Sei sulla pagina 1di 35

| 

Project Team
M | ! 
   

|    
   |  
    





a Privacy and Personal Information


a Trust
a reedom of speech
a Intellectual Property
a omputer crime
a omputers and Work
a Professional Ethics and Responsibilities
O  O 
  

   
| " 

a ategory of professional ethics similar


to medical, accounting, legal ethics
a or computer professionals & those
who select, manage or use computers
in a professional setting
a many people do not understand
technology well...
± oncerns relationships & responsibilities
towards customers, clients, coworkers,
users, people affected by computers, ...
O  O 
  

   
½

#

a tudy of what it means to "do the right


thing"
a iew ethical rules as
± fundamental & universal
± made up to provide a framework to
interact with other people
a ehaving ethically is often practical
a eeds courage sometimes ...
O  O 
  

   
" 
  

a Right, wrong, OK, prohibited,


acceptable
a istinguising Wrong and Harm
a eparating Goals from onstraints
a Personal Preference and Ethics
a aw and Ethics

O  O 
  

   
   

a To handle information in a responsible


way you must understand:
± The importance of ethics in the ownership and
use of information.
± The importance to people of personal privacy and
the ways in which it can be compromised.
± The value of information to an organization.
± Threats to information and how to protect against
them (security).

O  O 
  

   


a V   the principles and


standards that guide our behavior
toward other people.

O  O 
  

   


O  O    


 V    

‰. Your basic ethical structure, which


you developed as you grew up.
2. The set of practical circumstances
involved in the decision that you¶re
trying to make ² that is, all the
shades of gray in what are rarely
black or white decisions.

O  O 
  

   

  | 
 

how much or how little benefit what is your perception of


or harm will come from a what society really thinks of
particular decision? your intended action?

how much do
you identify what is the
with the person probability of
or persons who the harm or
will receive the benefit that
benefit or suffer will occur if
the harm? you take the
action?

how many
what length of time people will be
will it take for the affected by
benefit or harm to your action?
take effect?
    "
a        intangible creative
work that is embodied in physical form.
a    the legal protection afforded an
expression of an idea, such as a song,
video game, and some types of proprietary
documents.
a    says that you may use
copyrighted material in certain situations ²
for example, for teaching purposes.

O  O 
  

   
    "

a    the unauthorized


use, duplication, distribution or sale of
copyrighted software.
a       software that is
manufactured to look like the real thing
and sold as such.

O  O 
  

   
$

a 
  the right to be left alone when
you want to be, to have control over
your own personal possessions, and not
to be observed without your consent.

O  O 
  

   
$

a Email is completely insecure.


a Each email you send results in at least 3 or 4 copies
being stored on different computers.
a You can take measures to protect your email.

O  O 
  

   
$

a   a small record deposited on your


hard disk by a Web site containing
information about you and your Web
activities.
a    software to generate ads that
installs itself on your computer when you
download some other (usually free) program
from the Web.
a O  software you don¶t
want hidden inside software you do want.
O  O 
  

   
$
a m (also called  or
    software that comes hidden in
free downloadable software
± tracks your online movements
± mines the information stored on your computer
± uses your computer¶s PU and storage
a   , or  ,  , a
program, when installed on a computer,
records every keystroke and mouse click.

O  O 
  

   
M|  
% |  M|
& | " 

 

ü Thou shalt not use a computer to harm other people.


ü Thou shalt not interfere with other people's computer work.

ü Thou shalt not snoop around in other people's files.

ü Thou shalt not use a computer to steal.

ü Thou shalt not use a computer to bear false witness.

ü Thou shalt not use or copy software for which you have not paid.

ü Thou shalt not use other people's computer resources without


authorization.
ü Thou shalt not appropriate other people's intellectual output.

ü Thou shalt think about the social consequences of the program


you write.
ü Thou shalt use a computer in ways that show consideration and
respect.
O  O 
  

   
' 

% | " & &( ) *  +,  -%)   
+,../-

‰. be responsible enough not to waste other


people¶s time or bandwidth by posting
unnecessarily long messages or
unimportant messages and sending large
attachments
± Keep your messages to the point  you may
opt to use common abbreviations
± imit the size of attachments to ‰ kb.

O  O 
  

   
' 

2. Promote civility. e pleasant and polite.


Although the Internet advocates freedom
of speech, it does not give anyone the
right to write anything he wants without
minding how it will affect others.
± Avoid using AP OK.
± Minimize the use of exclamation points.
± Use smileys or emoticons when appropriate
± o not use offensive language.

O  O 
  

   
"  

:) Happy face :


creaming
;) Kidding or teasing : isappointed
: aughing hard :'( rying
:I Indifferent. Either way :O urprise or
is O.K. amazement
|O Yawning : Your secret is safe
|I Asleep with me
: ot quite sure about }:) A devil
something O:) An angel
:( rowning ^5 High 5
>:( Angry

O  O 
  

   
"   

a A AIK As ar As I Know a G Grin


a A K Away rom Keyboard a TOMH rom The ottom Of My
a AAP As oon As Possible Heart
a 4 ye or ow a G Good uck
a  e ack ater a WIW or What It's Worth
a R e Right ack a H&K Hug and Kiss
a  e ack oon a G  Gone or ow
a YA ee You (eeya) a HAGU Have A Good 'Un
a U ee You a GMTA Great Minds Think Alike
a T on't et The ed ugs a HIG How's It Going
ite a HAG Have A Good ight
a YA R ee You ater a I I ee
(eeyalata) a HA Have A ice ay
a  ingers rossed a IMHO In My ot o Humble
a 2 ace To ace Opinion
a HT Hi There

O  O 
  

   
"   

a IMO In My onsidered Opinion a KOT Kiss On The heek


a IY I ove You a HO aughing Head Off
a IM I'm orry a  R G R ater 'Gator
a IMHO In My Humble Opinion a O augh Out oud
a K ust Kidding a MO aughing My ocks Off
a IMO In My Opinion a Y4E ove You orever
a IR In Real ife a HMH aughing o Hard My
a IOW In Other Words elly Hurts
a TYK ust To et You Know a ROT  Rolls On The loor
aughing
a 4G ust or Grins
a Y ove Ya
a KIT Keep In Touch
a TO ticking Out Tongue
a MO ust My Opinion KWIM
Know What I Mean a OI Oh, I ee
a KI Keep It imple, tupid a OTOH On The Other Hand
a  R ater

O  O 
  

   
' 

3. Use descriptive subject lines for your


messages as a courtesy to your reader 
to help people organize and prioritize their
messages.
4. et the recipient know who is sending the
message.
± rom: or end your messages with your name
± ignature

O  O 
  

   
' 

5. When forwarding messages:


± heck the reliability of the source of a forwarded
message and the accuracy of the message or story
before passing it on.
a o not unnecessarily alarm people, waste their precious time,
and clog the network.
± lean up your messages before you forward them.
a Take out unnecessary header information and forwarding
symbols (usually the > sign).
a Retain only those that are important to your recipient.
± hoose the recipients of your forwarded message.

O  O 
  

   
' 

º. When replying to a mass email, avoid hitting


Reply to All.
7. When sending mass email, it would be better to
use s (lind arbon opies)
± respect your recipients¶ privacy

a OTE: e careful when corresponding to


strangers on a network.
± o not give out sensitive or personal information to
people you do not personally know.
± e wary of people who give out or lie about their
own information to gain your trust.

O  O 
  

   
AE

discussion points

|    
   |  
    
|
0

You are a unit supervisor. A member of


your unit is out sick and another
member requests a copy of all files from
the sick employee's computer to his so
that he can do some work.

O  O 
  

   
|
,

My brother and I saw this really cool


game being played in the network
gaming shop. We would really like to
get a copy but it costs a lot of money.
My classmate told me that that there is a
website where I can copy it for free.
That way, I can enjoy the game without
having to shell out any money!
"& 111-  - $2 
2*-
% | " & &(   -%)   
+,../-
O  O 
  

   ) *  +, 
|
3

When I went over to ames¶ workstation


to copy a file, I found that he left his
Instant Messenger open. A mutual
friend, who is on the other end, just sent
a message. ince nobody is looking, I
sat down, typed a response, and sent it
pretending to be ames.

"& 111-  - $2 


2*-
% | " & &( ) *  +,  -%)   
+,../-
O  O 
  

   
|
4

I have an English book report due tomorrow,


and I have not even read halfway through the
book. I found a web page that gives a review on
the same book. All I have to do is to copy and
paste the contents of the page onto my word
processor. That would be a lot easier than
finishing the book and writing this entire book
report in one night. My teacher would not know.

"& 111-  - $2 


2*-
% | " & &( ) *  +,  -%)   
+,../-
O  O 
  

   
|
/

espite several warnings, ogs still leaves his


computer account open even if he knows that
another user will be using the same unit
afterwards. Annoyed with his noncompliance, I
decided to move all his documents to another
folder without his knowledge. That would teach
him to close his account.

"& 111-  - $2 


2*-
% | " & &( ) *  +,  -%)   
+,../-
O  O 
  

   
|
5

My friend sent me this really funny story


via email. I decided to change all the
characters¶ names to those of people in
our neighborhood, just for laughs ± and
:d all the people in my Address ook.

"& 111-  - $2 


2*-
% | " & &( ) *  +,  -%)   
+,../-
O  O 
  

   
|
6

anny brags that he can break into any


computer system. He says that it¶s really
fun. He is coaxing me to help him get
into the school¶s main computer to get a
peek at next week¶s exam questions.

"& 111-  - $2 


2*-
% | " & &( ) *  +,  -%)   
+,../-
O  O 
  

   
|
7

I saw this girl enter her password for


email access. ow, I can log in as her
and send hate mail to take revenge
against my enemies.

"& 111-  - $2 


2*-
% | " & &( ) *  +,  -%)   
+,../-
O  O 
  

   
|
8

I used my father¶s credit card, without


his knowledge, to bid on this collector¶s
item tar Wars figurine. I am so happy
because I won the online auction.

"& 111-  - $2 


2*-
% | " & &( ) *  +,  -%)   
+,../-
O  O 
  

   
*

|    
   |  
    

Potrebbero piacerti anche