computer ethics and legal issues

Post on 22-Nov-2014

9.934 Views

Category:

Education

8 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

TRANSCRIPT

CHAPTER 1: INFORMATION AND COMMUNICATION TECHNOLOGY

Computer Ethics and Legal Issues

Definition

Computer Ethics

Is a system of moral standards or moral values used as a guideline for computer users

Code of Ethics

Is a guideline in ICT that help determine whether a specific computer action is ethical or unethical

Intellectual Property

Is works created by inventors, authors and artists

Privacy Refers to the right of individuals and companies to deny or restrict the collection and use of information about them

Computer Crime

Is any illegal acts involving computers

Cyber Law Is any laws relating to protect the Internet and other online communication technologies

Differentiate between ethics and law

ETHICS LAW

As a guideline to computer users

As a rule to control computer users

Computers users are free to follow or ignore the code of ethics

Computers users must follow the regulations and law

Universal, can be applied anywhere, all over the world

Depend on country and state where the crime is committed

To produced ethical computers users

To prevent misuse of computers

Not following ethics are called immoral

Not obeying laws are called crime

Intellectual Property Laws

Four types of Intellectual Property are:

1.Patents for inventions2.Trademarks for brand identity3.Design for product appearance4.Copyright for materials

Privacy

Ways of making personal data more privates:

1. Install personal firewall2. Clear your history file when you are

browsing3. Purchase goods with cash, rather than

credit card

Authentication

Authentication is a process where user verifies their identity. Authentication deals with the problem of determining whether a user should be allowed access to a particular system.

Four commonly authentication methods:

A) User identification

Is a unique combination of characters (letter, number or symbol) that identify specific user

Examples: pin numberpassword

B) Possessed object

Is a any item that you must carry to gain access to computer of computer facility

Examples:ATM cardcredit cardsmart card

C) Biometric device

Is a device that translates personal characteristics into digital code that is compared with the digital code stored in the database

Examples:fingerprint readeriris scannerhand geometric scannersignature verification system

Controversial Contents and Control

PORNOGRAPHY SLANDER is any form media or material (like books, video or photos) that show erotic behavior and intended to cause sexual excitement

the effects of pornography on society are:i)Can lead to criminal acts such as exploitation of womenii)Can lead to sexual addictioniii)Can develop lower moral values towards other peopleiv)Can erode good religious, cultural, behaviors and beliefs

is a false spoken statement about someone, intended to damage his or her reputation

the effects of slander on society are:i)Can develop society that disregards on honesty and truthii)Can lead to bad habits of spreading rumors and untruthiii)Can cause people to have nagative attitudes toward another person

Computer Crimes

Why we need cyber law?i) Cyber laws are made to force people to be

goodii) To give protection against the misuse of

computers and computer criminal activities Examples of cyber abuse on the users:

i) Sending a computer virus via e-mailii) Harassment through e-mailiii) Hacking into your school's database to

change your examination results

Malaysian Cyber Lawi) Computer Crime Act 1997ii) Copyright (Amendment) Bill 1997iii) Digital Signature Act 1997iv) Telemedicine Bill 1997v) Communication and Multimedia Act 1998vi) Digital Signature Regulations 1998

4 examples of computer crimes:i) Computer fraud - is the crime of

obtaining money by deceiving (to trick) people through the use of computers such as email hoaxes, program fraud, investment schemes and claim of expertise on certain fields

ii) Copyright infringement - is a violation of the rights secured by a copyright. It occurs when you break the copyright laws such as copying movie, software or CD’s illegally

iii. Computer theft – is defined as the unauthorized used of another person’s property such as transfer of payment to the wrong accounts, get online material with no cost and tap into the data transmission lines

iv. Computer attack – is defined as any activities taken to disrupt the equipments of computers systems, change processing controls and corrupt stored data

top related