© 2013 by the mcgraw-hill companies, inc. all rights reserved. chapter 7b computing ethics

16
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Chapter 7B Computing Ethics Computing Ethics

Upload: noah-young

Post on 20-Jan-2016

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

Chapter 7BChapter 7B

Computing EthicsComputing Ethics

Page 2: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

22

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

Learning ObjectivesLearning Objectives7.57.5 Explain the terms Explain the terms copyright copyright and and fair usefair use, and , and

list common ways that copyrights are list common ways that copyrights are violated violated for software, music, and imagesfor software, music, and images

7.67.6 List at least three preferred behaviors List at least three preferred behaviors prescribed by netiquette, and contrast the prescribed by netiquette, and contrast the ethical ethical versus unethical use of online versus unethical use of online student resourcesstudent resources

7.77.7 Describe ethical and unethical ways that Describe ethical and unethical ways that computers are used at workcomputers are used at work

Page 3: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

33

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

Piracy vs. ForgeryPiracy vs. Forgery• PiracyPiracy: : In the context of computing, acquiring copies In the context of computing, acquiring copies

of protected digital creations without the permission of protected digital creations without the permission of the creatorof the creator– Among the most widespread forms of unethical Among the most widespread forms of unethical

computer usecomputer use• ForgeryForgery: : making copies that appear to be real and making copies that appear to be real and

selling those copies to unsuspecting buyers as selling those copies to unsuspecting buyers as legitimate productslegitimate products

Page 4: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

44

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

Intellectual PropertyIntellectual Property• Intellectual propertyIntellectual property:: Ideas, writing, music, art and Ideas, writing, music, art and

other kinds of mind-based products intended to be other kinds of mind-based products intended to be used in a commercial wayused in a commercial way– Piracy is stealing Piracy is stealing

intellectual propertyintellectual property– Evidence of theft may Evidence of theft may

not be obvious not be obvious – Intellectual-property lawsIntellectual-property laws

Page 5: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

55

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

Copyright and Fair UseCopyright and Fair Use• CopyrightCopyright: : A legal concept that grants rights and A legal concept that grants rights and

control to the owner of any published workcontrol to the owner of any published work• Fair useFair use: : A limited set of circumstances in which A limited set of circumstances in which

copyrighted material can be used without first copyrighted material can be used without first obtaining permissionobtaining permission

Page 6: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

66

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

Copyright LifetimesCopyright Lifetimes• Copyright lasts for the life of the creator and 70 years Copyright lasts for the life of the creator and 70 years

after the person’s deathafter the person’s death• Anything published before 1923 in the United States Anything published before 1923 in the United States

is considered not to be copyrightedis considered not to be copyrighted• When a copyright expires, the work enters the When a copyright expires, the work enters the public public

domaindomain

Page 7: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

77

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

Software LicensingSoftware Licensing• Personal software license: Personal software license: Legal permission granted Legal permission granted

to one person to use the programto one person to use the program• Multi-user license: Legal permission to install and use Multi-user license: Legal permission to install and use

a program on a certain number of computersa program on a certain number of computers– Site licenseSite license: : Allows the software to be installed and used Allows the software to be installed and used

on any computer in a building or corporate campuson any computer in a building or corporate campus– Enterprise licenseEnterprise license:: Permits installation and use on any Permits installation and use on any

computer within a companycomputer within a company

Page 8: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

88

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

Software PiracySoftware Piracy• End-user piracyEnd-user piracy: : A legitimate purchaser makes A legitimate purchaser makes

unauthorized copiesunauthorized copies• Internet piracyInternet piracy: : Use of the Web and Internet Use of the Web and Internet

resources to host and distribute software copiesresources to host and distribute software copies• Manufacturer piracyManufacturer piracy: Installation of unauthorized : Installation of unauthorized

copies of a program onto the manufacturer’s copies of a program onto the manufacturer’s computerscomputers

Page 9: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

99

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

Protections Against PiracyProtections Against Piracy• Focus on mitigating damage from piracyFocus on mitigating damage from piracy• DongleDongle: : Hardware device that is included with Hardware device that is included with

software and plugs into a computer portsoftware and plugs into a computer port• Software-based copy protectionSoftware-based copy protection• Internet-based copy protectionInternet-based copy protection

Page 10: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

1010

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

Downloading and Sharing MusicDownloading and Sharing Music• Most media sharing systems are based on peer-to-Most media sharing systems are based on peer-to-

peer networkspeer networks– The The bitTorrentbitTorrent protocol links users to cooperatively protocol links users to cooperatively

contribute small pieces of the complete file to the copiercontribute small pieces of the complete file to the copier• Some people see file sharing as a clear violation of Some people see file sharing as a clear violation of

others’ ownership rightsothers’ ownership rights• Other people see no harm in file sharingOther people see no harm in file sharing

Page 11: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

1111

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

Other Legal and Social RisksOther Legal and Social Risks• Nothing posted on the Internet is truly privateNothing posted on the Internet is truly private• SpidersSpiders or or Web crawlersWeb crawlers: : Automated software Automated software

programs run by search engine and other companies programs run by search engine and other companies to constantly sift through, catalog, and sometimes to constantly sift through, catalog, and sometimes store information they find on websitesstore information they find on websites

• Minimize personally identifying information Minimize personally identifying information • Incendiary opinions and hateful speech can come Incendiary opinions and hateful speech can come

back to haunt the writer years laterback to haunt the writer years later

Page 12: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

1212

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

Personal Computing EthicsPersonal Computing Ethics• Computer misuse and abuseComputer misuse and abuse

– HackingHacking• NetiquetteNetiquette:: The set of online behaviors considered The set of online behaviors considered

polite and properpolite and proper– Discourages abusive speech, rudenessDiscourages abusive speech, rudeness

• Acceptable use policy (AUP)Acceptable use policy (AUP):: Document that Document that attempts to encode and formalize the practice of attempts to encode and formalize the practice of ethical computer use for an institution or companyethical computer use for an institution or company

Page 13: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

1313

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

Personal Computing EthicsPersonal Computing Ethics• Online student notes and essay databanksOnline student notes and essay databanks

– Many school-related websites Many school-related websites are legitimate and beneficialare legitimate and beneficial

– Other sites support cheating and Other sites support cheating and the illusion of accomplishmentthe illusion of accomplishment

– Efforts to stop cheating- Efforts to stop cheating- Some schools require Some schools require students to submit work students to submit work to services like Turnitinto services like Turnitin

Page 14: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

1414

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

Professional Computing EthicsProfessional Computing Ethics• While employees are being paid, they should be While employees are being paid, they should be

focused on workfocused on work• Personal use of company computers also can create Personal use of company computers also can create

risks for companiesrisks for companies• Employer protections:Employer protections:

– Creating AUPs that identify forbidden and permitted Creating AUPs that identify forbidden and permitted behaviorsbehaviors

– Tracking employees’ keystrokes and Web activityTracking employees’ keystrokes and Web activity– Monitoring e-mail and other communicationsMonitoring e-mail and other communications

Page 15: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

1515

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

Workplace Electronic CommunicationWorkplace Electronic Communication

• General principles apply: General principles apply: – Thinking before speakingThinking before speaking– Treat others with respectTreat others with respect

• Workplace communication generally has to meet a Workplace communication generally has to meet a higher standard of politenesshigher standard of politeness

• Inappropriate types of workplace communicationInappropriate types of workplace communication– Carelessly sharing nonprofessional materialCarelessly sharing nonprofessional material– E-mail with complaints that should be kept privateE-mail with complaints that should be kept private

Page 16: © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics

1616

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.

WhistleblowingWhistleblowing• WhistleblowingWhistleblowing: : Pointing out a major internal Pointing out a major internal

problemproblem– Although it tends to reflect high ethical concerns, it can Although it tends to reflect high ethical concerns, it can

make life difficult for the whistleblower.make life difficult for the whistleblower.– State and federal laws protect whistleblowers in some State and federal laws protect whistleblowers in some

situationssituations– Any complaints should be fully documented and pursued Any complaints should be fully documented and pursued

through proper channelsthrough proper channels