issues in computing 1 ssk3000 information technology and its application

64
Issues in Computing 1 SSK3000 Information Technology and Its Application

Upload: delilah-burke

Post on 27-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Slide 1

Issues in Computing1SSK3000Information Technology and Its Application

1SSK3000CHAPTER 7Issues In Computing

Main issuesComputer ethicsComputer crimesCurrent issues2SSK30002SSK3000Introduction3SSK3000Is a moral guide towards the use of computer and information systemComputers are everywhereAnytime, anywhere computingStandard that determines whether an action is good or bad in regards with the computerComputer system are getting smaller, faster and more capableIssues related to IT:How does the technology actually work?What part of our lives are affected?What are the major issues being discussed today?The phrase "anytime, anywhere computing" has become a commonplace.3SSK3000CHAPTER 7Issues In Computing

Main issuesComputer ethicsComputer crimesCurrent issues44SSK3000Intellectual Property Rights5SSK3000Intellectual Property (IP) refers to unique and original worksRefers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce, ideas, logos

Intellectual Property Rights (IPR) are the rights to which creators are entitled for their workHarta intelekMain issues many of these works are available digitally5SSK3000Intellectual Property Rights6SSK3000Three main types:CopyrightsTrademarksPatents

6SSK3000Intellectual Property Rights7SSK3000Copyrights

Form of protection available to the creator of an original artistic or literary workExclusive right to publish, reproduce, distribute, perform, or display the workAnyone wishing to use copyrighted materials must first obtain permission from the copyright holder and pay any required feeSome uses do not require permission e.g. non-profit research, private study & review (with conditions)Known as the concept of fair dealing/fair useCopyright is a form of protection provided to the authors of "original works of authorship" including literary, dramatic, musical, artistic, and certain other intellectual works, both published and unpublished.

fair use is a defense against a claim of copyright infringement (perlanggaran hak cipta)

copyright infringement = piracy7SSK3000Intellectual Property RightsTypes of work that can be copyrightedArchitectureArtAudiovisual worksChoreographyDramaGraphicsLiterature Motion pictures

8SSK30008SSK30009

Intellectual Property Rights10SSK3000Trademarks

Word, phrase, symbol or design (or a combination) that identifies and distinguishes one product or service from anotherTrademarks that are claimed but not registered use the mark TMRegistered trademarks use the symbol A trademark is a word, name, symbol or device which is used in trade with goods to indicate the source of the goods and to distinguish them from the goods of others

The purpose of a trademark is to protect words, phrases and logos used in federally regulated commerce to identify the source of goods and/or services

A servicemark is the same as a trademark except that it identifies and distinguishes the source of a service rather than a product10SSK3000Intellectual Property Rights11SSK3000Patents

Protects inventions by granting exclusive rights of an inventions to its inventor for a period of 20 yearsA patented invention is typically a unique productCan also protect a business practice or procedurePriceLine.coms name-your-own-priceAmazon.coms one-click purchase

Expensive to get but can be very lucrative (menguntungkan)

A patent for an invention is the grant of a property right to the inventor, issued by the Patent and Trademark Office

Lucrative: menguntungkan

A patent owner has the right to use the patented invention, or may license to other parties to use the invention, or sell the right of the invention to someone else who will then become the new owner of the patent. 11SSK3000Intellectual Property RightsOther types of intellectual property rights:Industrial designGeographical indications

More on IP in Malaysia, refer http://www.myipo.gov.my/(Official website of Intellectual Property Corporation of Malaysia)

12SSK300012SSK3000CHAPTER 7Issues In Computing

Main issues done!Computer ethicsComputer crimesCurrent issues1313SSK3000Computer Ethics14SSK3000Ethics, nounpertaining to right or wrong in conduct

Ethical, adjin accordance with the rules or standards for right conduct or practice, especially the standards of a professionthe rules of conduct recognized in a particular class of human actions- Moral guidelines that govern the use of computers and IS.14SSK3000Ethical PrinciplesThe overriding principles (prinsip2 utama) are fairnessintegrityopennessresponsibilitycommitment to accuracy and truthMembers of a profession should act always for the maintenance for the community, rather than for sectional interests15SSK3000Fairness : ancient Greek philosopher Aristotle said that "equals should be treated equally and unequals unequally." The basic moral question is How fair is an action? Does it treat everyone in the same way, or does it show favoritism and discrimination?

Integrity : Holding yourself to a higher standard of honesty, loyalty and empathy. The best way to live your life is by always treating everyone as you would want them to treat you.

Openness : is the companion virtue to loyalty (keterbukaan teman kepada kesetiaan). A relationship between loyalty and openness as moral values.

Responsibility : means fulfilling obligations (tanggungjawab) in all ethical areas, or as many areas as possible. When an ethical dilemma occurs, involved individuals must choose between a wide variety of ethical principles and weigh which ones should be emphasized

Commitment : like a duty, or a moral obligation. You are bound to the morals you go by15SSK3000Ethical PrinciplesThis includes the exposure of hypocrisy, falsehoods or double standardsMembers should seek to present fair, balanced and accurate materialConfidentiality must be protected at all costs16SSK3000Hypocrisy kepura-puraanFalsehoods - kepalsuan16SSK3000Ethical PrinciplesFair and honest means should be used to obtain material, including information. Misrepresentations and the use of concealed equipment or surveillance devices should be avoidedMembers of an organization should have equal opportunity to develop their skillsThe employer organization is obliged to provide a healthy and safe working environment17SSK3000- Misinterpretation gambaran yg salah17SSK3000Ethical PrinciplesActivities outside work hours may be seen to have an impact on the individuals or the employer organizationNo person should be harassed or discriminated against on grounds of gender, color, race, nationality, religious belief, impairment, age, height, weight, marital status, appearance or sexual preferenceManagers or others with access to personal information relating to other members are required to treat such information as confidential, and not to disclose such information except in the course of discharging formal responsibilities18SSK300018SSK3000Ethical PrinciplesMembers should not use their position to obtain private benefit for themselves or othersMembers should not be influenced by family or other personal relationshipsMembers should be alert to conflict of interests which may arise and declare to a senior person or officer any real or perceived conflict of interest which arises or is foreseen19SSK300019SSK3000Ethical PrinciplesMembers engaged in the development of software or hardware or communications or other Information Technology facility and who believe they have a interest on such development, maintenance, or installation should acknowledge such interestMembers in doubt as to whether a conflict of interest exists should consult a senior officerNo payment, gift or other advantage which may be seen to undermine accuracy, fairness or independence is to be accepted20SSK300020SSK3000Ethical PrinciplesOther peoples material is not to be reproduced without reference and acknowledgementThe source of material obtained form another organization should be acknowledged21SSK300021SSK3000Plagiarism

2222SSK3000Plagiarism Detection Services and Software Name of serviceProvideriThenticateiParadigmsTurnitiniParadigmsGlatt Plagiarism ServicesGlatt Plagiarism Services

EVE Plagiarism DetectionCaNexus23SSK300023SSK3000Plagiarism Detection Services and Software 24SSK3000

24SSK3000Computer Ethics25SSK3000are the moral guidelines that govern the use of computers and information systemsInformation accuracy is a concernNot all information on the Web is correct

Super imposed photo

25SSK3000Codes of Conduct26Discovering Computers 2012: Chapter 11

Page 583Figure 11-29An IT code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical3. Meddle - mencampuri26SSK3000CHAPTER 7Issues In Computing

Main issues done!Computer ethics done!Computer crimesCurrent issues2727SSK3000Computer CrimesComputer crimes occur when intruders gain unauthorized access to computer systemsCybercrime is crime carried out over the InternetCyber law tracks and combats computer related crimeTypes of Computer CrimeIdentity TheftCreating and disseminating computer virusMore Rogue ProgramsFraud and TheftForgeryBlackmail28SSK3000

Disseminating menyebarkanRogue penipu/bangsatFraud penipuanForgery pemalsuanBlackmail peras ugut28SSK3000Computer Crimes29SSK3000Identity theft

The concept is simple: someone gains access to your personal information and uses it for their own benefitExample: a criminal obtains enough information about you to open a credit card account in your name and charge items to that accountA phisher poses as legitimate company in an email or on a website in an attempt to learn personal information such as your IC, user name, password and account numbers29SSK3000Computer Crimes30SSK3000

30SSK3000Computer Crimes31SSK3000Creating and disseminating computer viruses or worms

A computer viruses are malicious programs that infect a computer system causing various problems with its useViruses replicate and attach themselves to programs in the systemWorms travel between systems through networks

Worms attempt to travel between systems through networks to spread their infections. A virus infects a host file and waits for that file to be executed on another computer to replicate. A worm, however, works independently of host file execution and is much more active in spreading itself. 31SSK3000Computer Crimes32SSK3000

- Unscrupulous tak bertanggungjawab32SSK3000Computer Crimes33SSK3000Type of viruses:File InfectorsAttach themselves to program filesSpread to other programs on the hard driveAre the most common type of virusBoot Sector VirusesAttach themselves to the boot sector of a hard driveExecute each time the computer is startedMay lead to the destruction of all data

Boot sector - is a region of a hard disc, floppy disc, optical disc, or other data storage device that contains machine code to be loaded into RAM by a computer systems built-in firmware. A boot sector virus is spread via infected floppy disks33SSK3000Computer Crimes34SSK3000Macro virusesInfect the automatic command capabilities of productivity softwareAttach themselves to the data files in word processing, spreadsheet, and database programsSpread when the data files are exchanged between users

Macro viruses tend to be surprising but relatively harmless. A typical effect is the undesired insertion of some comic text at certain points when writing a line. A macro virus is often spread as an e-mail virus. A well-known example in March, 1999 was the Melissa virus virus.34SSK3000Computer Crimes35SSK3000More rogue programsTime BombsAlso called logic bombsHarmless until a certain event or circumstance activates the programWormsResemble a virusSpread from one computer to anotherControl infected computersAttack other networked computersA logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger), should they ever be terminated from the company.35SSK3000Computer Crimes36SSK3000Denial of Service Attack (DoS)Also called Syn floodingOverload an Internet server with a large number of requests, either slowed or crashes the server completelyOften the attacks are coordinated automatically by botnetsA botnet is a group of compromised computers connected to a networkA compromised computer is known as a zombie

Example- fb. Some id is zombie, being used to spread unwanted post36SSK3000Computer Crimes37SSK3000Trojan HorsesDisguise themselves as useful programs such a game or a utility programContain hidden instructionsMay erase data or cause other irreparable damageA rootkitProgram that hides in a computer and allows someone from a remote location to take full controlA rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executables. Rootkits allow viruses and malware to hide in plain sight by disguising as necessary files that your antivirus software will overlook. Rootkits themselves are not harmful; they are simply used to hide malware, bots and worms. Rootkits get their name from the Unix term for the primary administrator account called root and kits37SSK3000Computer Crimes38SSK3000Backdoor programA program or set of instructions in a program that allow users to bypass security controls.

38SSK3000Computer Crimes39SSK3000Fraud and TheftSelling social security numbersMemory shaving taking RAM chips from computersSalami ShavingProgrammer alters a program to take a small amount of money out of an accountMaking and digitally distributing child pornographyFraud penipuan

39SSK3000Computer Crimes40SSK3000Forgery and BlackmailForgeryInternet data can appear to be coming from one source when its really coming from anotherForged e-mail and Web pagesA spoofing is a technique intruders use to make their network or Internet transmission appear legitimateBlackmailAdverse publicity fearsForgery pemalsuanBlackmail peras ugut 3gp pornography40SSK3000Computer Crimes41SSK3000

Source:Evans et al. 2011. Technology in action. 7th ed.41SSK3000Computer Crimes The criminals42SSK3000Meet the criminals:Hackersgain unauthorized access to computer or telecommunications systemsComputer hobbyists Find weaknesses and loopholes in computer systemsRarely destructiveAdhere to the hackers code of ethics42SSK3000Computer Crimes The criminals43SSK3000Crackersillegally break into computers for malicious purposesAlso called black hats Obsessed with entering secure computer systemsRarely destructiveLeave calling cards on the systems they enter43SSK3000Computer Crimes The criminals44SSK3000Cyber GangsBring crackers together by way of the Internet and meetings

Script KiddiesAmateur hackers Script kiddies dont create programs used to hack into computer systems; instead, they use tools created by skilled hackers.

44SSK3000Computer Crimes The criminals45SSK3000Virus AuthorsPush the boundaries of antivirus softwareCreate viruses that are very damaging

Corporate SpyHired to break into specific computer and steal its proprietary data and information or help identify security risks in their own organizationCorporate espionage to gain competitive advantage

45SSK3000Computer Crimes The criminals46SSK3000Cyber ExtortionistSome one who uses email as vehicle for extortionSend threatening email message if they are not paid a sum of money

Cyber TerroristSome one use internet or network to destroy or damage computers for political reasonsExample: target the nations air traffic control system, electricity generating companies or a telecommunication infrastructurecyber warfare

Pemeras siberpengganas siber46SSK3000Computer Crimes The criminals47SSK3000EmployeesSabotage their companys computer systemCreate security holes called trap doors

SwindlersUse the Internet to scam money from peopleUse scams like rip and tear, pumping and dumping, and bogus goods

Swindlers penipu

47SSK3000Computer Crimes Tips48Users can take several precautions to protect their home and work computers and mobile devices from these malicious infections

48SSK3000Computer Crimes Tips49SSK3000To protect a computer from power-related problems you should:Use programs that have an auto save/auto recovery functionEquip the system with an uninterruptible power supply, a battery-powered device that automatically turns on when the power is interrupted49SSK3000Computer Crimes Tips50SSK3000To control access to a computer:Use authentication passwords Use callback systems Use know & have authentication Tokens Electronic devices that generate a logon codeSmartcards Credit card-sized devices with internal memoryBiometric authentication Voice recognition, retinal scans, thumbprints, and facial recognitionCallback system - Security measure permitting entry into a computer system only by returning a user's log-in call from a specific terminal.50SSK3000Computer Crimes Tips

51SSK3000Using FirewallFirewalls are programs that are designed to prohibit outside sources from accessing the computer systemA personal firewall is designed to protect home computers from unauthorized access while being connected to the Internet51SSK3000Computer Crimes Tips52Install intrusion detection software and set up a honeypotA honey pot is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. (This includes the hacker, cracker, and script kiddy.)52SSK3000CHAPTER 7Issues In Computing

Main issues done!Computer ethics done!Computer crimes done!Current issues53SSK300053SSK3000Current Issues54SSK3000Environmental Problems

Manufacturing by-products - exposing semiconductor industry workers to a variety of hazardous toxinsDisposal by-products - e-waste - obsolete or broken PCs, monitors, printers, cell phones, TVs and other electronicsEnvironmental blight - visual pollution represented by wireless towers, roof antennas, satellite dishes, and all the utility poles topped with transformers and strung with electric, phone, cable-TV, and other wiresPossible risks of nanotechnology - manipulating materials such as carbon, zinc, and gold at molecular levelBlight - binasa54SSK3000Current Issues55SSK3000Mental/Health Problems

Isolation - going for days without actually speaking with or touching another personGambling - information technology makes it almost unavoidable Stress - 83% of corporate network administrators reported abusive and violent behavior by employees toward computers55SSK3000Current Issues56SSK3000Computer vision syndrome (CVS)eye and vision problemsRepetitive strain injury (RSI)Computer addictionwhen computer consumes entire social lifeTendonitisinflammation of tendon due to repeated motionCarpal tunnel syndrome (CTS)inflammation of nerve that connects forearm to palmTHREE (3) examples of major computer usage problems that could affect the human physical and social health56SSK3000Current Issues57SSK3000

57SSK3000Current Issues58Precautions that can prevent tendonitis or carpal tunnel syndrome:fingers apart for several seconds while keeping wrists straightGently push back fingers andthen thumbDangle arms loosely at sides and then shake arms and hands

58SSK3000Current Issues59How can you ease eyestrain when working at the computer?

59SSK3000Current Issues60SSK3000Artificial IntelligenceThe branch of computer science concerned with making computers behave like humans. The term was coined in 1956 by John McCarthy at the Massachusetts Institute of Technology. Artificial intelligence includes:games playing: programming computers to play games such as chess and checkers expert systems : programming computers to make decisions in real-life situations (for example, some expert systems help doctors diagnose diseases based on symptoms) natural language : programming computers to understand natural human languages neural networks : Systems that simulate intelligence by attempting to reproduce the types of physical connections that occur in animal brains robotics : programming computers to see and hear and react to other sensory stimuli60SSK3000Current Issues61SSK3000Green Computing

The study and practice of efficient and eco-friendly computing resources, is now under the attention of not only environmental organizations, but also businesses from other industriesIn recent years, companies in the computer industry have come to realize that going green is in their best interest, both in terms of public relations and reduced costs61SSK3000

6262SSK3000Current Issues63SSK3000Cloud Computing

Is an Internet service that provides computing needs to computer usersProvide flexible and massive online computing powerGartner: Cloud computing is a style of computing where massively scalable IT-related capabilities are provided as a service across the Internet to multiple external customersCloud computing refers to using the Internet to deliver business services online that were previously delivered locally by company-owned IT departments. Many Web 2.0 applications (such as blogs, wikis, and social networks) and Web-based e-mail (such as Yahoo! or Gmail) are provided via cloud computing.Businesses that need to process large amounts of data only once in a while can significantly reduce costs by using cloud computing. Instead of investing in large amounts of equipment and software that are used only infrequently, a company can rent as much computing power as it needs at specific times. Businesses that tend to be busy during certain months or seasons of the year are also good candidates. Security is one of the main concerns when utilizing cloud computing services. Running your own IT department requires careful consideration of how to protect and safeguard data. When you turn over processing to a third party, its important to carefully investigate the security and backup capabilities of the cloud computing service provider to determine if their procedures meet your requirements for data security.Source:Evans et al. 2011. Technology in action. 7th ed.63SSK300064

64SSK3000