Ethics and privacy ppt 3rd period


Published on

  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Ethics and privacy ppt 3rd period

  1. 1. Ethics and Privacy<br />Charity Harvill 8-3<br />Young Junior High<br />
  2. 2. Ethics and Privacy<br />Is anything private anymore?<br />Automated invaders.<br />Virus protection, detection, and disinfection.<br />Human invaders.<br />Intellectual property.<br />The future of ethics and privacy.<br />
  3. 3. Ethics and Privacy<br /> Intellectual property is ideas put into action, such as writing, music, art, computer code, and inventions that can be protected under copyright or patent laws. Many people are victimized by the ability of organizations, corporations, the government, and private citizens to access, store, and retrieve vast amounts of information on individuals in databases. This power over computerized information brings up ethical questions and responsibilities for all computer users.<br />
  4. 4. Ethics and Privacy<br /> Ethical questions deal with moral principles and values. Is it ethical for individuals, companies, or the government to store personal data about individuals without the individual knowing about it? We know when we have been physically robbed, but we may not know that someone has gained access to our private information.<br />
  5. 5. Ethics and Privacy<br />The types of automated invaders are:<br /><ul><li>Viruses—a program that contains destructive code which copies itself onto other computer files.
  6. 6. Worms—destructive code that “worms” its way through computers by boring through files.
  7. 7. Bombs—destructive code set to go off at a certain time or when a specific action is taken.
  8. 8. Trojan horse—destructive code disguised as something desirable, such as a shareware graphics program. Once inside, it wreaks havoc, erasing or scrambling files.</li></li></ul><li>Ethics and Privacy<br /> In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as user names, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social websites, auction sites, online payment processors, or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.<br />
  9. 9. Ethics and Privacy<br /> Antivirus and virus disinfectant programs are used to protect your data from automated invaders. An antivirus program checks each floppy disk automatically as it is inserted into the disk drive and scans all data from telecommunications devices. A virus disinfectant program uncovers viruses lurking on your hard drive.<br />
  10. 10. Ethics and Privacy<br /> Human invaders are called hackers. “Hacker” originally meant a person who was absorbed with computers. Today a hacker is one who secretly gains access to others’ computer files without permission.<br />
  11. 11. Ethics and Privacy<br /> Hackers are usually between the ages of 12-25, and they take pride in finding phone numbers and then cracking the security codes that allow access into the network. Often no real damage is done, and most computer crime, such as theft of electronic funds and the stealing of confidential data, are committed by insiders, at the cost of billions of dollars per year.<br />
  12. 12. Ethics and Privacy<br /> When can property be stolen from someone without his or her knowledge? With the theft of intellectual property, the original owner can still be in possession of the original property and have no knowledge that a theft has occurred. Software code is intellectual property. When software code is stolen, a copy is made the rightful owner still has the original. To protect software against unwanted or illegal duplication by writing computer code within the programs that prevents simple copying is called copy protect.<br />
  13. 13. Ethics and Privacy<br /> Why is intellectual property so easy to steal? First it can be done in the privacy of one’s home, etiher by copying a friend’s program disk or by going into an illicit bulletin board and downloading a copy of a pirated program. Secondly, the theft itself may only take a few seconds-and the hacker is neither seen nor heard. Often people unwittingly steal intellectual property because they are unfamiliar with copyright laws. The unauthorized copying and use of a computer program is called software piracy.<br />
  14. 14. Ethics and Privacy<br />“Site licenses” grant the user the right to make a specified number of copies of a software program for use on multiple computers. At Young we have site licenses for our software.<br /> The Copyright Act of 1976 allows the user to make a backup copy of copyrighted software for his or her personal use, but makes it illegal for the user to make and distribute copies.<br />
  15. 15. Ethics and Privacy<br />There are four types of software:<br />Commercial software (Copyrighted software available for purchase)<br />Freeware (Copyrighted software that is given away free of charge but is still the property of the owner and the user doesn’t have the right to distribute copies.)<br />Shareware (Copyrighted software that is distributed free of charge on a trial basis.) A nominal fee is charged if the user decides to keep it.<br />Public Domain Software (Software donated for public use that can be freely copied and distributed.)<br />
  16. 16. Ethics and Privacy<br /> Providing protection against the theft of intellectual property puts the government in a precarious position. There are trade-offs between regulating access to data and building a democracy based on freedom of information. As technology improves, we are provided with not only greater convenience but also with ethical choices involved in implementing that technology.<br />
  17. 17. Ethics and Privacy<br />Presented by<br />Click here to learn more about ethics in computing<br />