Computer and Ethics. Ethical Problems Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

POSSIBLE THREATS TO DATA
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Introduction to Information Literacy 1 M06: Economic, Legal, and Social Issues for Use of Information See also: Chapter 7, Riedling.
SECURITY CHECK Protecting Your System and Yourself Source:
Crime and Security in the Networked Economy Part 4.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Chapter 11 Security and Privacy: Computers and the Internet.
Protecting People and Information: Threats and Safeguards
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Unit 2 - Hardware Computer Security.
Joseph Pettaway ED505. What is Digital Citizenship? Concepts that aids individuals in learning and understanding how to use technology appropriately.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Computer Programming I
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
Viruses & Destructive Programs
Cyber Security Anchorage School District – 7 th grade Internet Safety.
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
According to netiquette simply refers to our behavior the internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Security CS Introduction to Operating Systems.
Cassidy Culligan Digital Citizenship Project ED 505.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Data Security.
Topic 5: Basic Security.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Ethics Unit 1. What does ethical mean? Following rules or doing the right thing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Any criminal action perpetrated primarily through the use of a computer.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Security Issues & Ethics in Education By Maud Mushayamunda.
Done by… Hanoof Al-Khaldi Information Assurance
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Computer Programming I
Securing your system, protecting your digital data and devices.
Lesson 2- Protecting Yourself Online
Presentation transcript:

Computer and Ethics

Ethical Problems Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics in decision making, to guide us. This code contains the main principles which we should revise before making a decision

P.A.P.A. model - I Privacy: –What information about one's self or one's associations must a person reveal to others, under what conditions and with what safeguards? –What things can people keep to themselves and not be forced to reveal to others?

P.A.P.A. model -II Accuracy: –Who is responsible for the authenticity, fidelity, and accuracy of information? –Who is to be held accountable for errors in information and how is the injured party to be made whole?

P.A.P.A. model -III Property: –Who owns information? –What are the just and fair prices for its exchange? –Who owns the channels, especially the airways, through which information is transmitted? –How should access to this scarce resource be allocated?

P.A.P.A. model -IV Accessibility: –What information does a person or an organization have a right or a privilege to obtain, under what conditions and with what safeguards?

P.A.P.A. model - I Privacy: –We have a lot of private data stored in computers: S.S.#, medical information, credit card #s, that must be kept from prying eyes. –With your credit card # and S.S. # someone could steal your financial identity

P.A.P.A. model -II Accuracy: –The amount you own in one of your credit card is increased because someone else has used your card without your knowledge. –Your transcript does not coincide with your real grades in some courses.

P.A.P.A. model -III Property: –Your last paper has been copied and handed in as if it were from another person. –The computer game has been copied, without the programmer receiving proper compensation for his/her effort.

P.A.P.A. model -IV Accessibility: –Credit bureaus have information about you (about all of us, as a matter of fact). Should you be able to request a copy of your information? Should you be able to ask for corrections if it is wrong?

Tools The previous principles should guide us in our decision making. We can’t assume that everybody is going to follow them. We may use some tools to protect ourselves. Specially in relation with the first 3 principles

Tools Use passwords to allow different kinds of access (Read, write, no-access), protecting your privacy and property. Have a disaster recovery plan –Use backups –Big enterprises need to have hot sites

Tools Use encryption programs that will also protect your privacy and property. Use anti-virus software, to protect your property and the accuracy of your information Use anti-spyware programs to detect spyware and adware in your system

Need of Tools - I Why do we need to use these tools? Because of the existence of –Hackers (Person who access your computer) –Viruses (Program which attaches to a file and reproduces itself into another files) –Worms (Program that reproduces itself from computer to computer)

Need of Tools - II Why do we need to use these tools? Because of the existence of –Trojan Horses (Program that seems to perform a job, when really they are doing something else) –Key-loggers (Program that records to a file everything that is typed on the keyboard. The file is sent to the creator to the program) –Phishing (Sending an claiming to be a legitimate site, to obtain private information for identity theft)

Tools For accessibility we must rely on laws, to enforce the accessibility of data. Otherwise the other party will not supply the information. –We have the Freedom of Information Act –Federal law requires that credit bureaus sent a credit report to anyone that ask for it, free of charge.