Sunteți pe pagina 1din 34

TOPIC 4:

COMPUTER ETHICS
AND SECURITY

Two (2) Subtopics:


4.1 Computer Ethics
4.1.1 Netiquette
4.1.2 Area of Computer Ethics
4.2 Computer Security
4.2.1 Computer Security Risks
4.2.2 Security Measures

4.1
Computer Ethics

Learning Outcomes:
At the end of this topic, students should
be able to:
(a) Identify the rules of Netiquette.
(b) Define computer ethics.
(c) Describe areas of computer ethics.

4.1.1 Netiquette
Netiquette, which is short for Internet
etiquette, is the code of acceptable behaviors
users should follow while on the Internet.
Netiquette includes rules for all aspects of the
internet, including the World Wide Web, e-mail,
instant messaging, chat rooms, FTP, and
message boards.

Golden Rule: Treat others as you would


like them to treat you.
1) Keep messages brief. Use proper grammar,
spelling, and punctuation.

2) Be careful when using sarcasm and humor,


as it might be misinterpreted.
3) Be polite. Avoid offensive language.
4) Read the message before you send it.
5) Use meaningful subject lines.
6

Golden Rule: Treat others as you would


like them to treat you.
6) Avoid sending or posting flames, which are
abusive or insulting messages. Do not
participate in flame wars, which are exchanges
of flames.
7) Avoid sending spam, which is the Internets
version of junk mail. Spam is an unsolicited
e-mail message sent to many recipients.

Golden Rule: Treat others as you would


like them to treat you.
8) Do not use all capital letters, which is the
equivalent of SHOUTING!

9) Use emoticons to express emotion. Popular


emoticons include
:) Smile
:| Indifference
:o Surprised
:( Frown
:\ Undecided
8

Golden Rule: Treat others as you would


like them to treat you.
10) Use abbreviations and acronyms for phrases:
btw
imho
fyi
ttfn
fwiw
tyvm

by the way
in my humble opinion
for your information
ta ta for now
for what its worth
thank you very much

Golden Rule: Treat others as you would


like them to treat you.
11. Read the FAQ (frequently asked questions), if
one exists. Many Web pages have an FAQ.

10

Golden Rule: Treat others as you would


like them to treat you.
12. Do not assume material is accurate or up-to
date. Be forgiving of others mistakes.
13. Never read someones private e-mail.

11

4.1.2 Areas of Computer Ethics


(1)
(2)
(3)
(4)
(5)

Information accuracy
Green computing
Codes of conduct
Information privacy
Intellectual property

12

Computer Ethics
As with any powerful technology, computers can
be used for both good and bad intentions. The
standards that determine whether an action is
good or bad are known as ethics.

13

Computer Ethics
Definition
Computer ethics are the moral guidelines that
govern the use of computers and information
systems.
~ Discovering Computer ~

14

(1) Information Accuracy


Information accuracy today is a concern because
many users access information maintained by
other people or companies on the Internet.
Users should evaluate the value of a Web page
before relying on its content. Be aware that the
organization providing access to the information
may not be the creator of the information.

15

(1) Information Accuracy


Example: Image manipulation

A digitally altered photo shows sports legend Michael Jordan


(born in 1963) meeting the famous scientist Albert Einstein
(who died in 1955).
16

(2) Green Computing


Green

computing involves reducing the

electricity and environmental waste while using a


computer.
People use, and often waste, resources such as
electricity and paper while using a computer.
Society has become aware of this waste and is
taking measures to combat it.

17

Organizations can implement a variety of


measures to reduce electrical waste.
Consolidate servers by using virtualization.
(Server virtualization provides the capability to divide a
physical server logically into many virtual server)
Purchase high-efficiency equipment, such as
uninterruptible power supplies and storage devices.
Use sleep modes and other power management
features for computers and devices.
Buy computers with low power consumption processors
and power supplies.
When possible, use outside air to cool the data center.
18

Green Computing Suggestions


1. Use computers and devices that comply with
the ENERGY STAR program.
2. Do not leave the computer running overnight.

3. Turn off the monitor, printer, and other devices


when not in use.
4. Use LCD monitors instead of CRT monitors.
5. Use paperless methods to communicate.

19

Green Computing Suggestions


6. Recycle paper.
7. Buy recycled paper.

8. Recycle toner cartridges.


9. Recycle old computers, printers, and other
devices.
10. Telecommute to save gas.
(Telecommuting is essentially working from home full-time or several
days out of the work week. Save time and money by not driving to
work each day )

11. Use video conferencing and VoIP for meetings.


20

(3) Code of Conduct


An IT code of conduct is a written guideline
that helps determine whether a specific
computer action is ethical or unethical.

21

IT Code of Conduct
1. Computers may not be used to harm other
people.
2. Employees may not interfere with others
computer work.
3. Employees may not meddle in others computer
files.
4. Computers may not be used to steal.
5. Computers may not be used to bear false
witness.
6. Employees may not copy or use software
illegally.
22

IT Code of Conduct
7. Employees may not use others computer
resources without authorization.
8. Employees may not use others intellectual
property as their own.
9. Employees shall consider the social impact of
programs and systems they design.
10. Employees always should use computers in a
way that demonstrates consideration and
respect for fellow humans.
Sample IT code of conduct employers may distribute to
employees.
23

(4) Information Privacy


Information privacy refers to the right of
individuals and companies to deny or restrict the
collection and use of information about them.
Today, huge databases store many of data online.
Much of the data is personal and confidential and
should be accessible only to authorized users.
That is, some companies and individuals collect
and use this information without user
authorization.

24

How to Safeguard Personal Information


1. Fill in only necessary information on
registration forms.
2. Purchase goods with cash, rather than credit or
checks.
3. Avoid shopping club and buyer cards.
4. If merchants ask personal questions, find out
why they want to know before releasing the
information.
5. Inform merchants that you do not want them to
distribute your personal information.

25

How to Safeguard Personal Information


6. Install a cookie manager to filter cookies.
7. Clear your history file when you are finished
browsing.
8. Turn off file and printer sharing on your Internet
connection.
9. Install a personal firewall.
10. Do not reply to spam for any reason.

26

(5) Intellectual Property


Intellectual property (IP) refers to unique and
original works such as ideas, inventions, art,
writings, processes, company and product names,
and logos.

OR

Intellectual property refers to creations of the


mind: inventions; literary and artistic works; and
symbols, names and images used in commerce.
27

(5) Intellectual Property


Intellectual property rights are the rights to
which creators are entitled for their work. Certain
issues arise surrounding IP today because many
of these works are available digitally.

28

(5) Intellectual Property


A copyright gives authors and artists exclusive
rights to duplicate, publish, and sell their materials.
A common infringement of copyright is piracy.
People pirate (illegally copy) software, movies, and
music.

29

Intellectual Property Patent


A patent is an exclusive right granted for an
invention, which is a product or a process that
provides, in general, a new way of doing
something, or offers a new technical solution to a
problem.

To get a patent, technical information about the


invention must be disclosed to the public in a
patent application.

Intellectual Property Copyright


Copyright (or authors right) is a legal term used
to describe the rights that creators have over
their literary and artistic works. Works covered
by copyright range from books, music, paintings,
sculpture, and films, to computer programs,
databases, advertisements, maps, and technical
drawings.

Intellectual Property Trademark


A trademark is a sign capable of distinguishing
the goods or services of one enterprise from
those of other enterprises. Trademarks are
protected by intellectual property rights.
Trademark is a recognizable sign, logo, design or
unique expression related to products or services.

Intellectual Property Corporation of Malaysia


(MyIPO) - www.myipo.gov.my

33

Computer Ethics (Definition)


Netiquette
Code of acceptable behaviour users
should follow while on the Internet.

Area of Computer Ethics (Describe /


Explain)
Information accuracy

Green Computing
Codes of Conduct
Information Privacy

Intellectual Property
34

S-ar putea să vă placă și