Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.

Similar presentations


Presentation on theme: "Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage."— Presentation transcript:

1 Computer Ethics Prepared by

2 Discuss “Character is what you do when no one is watching.” --old adage

3 Relatively New Terms “Cyber ethics" and "netiquette" refer to responsible cyber social behavior. These terms refer to what people do online when no one else is looking.

4 Defining Computer Ethics” Ethics refers to the rules and standards governing the conduct of an individual with others. As technology and computers become more a part of our everyday lives, business conduct will continue to be even more of a problem.

5 The Internet Online, people can feel invisible and capable of doing things they normally wouldn't do in person or in public -- things that they know might be wrong.

6 Defining “Computer Ethics” Since the introduction of the World Wide Web, the cyber definition of ethics has also evolved. A new type of ethics known as computer ethics has emerged. Computer ethics is concerned with standards of conduct as they pertain to computers.

7 Why do we need to study computer ethics? Two of the more pressing concerns in computer ethics today are questions of copyright and privacy.

8 Why do we need to study computer ethics? Many people have been tricked by e-mail scams, claiming that they will make you a millionaire. It is the same kind of pyramid scheme that exists over telephone or mail, but no laws covered it for a while.

9 Why do we need to study computer ethics? Many email chain letters have allowed urban legends to spread at an accelerated rate and created alarm over hoaxes concerning many food and drug products. These emails only bog down email systems and servers. Some advertisers also email unsolicited ads to email users in a practice known as spamming.

10 The most controversial areas in Internet cases today seem to be those involving copyright laws. An issue that has become fundamental to computer usage and computer ethics, therefore, is copyright. Copying is defined as the use of someone else's intellectual property, and it is therefore illegal. Copyright

11 How do you know when copyright ownership belongs to you and when it belongs to others? The following rules resolve the problem: 1.If you produced the work yourself, then you are the natural author and own the copyright yourself. 2.If you as an employee created the work in the scope of employment, your employer owns the copyright and is in fact considered the author. Copyright

12 Privacy Do you have a secret? Have you ever lied? Are there certain things you don't want your parents to know? How about your friends? How would you feel if in twenty years, someone told your boss that once, when you were 17, you tried some drugs at a party?

13 Privacy What if they got this information from an email that you fully expected would not go beyond yourself and the recipient, but was intercepted and posted on a web page? That would be an unfair violation of your privacy.

14 Basic Definitions to KNOW To discuss online privacy, you need to know some basic computer definitions. No matter how little time you have spent online, you have been asked if you would like to accept a cookie, or told that a cookie has been sent. Well, of course, you think at first, Mmmmm....cookie. Unfortunately, you cannot eat these cookies. A cookie is a piece of data that a web site collects about you when you visit the site.

15 Basic Definitions to KNOW The data varies with the web site - a commercial web site will collect demographics (that is, sex, age, and other advertising information) to learn more about you, while an e-mail service may collect identifying or personal (name, mailing address) information to recognize you. Cookies allow a web site to be tailor made for you as long as you stay in that domain name or each time you visit. If you have ever checked a box saying "Remember My Password,"you have set a cookie.

16 Two Aspects of Privacy Online One aspect of privacy online is a need for protection for yourself. Online stalking has been a problem, with people harassing new 'friends' online and sometimes even threatening them, or confronting them in person. The second is a need to protect your data from strangers. This comes not from the fear of physical, but financial harm.

17 Ten Commandments of Computer Ethics The Computer Ethics Institute offers the Ten Commandments of Computer Ethics to help reinforce acceptable online behavior.

18 1.Thou shalt not use a computer to harm other people. 2.Thou shalt not interfere with other people's computer work. 3.Thou shalt not snoop around in other people's files. 4.Thou shalt not use a computer to steal. 5.Thou shalt not use a computer to bear false witness. 6.Thou shalt not use or copy software for which you have not paid. 7.Thou shalt not use other people's computer resources without authorization. 8.Thou shalt not appropriate other people's intellectual output. 9.Thou shalt think about the social consequences of the program you write. 10.Thou shalt use a computer in ways that show consideration and respect.

19 Scenario Imagine that you own a business in which you have spent a great amount of time writing and designing a Web-based game, only to find that someone else has copied much of the game for their own site. Is this okay? Is it fair? Is it legal?

20 Discussion Situations Copying and selling music files: These works are copyrighted and the creators may have not given permission to copy them. Copying and giving away software: The software creator is being denied a right to earn a living because the friend would otherwise have to purchase the word processor. This is illegal. Software typically comes with information about the purposes for which copies can be made. Copying movies for personal use: Movies are copyrighted works. By not paying to see the movie, you are denying the creators a right to earn a living.

21 Discussion Situations Copying photos, animations, greeting cards: These are all copyrighted works and should not be displayed on a personal site without obtaining permission. Copying photos and paragraphs of text for a school report: School reports are considered fair use, but the creators should be credited. Copying and rearranging paragraphs of text for a school report: Rearranging copied paragraphs is plagiarism, unless credit is given to each source. If the intent was to make it the student's work, then the ideas would have to be put in the student's own words.

22 www.animationfactory.comwww.animationfactory.com (PowerPoint template) http://www.cybersmartcurriculum.org/l esson_plans/68_09.asp http://wise.fau.edu/netiquette/net/ten. html http://wise.fau.edu/netiquette/net/ten. html (10 Commandments of Computer Ethics) Sources


Download ppt "Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage."

Similar presentations


Ads by Google