Please enable JavaScript.
Coggle requires JavaScript to display documents.
3.1 area of computers ethics - Coggle Diagram
3.1 area of computers ethics
information accuracy
many users access information maintained by other people or companies such as on the Internet
refers to extent to which information is correct, reliable and free from errors
ways to ensure information accuracy (verify sources, cross-check information and check dates)
green computing
reducing the electricity and environmental waste while using computers, mobile devices and related technologies
also known as green technology, refers to the use of computer and other computing devices and equipment in energy-efficient and eco-friendly ways
software piracy
is the illegal copying, distribution or use of software. it involves obtaining, using or sharing software without proper authorization or licensing from the copyright holder
can various ways ( counterfeiting, end-user piracy, internet piracy, hard disk loading and client server overuse)
can lead to several serious problem such as (fines, lawsuits, jail time, harm to software creators, viruses and malware and lack of updates)
codes of conduct
importance of codes of conduct are (guidelines for behaviour, trust, risk management and accountability)
technology may not be used to harm other people
technology may not used to steal
technology may not used to bear false witness
employees may not copy or use software illegally
information privacy
electronic profiles ( data is collected when you fill out a form or register online)
cookies ( a small text that web server stores on your computer)
spam ( unsolicited e-mail sent to many recipients)
phishing ( a scam using an official looking email that attempts to obtain personal and financial data)
spyware and adware ( spyware is a program placed on a computer without the user's knowledge that secretly collects information about the user) (adware is a program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail messages or other Internet services)
intellectual property rights
copyright infringement (downloading and sharing movies, music, or software without permission from the copyright owner)
trademark infringement (using a logo or brand name that is very similar to an established trademark to sell products such as a clothing line using a swoosh symbol similar to Nike's)
patent infringement ( manufacturing and selling a product that uses a patented invention without the patent holder's permission such as a new type of smartphone battery that was patented by another company)
ways to make computing healthy for the environment
do not leave the computer running overnight
use paperless methids to communicate
recycle paper and buy recycled paper