SlideShare una empresa de Scribd logo
1 de 26
SUPER BILLING: COMPUTERS
ARE YOUR FUTURE
Computers Are Your Future Spotlight 1
COMPUTERS ARE YOUR
FUTURE
Spotlight 1
Ethics: Standards of Information Age
Conduct
Slide
2
Computers Are Your Future Spotlight 1
COMPUTER ETHICS
 Ethics is the branch of philosophy concerned with
what’s right and what’s wrong.
 Computer ethics deals with moral dilemmas and the
ethical principles for computer professionals.
Slide
3
Computers Are Your Future Spotlight 1
AVOIDING COMPUTER-RELATED LEGAL
PROBLEMS
 Most organizations have a policy defining what they
consider to be acceptable computer use.
 Types of legal problems that arise from computer use
include:
 Plagiarism
 Software Piracy
 Copyright Infringement
Slide
4
Computers Are Your Future Spotlight 1
PLAGIARISM
 Plagiarism is the unauthorized and/or uncited use of
someone else’s intellectual property.
 Intellectual property rights refer to an individual’s
ownership over original works.
 Copyright infringement is plagiarism of
copyrighted material.
 Legal implications of plagiarism:
 Dismissal from school
 Lawsuits
Slide
5
Computers Are Your Future Spotlight 1
SOFTWARE AND COPYRIGHTS
 Public domain software can be copied, sold, and
modified.
 Shareware is copyrighted software that can be used
without a license for a specified time.
 Trial versions can be copied.
 When the evaluation period ends, a registration fee is paid for
continued use of the software.
 Commercial software is copyrighted.
 You must purchase the software to use it.
 Organizations purchase a site license to use the software on
all of their computers.
Slide
6
Computers Are Your Future Spotlight 1
SOFTWARE PIRACY
 Selling software that contains all or part of a
commercial software program
 Using shareware beyond its evaluation period
 Violating the terms of a software license
 Making copies of site-licensed programs for personal
use
 Giving or selling commercial software to others
Slide
7
Computers Are Your Future Spotlight 1
COPYRIGHT INFRINGEMENT
 An increasing number of Internet users are making
illegal copies of music.
 Rationalizations copyright violators use:
 “It’s OK to download MP3 files if I only keep them for 24
hours.”
 “It’s free advertising for the band.”
 “It’s legal because I don’t charge any money for sharing
them.”
Slide
8
Computers Are Your Future Spotlight 1
COPYRIGHT INFRINGEMENT
 The Fair use doctrine states
that a brief selection from
copyrighted work can be used
for commentary, parody, news
reporting, research, and
education.
Slide
9
Computers Are Your Future Spotlight 1
INTRODUCING ETHICS
 Computers cause new ethical problems.
 Computer ethics deals with the ethical principles
associated with those problems.
Slide
10
Computers Are Your Future Spotlight 1
MORAL DILEMMAS
 Moral dilemmas occur when:
 It’s not clear which moral rule to apply.
 Two or more moral rules conflict.
Slide
11
Computers Are Your Future Spotlight 1
ETHICAL PRINCIPLES
 Ethical principles are tools which are used to think
through difficult situations.
 Three useful ethical principles:
 An act is ethical if all of society benefits from it.
 An act is ethical if people are treated as ends and not as a
means to ends.
 An act is ethical if it is fair to all parties involved.
Slide
12
Computers Are Your Future Spotlight 1
THINKING THROUGH MORAL
DILEMMAS
 When confronted with a moral dilemma:
 Gather all the facts.
 Talk to someone you trust.
 Think through alternative courses of action.
 Find a solution you can be proud of.
Slide
13
Computers Are Your Future Spotlight 1
COMPUTER ETHICS FOR COMPUTER
USERS
 When using the college’s computers:
 Respect yourself.
 Respect others.
 Respect academic integrity.
Slide
14
Computers Are Your Future Spotlight 1
TEN COMMANDMENTS OF COMPUTER
ETHICS
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s computer
work.
3. Thou shalt not snoop around in other people’s files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which
you have not paid.
7. Thou shalt not use other people’s computer resources
without authorization or proper compensation.
8. Thou shalt not appropriate other people’s intellectual
output.
9. Thou shalt think about the social consequences of the
program you write or the system you design.
10. Thou shalt use a computer in ways that show
consideration and respect for your fellow humans. Slide
15
Computers Are Your Future Spotlight 1
NETIQUETTE
 Netiquette refers to the guidelines that involve
showing respect for others and yourself while you are
online.
Slide
16
Computers Are Your Future Spotlight 1
MAILING LIST NETIQUETTE
 Read the discussions for the past few days before
posting questions.
 Read the Frequently Asked Questions (FAQs)
list before posting questions.
 Don’t belittle people for grammatical errors.
 Don’t post inflammatory messages.
 Learn how to unsubscribe from the list.
Slide
17
Computers Are Your Future Spotlight 1
E-MAIL NETIQUETTE
 Promptly respond to
messages.
 Delete messages after
you read them.
 Speak of others
professionally and
courteously.
 Run your computer’s
anti-virus program on
any e-mail received or
sent.
Slide
18
Computers Are Your Future Spotlight 1
E-MAIL NETIQUETTE (CONTINUED)
 Keep the message short and to the point.
 Don’t type in all capital letters.
 Spell check your message before sending it.
 Be careful with sarcasm and humor in your message.
 Be mindful of the recipient’s reaction when you
request a return receipt. This feature can be annoying
and intrusive.
Slide
19
Computers Are Your Future Spotlight 1
INTERNET RELAY CHAT NETIQUETTE
 Listen to the discussion for a while before joining
it.
 Learn the commonly used abbreviations.
 Don’t flood the channel with text.
 Don’t harass others with unwanted invitations.
 Be careful if you are asked to type in a command.
It may have unexpected results.
 Use the ignore command when being bothered.
Slide
20
Computers Are Your Future Spotlight 1
COMPUTER ETHICS FOR COMPUTER
PROFESSIONALS
Slide
21
 The field of computer ethics specifies ethical codes
for computing professionals.
 The core of a computer professional’s code of ethics
is to preserve and protect human life from harm.
CODES OF CONDUCT AND GOOD PRACTICE FOR
CERTIFIED COMPUTING PROFESSIONALS
The essential elements relating to conduct that identify a
professional activity are:
· A high standard of skill and knowledge
· A confidential relationship with people served
· Public reliance upon the standards of conduct in
established practice
· The observance of an ethical code
Excerpt from the Code of Ethics of the Institute for Certification of Computing
Professionals
Computers Are Your Future Spotlight 1
ADDITIONAL ETHICAL
RESPONSIBILITIES
 Competence – Professionals keep up with the
latest knowledge in their fields and perform
services only in their areas of competence.
 Responsibility – Professionals are loyal to their
clients and employees, and they don’t disclose
confidential information.
 Integrity – Professionals express their opinions
based on facts, and they are impartial in their
judgments.
Slide
22
Computers Are Your Future Spotlight 1
THE ACM CODE OF CONDUCT
 A computing professional:
 Contributes to society and human well-being
 Avoids harm to others
 Is honest and trustworthy
 Is fair and takes action not to discriminate on the basis of
race, sex, religion, age, disability, or national origin
 Honors property rights, including copyrights and patents
 Gives proper credit when using the intellectual property of
others
 Respects other individuals’ rights to privacy
 Honors confidentiality
Slide
23
Computers Are Your Future Spotlight 1
PROGRAMMER LIABILITY
 Programmers can produce programs with errors.
 Computer experts agree that the liability for a program
failure should be shared among the programmer, the
software company, and the organization that buys the
software.
 A field called software engineering applies external,
impartial reviews to software production.
 Fault-tolerant systems are being developed that
continue working when a problem occurs.
Slide
24
Computers Are Your Future Spotlight 1
COMPUTER ETHICS IN BUSINESS
 A business must protect its data from:
 Loss or damage
 Misuse or errors
 Unauthorized access
 Backup procedures are used to protect data from
loss.
 It is the organization’s responsibility to ensure that
its data is as complete as possible.
 Divulging customer data without asking permission
is considered unethical behavior by privacy
advocates. Slide
25
Computers Are Your Future Spotlight 1
WHISTLE-BLOWING
 Whistle-blowing refers to employees reporting their
company’s dangerous or illegal acts to regulatory
agencies or the press.
 Some laws exist to protect whistle-blowers, but many
find themselves unemployed and blacklisted.
Slide
26

Más contenido relacionado

La actualidad más candente

The ten commandments of computer ethics
The ten commandments of computer ethicsThe ten commandments of computer ethics
The ten commandments of computer ethicssalj_16
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Ten commandments
Ten commandmentsTen commandments
Ten commandmentslsanford84
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalejl2
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerNur Azlina
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroommiarmenta
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
 
Computer info unit 1
Computer info unit 1Computer info unit 1
Computer info unit 1jeanprovitt
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsAmplephi
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyrightAdyns
 

La actualidad más candente (20)

The ten commandments of computer ethics
The ten commandments of computer ethicsThe ten commandments of computer ethics
The ten commandments of computer ethics
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Ethics
EthicsEthics
Ethics
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 
7 computer ethics
7 computer ethics7 computer ethics
7 computer ethics
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point final
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using Computer
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroom
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer info unit 1
Computer info unit 1Computer info unit 1
Computer info unit 1
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 

Destacado

Middle school presentation
Middle school presentationMiddle school presentation
Middle school presentationppoulos
 
Computing and health
Computing and healthComputing and health
Computing and healthDanijel Gajan
 
Application of computer in medicine
Application of computer in medicineApplication of computer in medicine
Application of computer in medicinekiran gajurel
 
The house of the future
The house of the futureThe house of the future
The house of the futureAna Duarte
 
Virtual Reality-Seminar presentation
Virtual Reality-Seminar  presentationVirtual Reality-Seminar  presentation
Virtual Reality-Seminar presentationShreyansh Vijay Singh
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system pptSuaj
 

Destacado (8)

Middle school presentation
Middle school presentationMiddle school presentation
Middle school presentation
 
Computing and health
Computing and healthComputing and health
Computing and health
 
Application of computer in medicine
Application of computer in medicineApplication of computer in medicine
Application of computer in medicine
 
The house of the future
The house of the futureThe house of the future
The house of the future
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
 
Virtual Reality-Seminar presentation
Virtual Reality-Seminar  presentationVirtual Reality-Seminar  presentation
Virtual Reality-Seminar presentation
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system ppt
 

Similar a Super billing computers are your future

Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computeribrahimtbl3147
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Presentation computer ethics
Presentation computer ethicsPresentation computer ethics
Presentation computer ethicsYuyul Yieyien
 
etiquettes-grade 7.pptx
etiquettes-grade 7.pptxetiquettes-grade 7.pptx
etiquettes-grade 7.pptxCynnePataweg
 
Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptxMohammedAish
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxjennyJey2
 
PPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptxPPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptxRowellRizalte
 
SPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsxSPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsxozaixyzo
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxSATYAJIT58
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technologylcnemedez
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 

Similar a Super billing computers are your future (20)

COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
 
Presentation computer ethics
Presentation computer ethicsPresentation computer ethics
Presentation computer ethics
 
etiquettes-grade 7.pptx
etiquettes-grade 7.pptxetiquettes-grade 7.pptx
etiquettes-grade 7.pptx
 
Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
PPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptxPPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptx
 
SPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsxSPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsx
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
Law 483 cyberethics
Law 483 cyberethicsLaw 483 cyberethics
Law 483 cyberethics
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 

Último

How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdflaloo_007
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challengeshemanthkumar470700
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsShree Krishna Exports
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Timegargpaaro
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingNauman Safdar
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfbelieveminhh
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030tarushabhavsar
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 

Último (20)

Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 

Super billing computers are your future

  • 2. Computers Are Your Future Spotlight 1 COMPUTERS ARE YOUR FUTURE Spotlight 1 Ethics: Standards of Information Age Conduct Slide 2
  • 3. Computers Are Your Future Spotlight 1 COMPUTER ETHICS  Ethics is the branch of philosophy concerned with what’s right and what’s wrong.  Computer ethics deals with moral dilemmas and the ethical principles for computer professionals. Slide 3
  • 4. Computers Are Your Future Spotlight 1 AVOIDING COMPUTER-RELATED LEGAL PROBLEMS  Most organizations have a policy defining what they consider to be acceptable computer use.  Types of legal problems that arise from computer use include:  Plagiarism  Software Piracy  Copyright Infringement Slide 4
  • 5. Computers Are Your Future Spotlight 1 PLAGIARISM  Plagiarism is the unauthorized and/or uncited use of someone else’s intellectual property.  Intellectual property rights refer to an individual’s ownership over original works.  Copyright infringement is plagiarism of copyrighted material.  Legal implications of plagiarism:  Dismissal from school  Lawsuits Slide 5
  • 6. Computers Are Your Future Spotlight 1 SOFTWARE AND COPYRIGHTS  Public domain software can be copied, sold, and modified.  Shareware is copyrighted software that can be used without a license for a specified time.  Trial versions can be copied.  When the evaluation period ends, a registration fee is paid for continued use of the software.  Commercial software is copyrighted.  You must purchase the software to use it.  Organizations purchase a site license to use the software on all of their computers. Slide 6
  • 7. Computers Are Your Future Spotlight 1 SOFTWARE PIRACY  Selling software that contains all or part of a commercial software program  Using shareware beyond its evaluation period  Violating the terms of a software license  Making copies of site-licensed programs for personal use  Giving or selling commercial software to others Slide 7
  • 8. Computers Are Your Future Spotlight 1 COPYRIGHT INFRINGEMENT  An increasing number of Internet users are making illegal copies of music.  Rationalizations copyright violators use:  “It’s OK to download MP3 files if I only keep them for 24 hours.”  “It’s free advertising for the band.”  “It’s legal because I don’t charge any money for sharing them.” Slide 8
  • 9. Computers Are Your Future Spotlight 1 COPYRIGHT INFRINGEMENT  The Fair use doctrine states that a brief selection from copyrighted work can be used for commentary, parody, news reporting, research, and education. Slide 9
  • 10. Computers Are Your Future Spotlight 1 INTRODUCING ETHICS  Computers cause new ethical problems.  Computer ethics deals with the ethical principles associated with those problems. Slide 10
  • 11. Computers Are Your Future Spotlight 1 MORAL DILEMMAS  Moral dilemmas occur when:  It’s not clear which moral rule to apply.  Two or more moral rules conflict. Slide 11
  • 12. Computers Are Your Future Spotlight 1 ETHICAL PRINCIPLES  Ethical principles are tools which are used to think through difficult situations.  Three useful ethical principles:  An act is ethical if all of society benefits from it.  An act is ethical if people are treated as ends and not as a means to ends.  An act is ethical if it is fair to all parties involved. Slide 12
  • 13. Computers Are Your Future Spotlight 1 THINKING THROUGH MORAL DILEMMAS  When confronted with a moral dilemma:  Gather all the facts.  Talk to someone you trust.  Think through alternative courses of action.  Find a solution you can be proud of. Slide 13
  • 14. Computers Are Your Future Spotlight 1 COMPUTER ETHICS FOR COMPUTER USERS  When using the college’s computers:  Respect yourself.  Respect others.  Respect academic integrity. Slide 14
  • 15. Computers Are Your Future Spotlight 1 TEN COMMANDMENTS OF COMPUTER ETHICS 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people’s computer work. 3. Thou shalt not snoop around in other people’s files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people’s computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people’s intellectual output. 9. Thou shalt think about the social consequences of the program you write or the system you design. 10. Thou shalt use a computer in ways that show consideration and respect for your fellow humans. Slide 15
  • 16. Computers Are Your Future Spotlight 1 NETIQUETTE  Netiquette refers to the guidelines that involve showing respect for others and yourself while you are online. Slide 16
  • 17. Computers Are Your Future Spotlight 1 MAILING LIST NETIQUETTE  Read the discussions for the past few days before posting questions.  Read the Frequently Asked Questions (FAQs) list before posting questions.  Don’t belittle people for grammatical errors.  Don’t post inflammatory messages.  Learn how to unsubscribe from the list. Slide 17
  • 18. Computers Are Your Future Spotlight 1 E-MAIL NETIQUETTE  Promptly respond to messages.  Delete messages after you read them.  Speak of others professionally and courteously.  Run your computer’s anti-virus program on any e-mail received or sent. Slide 18
  • 19. Computers Are Your Future Spotlight 1 E-MAIL NETIQUETTE (CONTINUED)  Keep the message short and to the point.  Don’t type in all capital letters.  Spell check your message before sending it.  Be careful with sarcasm and humor in your message.  Be mindful of the recipient’s reaction when you request a return receipt. This feature can be annoying and intrusive. Slide 19
  • 20. Computers Are Your Future Spotlight 1 INTERNET RELAY CHAT NETIQUETTE  Listen to the discussion for a while before joining it.  Learn the commonly used abbreviations.  Don’t flood the channel with text.  Don’t harass others with unwanted invitations.  Be careful if you are asked to type in a command. It may have unexpected results.  Use the ignore command when being bothered. Slide 20
  • 21. Computers Are Your Future Spotlight 1 COMPUTER ETHICS FOR COMPUTER PROFESSIONALS Slide 21  The field of computer ethics specifies ethical codes for computing professionals.  The core of a computer professional’s code of ethics is to preserve and protect human life from harm. CODES OF CONDUCT AND GOOD PRACTICE FOR CERTIFIED COMPUTING PROFESSIONALS The essential elements relating to conduct that identify a professional activity are: · A high standard of skill and knowledge · A confidential relationship with people served · Public reliance upon the standards of conduct in established practice · The observance of an ethical code Excerpt from the Code of Ethics of the Institute for Certification of Computing Professionals
  • 22. Computers Are Your Future Spotlight 1 ADDITIONAL ETHICAL RESPONSIBILITIES  Competence – Professionals keep up with the latest knowledge in their fields and perform services only in their areas of competence.  Responsibility – Professionals are loyal to their clients and employees, and they don’t disclose confidential information.  Integrity – Professionals express their opinions based on facts, and they are impartial in their judgments. Slide 22
  • 23. Computers Are Your Future Spotlight 1 THE ACM CODE OF CONDUCT  A computing professional:  Contributes to society and human well-being  Avoids harm to others  Is honest and trustworthy  Is fair and takes action not to discriminate on the basis of race, sex, religion, age, disability, or national origin  Honors property rights, including copyrights and patents  Gives proper credit when using the intellectual property of others  Respects other individuals’ rights to privacy  Honors confidentiality Slide 23
  • 24. Computers Are Your Future Spotlight 1 PROGRAMMER LIABILITY  Programmers can produce programs with errors.  Computer experts agree that the liability for a program failure should be shared among the programmer, the software company, and the organization that buys the software.  A field called software engineering applies external, impartial reviews to software production.  Fault-tolerant systems are being developed that continue working when a problem occurs. Slide 24
  • 25. Computers Are Your Future Spotlight 1 COMPUTER ETHICS IN BUSINESS  A business must protect its data from:  Loss or damage  Misuse or errors  Unauthorized access  Backup procedures are used to protect data from loss.  It is the organization’s responsibility to ensure that its data is as complete as possible.  Divulging customer data without asking permission is considered unethical behavior by privacy advocates. Slide 25
  • 26. Computers Are Your Future Spotlight 1 WHISTLE-BLOWING  Whistle-blowing refers to employees reporting their company’s dangerous or illegal acts to regulatory agencies or the press.  Some laws exist to protect whistle-blowers, but many find themselves unemployed and blacklisted. Slide 26