Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

ethics powerpoint

Published in: Technology
  • Be the first to comment

  • Be the first to like this


  1. 1. Ethics By Rebecca Griffiths
  2. 2. Netiquette  Netiquette is the correct way to use the internet, it involves respecting other users views and displaying common courtesy when posting your views to online discussion groups.  Sadly not everyone sticks to netiquette and people abuse the privileges of the internet. The ways in which people do this is by cyber bulling and leaving rude and hurtful comments on people posts on social networking. This is not the correct way to use the internet and it reduces peoples rights to what they can say online.  If they do not stick to netiquette and people cyber bully others, if these people get caught they can be fined, prosecuted or in some situations be imprisoned. However the majority of the time cyber bullies do not get caught and their actions cause serious affects on the people they bullied such as suicide.
  3. 3. Freedom of speech  Our speech is free in the aspects that different social networking sights allow you to give your valid opinions on different matters online. However the normal people who use this sight can reduce your freedom of speech by leaving hateful comments on your opinions and making you feel belittled and as if you no longer wish to share your opinion.  Twitter states than you are in control of how much information you share on twitter about yourself. You need to be careful that you do not ever post bank details on your twitter and that you are thoughtful when you publically share your location. Also  Be wary of any communication that asks for your private contact information, personal information, or passwords. Think about how much information you provide in your Tweets. Also if a friend has different judgements as to what is private and what is not and they have posted something about you that you would rather be private then contact them and ask them to remove it. Also if the tables are turnt and you post information about a friend that they would rather stay private then please honour their request if they ask you to remove it.  If someone was to tweet private information about you and refuse to remove it such as your private phone number, home address or bank details then they would be violating twitters policy and you will be able to file a report so they can investigate further. If twitter agrees on the violation then they will temporarily suspend the account until the information is removed.  Personally I think that in certain cases it is right to prosecute someone for what they say online because if they say something that goes against the law such as threatening or giving out personal information without permission then I agree you should because it is not right for the person being targeted made to feel this way and this goes against the law.
  4. 4. Online privacy  When it comes to privacy online, alot of it is in your hands and you have control as to how much information you share publically online. When you are asked to give information about yourself, ask yourself the following questions:  Who am I sharing this information with?  How much and what type of information am I sharing?  How many people can see the information I am sharing?  Can I trust all the people that see this information?  On icloud your information is protected from unauthorized access both while it is being transmitted to your devices and when it is stored in the cloud. However recently there has been a number of cases of celebrities iclouds being hacked and private photos of themselves being released to the public, so is your icloud really that safe? It is only ethical for companies to hold information about you that is necessary for the reason they have the information. For example a Tesco's club card only needs information about your name and email address if Tesco's asks information about your sexuality or ethnicity then this is not ethic because it is not necessary for them to have this information about you. It's legal for a company to sell information about you but whether it is ethical or not it depends on culture. Reason being for this is privacy has a different meaning depending of where you are; in Europe for example, it is a human right, whereas in the USA it has market value, from giving your phone number and/or email to download free ringtones to submitting personal videos to YouTube (after which they own it and can do as they please with it). However money is always a factor, so in the end the only person with power over what happens to your personal info is you.
  5. 5. Phishing or scam Phishing is when someone send an email pretending (fraud) to be a company in order to get personal information about you such as passwords or bank details. Spam is irrelevantly sending messages over the internet, typically to a large number of users for the purpose of advertising, phishing, spreading malware etc. I do not believe it is ethical and I can struggle to understand why anyone would argue it is because the goal purpose is to rip someone off and fraud them for money etc. Currently, congress has passed the Anti-Phishing Act of 2004. The anti-phishing bill offers numerous forms of protection against phishing but most importantly it defines phishing as a federal crime. The basic wording of the bill concerning phishing states that it is illegal to spoof or fake a website in order to request, ask, or solicit any person to provide means of identification to another person. If someone is convicted under the law passed by congress for phishing they could risk spending up to five years in prison. The people convicted of phishing may also have to pay a $250,000 fine. The Can-Spam Act has also been placed into effect. In this act of congress it states it is illegal to send mass emails or spam that contains any falsified information such as pictures or headers. This includes the “From:” field in an email letter.
  6. 6. Freedom of information act  The freedom of information act (FOIA) is a law that gives you the right to access information from the federal government. It is often described as the law that keeps citizens in the know about their government.  It does this in two ways: public authorities are obliged to publish certain information about their activities; and members of the public are entitled to request information from public authorities.  The Act only covers public authorities. Schedule 1 of the Act contains a list of the bodies that are classed as public authorities in this context. Some of these bodies are listed by name, such as the Health and Safety Executive or the National Gallery. Others are listed by type, for example government departments, parish councils, or maintained schools. Executive agencies are classed as part of their parent government department.  If you break this law the obligations of public authorities to comply with the Freedom of Information Act can be enforced by the Information Commissioner, who may issue an enforcement notice. If the public authority does not comply with the enforcement notice, this can be dealt with as if it were a contempt of court, leading potentially to large fines.
  7. 7. Computing and the environment  One way a computer negatively effects the environment is when old computers and being disposed of, if not disposed correctly they can release certain chemicals which are bad for the environment such as; Mercury.  Another way computers damage the environment is the manufacturing stage of a computer which releases lots of pollutants in to the air such as carbon dioxide, as well as this they also need a lot of energy to power them which again releases co2.  How we can make computers more economically friendly; Buy a computer that grows with you. Learning how to buy the right system for your specific needs is the first crucial step in making sure your computer will be growing with you for many years to come. Shop smartly and you can maximize the work (and play) you'll accomplish with your computer.  Buy refurbished products. Many computer manufacturers and resellers offer refurbished computer systems and parts. Refurbished computers and peripherals can offer substantial savings while benefiting the environment.  Consider the environment. Most computers are being designed to reduce the negative effects of manufacturing and use. For example, Energy Star-compliant computers and monitors have been designed to reduce energy use when idle. Other environmental features such as a modular, upgradeable design, online user manuals and documentation, and recyclability should be considered when choosing a computer system.  Packaging is important. Computers and their components are sophisticated and precise products requiring maximum protection from drops, vibration and temperature variations that can occur during shipping and handling. Find out what various retailers and manufacturers are doing to reduce unnecessary packaging before you spend your money with them.