Your SlideShare is downloading. ×
Understand Ethics and Security in the Programming Process
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Understand Ethics and Security in the Programming Process


Published on

Published in: Education

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Understand Ethics and Security in The Programming Process
  • 2. What is Computer Ethics? “Dealing with ethical problems aggravated, transformed or created by computer technology” - Computer Ethics in the Computer Science Curriculum
  • 3. Organizations ACM – Association for Computer Machinery Centre for Computing and Social Responsibility The Research Center on Computing & Society
  • 4. Ethical Considerations
  • 5. Information Age Due to the computer’s ability to store and manipulate large amounts of information
  • 6. Netiquette Do not attempt to access the account of another user without authorization Do not share your password – change it periodically Use appropriate subject matter and language, and be considerate of other people’s beliefs and opinions.
  • 7. Privacy Ethical issue Computers record transactions, calls, etc. (These records can be used to learn a lot about you.) Because of privacy issues, many laws have been passed.
  • 8. Online Profiling Marketing technique where data is collected about customers visiting a website
  • 9. Cookie Text file created by the server computer when a user enters information into a website. (not a delicious treat)
  • 10. Web Beacon Tiny, transparent graphics located on web pages or in e-mail message that are used in combination with cookies to collect data about web page users or email senders
  • 11. Privacy Policy Legally binding document that explains how any personal information will be used.
  • 12. Information Technology Laws in the United States
  • 13. Technology Laws • Identity Theft Penalty Enhancement Act of 2004 • Federal Information Security Management Act of 2002 (FISMA) • Consumer Credit Reporting Reform Act of 1996 • Privacy Act of 1974 • Right to Financial Privacy Act of 1978 • Electronic Communications Privacy Act of 1986 (ECPA) • Electronic Freedom of Information Act of 1996 • Children’s Online Privacy Protection Act of 1988 (COPPA) • Safety and Freedom through Encryption Act of 1999 (SAFE) • Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001
  • 14. Implications of Computer Use
  • 15. Ergonomics The science that studies safe work environments. Repetitive stress injuries, eye strain, etc.
  • 16. Environmental Concerns Power & paper waste Disposal of outdated hardware
  • 17. Employee Monitoring Issues with computers in the workplace
  • 18. Invasion of Privacy Identity theft
  • 19. Protection of SOFTWARE & DATA
  • 20. Copyright Protection of digital information NET (No Electronic Theft) Act of 1997 • Protects against copyright infringement
  • 21. Piracy Illegal copies being distributed.
  • 22. Virus Program or series of instruction that can replicate without the user’s knowledge Trojan Horse » Appears as something else Worm » Program that is able to reproduce itself over a network
  • 23. Antivirus-Programs Install on computers to detect and remove code before it can replicated or damage data
  • 24. Precautions to Take Update virus software Do not open email attachments without scanning.
  • 25. Crackers, Hackers Illegal act to gain access to large computer systems to perform acts of vandalism. Electronic Communications Privacy Act of 1986 makes it a federal offense. Most networks have a firewall to prevent this type of access.
  • 26. Phishing Act of sending an email to a user falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes like identity theft.