Your SlideShare is downloading. ×
Understand Ethics and Security in the Programming Process
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Understand Ethics and Security in the Programming Process

519
views

Published on

Published in: Education

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
519
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Understand Ethics and Security in The Programming Process
  • 2. What is Computer Ethics? “Dealing with ethical problems aggravated, transformed or created by computer technology” - Computer Ethics in the Computer Science Curriculum
  • 3. Organizations ACM – Association for Computer Machinery Centre for Computing and Social Responsibility The Research Center on Computing & Society
  • 4. Ethical Considerations
  • 5. Information Age Due to the computer’s ability to store and manipulate large amounts of information
  • 6. Netiquette Do not attempt to access the account of another user without authorization Do not share your password – change it periodically Use appropriate subject matter and language, and be considerate of other people’s beliefs and opinions.
  • 7. Privacy Ethical issue Computers record transactions, calls, etc. (These records can be used to learn a lot about you.) Because of privacy issues, many laws have been passed.
  • 8. Online Profiling Marketing technique where data is collected about customers visiting a website
  • 9. Cookie Text file created by the server computer when a user enters information into a website. (not a delicious treat)
  • 10. Web Beacon Tiny, transparent graphics located on web pages or in e-mail message that are used in combination with cookies to collect data about web page users or email senders
  • 11. Privacy Policy Legally binding document that explains how any personal information will be used.
  • 12. Information Technology Laws in the United States
  • 13. Technology Laws • Identity Theft Penalty Enhancement Act of 2004 • Federal Information Security Management Act of 2002 (FISMA) • Consumer Credit Reporting Reform Act of 1996 • Privacy Act of 1974 • Right to Financial Privacy Act of 1978 • Electronic Communications Privacy Act of 1986 (ECPA) • Electronic Freedom of Information Act of 1996 • Children’s Online Privacy Protection Act of 1988 (COPPA) • Safety and Freedom through Encryption Act of 1999 (SAFE) • Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001
  • 14. Implications of Computer Use
  • 15. Ergonomics The science that studies safe work environments. Repetitive stress injuries, eye strain, etc.
  • 16. Environmental Concerns Power & paper waste Disposal of outdated hardware
  • 17. Employee Monitoring Issues with computers in the workplace
  • 18. Invasion of Privacy Identity theft
  • 19. Protection of SOFTWARE & DATA
  • 20. Copyright Protection of digital information NET (No Electronic Theft) Act of 1997 • Protects against copyright infringement
  • 21. Piracy Illegal copies being distributed.
  • 22. Virus Program or series of instruction that can replicate without the user’s knowledge Trojan Horse » Appears as something else Worm » Program that is able to reproduce itself over a network
  • 23. Antivirus-Programs Install on computers to detect and remove code before it can replicated or damage data
  • 24. Precautions to Take Update virus software Do not open email attachments without scanning.
  • 25. Crackers, Hackers Illegal act to gain access to large computer systems to perform acts of vandalism. Electronic Communications Privacy Act of 1986 makes it a federal offense. Most networks have a firewall to prevent this type of access.
  • 26. Phishing Act of sending an email to a user falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes like identity theft.

×