COMPUTER ETHICS AND SECURITY IS ABOUT THE RULES AND WAYS WHEN USING INTERNET.
MAKE SURE YOU DOWNLOAD IT AS POWERPOINT PRESENTATION TO SEE THE EFFECTS OF THE SLIDES
2. COMPUTERCOMPUTER ETHICS AND SECURITYETHICS AND SECURITY
4.1 COMPUTER ETHICS
4.1.1. NETIQUETTE
2
At the end of this topic, students should be able to:
*Identify the rules of Netiquette
3. NETIQUETTENETIQUETTE
3
Definition of Netiquette (or Internet
Netiquette):The code of acceptable behaviors that
users should follow while on the internet
6. Internet Services: WWWInternet Services: WWW
6
What is WWW?
• The World Wide Web (WWW), or Web,
consists of a worldwide collection of electronic
documents.
7. Internet Services: E-MailInternet Services: E-Mail
7
What is an E-Mail?
• E-mail (short for electronic mail ) is the
transmission of messages and files via a
computer network.
• Email was one of the original services on the
Internet, enabling scientist to communicate
with other scientist at other locations.
9. Internet Services: E-MailInternet Services: E-Mail
9
An e-mail program is used to create, send, receive,
forward, store, print, and delete e-mail messages.
• Example: Gmail, Yahoo! Mail
An e-mail address is a combination of a user name and a
domain name that identifies a user so that he or she can
receive Internet e-mail.
• Example: fidaanuar@gmail.com
A user name is a unique combination of characters, such
as letters of the alphabet and/or numbers, that identifies
a specific user.
10. Internet Services: E-MailInternet Services: E-Mail
10
An address book, or contacts folder, contains a
list of names and e-mail addresses.
An attachment in e-mail message, is a file to
supplement the body of the e-mail message.
11. Internet Services:Internet Services:
Instant MessagingInstant Messaging
11
What is an Instant Messaging?
Real-time Internet communication
services that notify you when one or more connected
users are online & allows you to exchange messages,
photos, videos, and other content.
*Real time means that you and the people with whom
you are conversing are online at the same time.
12. Internet Services:Internet Services:
Instant MessagingInstant Messaging
12
• Instant Messaging services support voice, video
conversations, allow you to send photos, listen to
streaming music, and play games with another online
contact.
• For real time Instant Messaging to work, both parties
must be online at the same time. Also, the receiver
of a message must be willing to accept messages.
13. Internet Services:Internet Services:
Instant MessagingInstant Messaging
13
Examples of popular Instant Messaging:
• Google Talk
• MySpace IM
• Windows Live Messenger
• Yahoo! Messenger
• Whatsapp
• WeChat
14. 14
What is a Message Board?
• A message board is a Web-based type of
discussion group where users have
written discussions about particulars
(uses web browser)
• Example : Yahoo!Message Boards
Internet Services : Message
Board
15. COMPUTERCOMPUTER ETHICS AND SECURITYETHICS AND SECURITY
4.1 COMPUTER ETHICS
4.1.2. Areas of computer ethic
15
At the end of this topic, students should be able to:
*Define computer ethics
*Describe areas of computer ethics
16. COMPUTER ETHICSCOMPUTER ETHICS
16
Definition of Computer Ethics :The moral
guidelines that oversee the use of computers and
information systems.
17. AREAS OF COMPUTERAREAS OF COMPUTER
ETHICSETHICS
17
There are four (4) types of Areas of Computer Ethics:
18. INFORMATIONINFORMATION
ACCURACYACCURACY
18
What is a Information Accuracy?
• A measure of the reliability of information held
within an IT system.
Information Accuracy today is a concern because
many users access information mainly from the
Internet.
DO NOT assume all the information on the web is
correct, we should evaluate the value of a web before
relying on its content.
19. GREEN COMPUTINGGREEN COMPUTING
19
What is a Green Computing?
• Involves reducing the electricity and environmental
waste while using computers.
GREEN COMPUTING SUGGESTIONS
• Do not leave the computer running overnight.
• Use computers and devices that comply with the Energy Star
program.
• Use LCD monitors instead of CRT monitors.
• Recycle paper
• Recycle toner cartridges.
20. CODES OF CONDUCTCODES OF CONDUCT
20
• Is a written guideline that helps determine whether a
specific computer action is ethical or unethical.
IT Code of Conduct
1.Computers may not be used to harm other people
2.Employees may not interfere with others computer
work
3.Computers may not be used to steal
4. Computers may not be used to bear false witness
5.Computers may not copy or use software illegally
22. INTELLECTUAL PROPERTYINTELLECTUAL PROPERTY
22
What is a Intellectual Property?
• Refers to unique and original works such as logos,
brands, ideas, inventions, art, writings, process,
company, and product names and logos.
23. Web Site:Web Site:
Online Social NetworkOnline Social Network
23
• TYPES OF INTELLECTED PROPERTIES
TYPES OF INTELLECTED
PROPERTIES
IMPORTANCE OF EACH IP
TRADEMARK To protect image, logo from being used
by any other business entity
PATENT To protect product ideas, manufacturing
process improvements, and technological
developments from being used by other
business entity
COPYRIGHT To protect any material form of
expression (written words, music, dance,
art) from being used by others.