What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
JCSD-aw Citizenship in an e-World Johnston Community School District.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Threats To A Computer Network
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Computer ethics.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
Cyber crime & Security Prepared by : Rughani Zarana.
Viruses & Destructive Programs
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Digital Citizenship Project By Allen Naylor Ed 505.
Information Ethics Prof. Madya Dr. Rozinah Jamaludin 11 March 2010.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Ethics.
Cybercrime. Professional Hackers Paid per the job, usually flat rates State-side hackers can earn up to $200K a year The work is usually writing tools.
Topic 5: Basic Security.
Digital Citizenship By Lori Gray.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
COMPUTER ETHICS AND LEGAL ISSUES
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
A Project on CYBER SECURITY
Secure Software Confidentiality Integrity Data Security Authentication
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Five Unethical Uses of Computers
Internet Safety Vocabulary
Chapter 13 Security and Ethical Challenges.
HOW DO I KEEP MY COMPUTER SAFE?
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.

 Hacking  Copyright Infringement of software  E-democratic technology Some questions in computer ethics

Ethical standards  Association for Computing Machinery (ACM) code of ethics –Ethical behavior among computing professionals –Learned society –Founded in 1947

Computers in the Workplace: Are They Used Ethically?  Then typewriters, filing cabinets, and correction fluid were the norm.  Replaced by desktop and portable computers, database management systems, and word processing software.  Benefits: You are already familiar with some of the benefits of using computers in the workplace

Two types:  Crimes that target computer networks or devices directly,  Crimes facilitated computer networks or devices, the primary target of which is independent of the computer network or device

COMPUTER CRIME Examples of crimes that primarily target computer networks or devices would include, Examples of crimes that primarily target computer networks or devices would include,  Malware (malicious code) Malware  Denial-of-service attacks Denial-of-service attacks Denial-of-service attacks  Computer viruses Computer viruses Computer viruses

Examples of crimes that merely use computer networks or devices would include; Examples of crimes that merely use computer networks or devices would include;  Cyber stalking Cyber stalking Cyber stalking  Fraud and identity theft Fraudidentity theft Fraudidentity theft  Phishing scams Phishing scams Phishing scams  Information warfare Information warfare Information warfare

 Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent.

 A denial-of-service attack (DoS attack) or distributed denial-of- service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users.

 computer virus is a computer program that can copy itself and infect a computer.  The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. malwareadware spywaremalwareadware spyware

 Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used.

 Spyware is a type of malware that is installed on computers and collects little bits information at a time about users without their knowledge

 Cyberstalking is the use of the Internet or other electronic means to stalk someone.

 a fraud is an intentional deception made for personal gain or to damage another individual

criminal fraud include :  Banckruptcy fraud  benefit fraud  False advertising  False billing  False insurance claims  forgery  Health fraud  Identity theft  Marriage fraud  taking payment for goods sold online, by mail or phone, such as tickets, with no intention of delivering them  Tax fraud, (tax evasion), tax evasiontax evasion

Identity theft  Five categories: –business/commercial identity theft –criminal identity theft –financial identity theft –identity cloning –medical identity theft

Techniques for obtaining personal information  Researching about the victim in government  Remotely reading information from an RFID chip on a smart card, RFID-enabled credit card, or passport.  Stealing payment or identification cards  Stealing personal information from computers and computer databases  Advertising bogus job offers

 phishing is the criminally fraud process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

 Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. –Collection of tactical information, –Assurance(s) that one's own information is valid, –spreading of propaganda or disinformation to demoralizethe enemy and the public

 Television and radio transmission(s) can be jammed.  Television and radio transmission(s) can be hijacked for a disinformation campaign.  Logistics networks can be disabled.  Enemy communications networks can be disabled.  Stock exchange transactions can be sabotaged, either with electronic intervention, leaking sensitive information or placing disinformation. sabotaged

Computer security

 What is computer security?  Why should I care about computer security?  Who would want to break into my computer at home?  How easy is it to break into my computer?

Information security is concerned with three main areas: Confidentiality - information should be available only to those who rightfully have access to it Integrity -- information should be modified only by those who are authorized to do so Availability -- information should be accessible to those who need it when they need it

Electronic Commerce Act  Electronic commerce, commonly known as (electronic marketing) e- commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks computer networkscomputer networks

Cybercrimes

The Department of Justice categorizes computer crime in three ways :  The computer as a target  The computer as a weapon  The computer as an accessory

Personal responsibility  Contribute to society and human well-being  Avoid harm to others  Be honest and trustworthy  Be fair and take action not to discriminate  Honor property rights including copyrights and patent

 Give proper credit for intellectual property  Respect the privacy of others  Honor confidentiality

Social network service

 A social network service focuses on building and reflecting of social networks or social relations among people, e.g., who share interests and/or activities.  A social network service essentially consists of a representation of each user (often a profile), his/her social links, and a variety of additional services.

 Philippine IT Related Laws  Ten Commandments of Computer Ethics  Other Emerging Issues in IT