Ethics. Ethics are the principles and standards we use to decide how to act.

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Internet Safety Rockingham County Public Schools
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
What you don’t know CAN hurt you!
Using internet and cell phones safely
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Security, Privacy, and Ethics Online Computer Crimes.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
E-Safety Quiz Keeping safe online! A guide for parents & children.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Internet Safety Guidelines Elementary Information and graphics obtained from:
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Joseph Pettaway ED505. What is Digital Citizenship? Concepts that aids individuals in learning and understanding how to use technology appropriately.
Digital Citizenship Project Elle Wagner ED 505. Netiquette on Social Media Sites DoDon’t Be professionalPost illegal activity Share accurate informationBully.
IT security By Tilly Gerlack.
Surfing the Internet Teaching Children about the SMARTS of using the Internet Are you being responsible when you use the Internet??? B E SMART! B E RESPONSIBLE!
Computer Ethics for Computer Users
What is a virus? A virus is a software program that is capable of causing great harm to files and other programs on the same computer. It can replicate.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
INTERNET SAFETY RULES. TECHNOLOGY Technology has become an important part of today’s classroom as well as the world. Students need to be able to use and.
6 th Grade. a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer.
Digital Citizenship Project By Allen Naylor Ed 505.
The Computer Labs are a valuable tool for learning at Prattville High School While in the labs, students will Follow appropriate code of conduct. Adhere.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Student Technology Code of Ethics
Riding the Internet Highway Internet Safety Rules.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Kyleigh LESLIE. I will never give out my personal information like my phone number, location, and my school.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Digital Citizenship Project Kimberly Robbins. “Advances in computer technology and the Internet have changed the way America works, learns, and communicates.
Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cyber Safety Jamie Salazar.
Page 3 By: Michael, Natalie, and Kelly Grades Final grades will be calculated as follows: Assessments 20% Binder/Portfolio 20% Classroom 20% Additional.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Mrs. Jenkins Review Elective Building Guidelines.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computers and You Chapter 2. Definitions Technology – the use of science to solve practical problems Microprocessor, the “brain” of every computerized.
Technology in Your Life
Welcome to Challenger Computer Lab.
Internet Safety.
Welcome to the Computer Lab.
PART 2.
Follow safety rules so that YOU: Avoid getting HURT.
What is Information Security?
I will… only people I know or my teacher has approved of.
Presentation transcript:

Ethics

Ethics are the principles and standards we use to decide how to act.

1.Respect the privacy of other - Do not open any files or s that are not your own unless you have permission to do so. 2.Be honest – Use a computer and Internet access to d your own work. 3.Treat people fairly – Conflicts should be worked out face to face. Do not use Web sites, or chat rooms to harm someone’s reputation. 4.Pay your fair share – You might hear about ways to get commercial software or music for free, but his is usually illegal.

1.Viruses – A computer virus is a program intentionally designed to cause annoyance or damage to computer hardware or software. 2.Hackers – A hacker is a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage. 3.Dishonest people – The Internet is open to anyone, including people who may want to cause harm by giving false or illegal information.

1.Firewalls and antivirus software can help protect your computer from hackers and viruses. 1.You must still use common sense whenever you log on to your computer, use the Internet, or share files with other people.

1.Respect the computer equipment. 2.Never change software settings or delete software without permission. 3.Use only your own files and folders. 4.Always get permission before installing programs. 5.Only visit Web sites that are needed to complete school work. Surf the Web only with permission. 6.Always pay to download music or other files unless they are offered for free. 7.Always obtain permission, if needed, and cite your sources. 8.Never use someone else’s password or use names.

“With great power comes great responsibility” Spiderman Movie