View
214
Download
0
Tags:
Embed Size (px)
Citation preview
Main PointsMain Points1.1. Computer Technology Arises ConcernsComputer Technology Arises Concerns
2.2. Computer Ethics & Guidelines that Computer Ethics & Guidelines that Govern the morally acceptable use of Govern the morally acceptable use of Computers in our societyComputers in our society
3.3. Privacy Issues related to the InternetPrivacy Issues related to the Internet
4.4. Computer Crime & the CriminalsComputer Crime & the Criminals
5.5. Ways to Protect your SecurityWays to Protect your Security
6.6. Common Types of Physical & mental Common Types of Physical & mental Illnesses arising from Computer useIllnesses arising from Computer use
7.7. Ways to protect the Computer Industry Ways to protect the Computer Industry
Most Significant Concerns
Privacy-What are our threats to personal privacy & How can we protect ourselves?
Security-How can we access to our personal data be controlled?
2nd Most Significant Concerns
Ergonomics-What are the physical & mental risks of technology & can they be eliminated?
Environment-What can we do to minimize the impact of technology on our environment?
Computer Ethics & Guidelines Computer Ethics & Guidelines
Privacy-Privacy- concerns concerns the collection & the collection & use of data about use of data about individualsindividuals
Accuracy-Accuracy- relates relates to the to the responsibility of responsibility of those who collect those who collect data to ensure that data to ensure that the data is correctthe data is correct
Property-Property- relates to relates to who owns data and who owns data and right of softwareright of software
Access-Access- relates to relates to the responsibility the responsibility of those who have of those who have data to control and data to control and who is able to use who is able to use the datethe date
Privacy IssuesPrivacy Issues
• Large Databases gather detailed personal information on individuals that are public & non-public, however, this raises concerns about:
Identity Theft – illegal assumption of someone’s identity for economic gain
Mistaken Identity - an electronic profile of one person is switched with another
The Internet & the WebWeb activity is monitored by:
Traditional Cookies-When you first visit a site, a cookie is
deposited and begins to monitor your activities, but when you exit site it becomes a dormant
Ad Network or
Adware cookies-Monitors your activities,
however, deposits itself on your hard disk and compiles and marks your information
Computer CriminalsComputer CriminalsA computer crime is an illegal action in which A computer crime is an illegal action in which
the perpetrator uses special knowledge of the perpetrator uses special knowledge of computer technology, there are five types:computer technology, there are five types:
Employees- largest category, mainly because Employees- largest category, mainly because they have easier access.they have easier access.
Outsider Users- sometimes have access to Outsider Users- sometimes have access to company’s computers systems. company’s computers systems.
Hackers & Crackers- Hackers gain Hackers & Crackers- Hackers gain unauthorized access to computers for fun or unauthorized access to computers for fun or for a challenge and Crackers access for a challenge and Crackers access computers for malicious purposes.computers for malicious purposes.
Organized Crime- counterfeiters and forgers.Organized Crime- counterfeiters and forgers. Terrorists- potentially crash satellites and Terrorists- potentially crash satellites and
wage economic warfare.wage economic warfare.
Computer CrimeComputer Crime
Viruses-Programs that migrate throughNetworks and operating systems And once activated they can alter or Delete files.
Worms-Are special type of viruses which do not attach to filesOr programs. Rather it fills a computer with self-replicatinginformation
Trojan Horses-Programs that come into a computer Disguised as something else. They are not Viruses but in fact carry viruses.
Measures to Protect your Computer SecurityMeasures to Protect your Computer Security
Use ENCRYPTING, by coding all messages sent over a network
Use RESTRICTING, by limiting access to unauthorized persons
Use ANTICIPATING, by preparing for disasters by ensuring physical security and data security
Use BACKING UP, by routinely copying data and storing it at a remote location
Physical Health & Mental Physical Health & Mental RisksRisks• Eyestrain & Headaches-Eyestrain & Headaches- Monitors require using Monitors require using
your eyes at a close range which can create your eyes at a close range which can create eyestrain, headaches, and double vision. Make eyestrain, headaches, and double vision. Make sure screen is 3-4x higher than room light.sure screen is 3-4x higher than room light.
• Back & Neck pain-Back & Neck pain- Many people work at Many people work at monitors and keyboard that are in improper monitors and keyboard that are in improper positions which can cause back pain and neck positions which can cause back pain and neck pain. Make sure you are able to adjust your chair.pain. Make sure you are able to adjust your chair.
• Repetitive stain injury-Repetitive stain injury- it is a number of it is a number of injuries such as carpal tunnel syndrome which injuries such as carpal tunnel syndrome which results in shake hands that require surgery.results in shake hands that require surgery.
• NoiseNoise- computer can be noisy. Acoustical tile & - computer can be noisy. Acoustical tile & sound-muffling covers are available for reducing sound-muffling covers are available for reducing the noise to co-workers.the noise to co-workers.