© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
© and The Internet Copyright Law applies to materials found on the internet to the same extent it applies to materials in traditional formats.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
INTERNET and CODE OF CONDUCT
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
 Provide a basis for determining who in the organization should control access to a particular item of information.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Intellectual Property
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Possible WebQuest type links  
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
Examples of problems with teacher/school site violations: A company’s logo and link on footer of homepage when company is not their business partner—only.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Electronic Use Policies.   Social Media  Internet.
Ethics And Computers. What are Ethics? Ethics Ethics are: Principles that guide behavior OR the rules of right and wrong behavior that you should follow.
Computer Ethics for Computer Users
Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Employee Guidelines for Acceptable Use of Technology Resources.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
Vocabulary review.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Clark County School District (CCSD)
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
Unethical use of Computers and Networks
00870B2F.0/Internet%20Safety.jpg.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Digital Citizenship Created By: Kelli Stinson June 2011.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Web 2.0: Making the Web Work for You, Illustrated Unit B: Finding Media for Projects.
Presentation.  Suppression of speech or public communication.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Digital Citizenship Jacinta Little ED 505. Table of Contents Definition of Digital Citizenship………………………… Slides 3-4 Social networking…………………………………………
INTERNET SAFETY.
Legal and Ethical Issues in Computer Security Csilla Farkas
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Ethics Self Imposed Right and Wrong Behavior Described as:
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Plagiarism, Fair Use and Copyright Laws
Clark County School District
Computer Safety and Ethics
Computers Are Your Future Twelfth Edition
Using the computer appropriately
Five Unethical Uses of Computers
Lesson 2- Ethical Use of Digital Resources
Ethics & Privacy CSCI 101.
Property in Cyberspace
ICT Communications Lesson 3: Internet Life and Privacy
The Issues with Technology in education
Student User Agreement and Policy 2022
Student Name Student Class
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
Presentation transcript:

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

2 2 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Learning Objectives 7.5Explain the terms copyright and fair use, and list common ways that copyrights are violated for software, music, and images 7.6List at least three preferred behaviors prescribed by netiquette, and contrast the ethical versus unethical use of online student resources 7.7Describe ethical and unethical ways that computers are used at work

3 3 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Piracy vs. Forgery Piracy: In the context of computing, acquiring copies of protected digital creations without the permission of the creatorPiracy: In the context of computing, acquiring copies of protected digital creations without the permission of the creator –Among the most widespread forms of unethical computer use Forgery: making copies that appear to be real and selling those copies to unsuspecting buyers as legitimate productsForgery: making copies that appear to be real and selling those copies to unsuspecting buyers as legitimate products

4 4 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Intellectual Property Intellectual property: Ideas, writing, music, art and other kinds of mind-based products intended to be used in a commercial wayIntellectual property: Ideas, writing, music, art and other kinds of mind-based products intended to be used in a commercial way –Piracy is stealing intellectual property –Evidence of theft may not be obvious –Intellectual-property laws

5 5 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Copyright and Fair Use Copyright: A legal concept that grants rights and control to the owner of any published workCopyright: A legal concept that grants rights and control to the owner of any published work Fair use: A limited set of circumstances in which copyrighted material can be used without first obtaining permissionFair use: A limited set of circumstances in which copyrighted material can be used without first obtaining permission

6 6 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Copyright Lifetimes Copyright lasts for the life of the creator and 70 years after the person’s deathCopyright lasts for the life of the creator and 70 years after the person’s death Anything published before 1923 in the United States is considered not to be copyrightedAnything published before 1923 in the United States is considered not to be copyrighted When a copyright expires, the work enters the public domainWhen a copyright expires, the work enters the public domain

7 7 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Software Licensing Personal software license: Legal permission granted to one person to use the programPersonal software license: Legal permission granted to one person to use the program Multi-user license: Legal permission to install and use a program on a certain number of computersMulti-user license: Legal permission to install and use a program on a certain number of computers –Site license: Allows the software to be installed and used on any computer in a building or corporate campus –Enterprise license: Permits installation and use on any computer within a company

8 8 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Software Piracy End-user piracy: A legitimate purchaser makes unauthorized copiesEnd-user piracy: A legitimate purchaser makes unauthorized copies Internet piracy: Use of the Web and Internet resources to host and distribute software copiesInternet piracy: Use of the Web and Internet resources to host and distribute software copies Manufacturer piracy: Installation of unauthorized copies of a program onto the manufacturer’s computersManufacturer piracy: Installation of unauthorized copies of a program onto the manufacturer’s computers

9 9 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Protections Against Piracy Focus on mitigating damage from piracyFocus on mitigating damage from piracy Dongle: Hardware device that is included with software and plugs into a computer portDongle: Hardware device that is included with software and plugs into a computer port Software-based copy protectionSoftware-based copy protection Internet-based copy protectionInternet-based copy protection

10 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Downloading and Sharing Music Most media sharing systems are based on peer-to- peer networksMost media sharing systems are based on peer-to- peer networks –The bitTorrent protocol links users to cooperatively contribute small pieces of the complete file to the copier Some people see file sharing as a clear violation of others’ ownership rightsSome people see file sharing as a clear violation of others’ ownership rights Other people see no harm in file sharingOther people see no harm in file sharing

11 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Other Legal and Social Risks Nothing posted on the Internet is truly privateNothing posted on the Internet is truly private Spiders or Web crawlers: Automated software programs run by search engine and other companies to constantly sift through, catalog, and sometimes store information they find on websitesSpiders or Web crawlers: Automated software programs run by search engine and other companies to constantly sift through, catalog, and sometimes store information they find on websites Minimize personally identifying informationMinimize personally identifying information Incendiary opinions and hateful speech can come back to haunt the writer years laterIncendiary opinions and hateful speech can come back to haunt the writer years later

12 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Personal Computing Ethics Computer misuse and abuseComputer misuse and abuse –Hacking Netiquette: The set of online behaviors considered polite and properNetiquette: The set of online behaviors considered polite and proper –Discourages abusive speech, rudeness Acceptable use policy (AUP): Document that attempts to encode and formalize the practice of ethical computer use for an institution or companyAcceptable use policy (AUP): Document that attempts to encode and formalize the practice of ethical computer use for an institution or company

13 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Personal Computing Ethics Online student notes and essay databanksOnline student notes and essay databanks –Many school-related websites are legitimate and beneficial –Other sites support cheating and the illusion of accomplishment –Efforts to stop cheating- Some schools require students to submit work to services like Turnitin

14 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Professional Computing Ethics While employees are being paid, they should be focused on workWhile employees are being paid, they should be focused on work Personal use of company computers also can create risks for companiesPersonal use of company computers also can create risks for companies Employer protections:Employer protections: –Creating AUPs that identify forbidden and permitted behaviors –Tracking employees’ keystrokes and Web activity –Monitoring and other communications

15 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Workplace Electronic Communication General principles apply:General principles apply: –Thinking before speaking –Treat others with respect Workplace communication generally has to meet a higher standard of politenessWorkplace communication generally has to meet a higher standard of politeness Inappropriate types of workplace communicationInappropriate types of workplace communication –Carelessly sharing nonprofessional material – with complaints that should be kept private

16 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Whistleblowing Whistleblowing: Pointing out a major internal problemWhistleblowing: Pointing out a major internal problem –Although it tends to reflect high ethical concerns, it can make life difficult for the whistleblower. –State and federal laws protect whistleblowers in some situations –Any complaints should be fully documented and pursued through proper channels