Computer Use

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

RESPONSIBLE USE OF COMPUTERS

• Computer Ethics: These are the moral guidelines that


govern the use of computers and information systems.
A violation of this may results in computer crime
which is a computer security risk issue.
• A computer security risk is any event or action that
could cause a loss or damage to the computer
hardware, software, data, information, or processing
capability. Some breaches to computer security are
accidental and others are planned intrusions. Three of
the more pressing concerns in computer ethics today
are questions of copyright, piracy, and computer
crime.
Computer Security Risk-Definitions
• Unauthorized Access and Use: Unauthorized
access is the use of a computer or network
without permission and unauthorized use is
the use of computer or its data for unapproved
or possibly illegal activities. It includes
employee using an organization’s computer to
send personal email messages, someone
gaining access to a bank’s computer and
performing unauthorized transfer.
Computer Security Risk-Definitions
• Software Theft (Piracy): This occurs when
someone: (i) steals software media (ii) intentionally
erases program (iii) illegally copies a program. The
first type of software theft occurs when the media
that contains the software or the hardware is stolen,
the second one occurs when an outgoing employee
decides to remove the software intentionally
especially programmers and the third one occurs
when the software is stolen from the manufacturers.
This is known as piracy. Software piracy is the
unauthorized and illegal duplication of copyrighted
software.
Computer Security Risk-Definitions
• Information Accuracy: This refers to
availability of right information to be put up for
the right purposes from the right source. This
involves avoiding the manipulating of graphics or
images by altering the original information using
special software to create an effect. Some
information are censored before putting them in
the public domain. Censorship is the suppression
of speech or deletion of communicative material
which may be considered as objectionable,
harmful or sensitive, as determine by a censor.
Computer Security Risk-Definitions
• Intellectual Property Rights: Intellectual
Property (IP) refers to unique and original
works such as ideas, inventions, arts, writings,
processes, company and product names, and
logos. Intellectual property rights are the rights
to which creators are entitled for their work. A
copyright gives author and artists exclusive
rights to duplicate, publish, and sell their
materials. It protects the tangible form of
expression. A common form of copyright
violation is piracy.
Computer Security Risk-Definitions
• Codes of Conduct: Recognizing that
individuals need specific standards for the
ethical use of computers, a number of computer-
related organizations have established IT codes
of conduct. An IT/Computer code of conduct is
a written guideline that helps determine whether
a specific computer action is ethical or
unethical. E.g. computers should not be used to
copy or use software illegally, employee should
not meddle in others’ computer files.
Computer Security Risk-Definitions
• Information Privacy: This refers to the right
of individuals and companies to deny or
restrict the collection and use of information
about them. In the past, this was strictly
adhered to since information are kept in
separate location but now huge databases store
this data online for people to access and those
that are personal or confidential are accessible
only to authorized users.
ASSIGNMENT-DISCUSSION
• Let students come out with their own rules and
regulations to be put in place when using or
maintaining order in the computer lab.

You might also like