computer ethics and legal issues
DESCRIPTION
TRANSCRIPT
CHAPTER 1: INFORMATION AND COMMUNICATION TECHNOLOGY
Computer Ethics and Legal Issues
Definition
Computer Ethics
Is a system of moral standards or moral values used as a guideline for computer users
Code of Ethics
Is a guideline in ICT that help determine whether a specific computer action is ethical or unethical
Intellectual Property
Is works created by inventors, authors and artists
Privacy Refers to the right of individuals and companies to deny or restrict the collection and use of information about them
Computer Crime
Is any illegal acts involving computers
Cyber Law Is any laws relating to protect the Internet and other online communication technologies
Differentiate between ethics and law
ETHICS LAW
As a guideline to computer users
As a rule to control computer users
Computers users are free to follow or ignore the code of ethics
Computers users must follow the regulations and law
Universal, can be applied anywhere, all over the world
Depend on country and state where the crime is committed
To produced ethical computers users
To prevent misuse of computers
Not following ethics are called immoral
Not obeying laws are called crime
Intellectual Property Laws
Four types of Intellectual Property are:
1.Patents for inventions2.Trademarks for brand identity3.Design for product appearance4.Copyright for materials
Privacy
Ways of making personal data more privates:
1. Install personal firewall2. Clear your history file when you are
browsing3. Purchase goods with cash, rather than
credit card
Authentication
Authentication is a process where user verifies their identity. Authentication deals with the problem of determining whether a user should be allowed access to a particular system.
Four commonly authentication methods:
A) User identification
Is a unique combination of characters (letter, number or symbol) that identify specific user
Examples: pin numberpassword
B) Possessed object
Is a any item that you must carry to gain access to computer of computer facility
Examples:ATM cardcredit cardsmart card
C) Biometric device
Is a device that translates personal characteristics into digital code that is compared with the digital code stored in the database
Examples:fingerprint readeriris scannerhand geometric scannersignature verification system
Controversial Contents and Control
PORNOGRAPHY SLANDER is any form media or material (like books, video or photos) that show erotic behavior and intended to cause sexual excitement
the effects of pornography on society are:i)Can lead to criminal acts such as exploitation of womenii)Can lead to sexual addictioniii)Can develop lower moral values towards other peopleiv)Can erode good religious, cultural, behaviors and beliefs
is a false spoken statement about someone, intended to damage his or her reputation
the effects of slander on society are:i)Can develop society that disregards on honesty and truthii)Can lead to bad habits of spreading rumors and untruthiii)Can cause people to have nagative attitudes toward another person
Computer Crimes
Why we need cyber law?i) Cyber laws are made to force people to be
goodii) To give protection against the misuse of
computers and computer criminal activities Examples of cyber abuse on the users:
i) Sending a computer virus via e-mailii) Harassment through e-mailiii) Hacking into your school's database to
change your examination results
Malaysian Cyber Lawi) Computer Crime Act 1997ii) Copyright (Amendment) Bill 1997iii) Digital Signature Act 1997iv) Telemedicine Bill 1997v) Communication and Multimedia Act 1998vi) Digital Signature Regulations 1998
4 examples of computer crimes:i) Computer fraud - is the crime of
obtaining money by deceiving (to trick) people through the use of computers such as email hoaxes, program fraud, investment schemes and claim of expertise on certain fields
ii) Copyright infringement - is a violation of the rights secured by a copyright. It occurs when you break the copyright laws such as copying movie, software or CD’s illegally
iii. Computer theft – is defined as the unauthorized used of another person’s property such as transfer of payment to the wrong accounts, get online material with no cost and tap into the data transmission lines
iv. Computer attack – is defined as any activities taken to disrupt the equipments of computers systems, change processing controls and corrupt stored data