understand ethics and security in the programming process

26
Understand Ethics and Security in The Programming Process

Upload: d-casey-robertson

Post on 06-May-2015

529 views

Category:

Education


3 download

TRANSCRIPT

Page 1: Understand Ethics and Security in the Programming Process

Understand Ethics and Security in The Programming Process

Page 2: Understand Ethics and Security in the Programming Process

“Dealing with ethical problems aggravated, transformed or created by computer technology”

- Computer Ethics in the Computer Science Curriculum

What is Computer Ethics?

Page 3: Understand Ethics and Security in the Programming Process

ACM – Association for Computer Machinery

Centre for Computing and Social Responsibility The Research Center on Computing & Society

Organizations

Page 4: Understand Ethics and Security in the Programming Process

Ethical Considerations

Page 5: Understand Ethics and Security in the Programming Process

Due to the computer’s ability to store and manipulate large amounts of information

Information Age

Page 6: Understand Ethics and Security in the Programming Process

Do not attempt to access the account of another user without authorization

Do not share your password – change it periodically

Use appropriate subject matter and language, and be considerate of other people’s beliefs and opinions.

Netiquette

Page 7: Understand Ethics and Security in the Programming Process

Ethical issue

Computers record transactions, calls, etc. (These records can be used to learn a lot about you.)

Because of privacy issues, many laws have been passed.

Privacy

Page 8: Understand Ethics and Security in the Programming Process

Marketing technique where data is collected about customers visiting a website

Online Profiling

Page 9: Understand Ethics and Security in the Programming Process

Text file created by the server computer when a user enters information into a website. (not a delicious treat)

Cookie

Page 10: Understand Ethics and Security in the Programming Process

Tiny, transparent graphics located on web pages or in e-mail message that are used in combination with cookies to collect data about web page users or email senders

Web Beacon

Page 11: Understand Ethics and Security in the Programming Process

Legally binding document that explains how any personal information will be used.

Privacy Policy

Page 12: Understand Ethics and Security in the Programming Process

Information Technology Laws in the

United States

Page 13: Understand Ethics and Security in the Programming Process

Technology Laws

• Identity Theft Penalty Enhancement Act of 2004

• Federal Information Security Management Act of 2002 (FISMA)

• Consumer Credit Reporting Reform Act of 1996

• Privacy Act of 1974

• Right to Financial Privacy Act of 1978

• Electronic Communications Privacy Act of 1986 (ECPA)

• Electronic Freedom of Information Act of 1996

• Children’s Online Privacy Protection Act of 1988 (COPPA)

• Safety and Freedom through Encryption Act of 1999 (SAFE)

• Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001

Page 14: Understand Ethics and Security in the Programming Process

Implications of Computer Use

Page 15: Understand Ethics and Security in the Programming Process

The science that studies safe work environments.

Repetitive stress injuries, eye strain, etc.

Ergonomics

Page 16: Understand Ethics and Security in the Programming Process

Power & paper waste

Disposal of outdated hardware

Environmental Concerns

Page 17: Understand Ethics and Security in the Programming Process

Issues with computers in the workplace

Employee Monitoring

Page 18: Understand Ethics and Security in the Programming Process

Identity theft

Invasion of Privacy

Page 19: Understand Ethics and Security in the Programming Process

Protection of SOFTWARE

& DATA

Page 20: Understand Ethics and Security in the Programming Process

Protection of digital information

NET (No Electronic Theft) Act of 1997

• Protects against copyright infringement

Copyright

Page 21: Understand Ethics and Security in the Programming Process

Illegal copies being distributed.

Piracy

Page 22: Understand Ethics and Security in the Programming Process

Program or series of instruction that can replicate without the user’s knowledge

Trojan Horse » Appears as something else

Worm » Program that is able to reproduce itself over a network

Virus

Page 23: Understand Ethics and Security in the Programming Process

Install on computers to detect and remove code before it can replicated or damage data

Antivirus-Programs

Page 24: Understand Ethics and Security in the Programming Process

Update virus software

Do not open email attachments without scanning.

Precautions to Take

Page 25: Understand Ethics and Security in the Programming Process

Illegal act to gain access to large computer systems to perform acts of vandalism.

Electronic Communications Privacy Act of 1986 makes it a federal offense.

Most networks have a firewall to prevent this type of access.

Crackers, Hackers

Page 26: Understand Ethics and Security in the Programming Process

Act of sending an email to a user falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes like identity theft.

Phishing