Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing.

Slides:



Advertisements
Similar presentations
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Advertisements

INTERNET SAFETY FOR STUDENTS
Chapter 1: The Context of SA&D Methods
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
Internet Safety/Cyber Ethics
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
 What are systems analysis and design?  Where do systems analysts work?  What modern business and technology trends are affecting information systems.
Understanding Business Ethics
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Internet safety By Lydia Snowden.
Possible WebQuest type links  
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Computer Ethics for Computer Users
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Internet Safety Dangers and Netiquette Trust No One You Don’t Know! A shark is a predator. Predators swim around looking for victims. The ocean is beautiful.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Ethics, Computing, and the Internet
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
CSC Intro. to Computing Lecture 19: Ethics & Computers.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Computer Ethics CSCI 101 Kara kelly. Ethics Ethics can be defined as a discipline in which one attempts to identify, organize, analyze, and justify human.
“Taking care of myself while surfing the Internet” Children’s Experiences & eSafety Rules.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
ICS131 – Ethics 11/17/03. IEEE-CS and ACM 1.PUBLIC - Software engineers shall act consistently with the public.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
Netiquette INFORMATION TECHNOLOGY AND ACQUIRING INFORMATION (JÄRVELÄ, RITVA-LIISA)
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
 byte  short  int  long  float  double  boolean  char.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
What your students and Parents need to know  The ethical rules we live by also apply to technology.  Make students aware that how technology is.
Computer Ethics IT Fundamentals Battlefield High School.
Internet Etiquette or Netiquette
Chapter 16 – Careers in Information Technology
Internet Etiquette or Netiquette
Internet Etiquette or Netiquette
Ethics & Privacy CSCI 101.
Presentation transcript:

Ethics, Privacy, & Safety

Source: Ethics in ComputingEthics in Computing

How do People Learn to Engage in Ethical Behavior? A recognition that an action has caused harm Social disapproval Punishment by authority Source: Computer Ethics, Etiquette & Safety

Information and communication technologies affect ethical behavior Technology does not provide tangible feedback Technology allows us to become invisible Source: Computer Ethics, Etiquette & Safety

Eight Ethical Decision-Making Strategies Golden Rule Test Trusted Adult Test Is There a Rule? Test Front Page Test If Everybody Did It Test Real World Test Gandhi Test Check Inside Test Source: Computer Ethics, Etiquette & Safety

Universal Rationalizations The finger of blame (“She started it…”) Follow the crowd (“Everyone does it…”) If I only had a brain (“He told me to…”) No harm no foul (“Nobody got hurt”) It’s only a little bit wrong… Good intentions (“It’s for a good cause…”) “No one ever gets caught…” “Things have changed…” Source: Computer Ethics, Etiquette & Safety

What Can You Do? Play by the Rules Keep It Private Look Your Best Don’t Pollute Remain Cool Under Fire Read with Your Eyes Open Credit the Source Respect the Creator Watch Where You are Looking Don’t Take Candy from Strangers Don’t Go Where You Don’t Belong Source: Computer Ethics, Etiquette & Safety

Web Resources CyberEthics –CyberSmart CurriculumCyberSmart Curriculum –CopyrightCopyright –Computer Virus Myths, Hoaxes, Urban Legends, HysteriaComputer Virus Myths, Hoaxes, Urban Legends, Hysteria Cyberethics, Cybersecurity and CybersafetyCyberethics, Cybersecurity and Cybersafety

The Ten Commandments of Computer Ethics 1.Thou shalt not use a computer to harm other people. 2.Thou shalt not interfere with other people's computer work. 3.Thou shalt not snoop around in other people's computer files. 4.Thou shalt not use a computer to steal. 5.Thou shalt not use a computer to bear false witness. 6.Thou shalt not copy or use proprietary software for which you have not paid. 7.Thou shalt not use other people's computer resources without authorization or proper compensation. 8.Thou shalt not appropriate other people's intellectual output. 9.Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10.Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. Computer Ethics Institute A project of the Brookings Institution

What About Privacy? Computer Safety Secure Identity Theft Credit Reports Spam Filters Anti-Virus Spyware Removal Privacy Software Ad Blockers Firewalls Encryption Parental Control Key Loggers Privacy Fence

Web Resources Protecting your Privacy on the Internet Internet Privacy Resources

Let’s Stop and Play… Privacy Playground Cybersense and Nonsense Jo Cool or Jo Fool

Cyberbullies March 08, 2005 – USA Today "Cyberbullies, mostly ages 9 to 14, are using the anonymity of the Web to mete out pain without witnessing the consequences," reports USA Today."Cyberbullies Half of 3,000 U.S. children surveyed the past six months said they or someone they know have been victims or guilty of cyberbullying, Wired Safety says.Wired Safety Bullying isn't just for large males. Now anyone, male or female, with minimal technical skills can get into the act. But victims still tend to be kids seen as "different."

Let’s explore… Quiz Think about this… Suggestions

Safety Playing It Safe Keeping Children Safer Surf Swell Island CyberNetiquette Comix GetNetWise SafeKids and SafeTeensSafeKidsSafeTeens Netsmartzkids.org

“Integrity is doing the right thing, even if nobody is watching.” Anonymous