Ethics and Computers - Mrs....

Preview:

Citation preview

Ethics and

Computers

What Is Ethics?

Ethics Ethics are Moral Values

Principles that guide right and wrong behavior. People learn what is ethical

according to their . . .

Community or

Society Professional or

School setting

Individual

Standards

Ethics are Not . . . Laws that have a penalty

Detailed instructions for every possible situation

Flexible and changing depending on each person or situation

Where Did You Get Your Ethics?

• parents • siblings • friends • school • media • society • religion • culture

How Do Ethics Relate To

Rules? Ethics are guiding principles.

Rules are specific and tell you what is right and wrong.

◦When you break a rule or choose to be unethical there are always and will always be consequences and punishments.

◦Rules teach and clarify what behavior is not acceptable.

What are Laws?

Laws are regulations passed and enforced by city, state and federal governments

Are Laws the Same As Ethics?

If not, how are they different?

Is it Legal and Ethical?

Can something be:

◦ Legal and Unethical?

◦ Illegal and Ethical?

◦ Illegal and Unethical?

◦ Legal and Ethical?

One Aspect That Helps

Define Your Character? What you do when no one

is watching.

The concept of character can imply a variety of attributes including:

the existence or lack of virtues such as integrity, courage, fortitude, honesty, and loyalty, or of good behaviors or habits.

Cyber Ethics

Appropriate Electronic Behavior

Why Do People Use the

Internet to Commit Crime?

People tend to feel invisible online

They feel capable of doing things they might not normally do in person or in public

They can commit crime in the comfort of their own home

They assume there are no witnesses

What is Copyright?

Copyright

Copyright is the rights possessed by the owner of information or resources.

Copyright gives the owner the right to:

copy distribute use sell display lease perform rent

Is It Copyrighted?

A book you read for

English class

A drawing your sister

does for your mom

A picture a

photographer takes A piece of music A sculpture in a

museum A software program

like Microsoft Excel A movie you see at a

theater

Your brother’s wedding

video What else can be

copyrighted?

What is Copyrighted? Any original work is copyrighted once it’s in

tangible form. (not an idea)

◦ You can’t copyright thoughts ideas or facts. But, once something it is recorded, it is copyrighted.

If something is registered with the US Copyright Office, you’ll see this symbol ©.

◦ But, this is not required to "own" the copyright. Some people think it's legal to copy software that doesn't have a copyright notice or © symbol or otherwise, but that's not true.

Copyright cont’d Is it okay to copy something that

doesn’t have the © symbol on it?

◦ NO! You still need the permission of the owner.

Remember, any original work in tangible form is automatically protected by copyright.

The © symbol only means that it is registered with the Copyright office.

◦ Copyright lasts for a certain time period after which the work is said to enter the public domain.

Public Domain

These are works that are not covered by intellectual property rights

◦ if the intellectual property rights have expired [1]

◦ and/or if the intellectual property rights are forfeited or unclaimed.[2]

Examples:

◦ The English language

◦ The Works of Shakespeare

Fair Use A doctrine in U. S. copyright law that allows limited

use of copyrighted material without requiring permission from the rights holders, such as for commentary, criticism, news reporting, research, teaching, or scholarship.

To use the work it must be justified under this four-factor balancing test. ◦ Purpose and Character of the Use

What is the intent in using the work? Is it to benefit the public or for personal profit, or commercial use?

◦ Nature of the copyrighted work

◦ The amount and substantiality of the portion used in relation to the copyrighted work as a whole.

◦ The effect it has upon the copyrighted works value.

What are Software

Licenses?

Software Licenses

A legal contract that defines the ways in which you may use a computer program

When you purchase software for the computer, you’re not buying the software itself, but the right to use it (also called a license).

Software Licenses:

Four Types

Public Domain

Freeware

Shareware

All Rights Reserved

Freeware or Open Source

•A freeware software license grants recipients the rights to modify and redistribute the software, which would otherwise be prohibited by copyright law and is really what copyright is all about.

•You get the software for free or sometimes for a small fee.

Often considered Public Domain

Proprietary or Regular

You can purchase, use, and install the full version of software on one or sometimes more computers, but ownership of each copy remains with the software publisher.

Shareware or Trial

You can use the proprietary software on a

trial basis and purchase it at the end of the

trial period. (Some features may be disabled until you

purchase the full version.)

End-User License

Agreement (EULA)

2.1 General Use. You may install and use one copy of the Software

on up to the Permitted Number of your compatible Computers.

I Agree When you install the program, you agree to abide

by the EULA, a legally-binding contract.

Copyright Infringement

- Piracy Stealing intellectual property

Making illegal copies of CDs, movies, software, pictures, etc. is called Piracy.

Piracy is a federal crime with serious penalties.

Conviction of a FIRST offense can result in a fine up to $250,000 and a jail sentence of up to five years.

Vandalism

Attempts to harm or destroy data or hardware of another user, agency, or network

You can be prosecuted to the full extent of the law

Nuisance or Harassment

Definition: Use of a computer or computer network to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language, or make any suggestion or proposal of an obscene nature, or threaten any illegal or immoral act.

It doesn’t matter if your intention was to be funny or friendly or something else. If the person you contact through the Internet is uncomfortable, it’s illegal

Cyber Bullying Definition: “When somebody is repeatedly

'tormented, threatened, harassed, humiliated, embarrassed, or otherwise targeted' by another person using text messaging, e-mail, instant messaging or any other type of communication technology."

It can be as simple as continuing to send e-mail to someone who has said they want no contact with the sender

But it may also include threats, sexual remarks, hate speech, and ganging up on victims by making them the subject of ridicule and posting false statements as fact aimed at humiliation.

Cyber Bullying Kids report being mean to each other online

beginning as young as 2nd grade.

According to research, boys initiate mean online activity earlier than girls do.

However, by middle school, girls are more likely to engage in cyber bullying than boys do.

Cyberstalking

Definition: Using the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization.

Cyberstalking Cyberstalkers meet or target their victims

using search engines, online forums, bulletin and discussion boards, chat rooms, and more recently, through online communities such as MySpace; Facebook; Bebo; Friendster; and Indymedia, a media outlet known for self-publishing.

They may engage in live chat harassment or flaming or they may send electronic viruses and unsolicited e-mails.[11] Victims of cyberstalking may not even know that they are being stalked.

Computer Hacking or

Security Cracking A hacker is a person

who breaks into computers and computer networks either for profit or motivated by the challenge [12]

Plagiarism: Why Should I

Cite Electronic Sources?

Plagiarism “Use or close imitation of the language and

thoughts of another author and the representation of them as one's own original work.” [1]

People who create “intellectual property” need to be given credit for their efforts

This applies to: ◦ music ◦ writing ◦ art ◦ designs ◦ ideas

Citing Electronic Sources

Is it okay to use other people’s information without giving them credit?

No. Give credit where credit is due!

Citing Sources

You are allowed to paraphrase or quote if you don’t change the meaning, but you must give proper credit to the author. (Create a References or Works Cited page).

What is an AUP?

Acceptable Use Policy

An Acceptable Use Policy or AUP is a policy that is established by the computer owners regarding acceptable use of that computer.

Purpose of an AUP

Set of Rules applied by the owner/manager of a network, website, or a large computer system that restrict the ways in which the network site or system may be used.

UHS’s AUP

UHS has an Acceptable Use Policy.

You and your parent/guardian signed the AUP

giving you access to the Internet and school’s

computers.

What Did I Agree To?

1. Acceptable Use of the School Computers/Internet

2. Ethical Conduct

What Did I Agree To?

Specific “Dos” Use computers for school-related assignments

Follow basic netiquette

Specific “Don’ts” Do not access chat rooms, personal email, or Instant Messenger

Do not access or distribute inappropriate materials (pornography, obscene, or threatening material)

Do not engage in illegal activities

Do not change settings/configuration of computer

Acceptable Use Policy

Computer use is a privilege, not a right. ◦ Remember, you did not buy the computer

you use at school.

◦ You can lose your computer privileges if you misuse them.

What is Private and

Public Information?

Public vs. Private Info.

Public Information

◦ Information that can be used without permission.

Private Information

◦ Information that cannot be used without your permission.

Public or Private?

Public Private

Full Name

Phone Number Home Address

Grades Medical Records

Is It Ethical?

April April found some great

information on the Internet for her report. She only paraphrased a small amount of the material and doesn’t want to cite the source. Is this ethical?

NO! This is called plagiarism. You have to give credit where it’s due.

Tyler

Tyler likes his friend Bill’s computer game. Tyler borrows it from Bill to install it on Tyler’s computer at home. Is this ethical?

No! Most software license agreements allow software to be installed on only one computer at a time.

Todd

Todd copied images off of a freeware clip art site to put on his own homepage. Is it ethical?

Yes! But Todd should see if the site requires anything. Some ask that you provide a link back to their clip art site.

Lynn

Lynn downloaded some songs for free from U2s latest CD from a file-sharing server on the Internet. Is it ethical?

No, Downloading copyrighted material without permission/purchasing it is unethical and illegal.

Rick Rick got a list of

written ideas for a new computer program from his coworker, Jason. Jason gave Rick permission to share the ideas at a company meeting. Is it ethical?

YES. Rick had Jason’s

permission to use the

information.

• Charlene bought some songs from iTunes and then burned them onto CDs to give to her three best friends. Is it ethical?

Charlene

NO! You can make one backup copy of a song or CD, but that backup copy is not to be distributed to anyone else, including family and friends.

Be Ethical

Decide today to always make ethical choices when using a computer.

Don’t we wish everyone did?

Works Cited Page 1. qtd. in Stepchyshyn, Vera; Robert S. Nelson (2007). Library plagiarism

policies. Assoc of College & Resrch Libraries. p. 65. ISBN 0838984169.

2. BIS 1400 Materials. Utah State University

3. http://www.download.com

4. US Copyright Office

5. http://www.adobe.com 6. http://www.channelone.com/news/2003/09/04/file_swappers/index.ht

ml 7. Clipart from the Microsoft Office XPsuite 8. Megan Hansen. “Ethics and Copyright” presentation 9. Copyright Basics ·2002, the term of copyright will not expire before

December 31, 2047. 10. "Fair Use." Wikipedia, the Free Encyclopedia. Web. 07 June 2010.

http://en.wikipedia.org/wiki/Fair_Use . 11. The National Center for Victims of Crime.

http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32458

12. ^ a b Sterling, Bruce. "Part 2(d)". The Hacker Crackdown. McLean, Virginia: IndyPublish.com. p. 61. ISBN 1-4043-0641-2.

Recommended