SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Identify Ethical Use of Computers
Introduction to computers
By Al Forte
According to Dictionary.com, ethics is “a system of moral principles” which leads us to the
understanding that computer ethics would be the system of moral principles regarding all
aspects of computing.
The Ten Commandments of Computer Ethics by the Computer Ethics Institute
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization or
proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are writing or the
system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and respect for
your fellow humans.
Computer Ethics
 Under the umbrella of computer ethics, a
person could easily parse out subcategories
such as:
 Internet Ethics
 Cyber Ethics
 E-Commerce Ethics
 Web Ethics
 Business Computer Ethics
 Consumer Computer Ethics.
Computers in Society
 Computers have inarguably made our lives easier
yet there have been a few drawbacks as well.
 Think about things like privacy,
communication, fraud, bullying, addiction, health,
and employment opportunities before and
after computers.
 How has the mass implementation of technology
affected these topics? Are there solutions to these
issues?
Computer Security
 According to Dictionary.com,
 security is defined
 as the precautions taken
 to guard against
 crime
 attack
 sabotage
 espionage
 Therefore, computer security would be
 the precautions taken
 to guard computers
 and our digital environments.
 The current buzzword for computer security
 cybersecurity
 and before that it was information security,
 sometimes terms are not appropriately
interchangeable.
Let’s begin with
information security.
 According to the SANS institute (SysAdmin, Audit, Network and Security),
 information security refers to the processes and methodologies which are
designed and implemented to
 protect print
 electronic
 any other form of confidential
 private and sensitive information
 or data from
 unauthorized access
 use
 misuse
 disclosure
 destruction
 modification
 or disruption.
 In the simplest terms, this means that a locked door to a file room with both
paper and electronic files is considered information security.
Cybersecurity
is a more defined subset of information security.
 According to National Institute of Standards and Technology (NIST) a unit of the U.S. Commerce
Department
 cybersecurity is
 the prevention of damage to
 protection of
 and restoration of computers
 electronic communications systems
 electronic communications services
 wire communication
 and electronic communication
 including information contained therein
 to ensure
 Its availability
 integrity
 authentication
 confidentiality
 and nonrepudiation (the assurance that a sender cannot deny authenticity).
 Nowadays we have separate focus on different types of information and a much stronger
focus on electronic information.
• Digital ethics and the future of humans in a
connected world.
 The Study guide and test will have questions
regarding this video.
 Watch this video there is a discussion
board where you will need to participate in
 Plus some of the questions in the study
guide come from this video
 Direct video
URL: https://youtu.be/bZn0IfOb61U
Other videos to watch
 Review the videos and article links below while considering these questions.
 Direct video URL: https://youtu.be/tvbU00dpnlg
 What Are the Benefits of Computers in Society?
https://tinyurl.com/yy4fvzby
Disadvantages of Computers in Society
https://tinyurl.com/y3z8tmzf
The Impact of Computers on Employment
https://tinyurl.com/y5j989n8
15 of the most promising jobs in the US in 2019, according to LinkedIn
https://tinyurl.com/yadkdrht
The 25 most in-demand technical skills of 2019, according to LinkedIn
https://tinyurl.com/yypx2zle
There really is no universal standard set by one entity regarding computer
ethics.
There are several professional societies that have created some basic
computer ethics guidelines. (as shown below)
 Association for Computing Machinery (ACM)
ACM Code of Ethics and Professional Conduct
Australian Computer Society (ACS)
ACS Code of Ethics
ACS Code of Professional Conduct
British Computer Society (BCS)
BCS Code of Conduct
Code of Good Practice
Institute of Electrical and Electronics Engineers (IEEE)
IEEE Code of Ethics
IEEE Code of Conduct
Information Technology Alliance (ITA)
Code of Professional Conduct
League of Professional System Administrators (LOPSA)
The System Administrators' Code of Ethics
 Parts of this PowerPoint
 © 2020, Texas Higher Education Coordinating Board
 A project created by ISKME. Except where otherwise noted, content on
this site is licensed under a Creative Commons Attribution-
NonCommercial-ShareAlike 4.0 License.

Weitere ähnliche Inhalte

Was ist angesagt?

ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsMichael Heron
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
computer ethics
computer ethicscomputer ethics
computer ethicsHoney jose
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing professionshahmansoor109
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin itRushana Bandara
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsDyuti Islam
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 

Was ist angesagt? (20)

ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 

Ähnlich wie Identify ethical use of computers

computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The HealthcareTracy Berry
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your futuresuperb11b
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethicssmartinson
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsAmplephi
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
3.0 computer ethic
3.0 computer ethic3.0 computer ethic
3.0 computer ethicfauzihayob
 
PPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptxPPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptxRowellRizalte
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 

Ähnlich wie Identify ethical use of computers (14)

computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
3.0 computer ethic
3.0 computer ethic3.0 computer ethic
3.0 computer ethic
 
PPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptxPPT-ETech-Week 1.pptx
PPT-ETech-Week 1.pptx
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 

Kürzlich hochgeladen

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Kürzlich hochgeladen (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Identify ethical use of computers

  • 1. Identify Ethical Use of Computers Introduction to computers By Al Forte
  • 2. According to Dictionary.com, ethics is “a system of moral principles” which leads us to the understanding that computer ethics would be the system of moral principles regarding all aspects of computing. The Ten Commandments of Computer Ethics by the Computer Ethics Institute 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
  • 3. Computer Ethics  Under the umbrella of computer ethics, a person could easily parse out subcategories such as:  Internet Ethics  Cyber Ethics  E-Commerce Ethics  Web Ethics  Business Computer Ethics  Consumer Computer Ethics.
  • 4. Computers in Society  Computers have inarguably made our lives easier yet there have been a few drawbacks as well.  Think about things like privacy, communication, fraud, bullying, addiction, health, and employment opportunities before and after computers.  How has the mass implementation of technology affected these topics? Are there solutions to these issues?
  • 5. Computer Security  According to Dictionary.com,  security is defined  as the precautions taken  to guard against  crime  attack  sabotage  espionage
  • 6.  Therefore, computer security would be  the precautions taken  to guard computers  and our digital environments.  The current buzzword for computer security  cybersecurity  and before that it was information security,  sometimes terms are not appropriately interchangeable.
  • 7. Let’s begin with information security.  According to the SANS institute (SysAdmin, Audit, Network and Security),  information security refers to the processes and methodologies which are designed and implemented to  protect print  electronic  any other form of confidential  private and sensitive information  or data from  unauthorized access  use  misuse  disclosure  destruction  modification  or disruption.  In the simplest terms, this means that a locked door to a file room with both paper and electronic files is considered information security.
  • 8. Cybersecurity is a more defined subset of information security.  According to National Institute of Standards and Technology (NIST) a unit of the U.S. Commerce Department  cybersecurity is  the prevention of damage to  protection of  and restoration of computers  electronic communications systems  electronic communications services  wire communication  and electronic communication  including information contained therein  to ensure  Its availability  integrity  authentication  confidentiality  and nonrepudiation (the assurance that a sender cannot deny authenticity).  Nowadays we have separate focus on different types of information and a much stronger focus on electronic information.
  • 9. • Digital ethics and the future of humans in a connected world.  The Study guide and test will have questions regarding this video.  Watch this video there is a discussion board where you will need to participate in  Plus some of the questions in the study guide come from this video  Direct video URL: https://youtu.be/bZn0IfOb61U
  • 10. Other videos to watch  Review the videos and article links below while considering these questions.  Direct video URL: https://youtu.be/tvbU00dpnlg  What Are the Benefits of Computers in Society? https://tinyurl.com/yy4fvzby Disadvantages of Computers in Society https://tinyurl.com/y3z8tmzf The Impact of Computers on Employment https://tinyurl.com/y5j989n8 15 of the most promising jobs in the US in 2019, according to LinkedIn https://tinyurl.com/yadkdrht The 25 most in-demand technical skills of 2019, according to LinkedIn https://tinyurl.com/yypx2zle
  • 11. There really is no universal standard set by one entity regarding computer ethics. There are several professional societies that have created some basic computer ethics guidelines. (as shown below)  Association for Computing Machinery (ACM) ACM Code of Ethics and Professional Conduct Australian Computer Society (ACS) ACS Code of Ethics ACS Code of Professional Conduct British Computer Society (BCS) BCS Code of Conduct Code of Good Practice Institute of Electrical and Electronics Engineers (IEEE) IEEE Code of Ethics IEEE Code of Conduct Information Technology Alliance (ITA) Code of Professional Conduct League of Professional System Administrators (LOPSA) The System Administrators' Code of Ethics
  • 12.  Parts of this PowerPoint  © 2020, Texas Higher Education Coordinating Board  A project created by ISKME. Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution- NonCommercial-ShareAlike 4.0 License.