14
Hectic Ethics Computer Applications Mrs. Wohleb

Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances

Embed Size (px)

Citation preview

Page 1: Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances

Hectic EthicsComputer Applications

Mrs. Wohleb

Page 2: Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances

Objectives Students will be able to:

Describe ethical considerations resulting from technological advances

Hacking Privacy Restricted Sites Copyright Spreading Viruses Consequences Misuse of Technology Reliability of electronic information Netiquette

Page 3: Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances

Hacking Unauthorized use of computer and network

resources "hacker" originally meant a very gifted

programmer Hacking is a felony in the United States

and most other countries

Page 4: Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances

Ethical Hacking Ethical hacking is the methodology adopted

by ethical hackers to discover the vulnerabilities existing in information systems operating environments

Ethical hackers typically employ the same tools and techniques as criminal attackers, but they neither damage the target systems nor steal information

Page 5: Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances

How Private is Your Information Unsolicited email is not regulated by federal

law at present A few companies are creating huge

databases full of private information The federal government regulates only its own

databases, leaving private database owners to decide how and when to distribute collected information

Page 6: Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances

Privacy Privacy refers to the information on a

computer as it relates to individuals and businesses Seeing private, protected and copyrighted

electronic information is a part of working with computers

Knowing how to ethically handle this information is what is important

Page 7: Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances

Copyright A copyright is a property right attached to

an original work of art or literature It grants the author or creator exclusive rights to

reproduce, distribute, adapt, perform, or display the protected work

Page 8: Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances

Restricted Sites A restricted web site or web area is a site

that is only available for viewing by a certain group of people, such as students in a particular course

Restrictions can be made according to the IP number, subnet or domain of machines, or by user name and password.

Page 9: Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances

Help My Computer’s Sick A computer virus passes from computer to

computer like a biological virus passes from person to person

It must piggyback on top of some other program or document in order to get executed

Once it is running, it is then able to infect other programs or documents

Page 10: Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances

Consequences For those who intentionally cause damage

by transmitting a virus, the punishment can amount to ten years in federal prison, plus a fine

For those who transmit a virus with only "reckless disregard" to the damage it will cause, the maximum punishment stops at a fine and a year in prison

Page 11: Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances

Misuse of Technology Includes

Hacking using e-mail to intimidate or threaten students illegally downloading music plagiarizing information from the Internet using cellular phones during class time accessing pornographic Web sites and playing video games during class

Page 12: Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances

Reliability One of the great things about the Internet is that

anyone, no matter their age, education, or personal beliefs, etc. can publish information

On the other hand, one of the problems with the Internet is that anyone, no matter their age, education, or personal beliefs, etc. can publish information

That means that you, as the consumer of Internet information, must be especially careful when you are selecting materials to believe and to cite in an academic paper

Page 13: Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances

Reliability Questions Who is the author or sponsor of the page Are there obvious reasons for bias Is contact information provided Is there a copyright symbol on the page Is the page a “zombie” Can you verify the information

Page 14: Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances

Netiquette Simply stated, it's network etiquette -- that

is, the etiquette of cyberspace Examples of Netiquette

Do not type in all Caps Do not leave the subject field blank Refrain from formatting your e-mail with colored

text and background colors Never give out phone numbers or personal

information