Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 8
RESPONSIBLE USE OF COMPUTERS
• Computer Ethics: These are the moral guidelines that
govern the use of computers and information systems. A violation of this may results in computer crime which is a computer security risk issue. • A computer security risk is any event or action that could cause a loss or damage to the computer hardware, software, data, information, or processing capability. Some breaches to computer security are accidental and others are planned intrusions. Three of the more pressing concerns in computer ethics today are questions of copyright, piracy, and computer crime. Computer Security Risk-Definitions • Unauthorized Access and Use: Unauthorized access is the use of a computer or network without permission and unauthorized use is the use of computer or its data for unapproved or possibly illegal activities. It includes employee using an organization’s computer to send personal email messages, someone gaining access to a bank’s computer and performing unauthorized transfer. Computer Security Risk-Definitions • Software Theft (Piracy): This occurs when someone: (i) steals software media (ii) intentionally erases program (iii) illegally copies a program. The first type of software theft occurs when the media that contains the software or the hardware is stolen, the second one occurs when an outgoing employee decides to remove the software intentionally especially programmers and the third one occurs when the software is stolen from the manufacturers. This is known as piracy. Software piracy is the unauthorized and illegal duplication of copyrighted software. Computer Security Risk-Definitions • Information Accuracy: This refers to availability of right information to be put up for the right purposes from the right source. This involves avoiding the manipulating of graphics or images by altering the original information using special software to create an effect. Some information are censored before putting them in the public domain. Censorship is the suppression of speech or deletion of communicative material which may be considered as objectionable, harmful or sensitive, as determine by a censor. Computer Security Risk-Definitions • Intellectual Property Rights: Intellectual Property (IP) refers to unique and original works such as ideas, inventions, arts, writings, processes, company and product names, and logos. Intellectual property rights are the rights to which creators are entitled for their work. A copyright gives author and artists exclusive rights to duplicate, publish, and sell their materials. It protects the tangible form of expression. A common form of copyright violation is piracy. Computer Security Risk-Definitions • Codes of Conduct: Recognizing that individuals need specific standards for the ethical use of computers, a number of computer- related organizations have established IT codes of conduct. An IT/Computer code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical. E.g. computers should not be used to copy or use software illegally, employee should not meddle in others’ computer files. Computer Security Risk-Definitions • Information Privacy: This refers to the right of individuals and companies to deny or restrict the collection and use of information about them. In the past, this was strictly adhered to since information are kept in separate location but now huge databases store this data online for people to access and those that are personal or confidential are accessible only to authorized users. ASSIGNMENT-DISCUSSION • Let students come out with their own rules and regulations to be put in place when using or maintaining order in the computer lab.