Ethics and Online Issues

Slides:



Advertisements
Similar presentations
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Rockingham County Public Schools Technology Acceptable Use Policy
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Ethics and Online Issues
Using the computer appropriately.
Laptop Responsibilities Memorial Middle School Laredo ISD.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Introduction to Information Literacy 1 M06: Economic, Legal, and Social Issues for Use of Information See also: Chapter 7, Riedling.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
Computer Technology Day 18
Boyertown Area School District Acceptable Use Policy.
Security, Privacy, and Ethics Online Computer Crimes.
Social and Ethical Issues Piracy & Copyright. Piracy.
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Licenses A Legal Necessity Copyright © 2015 – Curt Hill.
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
Ethics And Computers. What are Ethics? Ethics Ethics are: Principles that guide behavior OR the rules of right and wrong behavior that you should follow.
Computer Technology, Mrs. Tom. Using technology in a safe, legal, and responsible way Netiquette – Proper etiquette used in electronic communications.
Computer Ethics for Computer Users
Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Computer Ethics, Privacy and Security. Computer Ethics Computers are involved to some extent in almost every aspect of our lives They often perform life-critical.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
PREPARED BY: YOUR FIRST AND LAST NAME CURRENT DATE Ethics for Computer Use.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
For Computer Use in Business
CEDAR HEIGHTS MIDDLE SCHOOL Parent One-to-One presentation.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
IT in Business Issues in Information Technology Lecture – 13.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computer Ethics Computer Technology 1 By Jill Einerson.
Computer Technology Timpview High School
Woodland Hills School District Computer Network Acceptable Use Policy.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
Computer Technology RULES, LAWS, ETHICS By Megan Rees.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Computer Safety and Ethics
Computers Are Your Future Twelfth Edition
Using the computer appropriately
Using the computer appropriately.
Lesson 2- Ethical Use of Digital Resources
BCT 2.00 Analyze Technology Issues
Ethics and Online Issues
Ethics Computer Technology.
Using the computer appropriately.
Using the computer appropriately.
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
Presentation transcript:

Ethics and Online Issues Using the computer and online resources appropriately.

What are your responsibilities? What are ETHICS? What are your responsibilities? What are the rules? During this presentation you will learn about ethical issues concerning computer usage. Don’t get stuck doing something illegal with computers and/or online resources.

Computer Issues. Security Information Privacy Ethics

Security Computer Viruses Executable files that insert intrusive programs among other files Infects file on your computer Cause various kinds of damage to computer data

Security Unauthorized Access and Use Breaking into computer systems without proper access rights (Hacking) How would you feel about someone hacking into your computer? Movie example – The Net

Laws about vandalism Attempts to harm or destroy data or hardware of another user, agency, or network can be prosecuted to the full extent of the law.

Security Theft Hardware theft: Laptops stolen from cars Software and other theft: Downloading files from the Internet without permission (music, graphics, software) Piracy: Copying and installing computer programs (even for personal use) without permission

Security Computer Failures Crashes are an annoying fact of life when owning computers. What usually solves computer errors? REBOOTING Save often and backup files frequently to prevent loss of information Store backups offsite

Information Privacy

Information Privacy Beware of any site that asks for your Social Security #. Beware of any site that asks for specific personal information when you are not on a secure link.

Information Privacy Watchdog organizations and new laws governing business activity online may help protect you from certain abuses of Internet communications, but the best protection is your own good sense.” (Preparing for IC3 Certification, DDC)

Information Privacy Many items of information about you that you might not want generally known are defined as public and can be published without your permission. Some of these are your full name, your home address, your phone number, debts you owe, court judgments against you, courses you’ve taken, and police actions relating to you. Generally speaking, people who know where to look can find out a lot about you.” (USU Ethics Module)

Information Privacy Employers have the right to monitor your work and use of the computer at your place of employment. Time spent playing computer games or surfing the Internet during work hours is costly to a business and could be cause for reprimand or dismissal (firing).

Ethics

Standards of right and wrong Principles that guide your behavior What are ETHICS? Standards of right and wrong Principles that guide your behavior Don’t get stuck doing something illegal with your computer or online resources.

Ethics Information Accuracy Not everything that you read on the Internet is true!!! Make sure information is accurate before putting it on the Internet. No one polices the validity, accuracy, and reliability of the information on the Net.

Ethics Information Accuracy Plagiarism: Using another person’s ideas and presenting them as your own. Be sure to give credit where credit is due. Cite borrowed material with textual citations. Use material in a way that preserves the meaning and context intended by the author.

Ethics Acceptable Use Policy (AUP) Most educational institutions have a document that governs the use of the computers and networks owned by the institution. This document, commonly called an Acceptable Use Policy or AUP, outlines what types of uses are acceptable and which are prohibited.” (USU Ethics Module)

Ethics Internet Security and Privacy Company’s responsibilities: To protect information about business operations To protect employee and customer information

Ethics Objectionable Materials Deciding what to censor and for whom has been a very controversial subject. Companies may have legal liability if an employee performs certain types of activities online from a company computer.

Laws about nuisance or harassment It doesn’t matter if your intention was to be funny, or friendly, or something else. If the person you contact through the Internet is uncomfortable, STOP! Or it’s illegal!!!

Copyright Issues Pertaining to Software Four Software Copyright Categories: Public Domain Freeware Shareware Licensed or All Rights Reserved

What is Copyright? Rights possessed by the author of a work. Just because something is on the Internet does not give anyone who views it the right to take ownership of it.

Public Domain Free software Can be used without restriction Not copyrighted or copyright has expired Rare Unreliable Poor quality Virus-laden No cost? That may be exactly how much this software is worth.

Freeware? Copyrighted software that is given away free by the author. Although it is available for free, the author retains the copyright, which means that you cannot do anything with it that is not expressly allowed by the author. Usually, the author allows people to use the software, but not sell it. Some freeware is “really good stuff.” Pegasus Mail Eudora Light Internet Explorer Netscape

Shareware Copyrighted software Distributed on the honor system Can be examined free of charge for a trial period and then you must pay for the software

Licensed or All Rights Reserved Software that is purchased Must abide by the restrictions of the license agreement

“Wonderful stuff!” Word Excel PowerPoint Access Illustrator MicroType QuarkXPress Fireworks Dreamweaver Vision Windows Quick Books ClickArt Freehand Flash In Design Quattro Pro Paint MP3 Point and Click PhotoShop Age of Empires WordPerfect Anti-Virus Camedia

Software License Agreement Excerpts from QuarkXPress software license agreement The software and accompanying documentation may not be transmitted electronically, including over the Internet, rented, loaned, leased, sold, distributed, made available, directly or indirectly, for USE by any other person or entity not covered by this License Agreement. Customers who have purchased a Single-User license may INSTALL and USE the SOFTWARE on one computer. IF YOU DO NOT ACCEPT THIS LICENSE AGREEMENT, DO NOT OPEN THE ENCLOSED PACKET OR BREAK THE SEAL ON THE CD-ROM The only right granted to the Customer is the right to USE the SOFTWARE and accompanying documentation in accordance with this License Agreement. The customer may not modify, translate, copy, reproduce, reverse engineer, disassemble, decompile, or otherwise derive source code from, the SOFTWARE or accompanying documentation, or use it as a basis for the preparation of other software programs

Even if you can. Even if no one will ever find out. Follow the license agreement or you will be breaking the law.

References Barquin, Ramon C. “In Pursuit of a Ten Commandments of Computer Ethics.” Computer Ethics Institute. Brookings University. www.brook.edu/. 1992. Bower, Kevin W. Ethics and Computing. IEEE Computer Society Press, 1996. Ethics Presentation. Computer Technology Committee. Davis School District. 2003. Hilton, Dr. Thomas, et. Al. “Ethics Teaching Module.” Utah State University. http://conlit.usu.edu/ethics modules.html. 23 October 2002. Simmons, Toni. Ethics Presentation. Utah State Office of Education. www.uen.org/lessonplan. 2003. Wray, Paul. Preparing for IC3 Certification. DDC Publishing Company. 2003.

The END