Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.

Slides:



Advertisements
Similar presentations
Todays Objective You are going to consider ethical questions about real- life decisions young creators make in exercising their creative rights and responsibilities,
Advertisements

Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Ethics for Teacher Candidates Teresa Chen Department of Advanced Studies in Education and Counseling California State University, Long Beach.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Computer ethics.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Computer Ethics.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Computer Ethics for Computer Users
Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Computer Ethics Christina McCorkle.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
COMPUTER ETHICS Do you know the difference between right and wrong?
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
History Fair What is the history fair? Program that allows students to conduct research on a world, national, state or local topic. This year’s.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Copyrights and Wrongs Day 03. Essential Question How can I make responsible choices when I use other people’s creative work (pictures, etc)?
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing.
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship Project By Lacy Brown. Netiquette Netiquette is etiquette for the internet. Netiquette is etiquette for the internet. You should be.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Business Ethics Why should business ethics concern you?
By Cheryl Costantino, M.A. June  Teachers, students and parents have responsibilities when it comes to the use of technology.  There are national.
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
Intellectual Property Basics
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
Computer Ethics CSCI 101 Kara kelly. Ethics Ethics can be defined as a discipline in which one attempts to identify, organize, analyze, and justify human.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
CyberEthics LARK - Keeping It Legal, Appropriate, Responsible, Kind Grade Piracy, Copyright and Plagiarism LARK - Keeping It Legal, Appropriate,
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computers Are Your Future
Internet Etiquette or Netiquette
Computers Are Your Future Twelfth Edition
Internet Etiquette or Netiquette
Internet Etiquette or Netiquette
Unit 3- Introduction to Computer Ethics
Ethics & Privacy CSCI 101.
Presentation transcript:

Computer Ethics Prepared by

Discuss “Character is what you do when no one is watching.” --old adage

Relatively New Terms “Cyber ethics" and "netiquette" refer to responsible cyber social behavior. These terms refer to what people do online when no one else is looking.

Defining Computer Ethics” Ethics refers to the rules and standards governing the conduct of an individual with others. As technology and computers become more a part of our everyday lives, business conduct will continue to be even more of a problem.

The Internet Online, people can feel invisible and capable of doing things they normally wouldn't do in person or in public -- things that they know might be wrong.

Defining “Computer Ethics” Since the introduction of the World Wide Web, the cyber definition of ethics has also evolved. A new type of ethics known as computer ethics has emerged. Computer ethics is concerned with standards of conduct as they pertain to computers.

Why do we need to study computer ethics? Two of the more pressing concerns in computer ethics today are questions of copyright and privacy.

Why do we need to study computer ethics? Many people have been tricked by scams, claiming that they will make you a millionaire. It is the same kind of pyramid scheme that exists over telephone or mail, but no laws covered it for a while.

Why do we need to study computer ethics? Many chain letters have allowed urban legends to spread at an accelerated rate and created alarm over hoaxes concerning many food and drug products. These s only bog down systems and servers. Some advertisers also unsolicited ads to users in a practice known as spamming.

The most controversial areas in Internet cases today seem to be those involving copyright laws. An issue that has become fundamental to computer usage and computer ethics, therefore, is copyright. Copying is defined as the use of someone else's intellectual property, and it is therefore illegal. Copyright

How do you know when copyright ownership belongs to you and when it belongs to others? The following rules resolve the problem: 1.If you produced the work yourself, then you are the natural author and own the copyright yourself. 2.If you as an employee created the work in the scope of employment, your employer owns the copyright and is in fact considered the author. Copyright

Privacy Do you have a secret? Have you ever lied? Are there certain things you don't want your parents to know? How about your friends? How would you feel if in twenty years, someone told your boss that once, when you were 17, you tried some drugs at a party?

Privacy What if they got this information from an that you fully expected would not go beyond yourself and the recipient, but was intercepted and posted on a web page? That would be an unfair violation of your privacy.

Basic Definitions to KNOW To discuss online privacy, you need to know some basic computer definitions. No matter how little time you have spent online, you have been asked if you would like to accept a cookie, or told that a cookie has been sent. Well, of course, you think at first, Mmmmm....cookie. Unfortunately, you cannot eat these cookies. A cookie is a piece of data that a web site collects about you when you visit the site.

Basic Definitions to KNOW The data varies with the web site - a commercial web site will collect demographics (that is, sex, age, and other advertising information) to learn more about you, while an service may collect identifying or personal (name, mailing address) information to recognize you. Cookies allow a web site to be tailor made for you as long as you stay in that domain name or each time you visit. If you have ever checked a box saying "Remember My Password,"you have set a cookie.

Two Aspects of Privacy Online One aspect of privacy online is a need for protection for yourself. Online stalking has been a problem, with people harassing new 'friends' online and sometimes even threatening them, or confronting them in person. The second is a need to protect your data from strangers. This comes not from the fear of physical, but financial harm.

Ten Commandments of Computer Ethics The Computer Ethics Institute offers the Ten Commandments of Computer Ethics to help reinforce acceptable online behavior.

1.Thou shalt not use a computer to harm other people. 2.Thou shalt not interfere with other people's computer work. 3.Thou shalt not snoop around in other people's files. 4.Thou shalt not use a computer to steal. 5.Thou shalt not use a computer to bear false witness. 6.Thou shalt not use or copy software for which you have not paid. 7.Thou shalt not use other people's computer resources without authorization. 8.Thou shalt not appropriate other people's intellectual output. 9.Thou shalt think about the social consequences of the program you write. 10.Thou shalt use a computer in ways that show consideration and respect.

Scenario Imagine that you own a business in which you have spent a great amount of time writing and designing a Web-based game, only to find that someone else has copied much of the game for their own site. Is this okay? Is it fair? Is it legal?

Discussion Situations Copying and selling music files: These works are copyrighted and the creators may have not given permission to copy them. Copying and giving away software: The software creator is being denied a right to earn a living because the friend would otherwise have to purchase the word processor. This is illegal. Software typically comes with information about the purposes for which copies can be made. Copying movies for personal use: Movies are copyrighted works. By not paying to see the movie, you are denying the creators a right to earn a living.

Discussion Situations Copying photos, animations, greeting cards: These are all copyrighted works and should not be displayed on a personal site without obtaining permission. Copying photos and paragraphs of text for a school report: School reports are considered fair use, but the creators should be credited. Copying and rearranging paragraphs of text for a school report: Rearranging copied paragraphs is plagiarism, unless credit is given to each source. If the intent was to make it the student's work, then the ideas would have to be put in the student's own words.

(PowerPoint template) esson_plans/68_09.asp html html (10 Commandments of Computer Ethics) Sources