Computer Programming I

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Hart District Acceptable Use Policy Acceptable Use Policy.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Computer Programming Chapter 1 – lesson 2.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Computer and Ethics. Ethical Problems Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics.
INTERNET and CODE OF CONDUCT
Security Issues and Ethics in Education
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
Chapter 11 Security and Privacy: Computers and the Internet.
Digital Citizenship Project
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
in Information Systems and the Internet
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Employee Guidelines for Acceptable Use of Technology Resources.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Digital Citizenship Created By: Kelli Stinson June 2011.
Digital Citizenship Project By Allen Naylor Ed 505.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Topic 5: Basic Security.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Privacy, Security and Ethics
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Security Issues & Ethics in Education By Maud Mushayamunda.
Information Systems Design and Development Security Precautions Computing Science.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Privacy and the Law.
Add video notes to lecture
DIGITAL CITIZENSHIP What You Should Know!.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Fundamentals of Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
BCT 2.00 Analyze Technology Issues
Computer Programming I
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Presentation transcript:

Computer Programming I Indicator 1.03 Understand Ethics and Security in The Programming Process Computer Programming I

Essential Standard and Objectives Essential Standard- 1.00 Understand Ethics and the History of Computer Programming. Indicator 1.03 Understand Ethics And Security in the Programming Process

What is Computer Ethics? According to Computer Ethics in the Computer Science Curriculum: “applied professional ethics dealing with ethical problems aggravated, transformed or created by computer technology” Computer Ethics in the Computer Science Curriculum http://www.southernct.edu/organizations/rccs/oldsite/resources/teaching/teaching_mono/bynum/bynum_computer_ethics.html

ACM Code of Ethics and Professional Conduct Who is ACM? Association for Computing Machinery Membership organization for computing professionals Provides resources Professional development Promotes policies and research for the benefit of society

ACM Code of Ethics and Professional Conduct “This Code, consisting of 24 imperatives formulated as statements of personal responsibility, identifies the elements of such a commitment.” Section 1 deals with fundamental ethic considerations Section 2 deals with more specific ethical considerations. Section 3 deals with specifically with those in leadership roles. Section 4 deals with principles involving compliance with the Code. http://www.acm.org/about/code-of-ethics

ACM Code of Ethics and Professional Conduct The Code is also supplemented with a set of Guidelines. Both the Code and the Guidelines “are intended to serve as a basis for ethical decision making in the conduct of professional work.”

Computer & Information Ethics There are now research centers devoted to computing and information technology ethics. Centre for Computing and Social Responsibility http://www.ccsr.cse.dmu.ac.uk/ The Research Center on Computing & Society http://www.southernct.edu/organizations/rccs/

Ethical Considerations Information Age Due to the computer’s ability to store and manipulate large amounts of information Netiquette Do not attempt to access the account of another user without authorization Do not share your password – change it periodically Use appropriate subject matter and language, and be considerate of other people’s beliefs and opinions. Privacy Ethical issue Computers record transactions, calls, etc. These records can be used to learn a lot about you. Because of privacy issues, many laws have been passed.

Ethical Considerations Online profiling Marketing technique where data is collected about customers visiting a website Cookie Text file created by the server computer when a user enters information into a website. Web beacons (web bugs or pixel tags) Tiny, transparent graphics located on web pages or in e-mail message that are used in combination with cookies to collect data about web page users or email senders Privacy Policy Legally binding document that explains how any personal information will be used.

US Information Technology Law There are now many laws about information technology in the US. Stanford Law School compiled a list of these laws. http://www.law.stanford.edu/program/centers/ttlf/law/us/it/

Technology Laws Identity Theft Penalty Enhancement Act of 2004 Establishes penalties for aggravated identity theft Prohibits a court from giving parole, reducing any sentence or for providing for concurrent terms of imprisonment. Federal Information Security Management Act of 2002 (FISMA) Requires federal agencies to develop, document and implement an agency-wide program to provide information security.

Technology Laws Consumer Credit Reporting Reform Act of 1996 Amended the Fair Credit Reporting Act (FCRA) of 1970 Addresses data collection by credit, insurance and employment agencies Gives individuals the right to see information maintained about them Restricts who may access credit files to only those with a court order or the written permission of the individual whose credit is being checked. Privacy Act of 1974 Restricts the way in which personal data can be used by federal agencies Individuals must be permitted access to information stored about them and may correct any information that is incorrect. Agencies must insure both the security and confidentiality of any sensitive information.

Technology Laws Right to Financial Privacy Act of 1978 Requires government authorities have a subpoena, summons or search warrant to access an individual’s financial records When records are released, the financial institution must notify the individual of who has had access to them. Electronic Communications Privacy Act of 1986 (ECPA) Makes it a crime to access electronic data without authorization Prohibits unauthorized release of such data

Technology Laws Electronic Freedom of Information Act of 1996 Requires federal government agencies to make certain agency information available for public inspection Designed to improve public access to agency records Children’s Online Privacy Protection Act of 1988 (COPPA) Requires commercial websites that collect personal information from children under the age of 13 to obtain parental consent.

Technology Laws Safety and Freedom through Encryption Act of 1999 (SAFE) Gives Americans the freedom to use any type of encryption to protect their confidential information. Prohibits the government from monitoring people’s communications without their knowledge or consent. Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001 Gives law enforcement the ability to monitor individual’s email and web activity

Acceptable Use Policies Use appropriate language Do not reveal personal information Do not access, upload, download, or distribute inappropriate materials Do not access another’s account Use of the network for private business is prohibited. Only administrator installed software may be used on the computers. Adding, deleting or modifying installed software is not permitted.

Implications of Computer Use Ergonomics The science that studies safe work environments. Repetitive stress injuries, eye strain, etc. Environmental concerns Power & paper waste Disposal of out-dated hardware Employee monitoring Issues with computers in the workplace Invasion of privacy Identity theft

Protecting Software and Data Copyright Protection of digital information NET (No Electronic Theft) Act of 1997 Protects against copyright infringement Piracy Illegal copies being distributed Virus Program or series of instruction that can replicate without the user’s knowledge Trojan Horse Appears as something else Worm Program that is able to reproduce itself over a network

Protecting Software and Data Antivirus programs Install on computers to detect and remove code before it can replicated or damage data Precautions to take Update virus software Do not open email attachments without scanning. Crackers, Hackers Illegal act to gain access to large computer systems to perform acts of vandalism. Electronic Communications Privacy Act of 1986 makes it a federal offense. Most networks have a firewall to prevent this type of access. Phishing Act of sending an email to a user falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes like identity theft.

Assignment Research a recent privacy, security or ethical incident. Describe the incident/issue. What was the result/consequence? Write a one- to two-page paper describing the incident. Include your own assessment. Double-spaced Cite each source.