By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Security, Privacy, and Ethics Online Computer Crimes.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
Ergonomics & The Environment Derek Franks Comm 165.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Presented by Student Name Workplace Issues – Lecture 4.
Computer and Ethics. Ethical Problems Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics.
Security Issues and Ethics in Education
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Chapter 11 Security and Privacy: Computers and the Internet.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
Unit 19 INTERNET SECURITY
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
C OMPUTING E SSENTIALS Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary.
Cyber crime & Security Prepared by : Rughani Zarana.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Computer Skills and Applications Computer Security.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Privacy, Security and Ethics
Society & Computers PowerPoint
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Security Issues & Ethics in Education By Maud Mushayamunda.
10 PRIVACY AND SECURITY CHAPTER
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
3.6 Fundamentals of cyber security
Chapter 10 Privacy and Security.
10 PRIVACY AND SECURITY CHAPTER
Identify the most significant concerns for effective implementation of computer technology.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 10 Privacy and Security McGraw-Hill
10 PRIVACY AND SECURITY CHAPTER
Chapter 10: Privacy, Security, and Ethics
Chapter 10: Privacy, Security, and Ethics
Chapter9.
Chapter 13 Security and Ethical Challenges.
Chapter9.
Chapter 10: Privacy, Security, and Ethics
HOW DO I KEEP MY COMPUTER SAFE?
Chapter 10 Privacy and Security.
10 PRIVACY AND SECURITY CHAPTER
Presentation transcript:

By Connie Lopez

Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers in our society 3. Privacy Issues related to the Internet 4. Computer Crime & the Criminals 5. Ways to Protect your Security 6. Common Types of Physical & mental Illnesses arising from Computer use 7. Ways to protect the Computer Industry

Most Significant Concerns  Privacy- What are our threats to personal privacy & How can we protect ourselves?  Security- How can we access to our personal data be controlled?

2 nd Most Significant Concerns  Ergonomics- What are the physical & mental risks of technology & can they be eliminated?  Environment- What can we do to minimize the impact of technology on our environment?

Computer Ethics & Guidelines Privacy- concerns the collection & use of data about individuals Accuracy- relates to the responsibility of those who collect data to ensure that the data is correct Property- relates to who owns data and right of software Access- relates to the responsibility of those who have data to control and who is able to use the date

Privacy Issues Large Databases gather detailed personal information on individuals that are public & non-public, however, this raises concerns about:  Identity Theft – illegal assumption of someone’s identity for economic gain  Mistaken Identity - an electronic profile of one person is switched with another

The Internet & the Web Web activity is monitored by: Traditional Cookies- When you first visit a site, a cookie is deposited and begins to monitor your activities, but when you exit site it becomes a dormant Ad Network or Adware cookies- Monitors your activities, however, deposits itself on your hard disk and compiles and marks your information

Computer Criminals A computer crime is an illegal action in which the perpetrator uses special knowledge of computer technology, there are five types:  Employees- largest category, mainly because they have easier access.  Outsider Users- sometimes have access to company’s computers systems.  Hackers & Crackers- Hackers gain unauthorized access to computers for fun or for a challenge and Crackers access computers for malicious purposes.  Organized Crime- counterfeiters and forgers.  Terrorists- potentially crash satellites and wage economic warfare.

Computer Crime Viruses- Programs that migrate through Networks and operating systems And once activated they can alter or Delete files. Worms- Are special type of viruses which do not attach to files Or programs. Rather it fills a computer with self-replicating information Trojan Horses- Programs that come into a computer Disguised as something else. They are not Viruses but in fact carry viruses.

Measures to Protect your Computer Security Use ENCRYPTING, by coding all messages sent over a network Use RESTRICTING, by limiting access to unauthorized persons Use ANTICIPATING, by preparing for disasters by ensuring physical security and data security Use BACKING UP, by routinely copying data and storing it at a remote location

Physical Health & Mental Risks Eyestrain & Headaches- Monitors require using your eyes at a close range which can create eyestrain, headaches, and double vision. Make sure screen is 3-4x higher than room light. Eyestrain & Headaches- Monitors require using your eyes at a close range which can create eyestrain, headaches, and double vision. Make sure screen is 3-4x higher than room light. Back & Neck pain- Many people work at monitors and keyboard that are in improper positions which can cause back pain and neck pain. Make sure you are able to adjust your chair. Back & Neck pain- Many people work at monitors and keyboard that are in improper positions which can cause back pain and neck pain. Make sure you are able to adjust your chair. Repetitive stain injury- it is a number of injuries such as carpal tunnel syndrome which results in shake hands that require surgery. Repetitive stain injury- it is a number of injuries such as carpal tunnel syndrome which results in shake hands that require surgery. Noise- computer can be noisy. Acoustical tile & sound- muffling covers are available for reducing the noise to co-workers. Noise- computer can be noisy. Acoustical tile & sound- muffling covers are available for reducing the noise to co-workers.

The Environment The computer environment has responded to the Energy Star program with the Green PC…….. How Can U help.. You can help by: CONSERVING, RECYCLING, & EDUCATING!