Please enable JavaScript.
Coggle requires JavaScript to display documents.
AREAS OF COMPUTERS ETHICS (GREEN COMPUTING (• Ways to implement green…
AREAS OF COMPUTERS ETHICS
GREEN COMPUTING
focuses on reducing the
electricity and environmental waste while
using a computer.
• Main purpose is to find and promote new
ways of reducing pollution, discovering
alternative technologies, and creating more
recyclable products.
• Ways to implement green computing:
– Turn off the monitor, printer, and other devices
when not in use.
– Use paperless method to communicate.
– Use recycle paper.
– Do not leave the computer running overnight.
CODES OF CONDUCT
helps determine
whether a specific computer action is ethical or
unethical.
• Examples:
– Ten Commandments Of Computer Ethics
– Australian Computer Society Code Of Ethics
– Singapore Computer Society (S.C.S.) Professional
Code Of Conduct
• Ten Commandments of Computer Ethics
Thou shalt not use a computer to harm other people.
Thou shalt not interfere with other people's computer work.
Thou shalt not snoop around in other people's computer files.
Thou shalt not use a computer to steal.
Thou shalt not use a computer to bear false witness.
Thou shalt not copy or use proprietary software for which you
have not paid.
Thou shalt not use other people's computer resources
without authorization or proper compensation.
Thou shalt not appropriate other people's intellectual output.
Thou shalt think about the social consequences of the
program you are writing or the system you are designing.
Thou shalt always use a computer in ways that insure
consideration and respect for your fellow humans.
INTELLECTUAL PROPERTY
unique and
original works such as ideas, inventions, arts,
writings, processes, product names, and logos.
• 3 types of Intellectual Property Rights:
– Copyright – for artistic and literary works
– Patent – for inventions
– Trademark – for signs, logo, slogan
INFORMATION PRIVACY
rights of
individuals and companies to deny or restrict
the collection and use of information about
them.
Techniques companies, employers, or hackers
use to collect your personal data:
– Cookies – a small text file that web server stores
on your computer
– Phishing – a scam using email to get personal and
financial information
– Electronic profiles – data collected when you fill a
form or register online
– Spyware and adware – malicious code that spread
through the network
• Ways to safeguard your personal information:
– Do not reply to spam for any reason.
– Clear your history file when you are finished browsing.
– Install a personal firewall.
– Limit the amount of information you provide to Web
sites or forms, fill in only necessary information.
INFORMATION ACCURACY
criteria to evaluate the
accuracy of information:
– How old is the information?
– Does the site provide the reference to data?
– Who provided the information and for what
purpose?