ALL INFORMATION FROM THE FIRST EDITION OF "E-TECH" (A BOOK OF TECHFACTORS INC.)
POWERPOINT GOOD FOR STUDENTS' PERFORMANCE TASK (REPORTING) IF THEY ARE TO REFER TO THE BOOK.
NOTE:
FONTS WERE AFFECTED IN THE UPLOADING OF THIS PPT. PLEASE DO THE EDITING IF YOU WANT. THANKS.
3. ONLINE SAFETY
➤ THE MORE INFORMATION YOU
PUT OR USE ONLINE, THE
HIGHER THE RISK PLACED ON
YOUR ONLINE SAFETY.
➤ RISKS SUCH AS:
— IDENTITY THEFT,
— PHISHING, AND
— MALWARE INFECTIONS
➤ IT IS YOUR RESPONSIBILITY TO
SECURE YOUR INFORMA-TION
ONLINE AS WELL AS MAINTAIN
GOOD ETIQUETTE WHEN
USING THESE SERVICES.
5. CRITERIA FOR
EVALUATION➤ CURRENCY
— IS THE INFORMATION UP-
TO-DATE?
➤ SECURITY
— DOES THE SITE ASK TOO
MUCH INFORMATION?
➤ SCOPE
— IS THE INFORMATION IN-
DEPTH?
➤ AUTHORITY
— DOES THE INFOR-MATION
COME FROM A TRUSTED
EXPERT?
7. COMPUTER
ETHICS➤ A NEW BRANCH OF ETHICS
THAT IS CONCERNED WITH
STANDARDS OF CONDUCT
IN THE USE OF
COMPUTERS.
➤ DEALS WITH HOW COM-
PUTING PROFESSIONALS
SHOULD MAKE DECISIONS
REGARDING PROFES-
SIONAL AND SOCIAL
CONDUCT.
8. “
— A SET OF STANDARDS TO GUIDE
AND INSTRUCT PEOPLE.
From the paper of
Ramon C. Barquin, 1992
Computer Ethics Institute created the Ten Commandments of Comp
Ethics in 1992 entitled;
IN PURSUIT OF A TEN COMMANDMENTS
where it is a means to create —
10. 1. THOU SHALT NOT USE A COMPUTER TO HARM IN ANY
WAY.
2. THOU SHALT NOT INTERFERE WITH OTHER PEOPLE’S
COMPUTER WORK.
3. THOU SHALT NOT SNEAK AROUND OTHER PEOPLE’S
FILES.
4. THOU SHALT NOT USE A COMPUTER TO STEAL.
5. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE
WITNESS.
6. THOU SHALT NOT COPY OR USE PROPRIETARY
SOFTWARE FOR WHICH YOU HAVE NOT PAID.
11. 7. THOU SHALT NOT USE OTHER PEOPLE’S COMPUTER
RESOURCES WITHOUT AUTHORISATION OF PROPER
COMPENSATION.
8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE’S
INTELLECTUAL OUTPUT.
9. THOU SHALT THINK ABOUT THE SOCIAL
CONSEQUENCES OF THE PROGRAM YOU ARE WRITING
OR THE SYSTEM YOU ARE DESIGNING.
10. THOU SHALT ALWAYS USE A COMPUTER IN WAYS
THAT ENSURE CONSIDERATION AND RESPECT FOR YOUR
FELLOW HUMANS.
14. GOOD PRACTICES IN USING THE
INTERNET
1. ALWAYS KEEP YOUR SOFTWARE OR APPLICATION
UPDATED AND UNINSTALL THE ONES THAT YOU DO
NOT USE.
2. DO NOT DIVULGE SENSITIVE INFORMATION ONLINE,
ESPECIALLY ON UNSAFE WEBSITES.
3. BE CAREFUL WHEN DEALING WITH EMAILS FROM
UNKNOWN SOURCES OR SPAM.
4. RUN YOUR ANTIVIRUS SOFTWARE BEFORE GOING
ONLINE.
5. THINK BEFORE YOU CLICK.
16. ➤ The biggest issue surrounding ICT concerns the violation of
Intellectual Property Rights (IPR), which is the act of stealing other
people's works and ideas, whether knowingly or unknowingly.
➤ Intellectual Property Laws (IPL) protect the rights of people to
maintain legal ownership of their works and ideas. But IPR is not
given right: they have to be applied for and granted to the applicant
by the proper authorities.
➤ Granting ownership of an idea to a person is not an easy thing to do.
➤ Art works, novels, short stories, poems, music and movies are the
only some of the copyright things that are available on the Internet.