Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Computer Ethics and Legal Issues

72,942 views

Published on

Published in: Education
  • A professional Paper writing services can alleviate your stress in writing a successful paper and take the pressure off you to hand it in on time. Check out, please ⇒ www.WritePaper.info ⇐
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Writing good research paper is quite easy and very difficult simultaneously. It depends on the individual skill set also. You can get help from research paper writing. Check out, please ⇒ www.HelpWriting.net ⇐
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • You can try to use this service HelpWriting.net I have used it several times in college and was absolutely satisfied with the result.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Could you use an extra $1750 a week? I'm guessing you could right? If you would like to see how you could make this type of money, right from the comfort of your own home, you absolutely need to check out this short free video. ★★★ http://t.cn/AisJWUCf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Follow the link, new dating source: ❤❤❤ http://bit.ly/33tKWiU ❤❤❤
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Computer Ethics and Legal Issues

  1. 1. CHAPTER 1: INFORMATIONAND COMMUNICATIONTECHNOLOGYComputer Ethics and Legal Issues
  2. 2. DefinitionComputer Ethics Is a system of moral standards or moral values used as a guideline for computer usersCode of Ethics Is a guideline in ICT that help determine whether a specific computer action is ethical or unethicalIntellectual Is works created by inventors, authors and artistsPropertyPrivacy Refers to the right of individuals and companies to deny or restrict the collection and use of information about themComputer Crime Is any illegal acts involving computersCyber Law Is any laws relating to protect the Internet and other online communication technologies
  3. 3. Differentiate between ethics and law ETHICS LAWAs a guideline to computer As a rule to control computerusers usersComputers users are free to Computers users must followfollow or ignore the code of the regulations and lawethicsUniversal, can be applied Depend on country and stateanywhere, all over the world where the crime is committedTo produced ethical computers To prevent misuse ofusers computersNot following ethics are called Not obeying laws are calledimmoral crime
  4. 4. Intellectual Property Laws Four types of Intellectual Property are:• Patents for inventions• Trademarks for brand identity• Design for product appearance• Copyright for materials
  5. 5. PrivacyWays of making personal data more privates: Install personal firewall Clear your history file when you are browsing Purchase goods with cash, rather than credit card
  6. 6. Authentication Authentication is a process where user verifies their identity. Authentication deals with the problem of determining whether a user should be allowed access to a particular system.
  7. 7.  Four commonly authentication methods:
  8. 8. A) User identification Is a unique combination of characters (letter, number or symbol) that identify specific user Examples: pin number password
  9. 9. B) Possessed object Is a any item that you must carry to gain access to computer of computer facility Examples: ATM card credit card smart card
  10. 10. C) Biometric device Is a device that translates personal characteristics into digital code that is compared with the digital code stored in the database Examples: fingerprint reader iris scanner hand geometric scanner signature verification system
  11. 11. Controversial Contents and Control PORNOGRAPHY SLANDER is any form media or material (like  is a false spoken statement aboutbooks, video or photos) that show erotic someone, intended to damage his or herbehavior and intended to cause sexual reputationexcitement  the effects of slander on society are: the effects of pornography on society iv)Can develop society that disregards onare: honesty and truthiv)Can lead to criminal acts such as v)Can lead to bad habits of spreadingexploitation of women rumors and untruthv)Can lead to sexual addiction vi)Can cause people to have nagativevi)Can develop lower moral values attitudes toward another persontowards other peoplevii)Can erode good religious, cultural,behaviors and beliefs
  12. 12. Computer Crimes Why we need cyber law? i) Cyber laws are made to force people to be good ii) To give protection against the misuse of computers and computer criminal activities Examples of cyber abuse on the users: i) Sending a computer virus via e-mail ii) Harassment through e-mail iii) Hacking into your schools database to change your examination results
  13. 13.  Malaysian Cyber Law i) Computer Crime Act 1997 ii) Copyright (Amendment) Bill 1997 iii) Digital Signature Act 1997 iv) Telemedicine Bill 1997 v) Communication and Multimedia Act 1998 vi) Digital Signature Regulations 1998
  14. 14.  4 examples of computer crimes: Computer fraud - is the crime of obtaining money by deceiving (to trick) people through the use of computers such as email hoaxes, program fraud, investment schemes and claim of expertise on certain fields Copyright infringement - is a violation of the rights secured by a copyright. It occurs when you break the copyright laws such as copying movie, software or CD’s illegally
  15. 15. Computer theft – is defined as the unauthorized used of another person’s property such as transfer of payment to the wrong accounts, get online material with no cost and tap into the data transmission linese Computer attack – is defined as any activities taken to disrupt the equipments of computers systems, change processing controls and corrupt stored data

×