COMPUTER ETHICS AND LEGAL ISSUES

Slides:



Advertisements
Similar presentations
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Computer Ethics for Computer Users
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
COMPUTER ETHICS Do you know the difference between right and wrong?
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Digital Citizenship Project By Allen Naylor Ed 505.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
Lesson 01: Computer Lab Regulations Lab Organisation
Lesson 15 : Networks And The Internet
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
CONTROLLING INFORMATION SYSTEMS
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY
Security and Ethics Safeguards and Codes of Conduct.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ETHICS IN USING COMPUTER
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
What your students and Parents need to know  The ethical rules we live by also apply to technology.  Make students aware that how technology is.
Computer Ethics IT Fundamentals Battlefield High School.
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
CHAPTER FOUR OVERVIEW SECTION ETHICS
Learning Area 1 Information And Communication Technology and Society
Ethics & Privacy CSCI 101.
Presentation transcript:

COMPUTER ETHICS AND LEGAL ISSUES What is computer ethics?? Computer ethics is a system of moral standards or values used as a guideline for computer users. A guideline is needed to stop the current technology products from being exploited for example replicating original CDs and selling them as pirated software, this unethical behavior can be controlled by the code of conducts.

THE TEN COMMANDMENTS OF COMPUTER ETHICS These principles consider the effective code of conducts for the proper use of information technology. 1. You shall not use a computer to harm other people. 2. You shall not interfere with other people's computer work. 3. You shall not snoop around in other people's computer files. 4. You shall not use a computer to steal. 5. You shall not use a computer to bear false witness. 6. You shall not copy or use proprietary software for which you have not paid. 7. You shall not use other people's computer resources without authorisation or proper compensation. 8. You shall not appropriate other people's intellectual output. 9. You shall think about the social consequences of the program you are writing or the system you are designing. 10. You shall always use a computer in ways that ensure consideration and respect for your fellow humans.

INTELLLECTUAL PROPERTY Intellectual Property (IP) refers to work created by inventors, authors and artists. These works are unique and have value in the market place. Intellectual property laws cover ideas, inventions, literary creations, unique names, business models, industrial processes, computer program codes and more. There are four types of Intellectual Property protection. They are patterns for invention, trademarks for brand identity, designs for product appearance and copyright for materials.

WHAT IS PRIVACY Privacy in IT refers to data and information privacy. Data refers to a collection of raw unprocessed facts, figures and symbols. The, computer is used to process data into information. In general, data include texts, numbers, sounds, images and video. Information privacy is describe as the right of individuals and companies to deny or restrict the collection and use of information about them.

WAYS TO PROTECT PRIVACY Privacy laws The privacy laws in Malaysia emphasises on the following: Security Services to review the security policy Security Management to protect the resources Security Mechanism to implement the required security services Security Object, the important entities within the system enviroment Utilities software Example : anti-spam program, firewall, anti-spyware and antivirus

AUTHENTICATION Authentication is a process where users verify that they are who they say they are. The user who attempt to perform functions in a system is in fact the user who is authorized to do so. Authentication is important in order to safeguard against the unauthorized access and use.

There are two commonly used authentication methods, which are biometric device and callback system. Is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database Callback system refers to the checking system that authenticates the user.

VERIFICATION Verification is the act of proving or disaproving the correctness of a system with respect to a certain formal specification. Method of verification User Identification Processed Object Refer to the process of validating the user Example : Key in user name to login to a system show the exam slip to verify that you are the valid candidate Refer to something the user has such as identification card, security token and cell phone. Checking the driving license to identify the valid driver - employee swipe their security card to enter building

CONTROVERSIAL CONTENTS AND CONTROL A controversial content is information that causes disagreement in opinions and may cause the disruption of peace because different people or culture will have different views about the contents. The issues of controversional contents are always focusing on pornography and slander. The definition of pornography is any form or media or material (like books or photographs) that depicts erotic behavior and is intended to cause sexual excitement. Slander is a legal term for false and malicious statement (meaning knowing that it is false, or “reckless disregard” that it was false) about someone. Example : sending spam mail.

Impact on Malaysian society Pornography Slander Can lead to criminal acts such as exploitation of women and children. Can develop into a society that disregards honesty and truth Can lead to sexual addiction or perversion Can develop bad habit of spreading untruths and rumours Can develop low moral value Can lead to unnecessary argument Can erode good religious , cultural and social believes and behaviour Can cause people to have negative attitudes towards another person

CYBER LAW Why Cyber Law is needed in online activities. security of government data placed integrity and security of information Cyber Law intellectual property rights legal status of online transactions privacy and confidentiality of information

THE CYBER LAW ACT IN MALAYSIA Computer Crime Act 1997 This act gives protection againts the misuse of computers and computer criminal activities. Digital Signature Act This act ensures high level of consumer confidence in the information and communication technology industry. Telemedicine Act 1997 This act ensure that only qualified medical practitioner can practice telemedicine and that their patients’ right and interest are protected. Communication and Multimedia Act 1998 This act secure electronic communications especially in the internet.

COMPUTER CRIME A computer crime is defined as criminal activity that is related to the use of computer. Computer fraud  defined as having an intention to take advantage over causing loss to other people, mainly on monetary basis through the use of computers. Copyright infringement  defined as a violation of the rights secured by the copyright. Computer theft  defined as the unauthorized used of another person’s property with the intention to deny the owner the rightful possession of that property or its use. Computer attack  any activities taken to disrupt the equipment of computer systems, change processing control or corrupt stored data.

DIFFERENCES BETWEEN ETHICS AND LAWS Guidelines Control Moral standards Judicial standards Free to follow Must follow No punishments Penalties, imprisonments and other punishments Universals Depends on country Produce ethical computer users Prevent misusing of computers Immoral Crime