computer ethics
TRANSCRIPT
OBJECTIVE
SYLLABUS
NOTESQUIZ
WEB REFERENCES
OBJECTIVE
Students will be able to;
1.Give the definition of Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law.
1.2.1 Definition: o Computer Ethics o Code of Ethics o Intellectual Property
SYLLABUS
1.2 COMPUTER ETHICS AND LEGAL ISSUES
1.2.2 Privacy: o Authorized access: user authentication and verification.
1.2.3 Controversial Contents and Control: Content examples:
o Pornography o Slander
Control example: o Filtering
SYLLABUS
Computer ethics
Are the moral guidelines that govern the use of computers, networks,
and information systems.
Code of Ethics
An IT code of conduct is written guideline that helps determine whether
a specific computer action is ethnical or
unethical.
IT CODE OF CONDUCT
1. Computers may not be used to harm other people.
2. Employees may not interfere with others’ computer work.
3. Employees may not meddle in others’ computer files.
4. Computers may not be used to steal.
5. Computers may not be used to bear false witness.
6. Employees may not copy or use software illegally.
7. Employees may not use others’ computer resources without authorization.
8. Employees may not use others’ intellectual property as their own.
9. Employees shall consider the social impact of programs and systems they design.
10. Employees always should use computers in a way that demonstrates consideration and respect for fellow humans.
IT CODE OF CONDUCT
Intellectual Property (IP)
Refers to unique and original works such as
ideas, inventions, art, writings, processes,
company and product names, and logos.
Privacy
Information privacy refers to the right of individuals and companies to deny
or restrict the collection and use
of information about them.
Computer Crime
Any illegal acts involving a computer.
Cyber Law Cyber law encompasses a wide variety of political and legal issues related
to the Internet and other communications
technology, including intellectual property, privacy, freedom of
expression, and jurisdiction.
Question 1
[Computer ethics]
Six frequently discussed areas of computer ethics are unauthorized use of computers and
networks, software theft (privacy), information accuracy, intellectual property rights, codes of
conduct, and information privacy.
(TRUE/FALSE)
Question 2
[Computer crime]
We must educate people to understand how technology can be
used to hurt others.
(TRUE/FALSE)
Question 3
[Intellectual Property]
A copyright protects any intangible form of expression.
(TRUE/FALSE)
Question 4
[Code of conduct/ethic]
Are computers may be used to harm other people in IT code of conduct
( TRUE/FALSE )
Question 5
[Code of conduct/ethic]
Computers may not be used to bear false witness.
(TRUE/FALSE)
Question 6
[Computer crime]
There are 6 major classes of criminal activity with computers
(TRUE/FALSE)
Question 7
[Computer ethics]
Ethic is divided into three primary areas: meta-ethics (the study of what ethicality is),
normative ethics (the study of what ethical truths there are and how they are known), and applied ethics
(the study of the use of ethical knowledge).
(TRUE/FALSE)
Question 8
[Computer ethics]
Ethics (from the Ancient Babylonians "ethikos", meaning "arising from habit")
is a major branch of philosophy.
(TRUE/FALSE)
Question 9
[Intellectual Property]
Install a cookie manager to filter cookies is a way to safeguard personal information.
( TRUE / FALSE )
Question 10
Information privacy refers to the right of individuals and companies to deny
or restrict the collection and use of information about them.
( TRUE / FALSE )
visit scsite.com/dc2006/ch11/weblink and then click intellectual Property(IP) Right
http:// en.wikipedia.org/wiki/Cyber_law http://en.wikipedia.org/wiki/Computer_crime
http://en.wikipedia.org/wiki/Privacy
WEB REFERENCES