SlideShare una empresa de Scribd logo
1 de 15
Ethics and Privacy Charity Harvill 8-3 Young Junior High
Ethics and Privacy Is anything private anymore? Automated invaders. Virus protection, detection, and disinfection. Human invaders. Intellectual property. The future of ethics and privacy.
Ethics and Privacy 	Intellectual property is ideas put into action, such as writing, music, art, computer code, and inventions that can be protected under copyright or patent laws. Many people are victimized by the ability of organizations, corporations, the government, and private citizens to access, store, and retrieve vast amounts of information on individuals in databases. This power over computerized information brings up ethical questions and responsibilities for all computer users.
Ethics and Privacy 	Ethical questions deal with moral principles and values. Is it ethical for individuals, companies, or the government to store personal data about individuals without the individual knowing about it? We know when we have been physically robbed, but we may not know that someone has gained access to our private information.
Ethics and Privacy The types of automated invaders are: ,[object Object]
Worms—destructive code that “worms” its way through computers by boring through files.
Bombs—destructive code set to go off at a certain time or when a specific action is taken.
Trojan horse—destructive code disguised as something desirable, such as a shareware graphics program. Once inside, it wreaks havoc, erasing or scrambling files.,[object Object]
Ethics and Privacy 	Antivirus and virus disinfectant programs are used to protect your data from automated invaders. An antivirus program checks each floppy disk automatically as it is inserted into the disk drive and scans all data from telecommunications devices. A virus disinfectant program uncovers viruses lurking on your hard drive.
Ethics and Privacy 	Human invaders are called hackers. “Hacker” originally meant a person who was absorbed with computers. Today a hacker is one who secretly gains access to others’ computer files without permission.
Ethics and Privacy 	Hackers are usually between the ages of 12-25, and they take pride in finding phone numbers and then cracking the security codes that allow access into the network. Often no real damage is done, and most computer crime, such as theft of electronic funds and the stealing of confidential data, are committed by insiders, at the cost of billions of dollars per year.
Ethics and Privacy 	When can property be stolen from someone without his or her knowledge? With the theft of intellectual property, the original owner can still be in possession of the original property and have no knowledge that a theft has occurred. Software code is intellectual property. When software code is stolen, a copy is made the rightful owner still has the original. To protect software against unwanted or illegal duplication by writing computer code within the programs that prevents simple copying is called copy protect.
Ethics and Privacy 	Why is intellectual property so easy to steal? First it can be done in the privacy of one’s home, etiher by copying a friend’s program disk or by going into an illicit bulletin board and downloading a copy of a pirated program. Secondly, the theft itself may only take a few seconds-and the hacker is neither seen nor heard. Often people unwittingly steal intellectual property because they are unfamiliar with copyright laws. The unauthorized copying and use of a computer program is called software piracy.
Ethics and Privacy “Site licenses” grant the user the right to make a specified number of copies of a software program for use on multiple computers. At Young we have site licenses for our software. 	The Copyright Act of 1976 allows the user to make a backup copy of copyrighted software for his or her personal use, but makes it illegal for the user to make and distribute copies.
Ethics and Privacy There are four types of software: Commercial software (Copyrighted software available for purchase) Freeware (Copyrighted software that is given away free of charge but is still the property of the owner and the user doesn’t have the right to distribute copies.) Shareware (Copyrighted software that is distributed free of charge on a trial basis.) A nominal fee is charged if the user decides to keep it. Public Domain Software (Software donated for public use that can be freely copied and distributed.)

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Data Security
Data SecurityData Security
Data Security
 
Software piracy
Software piracySoftware piracy
Software piracy
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Data security
Data securityData security
Data security
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 

Destacado

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
realpeterz
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
vinyas87
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
sappingtonkr
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
Adjem
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
Matthew Momney
 
Violation of privacy
Violation of privacyViolation of privacy
Violation of privacy
Lauren2342
 

Destacado (20)

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
 
What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.
 
OCLC Report: Sharing, Privacy and Trust
OCLC Report: Sharing, Privacy and TrustOCLC Report: Sharing, Privacy and Trust
OCLC Report: Sharing, Privacy and Trust
 
IRBsearch | GLBA data
IRBsearch | GLBA dataIRBsearch | GLBA data
IRBsearch | GLBA data
 
Big Data, Big Responsibilities
Big Data, Big ResponsibilitiesBig Data, Big Responsibilities
Big Data, Big Responsibilities
 
CSR Big data
CSR Big dataCSR Big data
CSR Big data
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringement
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Ethics
EthicsEthics
Ethics
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentiality
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
Violation of privacy
Violation of privacyViolation of privacy
Violation of privacy
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And Computing
 

Similar a Ethics and privacy ppt 3rd period

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
24sneha
 

Similar a Ethics and privacy ppt 3rd period (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Mobile security
Mobile securityMobile security
Mobile security
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Presentation1
Presentation1Presentation1
Presentation1
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Ethics and privacy ppt 3rd period

  • 1. Ethics and Privacy Charity Harvill 8-3 Young Junior High
  • 2. Ethics and Privacy Is anything private anymore? Automated invaders. Virus protection, detection, and disinfection. Human invaders. Intellectual property. The future of ethics and privacy.
  • 3. Ethics and Privacy Intellectual property is ideas put into action, such as writing, music, art, computer code, and inventions that can be protected under copyright or patent laws. Many people are victimized by the ability of organizations, corporations, the government, and private citizens to access, store, and retrieve vast amounts of information on individuals in databases. This power over computerized information brings up ethical questions and responsibilities for all computer users.
  • 4. Ethics and Privacy Ethical questions deal with moral principles and values. Is it ethical for individuals, companies, or the government to store personal data about individuals without the individual knowing about it? We know when we have been physically robbed, but we may not know that someone has gained access to our private information.
  • 5.
  • 6. Worms—destructive code that “worms” its way through computers by boring through files.
  • 7. Bombs—destructive code set to go off at a certain time or when a specific action is taken.
  • 8.
  • 9. Ethics and Privacy Antivirus and virus disinfectant programs are used to protect your data from automated invaders. An antivirus program checks each floppy disk automatically as it is inserted into the disk drive and scans all data from telecommunications devices. A virus disinfectant program uncovers viruses lurking on your hard drive.
  • 10. Ethics and Privacy Human invaders are called hackers. “Hacker” originally meant a person who was absorbed with computers. Today a hacker is one who secretly gains access to others’ computer files without permission.
  • 11. Ethics and Privacy Hackers are usually between the ages of 12-25, and they take pride in finding phone numbers and then cracking the security codes that allow access into the network. Often no real damage is done, and most computer crime, such as theft of electronic funds and the stealing of confidential data, are committed by insiders, at the cost of billions of dollars per year.
  • 12. Ethics and Privacy When can property be stolen from someone without his or her knowledge? With the theft of intellectual property, the original owner can still be in possession of the original property and have no knowledge that a theft has occurred. Software code is intellectual property. When software code is stolen, a copy is made the rightful owner still has the original. To protect software against unwanted or illegal duplication by writing computer code within the programs that prevents simple copying is called copy protect.
  • 13. Ethics and Privacy Why is intellectual property so easy to steal? First it can be done in the privacy of one’s home, etiher by copying a friend’s program disk or by going into an illicit bulletin board and downloading a copy of a pirated program. Secondly, the theft itself may only take a few seconds-and the hacker is neither seen nor heard. Often people unwittingly steal intellectual property because they are unfamiliar with copyright laws. The unauthorized copying and use of a computer program is called software piracy.
  • 14. Ethics and Privacy “Site licenses” grant the user the right to make a specified number of copies of a software program for use on multiple computers. At Young we have site licenses for our software. The Copyright Act of 1976 allows the user to make a backup copy of copyrighted software for his or her personal use, but makes it illegal for the user to make and distribute copies.
  • 15. Ethics and Privacy There are four types of software: Commercial software (Copyrighted software available for purchase) Freeware (Copyrighted software that is given away free of charge but is still the property of the owner and the user doesn’t have the right to distribute copies.) Shareware (Copyrighted software that is distributed free of charge on a trial basis.) A nominal fee is charged if the user decides to keep it. Public Domain Software (Software donated for public use that can be freely copied and distributed.)
  • 16. Ethics and Privacy Providing protection against the theft of intellectual property puts the government in a precarious position. There are trade-offs between regulating access to data and building a democracy based on freedom of information. As technology improves, we are provided with not only greater convenience but also with ethical choices involved in implementing that technology.
  • 17. Ethics and Privacy Presented by Click here to learn more about ethics in computing