Your SlideShare is downloading. ×
0
Understand Ethics and Security in
The Programming Process
What is Computer Ethics?
“Dealing with ethical problems
aggravated, transformed or created by
computer technology”
- Compu...
Organizations
ACM – Association for Computer Machinery
Centre for Computing and Social Responsibility
The Research Center ...
Ethical Considerations
Information Age
Due to the computer’s ability to store and
manipulate large amounts of information
Netiquette
Do not attempt to access the account of another user
without authorization
Do not share your password – change ...
Privacy
Ethical issue
Computers record transactions, calls, etc.
(These records can be used to learn a lot about you.)

Be...
Online Profiling
Marketing technique where data is collected about
customers visiting a website
Cookie
Text file created by the server computer when a user enters
information into a website.
(not a delicious treat)
Web Beacon
Tiny, transparent graphics located on web pages or in e-mail
message that are used in combination with cookies ...
Privacy Policy
Legally binding document that explains how any personal
information will be used.
Information Technology Laws in the

United States
Technology Laws
• Identity Theft Penalty
Enhancement Act of 2004
• Federal Information Security
Management Act of 2002 (FI...
Implications of Computer Use
Ergonomics
The science that studies safe work environments.
Repetitive stress injuries, eye strain, etc.
Environmental Concerns
Power & paper waste
Disposal of outdated hardware
Employee Monitoring
Issues with computers in the workplace
Invasion of Privacy
Identity theft
Protection of

SOFTWARE
&
DATA
Copyright
Protection of digital information
NET (No Electronic Theft) Act of 1997
• Protects against copyright infringemen...
Piracy
Illegal copies being distributed.
Virus
Program or series of instruction that can replicate without the
user’s knowledge
Trojan Horse
» Appears as something...
Antivirus-Programs
Install on computers to detect and remove code before it can
replicated or damage data
Precautions to Take
Update virus software
Do not open email attachments without scanning.
Crackers, Hackers
Illegal act to gain access to large computer systems to perform acts of
vandalism.
Electronic Communicat...
Phishing
Act of sending an email to a user falsely claiming to be a legitimate
business in an attempt to trick the user in...
Upcoming SlideShare
Loading in...5
×

Understand Ethics and Security in the Programming Process

539

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
539
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Understand Ethics and Security in the Programming Process"

  1. 1. Understand Ethics and Security in The Programming Process
  2. 2. What is Computer Ethics? “Dealing with ethical problems aggravated, transformed or created by computer technology” - Computer Ethics in the Computer Science Curriculum
  3. 3. Organizations ACM – Association for Computer Machinery Centre for Computing and Social Responsibility The Research Center on Computing & Society
  4. 4. Ethical Considerations
  5. 5. Information Age Due to the computer’s ability to store and manipulate large amounts of information
  6. 6. Netiquette Do not attempt to access the account of another user without authorization Do not share your password – change it periodically Use appropriate subject matter and language, and be considerate of other people’s beliefs and opinions.
  7. 7. Privacy Ethical issue Computers record transactions, calls, etc. (These records can be used to learn a lot about you.) Because of privacy issues, many laws have been passed.
  8. 8. Online Profiling Marketing technique where data is collected about customers visiting a website
  9. 9. Cookie Text file created by the server computer when a user enters information into a website. (not a delicious treat)
  10. 10. Web Beacon Tiny, transparent graphics located on web pages or in e-mail message that are used in combination with cookies to collect data about web page users or email senders
  11. 11. Privacy Policy Legally binding document that explains how any personal information will be used.
  12. 12. Information Technology Laws in the United States
  13. 13. Technology Laws • Identity Theft Penalty Enhancement Act of 2004 • Federal Information Security Management Act of 2002 (FISMA) • Consumer Credit Reporting Reform Act of 1996 • Privacy Act of 1974 • Right to Financial Privacy Act of 1978 • Electronic Communications Privacy Act of 1986 (ECPA) • Electronic Freedom of Information Act of 1996 • Children’s Online Privacy Protection Act of 1988 (COPPA) • Safety and Freedom through Encryption Act of 1999 (SAFE) • Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001
  14. 14. Implications of Computer Use
  15. 15. Ergonomics The science that studies safe work environments. Repetitive stress injuries, eye strain, etc.
  16. 16. Environmental Concerns Power & paper waste Disposal of outdated hardware
  17. 17. Employee Monitoring Issues with computers in the workplace
  18. 18. Invasion of Privacy Identity theft
  19. 19. Protection of SOFTWARE & DATA
  20. 20. Copyright Protection of digital information NET (No Electronic Theft) Act of 1997 • Protects against copyright infringement
  21. 21. Piracy Illegal copies being distributed.
  22. 22. Virus Program or series of instruction that can replicate without the user’s knowledge Trojan Horse » Appears as something else Worm » Program that is able to reproduce itself over a network
  23. 23. Antivirus-Programs Install on computers to detect and remove code before it can replicated or damage data
  24. 24. Precautions to Take Update virus software Do not open email attachments without scanning.
  25. 25. Crackers, Hackers Illegal act to gain access to large computer systems to perform acts of vandalism. Electronic Communications Privacy Act of 1986 makes it a federal offense. Most networks have a firewall to prevent this type of access.
  26. 26. Phishing Act of sending an email to a user falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes like identity theft.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×