Вы находитесь на странице: 1из 28

1.

2 COMPUTER ETHICS AND LEGAL ISSUES


1. 2.1.1 DEFINE COMPUTER ETHICS, CODE OF ETHICS, INTELLECTUAL
PROPERTY, PRIVACY, COMPUTER CRIME AND CYBER LAW.

COMPUTER ETHICS
Comput-is a system of moral standards or
values used as a guideline for computer
users. It is needed to stop the current
technology products from being
exploited.
Ethi-cs -is a moral philosophy where a
person makes a specific moral choice and
sticks to it. Code of ethics in computing
means moral guidelines to refer to when
using the computer and the Internet.

INTELLECTUAL
PROPERTY
property refers to any
product of human intellect
that is unique and has
value in the market place.
This covers ideas,
inventions, unique name,
computer program codes

PRIVACY
Privacy in IT refers to data and
information privacy. In general, data
include texts, numbers, sounds,
images and video. Information
privacy is described as the rights of
individuals and companies to deny
or restrict the collection and use of
information about them.
CYBER LAW
Cyber law refers to any laws relating
to protecting the Internet and other

1.2.1.2 DIFFERENTIATE BETWEEN ETHICS AND LAW.


ETHICS

LAW

Guideline: As a guideline to computer users. Control: As a rule to control computer users.


Moral Standards: Ethical behaviour is judged by Judicial Standards: Law is judged by judicial
moral standards.

standards.

No Punishments: No punishment for anyone

Must Follow: Computer users must follow the

who violates ethics.

regulations and law.

Free To Follow: Computer users are free to

Punishments: Penalties, imprisonments and

follow or ignore the code of ethics.

other punishments for those who break the law.

Immoral: Not honouring computer ethics means Depends On Country: Depends on country and
ignoring the moral elements (immoral).

state where the crime is committed.

Universals: Universal, can be applied

Prevent Misusing Of Computers: To prevent

anywhere, all over the world

misuse of computers.

1.2.1.3 INTELLECTUAL PROPERTY LAWS.

Intellectual property laws are


needed to establish and
safeguard the intellectual
property which refers to works
created by inventors, authors
and artists. It is also needed as
businesses today continue to
expand globally. There are four
types of Intellectual Property
protection. They are patents for
invention, trademarks for
brand identity, designs for
product appearance and

1.2.2.1

THE WAYS TO PROTECT PRIVACY

Privacy
law

Utilities
software

he privacy laws in Malaysia emphasises on the following:


Security Services to review the security policy Security
Management to protect the resources Security Mechanism to
implement the required security services Security Objects, the
important entities within the system environment

Example: anti-spam program,


firewall, anti-spyware and antivirus.

1.2.2.2 DEFINE AUTHENTICATION & VERIFICATION


METHODS/ TECHNOLOGIES .
Methods of Authentication

There are two commonly used authentication methods, which are biometric
device and callback system. Biometric device is a device that translates personal
characteristics into a digital code that is compared with a digital code stored in
the database. Biometric devices include Fingerprint Recognition, Facial
Recognition, Hand Geogmetry, Iris Scanning, Retinal Scanning, Voice Recognition
and Signature Verification. Callback system
Methods of Verification
refers to the checking system that authenticates the user.

There are two methods used in verification, which are user identification
and processed object. User identification refers to the process of
validating the user. Processed object refers to something the user has
such as identification card, security token and cell phone.

1.2.3.1 EFFECTS OF CONTROVERSIAL CONTENTS ON


SOCIETY

Pornography: can lead to criminal acts such as exploitation of


women and children can lead to sexual addiction or
perversion can de
velop low moral value towards other men, women or children
can erode good religious, cultural and social beliefs and
behaviour.
Slander: can develop into a society that disregards
honesty and truth can develop bad habit of spreading untruths
and rumours can lead to unnecessary argument can cause
people to have negative attitudes towards another person

1.2.4.1 CYBER LAW.

Cyber Law is needed as in the recent years, many


concerns and issues were raised on the integrity and
security of information, legal status of online transactions,
privacy and confidentiality of information, intellectual
property rights and security of government data placed on
the Internet.
1.2.4.2 Computer crimes below

Fraud

Copyright
Infringement

Attacks
Theft

1.1.3 COMPUTER SECURITY


1.3.1.1 DEFINE COMPUTER SECURITY.
Computer security means protecting our computer systems and the
information they contain against unwanted access, damage, destruction
or modification. Three types of computer security are: hardware security
software security/data security network security

1.3.2 .1 Security Threats


Malicious
code
Hacking

Natural
disaster

HOW SAFE ARE YOU?


Type of Info
1. First Name
2. Last Name
3. Middle Name
4. Current and previous
5. Cellphone number
6. Your address
7. Your phone number
8. Your address
9.Your home phone number
10. Your birthday

Shared

Not
Shared

ONLINE SAFETY AND SECURITY


Internet

Promote business
Gain new friends
Stay in touch with old ones
Entertainment-games, online communities

Other side of the coin


One of the most dangerous places

TIPS TO STAY ONLINE


1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.

Be Mindful
Read the terms of consditions
Check the privacy policy
Know the security features of the Social Net
Do not share PW
Avoid logging in public networks
Do not talk to strangers
Never post about future vacation
Add friends you know in real life
Avoid visiting untrusted site
Install and update an antivirus
Make your wifi private
Buy orig software

SKILL EXPLORATION
Visit a social networking site and look
for the sites privacy policy. The link is
typically found at the bottom of the
passage and sometimes labeled only
as Privacy. Write a summary on
how the web handles both your
private and public information

INTERNET THREATS
1. MALWARE- malicious software
a. VIRUS- replicate itself & transferable
b. WORM- ILOVEYOU (Lovebug) worm
c. TROJAN- disguised as useful program
d. SPYWARE- monitor your actions
Keyloggers-record keystroke by user
e. ADWARE pop-ups advertisements

INTERNET THREATS
2. SPAM- unwanted emails from bots or
advertisers
3. PHISHING- acquiring sensitive information
e.g. pw, credit card details

PHARMING-complicated way of Phishing

PROTECTING REPUTATIONS ONLINE


EMBARASSING MOMENTS
(Something you and your friends find funny today may
be something that could harm somenes reputation
later)
Before hiring, companies do a background check on
the applicant, and the easiest way to check your
background is to visit pages that are related to you.

THINK BEFORE YOU CLICK


Here are the things that you might want to consider before
posting something in the internet.
1. Would you want your parents/grandparents to see it?Would you
want your future boss to see it? Once posted YOU HAVE NO
CONTROL of who sees your post.
2. Your friends depend on you to protect their reputation online.
Talk to your fiends about this serious responsibility.
3. Set your post to private.
4. Avoid using names
5. If you fee that a post can affect you or others reputation, ask
the one who posted it to pull it down or report it as inappriate.

COPY INFRINGEMENT

INTELLECTUAL PROPERTY- No part of this


book may be copied, reproduced
copyright page
Punishable by laws
Copyright laws includes your rights over your
work
Employees or business owners face CI
huge fine due to reckless copying of materials

TIPS TO AVOID INFRINGEMENTS

1. Understand
2. Be Responsible
3. Be creative
4. Know the law

ONLINE RESEARCH
How to use credible source
TIPS:
1.Have a question in mind
2.Narrow it down
3.Advanced search
4.Look for credible sources5.Give credit

ONLINE RESEARCH
How to use credible source
TIPS:
1.Have a question in mind- focus on a
question you want to answer
2. Narrow it down- Search engine have
filters but in case it fails you need to
narrow down what you are looking for

ONLINE RESEARCH
How to use
credible source
TIP:
3. Advanced
search- best way

ONLINE RESEARCH
How to use
credible source
TIP:
4. Look for
credible sources-

ONLINE RESEARCH

ow to use
edible
urce
P:
Give
edit

EXPLORATION 2.2 CYBER NEWS


REPORT

Form agroups with three members


each.
Research for several news and
events to cybercrime. Using your
cellphone, report it as if your were
a news caster. Present it in 1-2
mins recording.

TAKE THE CHALLENGE!

Create campaign materials


promoting, Think before you
click. E.g. small posters posted
along the hallway or bulletin
boards as approved by the
school. The campaign is for the
younger batch of the school.

Вам также может понравиться