsibility.
Social and Ethical Issues Overview of strand 1. Topics of strand 1 1. Reliability and integrity 2. Security 3. Privacy and anonymity 4. Intellectual property.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
POLITICAL PROCESS Lana Bilani. Voting and elections Electronic voting is also known as e-voting.
Computer Use In Classroom. A: Acceptable U: Usage P: Policy.
Clouding with Microsoft Azure
Information Security, Theory and Practice.
Legal Resources in Cyberspace
PRIVACY AND SECURITY (CCI410) PERTEMUAN 5 IR. NIZIRWAN ANWAR, MT
Dr. Karen A. Forcht Professor of Information and Decision Sciences
Legal and Ethical Issues in E-Commerce
Acceptable Use Policy.
6. Politics, Ethics and Law
E-Commerce: Regulatory, Ethical, and Social Environments
Learning Area 1 Information And Communication Technology and Society
Robert Crawford, MBA West Middle School ©2014
Trademark And Copyright Solution | Basic Principles Of Copyrights
Trademark, Copyright, And Patents | Get physical and paper proof
Trademark, Copyright, And Patents| Specialist Intellectual Property Lawyer At Aggasso
Aggasso's Trademark Registration Solution helps to protect your firm
Presentation transcript:

ITGS Social & Ethical Issues

Reliability How reliable is it? Example: reliable – giving the same result after repeated trials / usages Example: air traffic control software

Integrity data does NOT change Example: save a file on your computer open it later you EXPECT the file to be unchanged

Security not letting everybody access it Example: school locker

Privacy keeping information private from others; not letting everybody see it Example: medical records

Anonymity not revealing your identity (who you are) Example: chat rooms

Authenticity verifying somebody is who they say they are Example: Driver’s license

Intellectual property ownership of ideas, discoveries, works of art, etc. Examples: patents - iPod trademarks – McDonald’s copyright – mp3s

Equality of access everybody having access to IT Examples: Internet! One Laptop Per Child (OLPC)

Surveillance Observing somebody Examples: SynchronEyes GPS-tracking

Globalization spread of IT resources across the globe (includes businesses) Examples: outsourcing

Cultural diversity globalization  less diversity Examples: Internet and spoken languages

Policies rules and regulations Examples: APS Acceptable Use Policy EVERY business has them

Standards and Protocols widely agreed upon rules Examples: HTML Driver’s licenses Credit card sizes

People and machines the interaction between people and machines usability and design Examples: Graphical User Interfaces (GUI)