understand ethics and security in the programming process
TRANSCRIPT
![Page 1: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/1.jpg)
Understand Ethics and Security in The Programming Process
![Page 2: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/2.jpg)
“Dealing with ethical problems aggravated, transformed or created by computer technology”
- Computer Ethics in the Computer Science Curriculum
What is Computer Ethics?
![Page 3: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/3.jpg)
ACM – Association for Computer Machinery
Centre for Computing and Social Responsibility The Research Center on Computing & Society
Organizations
![Page 4: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/4.jpg)
Ethical Considerations
![Page 5: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/5.jpg)
Due to the computer’s ability to store and manipulate large amounts of information
Information Age
![Page 6: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/6.jpg)
Do not attempt to access the account of another user without authorization
Do not share your password – change it periodically
Use appropriate subject matter and language, and be considerate of other people’s beliefs and opinions.
Netiquette
![Page 7: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/7.jpg)
Ethical issue
Computers record transactions, calls, etc. (These records can be used to learn a lot about you.)
Because of privacy issues, many laws have been passed.
Privacy
![Page 8: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/8.jpg)
Marketing technique where data is collected about customers visiting a website
Online Profiling
![Page 9: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/9.jpg)
Text file created by the server computer when a user enters information into a website. (not a delicious treat)
Cookie
![Page 10: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/10.jpg)
Tiny, transparent graphics located on web pages or in e-mail message that are used in combination with cookies to collect data about web page users or email senders
Web Beacon
![Page 11: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/11.jpg)
Legally binding document that explains how any personal information will be used.
Privacy Policy
![Page 12: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/12.jpg)
Information Technology Laws in the
United States
![Page 13: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/13.jpg)
Technology Laws
• Identity Theft Penalty Enhancement Act of 2004
• Federal Information Security Management Act of 2002 (FISMA)
• Consumer Credit Reporting Reform Act of 1996
• Privacy Act of 1974
• Right to Financial Privacy Act of 1978
• Electronic Communications Privacy Act of 1986 (ECPA)
• Electronic Freedom of Information Act of 1996
• Children’s Online Privacy Protection Act of 1988 (COPPA)
• Safety and Freedom through Encryption Act of 1999 (SAFE)
• Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001
![Page 14: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/14.jpg)
Implications of Computer Use
![Page 15: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/15.jpg)
The science that studies safe work environments.
Repetitive stress injuries, eye strain, etc.
Ergonomics
![Page 16: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/16.jpg)
Power & paper waste
Disposal of outdated hardware
Environmental Concerns
![Page 17: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/17.jpg)
Issues with computers in the workplace
Employee Monitoring
![Page 18: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/18.jpg)
Identity theft
Invasion of Privacy
![Page 19: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/19.jpg)
Protection of SOFTWARE
& DATA
![Page 20: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/20.jpg)
Protection of digital information
NET (No Electronic Theft) Act of 1997
• Protects against copyright infringement
Copyright
![Page 21: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/21.jpg)
Illegal copies being distributed.
Piracy
![Page 22: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/22.jpg)
Program or series of instruction that can replicate without the user’s knowledge
Trojan Horse » Appears as something else
Worm » Program that is able to reproduce itself over a network
Virus
![Page 23: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/23.jpg)
Install on computers to detect and remove code before it can replicated or damage data
Antivirus-Programs
![Page 24: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/24.jpg)
Update virus software
Do not open email attachments without scanning.
Precautions to Take
![Page 25: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/25.jpg)
Illegal act to gain access to large computer systems to perform acts of vandalism.
Electronic Communications Privacy Act of 1986 makes it a federal offense.
Most networks have a firewall to prevent this type of access.
Crackers, Hackers
![Page 26: Understand Ethics and Security in the Programming Process](https://reader034.vdocuments.mx/reader034/viewer/2022042700/5549a2dab4c90507608b51ee/html5/thumbnails/26.jpg)
Act of sending an email to a user falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes like identity theft.
Phishing