Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 3.1 AREA OF COMPUTER ETHICS - Coggle Diagram
CHAPTER 3.1 AREA OF COMPUTER ETHICS
DEFINITION OF COMPUTER ETHICS
:red_flag:The moral guidelines that govern the use of computers and information systems.
6 AREA OF COMPUTER ETHICS
:<3: information accuracy
:<3: green computing
:<3: software piracy
:<3:codes of conduct
:<3: information piracy
:<3:intellectual property rights
INFORMATION ACCURACY
Why is information accuracy become a concern today?
:check: Because many users access information maintained by other people or companies,such as on the interent.
:warning: do not assume that because the information is on the web that it is correct.
:warning: users should evaluate the value of a web page before relying on its content
GREEN COMPUTING
WHAT IS GREEN COMPUTING?
:check: involves reducing the electricity and environmental waste while using a computer
:no_entry: computer energy is often wasteful (leaving the computer when not in use CPU and fan consume power,screen saver)
:no_entry: printing is often wasteful
:no_entry: pollution
WAYS TO CONTRIBUTE TO GREEN COMPUTING
:green_cross: use computers and devices that comply with the Energy Star program
:green_cross: do not leave the computer running overnight
:green_cross: turn off monitors, printer , and other devices when not in use
SOFTWARE PIRACY
WHAT IS SOFTWARE PIRACY?
:check:unauthorized and illegal duplication of copyright.
HOW SOFTWARE PIRACY HAPPEN
:<3: users illegally obtaining registration numbers or activation code.
:<3: a program called a keygens creates software registration numbers and sometimes activation codes
CODES OF CONDUCT
WHAT IS CODE OF CONDUCT
:check: is a guideline that helps to determine whether a specific computer action is ethical or unethical
:red_cross: computers may not be use to harm other people
:red_cross: employees may not interfere with others' compuer work
:red_cross: computer may not be used to steal
:red_cross:computer may not be used to bear false witness
:red_cross: employees ,may not copy or use software illegally
INFORMATION PIRACY
WHAT IS INFORMATION PIRACY
:check:refers to right individuals and companies to deny or restricts the collection and use of information about them.
Techniques companies and employers use to collect your personal data
:black_flag: electronics profiles
:black_flag: cookies
:black_flag: spam
:black_flag: phishing
:black_flag: spyware and adware
HOW TO SAVE PERSONAL INFORMATION?
:recycle: FORM (fill only necessary information on rebate ,warranty and registration forms)
:recycle: SPAM ( do not reply to spam for any reasons)
:recycle: PROVIDING INFORMATION ( if merchants ask personal questions ,find out why they want to know before releasing the information.)
:recycle: COMPUTER HISTORY ( clear your history when you are finished browsed )
:recycle: BUYING GOODS ( purchase good with cash rather then credits or checks,
INTELLECTUAL PROPERTY RIGHTS
WHAT IS INTELLECTUAL PROPERTY RIGHTS?
:check: Refers to unique and original works such as ideas.inventionsm wittings ,processes ,company and product name and logo.
:check: are the rights to creators are entitled for their works
3 TYPES OF INTELLECTUAL PROPERTY RIGHTS
:star: Patent (exclusive right granted for innovation)
:star: Copyright ( rights given to creators for their literary and artistic works)
:star: trademark ( A distinctive sign which identifies certain goods or services)