Вы находитесь на странице: 1из 40

3.

0 COMPUTER ETHICS AND SECURITY


3.1 COMPUTER ETHICS
3.1.(a) (b) (c) AREAS OF COMPUTER ETHICS
Learning Outcomes

At the end of the lesson, students should be able to:

(a) Define computer ethics

(b) Describe areas of computer ethics

(c) Identify reasons of choosing types of computer ethics


based on the given scenario

LO
What is computer ethics?

Computer ethics are the moral guidelines that govern


the use of computers and information systems.
5 Areas of Computer Ethics

Information Accuracy

Green Computing

Codes of Conduct

Information Privacy

Intellectual Property Rights


Information Accuracy

Why is Information accuracy become a concern


today?

Information accuracy today is a concern because


many users access information maintained by other
people or companies, such as on the Internet.
Information Accuracy

Do not assume that


because the information
is on the Web that it is
correct

Users should evaluate


the value of a Web page
before relying on its
content.
Information Accuracy
Information Accuracy
Information Accuracy
Green Computing

• What is green
computing?
 Green computing
involves reducing
the electricity and
environmental
waste while using
a computer.
Green Computing
• Why?
 computer energy is often wasteful (leaving the computer
on when not in use (CPU and fan consume power, screen
savers consume power)
 printing is often wasteful (printing out partial drafts)
 pollution (disposal of computers and components)
Ways To Contribute To Green Computing.
i. Use computers and devices
that comply with the ENERGY
STAR program.
ii. Do not leave the computer
running overnight.
iii. Turn off the monitor, printer,
and other devices when not
in use.
iv. Use LCD monitors instead of
CRT monitors.
v. Use paperless methods to
communicate.
Codes of Conduct
 An IT code of conduct is a
written guideline that helps
determine whether a specific
computer action is ethical or
Unethical

Established by a number of
computer-related organizations
after recognizing that individuals
need specific standards for the
ethical use of computers
IT code of Conduct
1. Computers may not be used to harm other people.
2. Employees may not interfere with others’ computer work.
3. Employees may not meddle in others’ computer files.
4. Computers may not be used to steal.
5. Computers may not be used to bear false witness.
6. Employees may not copy or use software illegally.
7. Employees may not use others’ computer resources without
authorization.
8. Employees may not use others’ intellectual property as
their own.
9. Employees shall consider the social impact of programs and
systems they design.
10. Employees always should use computers in a way that
demonstrates consideration and respect for fellow humans
Information Privacy

• Information privacy refers


to the right of individuals
and companies to deny or
restrict the collection and
use of information about
them.
HOW?.
Techniques companies and employers use to collect your personal
data.
1. Electronic Profiles :
When you fill out a form such as contest entry form, the
merchant that receives the form usually enters it into a
database.
2. Spyware and Adware
Spyware is a program placed on a computer without the user’s
knowledge that secretly collects information about the user.
Adware is a program that displays an online advertisement in a
banner or pop-up window on Web pages, e-mail messages, or
other Internet services.
HOW?.
Techniques companies and
employers use to collect your
personal data.
Spam is an unsolicited e-
mail message or newsgroup
posting sent to multiple
recipients or newsgroups at
once. The content of spam
ranges from selling a
product or service, to
promoting a business
opportunity, to advertising
offensive material.
How to safeguard personal information
1. Fill in only necessary information on rebate,
warranty, and registration forms
2. Purchase goods with cash, rather than credit or
checks.
3. If merchants ask personal questions, find out why
they want to know before releasing the
information.
4. Clear your history file when you are finished
browsing.
5. Do not reply to spam for any reason.
Electronic Profiles
Spyware and Adware
Spam
Intellectual Propert y Rights
What is Intellectual Property?
Intellectual property (IP)
refers to unique and original
works such as ideas,
inventions, art, writings,
processes, company and
product names, and logos.
What is Intellectual Property
Rights? Intellectual property
rights are the rights to which
creators are entitled for their
work.
Intellectual Propert y Rights
Why IP Rights?
because many of these
works are available
digitally.
Types of Intellectual Property:

 Patent
 Copyright
 Trademark
Patent

• Definition:
• an exclusive right granted for an invention
• => invention
• a product or a process that provides a
new way of doing something, or offers a
new technical solution to a problem
• A patent is protected 20 years from the date of
filing.
Examples of Patent

Hanger

Vegetable and fruit washing machine


Examples of Patent

Bladeless fan

iPhone
Copyright

• Definition:
• Legal term describing rights given to creators
for their literary and artistic works.
• Copyright in any literary, musical or artistic work
shall subsist during the life of the author plus 50
years after his/her death.
Examples of Copyright

• literary works - novels, poems, plays, reference


works, newspapers, computer programs,
databases, films, musical compositions, and
choreography

• artistic works - paintings, drawings,


photographs, sculpture, architecture,
advertisements, maps and technical drawings
Examples of Literary Works

Musical
composition

Novels
Examples of Artistic Works

Painting

Photograph
Trademark

• Definition:
- A distinctive sign which identifies certain
goods or services
• Examples of Trademark
 Logo
 Sign
 Slogan
 Color
 Design
Examples of Logo
Examples of Hidden Logo
Examples of Hidden Logo
Examples of Sign
Examples of Slogan
Summary
• Define computer ethics
• Describe areas of computer ethics

Вам также может понравиться