15
LEARNING AREA 1 Information and Communication Technology and Society 1.2 Computer Ethics and Legal Issues

la1 ppt

Embed Size (px)

DESCRIPTION

presentaion

Citation preview

Page 1: la1 ppt

LEARNING AREA 1

Information and Communication Technology and Society

1.2 Computer Ethics and Legal Issues

Page 2: la1 ppt

1.2.1 Definition1.2.1.1 Define Computer ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law

1.2.1.2 Differentiate between ethics and law

1.2.1.3 State the need for intellectual property laws

Page 3: la1 ppt

1.2.1.1

Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law

Page 4: la1 ppt

Computer Ethics

Is a system of moral standards or moral values used as a guideline for computer users.

Page 5: la1 ppt

Code of EthicsA written set of guidelines issued by an organization to its workers and management to help them conduct their action in accordance to its primary values and ethical standards.

Page 6: la1 ppt

Intellectual Property

Is the property that results from original creative thought, as patents, copyright material, and trademarks.

Page 7: la1 ppt

Privacy

Is the right of individuals and companies to deny or restrict the collection and use of information about them.

Page 8: la1 ppt

Computer Crime

Are any illegal acts that involves computers.

Page 9: la1 ppt

Cyber Law

Is any law relating to protect the Internet and other online communication technology.

Page 10: la1 ppt

1.2.1.2 Differentiate between Ethics and Law

As a guideline to computer users.

As a rule to control computer users.

Computer users are free to follow or ignore the code of

ethics.Computer users must follow

the regulations and law.

Universal, can be applied anywhere, around the world.

Depends on the country and state where the crime is

committed.

To produce ethical computer users.

To prevent misuse of computers.

Not following the code of ethics are considered immoral.

Disobeying the law is considered a crime.

Page 11: la1 ppt

1.2.1.3 State the Need for Intellectual Property

LawThere are four different types of Intellectual Property protection. They are patents for invention, trademarks for brand identity, designs for product appearance and copyright for material. Intellectual property law is needed for:

• to establish and safeguard the intellectual property which refers to work created by inventors, authors and artists.

•as business today continues to expand globally.

Page 12: la1 ppt

1.2.2 Privacy

1.2.2.1 Ways to protect privacy.

1.2.2.2 Authentication and verification methods/technologies.

Page 13: la1 ppt

1.2.2.1 Ways to protect privacy

Privacy can be protected by privacy law and utilities software.

(a) Privacy law - Malaysia emphasises on the following:

• Security services to review the security policy.

• Security Management to protect the resources.

• Security Mechanism to implement the required security services.

• Security Objects, the important entities within the system environment.

(b) Utilities software

Example: anti-spam program, firewall, anti-spyware and antivirus.

Page 14: la1 ppt

1.2.2.2 Authentication and Verification

Methods/TechnologyMethods of AuthenticationTwo commonly used methods are biometric device and callback system.

• Biometric device is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. Biometric devices include Fingerprint Recognition, Facial Recognition, Hand Geometry, Iris Scanning, Retinal Scanning, Voice Recognition & Signature Verification.

• Callback system refers to the checking system that authenticates the user.

Page 15: la1 ppt

Methods of VerificationThere are two methods used, which are user identification and

processed object.

• User identification refers to the process of validating the user.

• Processed object refers to something the user has such as identification card, security token and cell phone.