Understand Ethics and Security in the Programming Process

822 views

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
822
On SlideShare
0
From Embeds
0
Number of Embeds
266
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Understand Ethics and Security in the Programming Process

  1. 1. Understand Ethics and Security in The Programming Process
  2. 2. What is Computer Ethics? “Dealing with ethical problems aggravated, transformed or created by computer technology” - Computer Ethics in the Computer Science Curriculum
  3. 3. Organizations ACM – Association for Computer Machinery Centre for Computing and Social Responsibility The Research Center on Computing & Society
  4. 4. Ethical Considerations
  5. 5. Information Age Due to the computer’s ability to store and manipulate large amounts of information
  6. 6. Netiquette Do not attempt to access the account of another user without authorization Do not share your password – change it periodically Use appropriate subject matter and language, and be considerate of other people’s beliefs and opinions.
  7. 7. Privacy Ethical issue Computers record transactions, calls, etc. (These records can be used to learn a lot about you.) Because of privacy issues, many laws have been passed.
  8. 8. Online Profiling Marketing technique where data is collected about customers visiting a website
  9. 9. Cookie Text file created by the server computer when a user enters information into a website. (not a delicious treat)
  10. 10. Web Beacon Tiny, transparent graphics located on web pages or in e-mail message that are used in combination with cookies to collect data about web page users or email senders
  11. 11. Privacy Policy Legally binding document that explains how any personal information will be used.
  12. 12. Information Technology Laws in the United States
  13. 13. Technology Laws • Identity Theft Penalty Enhancement Act of 2004 • Federal Information Security Management Act of 2002 (FISMA) • Consumer Credit Reporting Reform Act of 1996 • Privacy Act of 1974 • Right to Financial Privacy Act of 1978 • Electronic Communications Privacy Act of 1986 (ECPA) • Electronic Freedom of Information Act of 1996 • Children’s Online Privacy Protection Act of 1988 (COPPA) • Safety and Freedom through Encryption Act of 1999 (SAFE) • Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001
  14. 14. Implications of Computer Use
  15. 15. Ergonomics The science that studies safe work environments. Repetitive stress injuries, eye strain, etc.
  16. 16. Environmental Concerns Power & paper waste Disposal of outdated hardware
  17. 17. Employee Monitoring Issues with computers in the workplace
  18. 18. Invasion of Privacy Identity theft
  19. 19. Protection of SOFTWARE & DATA
  20. 20. Copyright Protection of digital information NET (No Electronic Theft) Act of 1997 • Protects against copyright infringement
  21. 21. Piracy Illegal copies being distributed.
  22. 22. Virus Program or series of instruction that can replicate without the user’s knowledge Trojan Horse » Appears as something else Worm » Program that is able to reproduce itself over a network
  23. 23. Antivirus-Programs Install on computers to detect and remove code before it can replicated or damage data
  24. 24. Precautions to Take Update virus software Do not open email attachments without scanning.
  25. 25. Crackers, Hackers Illegal act to gain access to large computer systems to perform acts of vandalism. Electronic Communications Privacy Act of 1986 makes it a federal offense. Most networks have a firewall to prevent this type of access.
  26. 26. Phishing Act of sending an email to a user falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes like identity theft.

×