Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 7 IT Ethics, Crime and Privacy. Quiz Instructions 1.Print your name (first and last) on a blank sheet of paper 2.Print date and class day and.

Similar presentations


Presentation on theme: "Chapter 7 IT Ethics, Crime and Privacy. Quiz Instructions 1.Print your name (first and last) on a blank sheet of paper 2.Print date and class day and."— Presentation transcript:

1 Chapter 7 IT Ethics, Crime and Privacy

2 Quiz Instructions 1.Print your name (first and last) on a blank sheet of paper 2.Print date and class day and class start time 3.Write the question number and the answer letter as a minimum. Answer ALL questions. 4.Example: 1.A 2.B 4. You have 5 minutes

3 Quiz on Chapter 7 1. What is environmentally sensible computing known as? (a)Ecological (b) Nature’s (c) Blue (d) Green 2. Attention to the overall workplace design can reduce stress and increase worker performance. (a) True (b) False 3. Your personal data cannot be passed from one organization to another without your consent. (a) True (b) False 4. A denial of service virus places high demands on: (a) backup capabilities, (b) hackers, (c) server resources, (d) vaccine research

4

5 Objectives Societal impact of information and information technology Identify terms and issues relating to proper and legal use of software, including privacy, licenses, copyright, and related concerns Discuss issues of monitoring related to individual use of the computer and your employer Explain the meaning of terms related to computer security and crime Recognize ergonomic and environmental concerns of your workplace and the definitions of related terms Identify ways to protect yourself and your information

6 Why this chapter is important to you! Understanding certain issues when dealing with computers will make you more sensitive to ethical concerns Everyday issues need to be understood in order to minimize problems, such as: Health Theft Abuse

7 Green Computing Green computing – Environmentally sensible computing Energy STAR guidelines – ensure energy- efficient PCs, monitors, and printers Consider technology during and after its useful life © 2005 Prentice-Hall, Inc.

8 The Workplace- Ergonomics Ergonomics – study of relationships between people and technology Carpal tunnel syndrome

9 Presentations Personal Information Workplace monitoring Computer Crimes Software Definitions Worms, Viruses, etc Phishing, pharming and spam Identity theft Ethics

10 Working Smart Common abuses that should be discussed with employees: Sending and receiving frivolous e-mail Non-business Internet browsing Playing games on company time © 2005 Prentice-Hall, Inc.

11 Privacy How Did They Get My Data?

12 The Privacy of Personal Information Violating the privacy of personal information Cookie – Computer monitoring – © 2005 Prentice-Hall, Inc.

13 Computer and IT Crime Areas of computer and IT criminal activity Negligence or incompetence © 2005 Prentice-Hall, Inc.

14 Computer and IT Crime Crimes that involve the theft of software or intellectual property Software piracy – making illegal copies of software © 2005 Prentice-Hall, Inc.

15 Computer and IT Crime  Site license – allows a company to install software on more than one computer  Pilferage – when a company does not buy a site license, but performs multiple installs

16 Identify Theft Check your credit reports once a year Don’t put your SSN or drivers license number on your checks Be suspicious of telephone solicitors Delete suspicious email requests http://www.idtheftcenter.org/html/prevention_tips.ht m for more tips and to check your risk level http://www.idtheftcenter.org/html/prevention_tips.ht m Many recent examples of company data being compromised

17 Phishing Suspicious transaction. Please advise. We recently received a request from our Payment Processor - VeriSign Inc, to put an Exception Payment on transaction id #02608771RES motivated by their Geographical Tracking System. Nevertheless, this is a computer controled system and it may have flaws. So we only ask a couple of moments from your time, to clarify this situation. Ignoring this message could cause serious consequences. If you agree that this is a fraudulent transaction, please answer us to clarify this issue.

18 Lesson Summary Identify terms and issues relating to proper and legal use of software, including privacy, licenses, copyright, and related concerns Discuss issues of monitoring related to individual use of the computer and your employer Explain the meaning of terms related to computer security and crime Recognize ergonomic and environmental concerns of your workplace and the definitions of related terms. Identify ways to protect yourself and your information

19 Dear Customer, We are contacting you to remind you that our Account Review Team identified some unusual activity in your account. In accordance with Carolina First Bank's User Agreement and to ensure that your account has not been compromised, access to your account was limited. Your account access will remain limited until this issue has been resolved. We encourage you to sign on and perform the steps necessary to restore your account access as soon as possible. Allowing your account access to remain limited for an extended period of time may result in further limitations on the use of your account and possible account closure. To view and perform the verification process, please click on the link below: https://online2.carolinafirst.com/servlet/tsfg/2000-login.html Carolina First Bank is committed to maintaining a safe environment for our customers. To protect the security of your account, our bank employs some of the most advanced security systems in the world and our anti-fraud teams regularly screen the Online Banking system for unusual activity. Thank you for your prompt attention to this matter. Please understand that this is a security measure meant to help protect you and your account. We apologize for any inconvenience. Sincerely, Carolina First Bank, Customer Service.

20 2. What is the study of the relationships between people and the things we use? A.Ergonomics B.Epistemology C. Ecology D. Econometrics 3. What is the name of the most commonly reported hand and wrist problem associated with keyboarding? A. Carpal tunnel syndrome (CTS) B. Chron’s syndrome (CS) C. Common hand injury (CHI) D. Reduced wrist movement (RWM) 4. What federal agency is proposing regulations to address ergonomic problems in the workplace? A. Office of Worker Safety (OWS) B. National Institutes of Health (NIH) C. Occupational Safety and Health Administration (OSHA) D. National Institute for Occupational Safety and Health (NIOSH)

21 A controversial, and apparently flawed, study in the late 1980s concluded that: A. women who used terminals and PCs were twice as susceptible to repetitive-stress injuries as were men. B. women who are exposed to the radiation emitted from terminals and PCs may have a higher rate of miscarriage than those who are not. C. due to job-related stress, one out of twenty marriages of IT professionals ended in divorce. D. IT workers were three times more susceptible to lower back injuries than other non-IT workers What is environmentally sensible computing known as? A. Ecological B. Nature’s C. Blue D. Green Which of the following is a common abuse that, if eliminated, can make a positive contribution to workplace efficiency? A. Sending and receiving frivolous e-mail B. Gambling on company time C. Using technology for personal profit D. All of these are correct.

22 More than how many different federal agencies maintain databases on individuals? A. 500 B. 1,000 C. 5,000 D. 10,000 One of the main purposes of the cookie is to: A. gather sensitive data. B. cause a virus to invade your computer. C. personalize your interaction with a Web site. D. All of these are correct. A recent study found that how many of the 100 most popular shopping Web sites were in compliance with Fair Information Practices, a set of principles that provides basic privacy protection? A. None B. Only one C. About 25 D. All The purpose of computer monitoring is to: A. continuously gather and assimilate data on job activities to measure worker performance. B. determine the root causes of worker fatigue. C. prevent worksite injuries. D. All of these are correct.

23 What crime has emerged as one of the fasted growing criminal activities? A. Identity theft B. Pilferage C. Scavenging D. Cracking What is a license called that permits LAN versions of software packages to be used by a specific number of users? A. Site B. Limited C. Restricted D. Numerated Comparisons of fingerprints, palm prints, iris scans, and voiceprints are used in what type of identification systems? A. Visual B. Audio C. Biometric D. Positive


Download ppt "Chapter 7 IT Ethics, Crime and Privacy. Quiz Instructions 1.Print your name (first and last) on a blank sheet of paper 2.Print date and class day and."

Similar presentations


Ads by Google