SlideShare a Scribd company logo
COMPUTERCOMPUTER ETHICS AND SECURITYETHICS AND SECURITY
1
COMPUTERCOMPUTER ETHICS AND SECURITYETHICS AND SECURITY
4.1 COMPUTER ETHICS
4.1.1. NETIQUETTE
2
At the end of this topic, students should be able to:
*Identify the rules of Netiquette
NETIQUETTENETIQUETTE
3
 Definition of Netiquette (or Internet
Netiquette):The code of acceptable behaviors that
users should follow while on the internet
NETIQUETTENETIQUETTE
4
 NETIQUETTENETIQUETTE-- GoldenGolden Rule:Rule: Treat others as youTreat others as you
would like them treat you…would like them treat you…
NETIQUETTENETIQUETTE
5
 Netiquette includes rules for all aspects of the
Internet Services,including:
Internet Services: WWWInternet Services: WWW
6
 What is WWW?
• The World Wide Web (WWW), or Web,
consists of a worldwide collection of electronic
documents.
Internet Services: E-MailInternet Services: E-Mail
7
 What is an E-Mail?
• E-mail (short for electronic mail ) is the
transmission of messages and files via a
computer network.
• Email was one of the original services on the
Internet, enabling scientist to communicate
with other scientist at other locations.
Internet Services: E-MailInternet Services: E-Mail
8
Internet Services: E-MailInternet Services: E-Mail
9
 An e-mail program is used to create, send, receive,
forward, store, print, and delete e-mail messages.
• Example: Gmail, Yahoo! Mail
 An e-mail address is a combination of a user name and a
domain name that identifies a user so that he or she can
receive Internet e-mail.
• Example: fidaanuar@gmail.com
 A user name is a unique combination of characters, such
as letters of the alphabet and/or numbers, that identifies
a specific user.
Internet Services: E-MailInternet Services: E-Mail
10
 An address book, or contacts folder, contains a
list of names and e-mail addresses.
 An attachment in e-mail message, is a file to
supplement the body of the e-mail message.
Internet Services:Internet Services:
Instant MessagingInstant Messaging
11
 What is an Instant Messaging?
Real-time Internet communication
services that notify you when one or more connected
users are online & allows you to exchange messages,
photos, videos, and other content.
*Real time means that you and the people with whom
you are conversing are online at the same time.
Internet Services:Internet Services:
Instant MessagingInstant Messaging
12
• Instant Messaging services support voice, video
conversations, allow you to send photos, listen to
streaming music, and play games with another online
contact.
• For real time Instant Messaging to work, both parties
must be online at the same time. Also, the receiver
of a message must be willing to accept messages.
Internet Services:Internet Services:
Instant MessagingInstant Messaging
13
 Examples of popular Instant Messaging:
• Google Talk
• MySpace IM
• Windows Live Messenger
• Yahoo! Messenger
• Whatsapp
• WeChat
14
 What is a Message Board?
• A message board is a Web-based type of
discussion group where users have
written discussions about particulars
(uses web browser)
• Example : Yahoo!Message Boards
Internet Services : Message
Board
COMPUTERCOMPUTER ETHICS AND SECURITYETHICS AND SECURITY
4.1 COMPUTER ETHICS
4.1.2. Areas of computer ethic
15
At the end of this topic, students should be able to:
*Define computer ethics
*Describe areas of computer ethics
COMPUTER ETHICSCOMPUTER ETHICS
16
 Definition of Computer Ethics :The moral
guidelines that oversee the use of computers and
information systems.
AREAS OF COMPUTERAREAS OF COMPUTER
ETHICSETHICS
17
 There are four (4) types of Areas of Computer Ethics:
INFORMATIONINFORMATION
ACCURACYACCURACY
18
 What is a Information Accuracy?
• A measure of the reliability of information held
within an IT system.
 Information Accuracy today is a concern because
many users access information mainly from the
Internet.
 DO NOT assume all the information on the web is
correct, we should evaluate the value of a web before
relying on its content.
GREEN COMPUTINGGREEN COMPUTING
19
 What is a Green Computing?
• Involves reducing the electricity and environmental
waste while using computers.
GREEN COMPUTING SUGGESTIONS
• Do not leave the computer running overnight.
• Use computers and devices that comply with the Energy Star
program.
• Use LCD monitors instead of CRT monitors.
• Recycle paper
• Recycle toner cartridges.
CODES OF CONDUCTCODES OF CONDUCT
20
• Is a written guideline that helps determine whether a
specific computer action is ethical or unethical.
IT Code of Conduct
1.Computers may not be used to harm other people
2.Employees may not interfere with others computer
work
3.Computers may not be used to steal
4. Computers may not be used to bear false witness
5.Computers may not copy or use software illegally
INFORMATION PRIVACYINFORMATION PRIVACY
21
 What is a Information Privacy?
• Companies to deny or restrict the collection and use
of information about them.
INTELLECTUAL PROPERTYINTELLECTUAL PROPERTY
22
 What is a Intellectual Property?
• Refers to unique and original works such as logos,
brands, ideas, inventions, art, writings, process,
company, and product names and logos.
Web Site:Web Site:
Online Social NetworkOnline Social Network
23
• TYPES OF INTELLECTED PROPERTIES
TYPES OF INTELLECTED
PROPERTIES
IMPORTANCE OF EACH IP
TRADEMARK To protect image, logo from being used
by any other business entity
PATENT To protect product ideas, manufacturing
process improvements, and technological
developments from being used by other
business entity
COPYRIGHT To protect any material form of
expression (written words, music, dance,
art) from being used by others.

More Related Content

What's hot

Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
yaminohime
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
RoshanMaharjan13
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
jonspav
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
dilahkmpk
 
System failure
System  failureSystem  failure
System failure
chrispaul8676
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
chrispaul8676
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
Sifat Hossain
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
badak sumbu
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is used
gracepm28
 
cyber_security
cyber_securitycyber_security
cyber_security
Jana Baxter
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
Ei-Dyei Diata
 
Computer Security
Computer SecurityComputer Security
Computer Security
Cristian Mihai
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
yaminohime
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
Progressive Integrations
 

What's hot (20)

Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
 
System failure
System  failureSystem  failure
System failure
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is used
 
cyber_security
cyber_securitycyber_security
cyber_security
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 

Similar to COMPUTER ETHICS AND SECURITY

Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
Anil Pokhrel
 
Internet Technology-I.pdf
Internet Technology-I.pdfInternet Technology-I.pdf
Internet Technology-I.pdf
RahulGhosh767154
 
Chirag sharma
Chirag sharmaChirag sharma
Chirag sharma
Chirag Sharma
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
Fizaril Amzari Omar
 
technologyinbusinesscommunications-111208051054-phpapp01.pdf
technologyinbusinesscommunications-111208051054-phpapp01.pdftechnologyinbusinesscommunications-111208051054-phpapp01.pdf
technologyinbusinesscommunications-111208051054-phpapp01.pdf
Jinx33
 
Discovering the internet
Discovering the internetDiscovering the internet
Discovering the internet
Iris Hershenson
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
Vigneshkumar Ponnusamy
 
Internet
Internet Internet
Internet tech lessons
Internet tech lessonsInternet tech lessons
Internet tech lessons
learnt
 
Chp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdfChp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdf
SuriyaMahendran2
 
presentation_class_iv_internet_1593465556_82291_095339.pptx
presentation_class_iv_internet_1593465556_82291_095339.pptxpresentation_class_iv_internet_1593465556_82291_095339.pptx
presentation_class_iv_internet_1593465556_82291_095339.pptx
AnmolThakur67
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCE
Usama ahmad
 
INTERNT.ppt
INTERNT.pptINTERNT.ppt
INTERNT.ppt
AdilRehman54
 
Digi comms ass. 1 p1
Digi comms ass. 1 p1Digi comms ass. 1 p1
Digi comms ass. 1 p1
Louise Reed
 
Social network
Social networkSocial network
Social network
aways daahir
 
DIGITAL SKILLS MODULE on Access Information online
DIGITAL SKILLS MODULE on Access Information onlineDIGITAL SKILLS MODULE on Access Information online
DIGITAL SKILLS MODULE on Access Information online
Goutham B
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
PravinGhosekar
 
A Fundamental elements of a network.pptx
A Fundamental elements of a network.pptxA Fundamental elements of a network.pptx
A Fundamental elements of a network.pptx
dexdexjoyjoy
 
amaha internet course
amaha internet courseamaha internet course
amaha internet course
Amaha Z Egziabeher Alemayehu
 
The Internet
The InternetThe Internet
The Internet
Ameesha Indusarani
 

Similar to COMPUTER ETHICS AND SECURITY (20)

Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
 
Internet Technology-I.pdf
Internet Technology-I.pdfInternet Technology-I.pdf
Internet Technology-I.pdf
 
Chirag sharma
Chirag sharmaChirag sharma
Chirag sharma
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
technologyinbusinesscommunications-111208051054-phpapp01.pdf
technologyinbusinesscommunications-111208051054-phpapp01.pdftechnologyinbusinesscommunications-111208051054-phpapp01.pdf
technologyinbusinesscommunications-111208051054-phpapp01.pdf
 
Discovering the internet
Discovering the internetDiscovering the internet
Discovering the internet
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
 
Internet
Internet Internet
Internet
 
Internet tech lessons
Internet tech lessonsInternet tech lessons
Internet tech lessons
 
Chp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdfChp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdf
 
presentation_class_iv_internet_1593465556_82291_095339.pptx
presentation_class_iv_internet_1593465556_82291_095339.pptxpresentation_class_iv_internet_1593465556_82291_095339.pptx
presentation_class_iv_internet_1593465556_82291_095339.pptx
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCE
 
INTERNT.ppt
INTERNT.pptINTERNT.ppt
INTERNT.ppt
 
Digi comms ass. 1 p1
Digi comms ass. 1 p1Digi comms ass. 1 p1
Digi comms ass. 1 p1
 
Social network
Social networkSocial network
Social network
 
DIGITAL SKILLS MODULE on Access Information online
DIGITAL SKILLS MODULE on Access Information onlineDIGITAL SKILLS MODULE on Access Information online
DIGITAL SKILLS MODULE on Access Information online
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
A Fundamental elements of a network.pptx
A Fundamental elements of a network.pptxA Fundamental elements of a network.pptx
A Fundamental elements of a network.pptx
 
amaha internet course
amaha internet courseamaha internet course
amaha internet course
 
The Internet
The InternetThe Internet
The Internet
 

Recently uploaded

一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
narwatsonia7
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
Emre Gündoğdu
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
Federico Ast
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 

Recently uploaded (13)

一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 

COMPUTER ETHICS AND SECURITY

  • 1. COMPUTERCOMPUTER ETHICS AND SECURITYETHICS AND SECURITY 1
  • 2. COMPUTERCOMPUTER ETHICS AND SECURITYETHICS AND SECURITY 4.1 COMPUTER ETHICS 4.1.1. NETIQUETTE 2 At the end of this topic, students should be able to: *Identify the rules of Netiquette
  • 3. NETIQUETTENETIQUETTE 3  Definition of Netiquette (or Internet Netiquette):The code of acceptable behaviors that users should follow while on the internet
  • 4. NETIQUETTENETIQUETTE 4  NETIQUETTENETIQUETTE-- GoldenGolden Rule:Rule: Treat others as youTreat others as you would like them treat you…would like them treat you…
  • 5. NETIQUETTENETIQUETTE 5  Netiquette includes rules for all aspects of the Internet Services,including:
  • 6. Internet Services: WWWInternet Services: WWW 6  What is WWW? • The World Wide Web (WWW), or Web, consists of a worldwide collection of electronic documents.
  • 7. Internet Services: E-MailInternet Services: E-Mail 7  What is an E-Mail? • E-mail (short for electronic mail ) is the transmission of messages and files via a computer network. • Email was one of the original services on the Internet, enabling scientist to communicate with other scientist at other locations.
  • 9. Internet Services: E-MailInternet Services: E-Mail 9  An e-mail program is used to create, send, receive, forward, store, print, and delete e-mail messages. • Example: Gmail, Yahoo! Mail  An e-mail address is a combination of a user name and a domain name that identifies a user so that he or she can receive Internet e-mail. • Example: fidaanuar@gmail.com  A user name is a unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user.
  • 10. Internet Services: E-MailInternet Services: E-Mail 10  An address book, or contacts folder, contains a list of names and e-mail addresses.  An attachment in e-mail message, is a file to supplement the body of the e-mail message.
  • 11. Internet Services:Internet Services: Instant MessagingInstant Messaging 11  What is an Instant Messaging? Real-time Internet communication services that notify you when one or more connected users are online & allows you to exchange messages, photos, videos, and other content. *Real time means that you and the people with whom you are conversing are online at the same time.
  • 12. Internet Services:Internet Services: Instant MessagingInstant Messaging 12 • Instant Messaging services support voice, video conversations, allow you to send photos, listen to streaming music, and play games with another online contact. • For real time Instant Messaging to work, both parties must be online at the same time. Also, the receiver of a message must be willing to accept messages.
  • 13. Internet Services:Internet Services: Instant MessagingInstant Messaging 13  Examples of popular Instant Messaging: • Google Talk • MySpace IM • Windows Live Messenger • Yahoo! Messenger • Whatsapp • WeChat
  • 14. 14  What is a Message Board? • A message board is a Web-based type of discussion group where users have written discussions about particulars (uses web browser) • Example : Yahoo!Message Boards Internet Services : Message Board
  • 15. COMPUTERCOMPUTER ETHICS AND SECURITYETHICS AND SECURITY 4.1 COMPUTER ETHICS 4.1.2. Areas of computer ethic 15 At the end of this topic, students should be able to: *Define computer ethics *Describe areas of computer ethics
  • 16. COMPUTER ETHICSCOMPUTER ETHICS 16  Definition of Computer Ethics :The moral guidelines that oversee the use of computers and information systems.
  • 17. AREAS OF COMPUTERAREAS OF COMPUTER ETHICSETHICS 17  There are four (4) types of Areas of Computer Ethics:
  • 18. INFORMATIONINFORMATION ACCURACYACCURACY 18  What is a Information Accuracy? • A measure of the reliability of information held within an IT system.  Information Accuracy today is a concern because many users access information mainly from the Internet.  DO NOT assume all the information on the web is correct, we should evaluate the value of a web before relying on its content.
  • 19. GREEN COMPUTINGGREEN COMPUTING 19  What is a Green Computing? • Involves reducing the electricity and environmental waste while using computers. GREEN COMPUTING SUGGESTIONS • Do not leave the computer running overnight. • Use computers and devices that comply with the Energy Star program. • Use LCD monitors instead of CRT monitors. • Recycle paper • Recycle toner cartridges.
  • 20. CODES OF CONDUCTCODES OF CONDUCT 20 • Is a written guideline that helps determine whether a specific computer action is ethical or unethical. IT Code of Conduct 1.Computers may not be used to harm other people 2.Employees may not interfere with others computer work 3.Computers may not be used to steal 4. Computers may not be used to bear false witness 5.Computers may not copy or use software illegally
  • 21. INFORMATION PRIVACYINFORMATION PRIVACY 21  What is a Information Privacy? • Companies to deny or restrict the collection and use of information about them.
  • 22. INTELLECTUAL PROPERTYINTELLECTUAL PROPERTY 22  What is a Intellectual Property? • Refers to unique and original works such as logos, brands, ideas, inventions, art, writings, process, company, and product names and logos.
  • 23. Web Site:Web Site: Online Social NetworkOnline Social Network 23 • TYPES OF INTELLECTED PROPERTIES TYPES OF INTELLECTED PROPERTIES IMPORTANCE OF EACH IP TRADEMARK To protect image, logo from being used by any other business entity PATENT To protect product ideas, manufacturing process improvements, and technological developments from being used by other business entity COPYRIGHT To protect any material form of expression (written words, music, dance, art) from being used by others.