Computer Ethics

Download Report

Transcript Computer Ethics

What is computer ethics?
 Computer
Ethics is a branch of
practical philosophy which deals with
how computing professionals should
make
decisions
regarding
professional and social conduct.
Some questions in computer
ethics
 Hacking
 Copyright
Infringement of software
 E-democratic technology
Ethical standards
 Association
for Computing Machinery
(ACM) code of ethics
– Ethical behavior among computing
professionals
– Learned society
– Founded in 1947
Computers in the Workplace: Are
They Used Ethically?
 Then
typewriters, filing cabinets, and
correction fluid were the norm.
 Replaced by desktop and portable
computers, database management
systems, and word processing
software.
 Benefits: You are already familiar
with some of the benefits of using
computers in the workplace
Two types:
 Crimes
that target computer
networks or devices directly,
 Crimes facilitated computer networks
or devices, the primary target of
which is independent of the
computer network or device
COMPUTER CRIME
Examples of crimes that primarily
target computer networks or
devices would include,
 Malware (malicious code)
 Denial-of-service attacks
 Computer viruses
Examples of crimes that merely use
computer networks or devices
would include;
 Cyber stalking
 Fraud and identity theft
 Phishing scams
 Information warfare
 Malware,
short for malicious
software, is software designed to
infiltrate a computer system without
the owner's informed consent.
A
denial-of-service attack (DoS
attack) or distributed denial-ofservice attack (DDoS attack) is an
attempt to make a computer
resource unavailable to its intended
users.
 computer
virus is a computer
program that can copy itself and
infect a computer.
 The term "virus" is also commonly
but erroneously used to refer to
other types of malware, adware, and
spyware programs that do not have
the reproductive ability.
 Adware
or advertising-supported
software is any software package
which automatically plays, displays,
or downloads advertisements to a
computer after the software is
installed on it or while the application
is being used.
 Spyware
is a type of malware that
is installed on computers and collects
little bits information at a time about
users without their knowledge
 Cyberstalking
is the use of the
Internet or other electronic means to
stalk someone.
a
fraud is an intentional deception
made for personal gain or to damage
another individual
criminal fraud include :
Banckruptcy fraud
 benefit fraud
 False advertising
 False billing
 False insurance claims
 forgery
 Health fraud
 Identity theft
 Marriage fraud
 taking payment for goods sold online, by
mail or phone, such as tickets, with no
intention of delivering them
 Tax fraud, (tax evasion),

Identity theft
 Five
categories:
– business/commercial identity theft
– criminal identity theft
– financial identity theft
– identity cloning
– medical identity theft
Techniques for obtaining
personal information
Researching about the victim in
government
 Remotely reading information from an
RFID chip on a smart card, RFID-enabled
credit card, or passport.
 Stealing payment or identification cards
 Stealing personal information from
computers and computer databases
 Advertising bogus job offers

 phishing
is
the criminally fraud
process of attempting to acquire
sensitive
information
such
as
usernames, passwords and credit
card details by masquerading as a
trustworthy entity in an electronic
communication.
 Information
warfare is the use
and management of information in
pursuit of a competitive advantage
over an opponent.
– Collection of tactical information,
– Assurance(s) that one's own information
is valid,
– spreading of propaganda or
disinformation to demoralizethe enemy
and the public
Television and radio transmission(s) can
be jammed.
 Television and radio transmission(s) can
be hijacked for a disinformation campaign.
 Logistics networks can be disabled.
 Enemy communications networks can be
disabled.
 Stock exchange transactions can be
sabotaged, either with electronic
intervention, leaking sensitive information
or placing disinformation.

Computer security
 What
is computer security?
 Why should I care about computer
security?
 Who would want to break into my
computer at home?
 How easy is it to break into my
computer?
Information security is concerned
with three main areas:
•Confidentiality - information should be
available only to those who rightfully
have access to it
•Integrity -- information should be
modified only by those who are
authorized to do so
•Availability -- information should be
accessible to those who need it when
they need it
Electronic Commerce Act
 Electronic
commerce, commonly
known as (electronic marketing) ecommerce or eCommerce, consists
of the buying and selling of
products
or
services
over
electronic systems such as the
Internet
and
other
computer
networks
Cybercrimes
The Department of Justice categorizes
computer crime in three ways :
 The
computer as a target
 The computer as a weapon
 The computer as an accessory
Personal responsibility
 Contribute
to society and human
well-being
 Avoid harm to others
 Be honest and trustworthy
 Be fair and take action not to
discriminate
 Honor property rights including
copyrights and patent
 Give
proper credit for intellectual
property
 Respect the privacy of others
 Honor confidentiality
Social network service
A social network service focuses on
building and reflecting of social networks
or social relations among people, e.g.,
who share interests and/or activities.
A
social network service essentially
consists of a representation of each user
(often a profile), his/her social links, and a
variety of additional services.

Philippine
IT Related
Laws
Ten Commandments of
Computer Ethics
Other Emerging Issues
in IT