Chapter 11 Computers and Society, Security, Privacy, and Ethics - PowerPoint PPT Presentation

1 / 20
About This Presentation
Title:

Chapter 11 Computers and Society, Security, Privacy, and Ethics

Description:

Chapter 11 Computers and Society, Security, Privacy, and Ethics Ethics and Society What are computer ethics? Ethics and Society What is an IT code of conduct? – PowerPoint PPT presentation

Number of Views:285
Avg rating:3.0/5.0
Slides: 21
Provided by: Steven694
Category:

less

Transcript and Presenter's Notes

Title: Chapter 11 Computers and Society, Security, Privacy, and Ethics


1
Chapter 11 Computers and Society, Security,
Privacy, and Ethics
2
Ethics and Society
  • What are computer ethics?

Moral guidelines that govern use of computers and
information systems
Software theft
Information accuracy
Unauthorized use of computers and networks
Intellectual property rightsrights to which
creators are entitled for their work
Codes of conduct
Information privacy
p. 589
3
Ethics and Society
  • What is an IT code of conduct?
  • Written guideline that helps determine whether
    computer action is ethical
  • Employers can distribute to employees

p. 591 Fig. 11-24
4
Information Privacy
  • What is information privacy?

Right of individuals and companies to restrict
collection and use of information about them
Difficult to maintain today because data is
stored online
Employee monitoring is using computers to observe
employee computer use
Legal for employers to use monitoring software
programs
p. 591 and 597
5
Information Privacy
  • What are some ways to safeguard personal
    information?

Fill in necessary informationon rebate,
warranty, and registration forms
Install a cookie manager to filter cookies
Sign up for e-mail filtering through your
Internet service provider or use an antispam
program, such as Brightmail
Clear your history file when you are finished
browsing
Avoid shopping club and buyers cards
Do not reply to spam for any reason
Set up a free e-mail account use this e-mail
address for merchant forms
Inform merchants that you do not want them to
distribute your personal information
Turn off file and print sharing on your Internet
connection
Surf the Web anonymously with a program such as
Freedom Web Secure or through an anonymous Web
site such as Anonymizer.com
Limit the amount of information you provide to
Web sites fill in only required information
Install a personal firewall
p. 592
6
Information Privacy
  • What is an electronic profile?
  • Data collected when you fill out form on Web
  • Merchants sell your electronic profile
  • Often you can specify whether you want
    personal information distributed

p. 592 Fig. 11-26
7
Information Privacy
  • What is a cookie?

Set browser to accept cookies, prompt you to
accept cookies, or disable cookies
Some Web sites sell or trade information stored
in your cookies
Small file on your computer that contains data
about you
User preferences
How regularly you visit Web sites
Interests and browsing habits
p. 593
8
Information Privacy
  • How do cookies work?

Step 2. If browser finds a cookie, it sends
information in cookie file to Web site.
Step 1. When you type Web address of Web site in
your browser window, browser program searches
your hard disk for a cookie associated with Web
site.
Step 3. If Web site does not receive cookie
information, and is expecting it, Web site
creates an identification number for you in its
database and sends that number to your browser.
Browser in turn creates a cookie file based on
that number and stores cookie file on your hard
disk. Web site now can update information in
cookie files whenever you access the site.
p. 594 Fig. 11-27
9
Information Privacy
  • What is a cookie manager?
  • Software program that selectively blocks cookies

p. 594 Fig. 11-28
10
Information Privacy
  • What are spyware and spam?
  • Spyware is program placed on computer without
    users knowledge
  • Secretly collects information about user
  • Spam is unsolicited e-mail message sent to many
    recipients

p. 595 Fig. 11-29
11
Information Privacy
  • How can you control spam?

E-mail filtering
Anti-spam program
p. 595
12
Information Privacy
  • What privacy laws have been enacted?

p. 596 Fig. 11-30
13
Information Privacy
  • What privacy laws have been enacted? (contd)

p. 596 Fig. 11-30
14
Information Privacy
  • What is content filtering?
  • Process of restricting access to certain material
  • Internet Content Rating Association (ICRA)
    provides rating system of Web content
  • Web filtering software restricts access to
    specified sites

p. 597 Fig. 11-31
15
Health Concerns of Computer Use
  • What are some health concerns of computer use?

Computer vision syndrome (CVS)eye and vision
problems
Carpal tunnel syndrome (CTS)inflammation of
nerve that connects forearm to palm
Repetitive strain injury (RSI)
Tendonitisinflammation of tendon due to repeated
motion
Computer addictionwhen computer consumes entire
social life
p. 598, 599, and 601
16
Health Concerns of Computer Use
  • What precautions can prevent tendonitis or carpal
    tunnel syndrome?
  • Take frequent breaks during computer session
  • Use wrist rest
  • Exercise hands and arms
  • Minimize number of times you switch between mouse
    and keyboard

p. 599 Fig. 11-32
17
Health Concerns of Computer Use
  • How can you ease eyestrain when working at the
    computer?

p. 599 Fig. 11-33
18
Health Concerns of Computer Use
  • What is ergonomics?
  • Applied science devoted to comfort, efficiency,
    and safety in workplace

elbows at 90 and arms and hands parallel to floor
keyboard height 23 to 28
adjustable backrest
adjustable seat
adjustable height chair with 5 legs for stability
p. 600 Fig. 11-34
feet flat on floor
19
Health Concerns of Computer Use
  • What is green computing?
  • Reducing electricity and environmental waste
    while using computer

p. 601 Fig. 11-35
20
Summary of Computers and Society, Security,
Privacy, and Ethics
Ethical issues surrounding information accuracy,
intellectual property rights, codes of conduct,
and information privacy
Computer-related health issues, their
preventions, and ways to keep the environment
healthy
Chapter 11 Complete
Write a Comment
User Comments (0)
About PowerShow.com