computer ethics and legal issues

16
CHAPTER 1: INFORMATION AND COMMUNICATION TECHNOLOGY Computer Ethics and Legal Issues

Upload: kak-yong

Post on 22-Nov-2014

9.931 views

Category:

Education


8 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Computer Ethics and Legal Issues

CHAPTER 1: INFORMATION AND COMMUNICATION TECHNOLOGY

Computer Ethics and Legal Issues

Page 2: Computer Ethics and Legal Issues

Definition

Computer Ethics

Is a system of moral standards or moral values used as a guideline for computer users

Code of Ethics

Is a guideline in ICT that help determine whether a specific computer action is ethical or unethical

Intellectual Property

Is works created by inventors, authors and artists

Privacy Refers to the right of individuals and companies to deny or restrict the collection and use of information about them

Computer Crime

Is any illegal acts involving computers

Cyber Law Is any laws relating to protect the Internet and other online communication technologies

Page 3: Computer Ethics and Legal Issues

Differentiate between ethics and law

ETHICS LAW

As a guideline to computer users

As a rule to control computer users

Computers users are free to follow or ignore the code of ethics

Computers users must follow the regulations and law

Universal, can be applied anywhere, all over the world

Depend on country and state where the crime is committed

To produced ethical computers users

To prevent misuse of computers

Not following ethics are called immoral

Not obeying laws are called crime

Page 4: Computer Ethics and Legal Issues

Intellectual Property Laws

Four types of Intellectual Property are:

1.Patents for inventions2.Trademarks for brand identity3.Design for product appearance4.Copyright for materials

Page 5: Computer Ethics and Legal Issues

Privacy

Ways of making personal data more privates:

1. Install personal firewall2. Clear your history file when you are

browsing3. Purchase goods with cash, rather than

credit card

Page 6: Computer Ethics and Legal Issues

Authentication

Authentication is a process where user verifies their identity. Authentication deals with the problem of determining whether a user should be allowed access to a particular system.

Page 7: Computer Ethics and Legal Issues

Four commonly authentication methods:

Page 8: Computer Ethics and Legal Issues

A) User identification

Is a unique combination of characters (letter, number or symbol) that identify specific user

Examples: pin numberpassword

Page 9: Computer Ethics and Legal Issues

B) Possessed object

Is a any item that you must carry to gain access to computer of computer facility

Examples:ATM cardcredit cardsmart card

Page 10: Computer Ethics and Legal Issues

C) Biometric device

Is a device that translates personal characteristics into digital code that is compared with the digital code stored in the database

Examples:fingerprint readeriris scannerhand geometric scannersignature verification system

Page 11: Computer Ethics and Legal Issues

Controversial Contents and Control

PORNOGRAPHY SLANDER is any form media or material (like books, video or photos) that show erotic behavior and intended to cause sexual excitement

the effects of pornography on society are:i)Can lead to criminal acts such as exploitation of womenii)Can lead to sexual addictioniii)Can develop lower moral values towards other peopleiv)Can erode good religious, cultural, behaviors and beliefs

is a false spoken statement about someone, intended to damage his or her reputation

the effects of slander on society are:i)Can develop society that disregards on honesty and truthii)Can lead to bad habits of spreading rumors and untruthiii)Can cause people to have nagative attitudes toward another person

Page 12: Computer Ethics and Legal Issues
Page 13: Computer Ethics and Legal Issues

Computer Crimes

Why we need cyber law?i) Cyber laws are made to force people to be

goodii) To give protection against the misuse of

computers and computer criminal activities Examples of cyber abuse on the users:

i) Sending a computer virus via e-mailii) Harassment through e-mailiii) Hacking into your school's database to

change your examination results

Page 14: Computer Ethics and Legal Issues

Malaysian Cyber Lawi) Computer Crime Act 1997ii) Copyright (Amendment) Bill 1997iii) Digital Signature Act 1997iv) Telemedicine Bill 1997v) Communication and Multimedia Act 1998vi) Digital Signature Regulations 1998

Page 15: Computer Ethics and Legal Issues

4 examples of computer crimes:i) Computer fraud - is the crime of

obtaining money by deceiving (to trick) people through the use of computers such as email hoaxes, program fraud, investment schemes and claim of expertise on certain fields

ii) Copyright infringement - is a violation of the rights secured by a copyright. It occurs when you break the copyright laws such as copying movie, software or CD’s illegally

Page 16: Computer Ethics and Legal Issues

iii. Computer theft – is defined as the unauthorized used of another person’s property such as transfer of payment to the wrong accounts, get online material with no cost and tap into the data transmission lines

iv. Computer attack – is defined as any activities taken to disrupt the equipments of computers systems, change processing controls and corrupt stored data