[go: up one dir, main page]

0% found this document useful (0 votes)
54 views19 pages

Lecture 10 Computer Ethics and Management

The document discusses assessment methods for a course including quizzes, assignments, projects, tests and a final exam. Students must pass both continuous and written assessments to pass the module. If a student fails continuous assessment they fail the module, if they fail the written assessment they can resit the final exam, and if they fail both they must retake the module.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views19 pages

Lecture 10 Computer Ethics and Management

The document discusses assessment methods for a course including quizzes, assignments, projects, tests and a final exam. Students must pass both continuous and written assessments to pass the module. If a student fails continuous assessment they fail the module, if they fail the written assessment they can resit the final exam, and if they fail both they must retake the module.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Assessment Methods and Types

Quizzes - 10%
Assignments - 30%
Project - 10%
Tests - 20%
Final Exam - 30%
• Compulsory to pass BOTH continuous assessment & written
assessment to pass the module.

• If you fail:
1. Continuous Assessment > you fail the whole module and have to
retake the module.
2. Written Assessment > you are allowed to re-sit the final exams.
3. BOTH > you fail the whole module and have to retake the module.
> CHANGE, EVERYDAY
Topic 1: What is Computer Ethics
What is Computer Ethics?
Ethics is a set of moral principles that govern the behaviour of a
group or individual.
Therefore, computer ethics is set of moral principles that regulate
the use of computers.
Some common issues of computer ethics include intellectual
property rights (such as copyrighted electronic content), privacy
concerns, and how computers affect society.
For example, while it is easy to duplicate copyrighted electronic
(or digital) content, computer ethics would suggest that it is wrong
to do so without the author's approval.
And while it may be possible to access someone's personal
information on a computer system, computer ethics would advise
that such an action is unethical.
> CHANGE, EVERYDAY
What are the concerns related to Computer Ethics

> CHANGE, EVERYDAY


Some areas related to Computer Ethics
• Hacking
• Malware
• Data Protection
• Anonymity
• Copyright
• Plagiarism
• Cracking
• Software license
• Jobs
• Environmental impact
• Social impact
> CHANGE, EVERYDAY
Computer Ethics
When computers first began to be used in society at large, the
absence of ethical standards about their use and related
issues caused some problems.
However, as their use became widespread in every facet of
our lives, discussions in computer ethics resulted in some kind
of a consensus. Today, many of these rules have been
formulated as laws, either national or international.
Computer crimes and computer fraud are now common terms.
There are laws against them, and everyone is responsible for
knowing what constitutes computer crime and computer
fraud.
The Ten Commandments of computer ethics have been
defined by the Computer Ethics Institute.
> CHANGE, EVERYDAY
Ethical responsibilities of IT professionals
What are your responsibilities as an IT professional?

Sources of Ethical guidance for IT professionals

Real world ethical dilemmas for IT professionals

> CHANGE, EVERYDAY


Types of Information Technology Professionals
IT professionals include many different job titles for professionals that
focus their efforts in one area of IT. All of these professionals have their
own specific job duties that work in conjunction with other IT
professionals to maintain an organization's computer systems. Some of
these job titles may include:
Computer and information systems manager
Computer support specialist
Computer programmer
Network and computer systems administrator
Web developer
Computer network architect
Database administrator
Information security analyst
Computer systems analyst
Software developer
> CHANGE, EVERYDAY
Privacy and Personal information
What is personal information?
Types of personal information.
What is Privacy?
Laws dealing with privacy and data protection.

> CHANGE, EVERYDAY


What is personal information?
Personal information includes
a broad range of information,
or an opinion, that could
identify an individual.
What is personal information
will vary, depending on
whether a person can be
identified or is reasonably
identifiable in the
circumstances.

> CHANGE, EVERYDAY


Data privacy
Data privacy (or information privacy or data protection) is
about access, use and collection of data, and the data subject’s
legal right to the data.
This refers to:
• Freedom from unauthorized access to private data
• Inappropriate use of data
• Accuracy and completeness when collecting data about a
person or persons (corporations included) by technology
• Availability of data content, and the data subject’s legal right
to access; ownership
• The rights to inspect, update or correct these data

> CHANGE, EVERYDAY


Freedom of speech in Cyberspace
The meaning of free speech and its importance in a
democratic society
Do we need to restrict access to some resources available
online?
Can Government intervene in case of abuse?

> CHANGE, EVERYDAY


What is Freedom of speech?
Freedom of speech is a principle
that supports the freedom of an
individual or a community to
articulate their opinions and
ideas without fear of
retaliation, censorship, or legal
sanction.
The term "freedom of
expression" is sometimes used
synonymously but includes any
act of seeking, receiving, and
imparting information or ideas,
regardless of the medium used.

> CHANGE, EVERYDAY


What is Cyberspace?
Cyberspace refers to the virtual computer world, and more
specifically, is an electronic medium used to form a global computer
network to facilitate online communication.
It is a large computer network made up of many worldwide
computer networks that employ TCP/IP protocol to aid in
communication and data exchange activities.
Cyberspace's core feature is an interactive and virtual environment
for a broad range of participants.
Cyberspace allows users to share information, interact, swap ideas,
play games, engage in discussions or social forums, conduct
business and create intuitive media, among many other activities.
The term cyberspace was initially introduced by William Gibson in
his 1984 book, “Neuromancer.”
> CHANGE, EVERYDAY
Intellectual Property and computer software
industry
What is the Intellectual property right of a software?
How to protect the Intellectual property right of a software?
Patents and Copyrights in regards to computer software
Laws governing the intellectual property of a computer
software.

> CHANGE, EVERYDAY


What is the Intellectual property right of a software?
Intellectual property rights (IPR) is
the term applied to the legal
protection afforded to innovative
and creative materials. The
intention is to allow the owner of
IPR to gain from the use of the
material and thereby to encourage
innovation and creativity.
IPR can be thought of as property
and can be bought and sold.
Owning IPR in material gives the
owner a monopoly for a period of
time. IPR legislation has evolved
over many years. There are
consequently a number of
overlapping categories.

> CHANGE, EVERYDAY


The essential categories of Intellectual Property Rights are:
• copyright;
• patent;
• design rights;
• trade marks.
In addition there are other forms of IPR protection including:
• database rights;
• internet domain names.

> CHANGE, EVERYDAY


Security in Cyberspace
What are the security concerns in cyberspace?
What is the scale of cyber threats?
Types of cyber threats
Latest trends in cyber threats
Safety tips to protect yourself against cyber-attacks.

> CHANGE, EVERYDAY


What are the security concerns in cyberspace?
The objective of Cybersecurity is to protect information from
being stolen, compromised or attacked. Cybersecurity can be
measured by at least one of three goals-
Protect the confidentiality of data.
Preserve the integrity of data.
Promote the availability of data for authorized users.

> CHANGE, EVERYDAY


What is the scale of cyber threats?
Types of cyber threats
Latest trends in cyber threats
Safety tips to protect yourself against cyber-attacks.

> CHANGE, EVERYDAY

You might also like