Lesson 2 - Online Safety, Security, Ethics and Etiquette
Lesson 2 - Online Safety, Security, Ethics and Etiquette
Lesson 2 - Online Safety, Security, Ethics and Etiquette
Edullantes, MMITM,
SECURITY, ETHICS AND MMEPM
Empowerment Technologies
ETIQUETTE
GOAL
At the end of the lesson, you will be able to
understand better the 24/7, social nature of digital
media. In particular, you will be able to:
Explore your digital life; and
Learn that it is important to act responsibly when
carrying out relationships over digital media
QUESTIONS TO CONSIDER:
Are digital media a big part of your life?
What kind of impact do digital media have on you?
What are your favorite and least-favorite things to do with
digital media?
Do you connect with others or create things with digital media?
Computer Ethics
the application of classical and ethical principles when using computer
technology
IMPORTANCE OF COMPUTER
ETHICS
Primary focus: to determine right and wrong conduct, both in
theory and in specific situations.
It gives individuals a basis on which to praise or decry an action
and punish or reward it.
Ethics seeks to protect parties that cannot speak for themselves.
Without Ethics: all actions are equally acceptable and no one is
safe from his neighbor.
ETHICAL PROBLEMS RELATED
TO THE USE OF COMPUTERS:
Privacy
Computers created a false sense of security
People do not realize how vulnerable information stored on computers
are
Property
Physical property
Intellectual property
Data as property
Access
Access to computing technology
Access to data
Accuracy
Accuracy of information stored
Software piracy
THE TEN COMMANDMENTS
OF COMPUTER ETHICS
(FROM COMPUTER ETHICS
INSTITUTE)
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s computer work.
3. Thou shalt not snoop in other people’s files
4. Thou shalt not use a computer to steal
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not use or copy software for which you have not paid
7. Thou shalt not use other people’s computer resources without authorization
8. Thou shalt not appropriate other people’s intellectual output
9. Thou shalt think about the social consequences of the program you write
10.Thou shalt use a computer in ways that show consideration and respect
INFORMATION SECURITY
Computer virus
small programs that are designed to spread form one computer to another to
interfere with computer operation.
Spreading of Virus
Through E-mail attachments, instant messaging messages, funny images,
audio and videos files
downloading files from Internet – Greeting cards and many more
STEPS TO HELP AVOID
VIRUSES
Use an Internet firewall
Subscribe to industry standard antivirus software
Never open an e-mail attachment from someone you don’t know
Scan each and every attachment
Read and understand the rules to be followed while surfing the
net
Hacker
someone who bypasses the system’s access controls by taking
advantage of security weakness left in the system by developers.