Your SlideShare is downloading. ×
0
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
ethical legal issues
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

ethical legal issues

118

Published on

Topics we will cover …

Topics we will cover

- Ethics and Society
- Unauthorized use of computers and networks
- Software theft
- Information privacy
- Code of Conduct
- Spyware and Spam

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
118
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Computing and IT in the Workplace CT006-1 Ethical & Legal Issues
  • 2. Learning Outcomes At the end of this section, YOU should be able to: • To explain and describe the common issues that arises in the use of computing • To explain and discuss the steps that can be taken to ensure proper use of IT Computing and IT in the Workplace Chapter 3 2
  • 3. Topics we will cover • Ethics and Society • Unauthorized use of computers and networks • Software theft • Information privacy • Code of Conduct • Spyware and Spam Computing and IT in the Workplace Chapter 3 3
  • 4. Ethics and Society • What are computer ethics? Moral guidelines that govern use of computers and information systems Unauthorized use of computers and networks Software theft Intellectual property rights—rights to which creators are entitled for their work Information accuracy Codes of conduct Information privacy Computing and IT in the Workplace Chapter 3 4
  • 5. Unauthorized Access and Use • What is unauthorized access and how is it achieved? Use of a computer or network without permission Hackers typically break into computer by connecting to it and then logging in as a legitimate user Hacker, or cracker, is someone who tries to access a computer or network illegally Computing and IT in the Workplace Chapter 3 5
  • 6. Unauthorized Access and Use • How can companies protect against hackers? Intrusion detection software analyzes network traffic, assesses system vulnerabilities, and identifies intrusions and suspicious behavior Access control defines who can access computer and what actions they can take Audit trail records access attempts Computing and IT in the Workplace Chapter 3 6
  • 7. Hardware Theft and Vandalism • What are hardware theft and hardware vandalism?  Hardware theft is act of stealing computer equipment     Cables sometimes used to lock equipment Some notebook computers use passwords, possessed objects, and biometrics as security methods For PDAs, you can passwordprotect the device Hardware vandalism is act of defacing or destroying computer equipment Computing and IT in the Workplace Chapter 3 7
  • 8. Software Theft • What is software theft? Act of stealing or illegally copying software or intentionally erasing programs Computing and IT in the Workplace Software piracy is illegal duplication of copyrighted software Chapter 3 8
  • 9. Software Theft • What is a license agreement?   Right to use software Single-user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer Computing and IT in the Workplace Chapter 3 9
  • 10. Software Theft • What are some other safeguards against software theft? Product activation allows user to input product identification number online or by phone and receive unique installation identification number Business Software Alliance (BSA) promotes better understanding of software piracy problems Computing and IT in the Workplace Chapter 3 10
  • 11. Information Theft • What is encryption?     Safeguards against information theft Process of converting plaintext (readable data) into ciphertext (unreadable characters) Encryption key (formula) often uses more than one method To read the data, the recipient must decrypt, or decipher, the data Computing and IT in the Workplace Chapter 3 11
  • 12. Information Theft • What does an encrypted file look like? Computing and IT in the Workplace Chapter 3 12
  • 13. IT Code of Conduct • What is an IT code of conduct?   Written guideline that helps determine whether computer action is ethical Employers can distribute to employees IT CODE OF CONDUCT Computing and IT in the Workplace Chapter 3 13
  • 14. Information Privacy • What is information privacy? Right of individuals and companies to restrict collection and use of information about them Difficult to maintain today because data is stored online Employee monitoring is using computers to observe employee computer use Legal for employers to use monitoring software programs Computing and IT in the Workplace Chapter 3 14
  • 15. Information Privacy • What are some ways to safeguard personal information? Fill in necessary information on rebate, warranty, and registration forms Avoid shopping club and buyers cards Inform merchants that you do not want them to distribute your personal information Install a cookie manager to filter cookies Clear your history file when you are finished browsing Set up a free e-mail account; use this e-mail address for merchant forms Turn off file and print sharing on your Internet connection Limit the amount of information you provide to Web sites; fill in only required information Computing and IT in the Workplace Install a personal firewall Chapter 3 Sign up for e-mail filtering through your Internet service provider or use an antispam program, such as Brightmail Do not reply to spam for any reason Surf the Web anonymously with a program such as Freedom Web Secure or through an anonymous Web site such as Anonymizer.com 15
  • 16. Information Privacy • What is an electronic profile?    Data collected when you fill out form on Web Merchants sell your electronic profile Often you can specify whether you want personal information distributed Computing and IT in the Workplace Chapter 3 16
  • 17. Information Privacy • What is a cookie? User preferences How regularly you visit Web sites Computing and IT in the Workplace Small file on your computer that contains data about you Some Web sites sell or trade information stored in your cookies Set browser to accept cookies, prompt you to accept cookies, or disable cookies Interests and browsing habits Chapter 3 17
  • 18. Information Privacy • How do cookies work? Step 2. If browser finds a Step 1. When you type Web cookie, it sends information in cookie file to Web site. address of Web site in your browser window, browser program searches your hard disk for a cookie associated with Web site. Step 3. If Web site does not receive cookie information, and is expecting it, Web site creates an identification number for you in its database and sends that number to your browser. Browser in turn creates a cookie file based on that number and stores cookie file on your hard disk. Web site now can update information in cookie files whenever you access the site. Computing and IT in the Workplace Web server for www.company.com Chapter 3 18
  • 19. Information Privacy • What is a cookie manager?  Software program that selectively blocks cookies Computing and IT in the Workplace Chapter 3 19
  • 20. Information Privacy  Spyware is program placed on computer without user’s knowledge   Secretly collects information about user Spam is unsolicited e-mail message sent to many recipients Computing and IT in the Workplace Chapter 3 20
  • 21. Information Privacy • How can you control spam? Service that blocks e-mail messages from designated sources E-mail filtering Collects spam in central location that you can view any time Anti-spam program Sometimes removes valid e-mail messages Attempts to remove spam Computing and IT in the Workplace Chapter 3 21
  • 22. Privacy Law • What privacy laws have been enacted? Computing and IT in the Workplace Chapter 3 22
  • 23. Privacy Law • What privacy laws have been enacted? (cont’d) Computing and IT in the Workplace Chapter 3 23
  • 24. Content Filtering • What is content filtering?    Process of restricting access to certain material Internet Content Rating Association (ICRA) provides rating system of Web content Web filtering software restricts access to specified sites Computing and IT in the Workplace Chapter 3 24
  • 25. Review Questions    What are the issues surrounding information privacy? Explain the process of encryption and discuss on why this process is needed. How to prevent unauthorized computer access and discuss the implications based on the case study given. Computing and IT in the Workplace Chapter 3 25
  • 26. Question and Answer Session Q&A Computing and IT in the Workplace Chapter 3 26
  • 27. What we will cover next Topic and Structure of next session Security Issues Computing and IT in the Workplace Chapter 3 27

×