Chapter 8
LEGAL AND ETHICAL USE OF TECHNOLOGY
ETHICS FOR COMPUTER USER:
- Use the computer to help people and not to do harm
- Use your own or assigned computer unit and not to interfere with others work
- Use the computer using your own files and not to use other files.
- Use the computer to share information and not to steel others information
- Use the computer to spread truthful information and not to do character assassination.
- Use Software that are original and legal and not pirated
- Use others computer resources with permission and not to duplicate it without authorization.
- Use your own work and not the work of others
- Use the computers that shows respect and consideration for other people and not to do cyber bullying
- Create programs or software having in mind its social impact and not for self-interest.
ETHICAL ISSUES IN TECHNOLOGY AND SOFTWARE
UNAUTHORIZED ACCESS AND USE HARDWARE, SOFTWARE, NETWORK, AND COMPUTER FILES.
1. Hardware theft and Vandalism
- Computer theft is stealing hardware and its devices
- Computer vandalism is the act of damaging or breaking the hardware-cutting the cables and wires, smashing the computer and its devices and deleting of software or computer files.
2. Software theft
- Software piracy is a form of software theft. This happens when a person copies illegally copyrighted software for personal or business use.
3. Information theft
- Information theft is a computer crime when one deliberately steals information for purposes of studying how to compete with other organizations and companies.
4. Malicious Acts in Software
- Spam- is an unwanted message being received through emails, discussion board’s text messages devices and others.
- Phishing- is scam in which agent sends a legitimate –looking- email that attempts to steal personal and financial information
- Malware is a malicious software that cause harm to one and more computers
- Adware is software that incorporates the presentation of advertisement as condition for operating the software.
Acceptable and Unacceptable Uses of School Technology
No comments:
Post a Comment