SlideShare a Scribd company logo
1 of 29
Commission on Information and Communications Technology
Cyber EthicsCyber Ethics
Source: Rommel Andong & Mel Tan
iSchools Project Team
HUMAN CAPITAL DEVELOPMENT GROUP
iSchools - CILC for Teachers 2
Issues
• Privacy and Personal Information
• Trust
• Freedom of speech
• Intellectual Property
• Computer crime
• Computers and Work
• Professional Ethics and Responsibilities
iSchools - CILC for Teachers 3
Computer Ethics
• Category of professional ethics similar
to medical, accounting, legal ethics
• For computer professionals & those
who select, manage or use computers
in a professional setting
• many people do not understand
technology well...
–Concerns relationships & responsibilities
towards customers, clients, coworkers,
users, people affected by computers, ...
iSchools - CILC for Teachers 4
What is Ethics ?
• Study of what it means to "do the right
thing"
• View ethical rules as
–fundamental & universal
–made up to provide a framework to
interact with other people
• Behaving ethically is often practical
• Needs courage sometimes ...
iSchools - CILC for Teachers 5
Some important distinctions
• Right, wrong, OK, prohibited,
acceptable
• Distinguising Wrong and Harm
• Separating Goals from Constraints
• Personal Preference and Ethics
• Law and Ethics
iSchools - CILC for Teachers 6
• To handle information in a responsible
way you must understand:
– The importance of ethics in the ownership and
use of information.
– The importance to people of personal privacy and
the ways in which it can be compromised.
– The value of information to an organization.
– Threats to information and how to protect against
them (security).
Introduction
iSchools - CILC for Teachers 7
Ethics
• Ethics - the principles and
standards that guide our behavior
toward other people.
iSchools - CILC for Teachers 8
Ethics
Two Factors That Determine How You Decide Ethical Issues
1. Your basic ethical structure, which
you developed as you grew up.
2. The set of practical circumstances
involved in the decision that you’re
trying to make — that is, all the
shades of gray in what are rarely
black or white decisions.
how much do
you identify
with the
person or
persons who
will receive
the benefit or
suffer the
harm?
Ethics: Practical Considerations
how much or how little
benefit or harm will come
from a particular decision?
what is your perception
of what society really
thinks of your intended
action?
what is the
probability
of the harm
or benefit
that will
occur if you
take the
action?
what length of
time will it take
for the benefit or
harm to take
effect?
how many
people will be
affected by
your action?
iSchools - CILC for Teachers 10
Intellectual Property
• Intellectual property - intangible creative
work that is embodied in physical form.
• Copyright - the legal protection afforded
an expression of an idea, such as a song,
video game, and some types of proprietary
documents.
• Fair Use Doctrine - says that you may use
copyrighted material in certain situations —
for example, for teaching purposes.
iSchools - CILC for Teachers 11
Intellectual Property
• Pirated software - the unauthorized
use, duplication, distribution or sale of
copyrighted software.
• Counterfeit software - software that is
manufactured to look like the real thing
and sold as such.
iSchools - CILC for Teachers 12
Privacy
• Privacy - the right to be left alone when
you want to be, to have control over
your own personal possessions, and not
to be observed without your consent.
iSchools - CILC for Teachers 13
Privacy
• E-mail is completely insecure.
• Each e-mail you send results in at least 3 or 4 copies
being stored on different computers.
• You can take measures to protect your e-mail.
iSchools - CILC for Teachers 14
Privacy
• Cookie - a small record deposited on your
hard disk by a Web site containing
information about you and your Web
activities.
• Adware - software to generate ads that
installs itself on your computer when you
download some other (usually free) program
from the Web.
• Trojan-horse software - software you don’t
want hidden inside software you do want.
iSchools - CILC for Teachers 15
Privacy
• Spyware (also called sneakware or
stealthware) - software that comes hidden in
free downloadable software
– tracks your online movements
– mines the information stored on your computer
– uses your computer’s CPU and storage
• Key logger, or key trapper, software, -a
program, when installed on a computer,
records every keystroke and mouse click.
iSchools - CILC for Teachers 16
THE TEN COMMANDMENTS
FOR COMPUTER ETHICS
from the Computer Ethics Institute
✔
Thou shalt not use a computer to harm other people.
✔
Thou shalt not interfere with other people's computer work.
✔
Thou shalt not snoop around in other people's files.
✔
Thou shalt not use a computer to steal.
✔
Thou shalt not use a computer to bear false witness.
✔
Thou shalt not use or copy software for which you have not paid.
✔
Thou shalt not use other people's computer resources without
authorization.
✔
Thou shalt not appropriate other people's intellectual output.
✔
Thou shalt think about the social consequences of the program
you write.
✔
Thou shalt use a computer in ways that show consideration and
respect.
iSchools - CILC for Teachers 17
NETIQUETTE
1. be responsible enough not to waste other
people’s time or bandwidth by posting
unnecessarily long messages or
unimportant messages and sending large
attachments
– Keep your messages to the point - you may
opt to use common abbreviations
– Limit the size of attachments to 100 kb.
From Computing for Life - Book A by Tan, 2nd
edition. FNB Publications, 2005.
iSchools - CILC for Teachers 18
NETIQUETTE
2. Promote civility. Be pleasant and polite.
Although the Internet advocates freedom
of speech, it does not give anyone the
right to write anything he wants without
minding how it will affect others.
– Avoid using CAPS LOCK.
– Minimize the use of exclamation points.
– Use smileys or emoticons when appropriate
– Do not use offensive language.
iSchools - CILC for Teachers 19
Sample Emoticons
:-) Happy face
;-) Kidding or teasing
:-D Laughing hard
:-I Indifferent. Either way
is O.K.
|-O Yawning
|-I Asleep
:-/ Not quite sure about
something
:-( Frowning
>:-( Angry
:-@ Screaming
:-C Disappointed
:'-( Crying
:-O Surprise or
amazement
:-X Your secret is safe
with me
}:-) A devil
O:-) An angel
^5 High 5
iSchools - CILC for Teachers 20
Sample Acronyms
• AFAIK As Far As I Know
• AFK Away From Keyboard
• ASAP As Soon As Possible
• B4N Bye For Now
• BBL Be Back Later
• BRB Be Right Back
• BBS Be Back Soon
• CYA See You (Seeya)
• CU See You
• DLTBBB Don't Let The Bed Bugs
Bite
• CYAL8R See You Later
(Seeyalata)
• FC Fingers Crossed
• F2F Face To Face
• G Grin
• FTBOMH From The Bottom Of My
Heart
• GL Good Luck
• FWIW For What It's Worth
• H&K Hug and Kiss
• GFN Gone For Now
• HAGU Have A Good 'Un
• GMTA Great Minds Think Alike
• HIG How's It Going
• HAGN Have A Good Night
• IC I See
• HAND Have A Nice Day
• IMNSHO In My Not So Humble
Opinion
• HT Hi There
iSchools - CILC for Teachers 21
Sample Acronyms
• IMCO In My Considered Opinion
• ILY I Love You
• IMS I'm Sorry
• IMHO In My Humble Opinion
• JK Just Kidding
• IMO In My Opinion
• IRL In Real Life
• IOW In Other Words
• JTLYK Just To Let You Know
• J4G Just For Grins
• KIT Keep In Touch
• JMO Just My Opinion KWIM
Know What I Mean
• KISS Keep It Simple, Stupid
• L8R Later
• KOTC Kiss On The Cheek
• LHO Laughing Head Off
• L8R G8R Later 'Gator
• LOL Laugh Out Loud
• LMSO Laughing My Socks Off
• LY4E Love You Forever
• LSHMBH Laughing So Hard My
Belly Hurts
• ROTFL Rolls On The Floor
Laughing
• LY Love Ya
• STO Sticking Out Tongue
• OIC Oh, I See
• OTOH On The Other Hand
iSchools - CILC for Teachers 22
NETIQUETTE
3. Use descriptive subject lines for your
messages as a courtesy to your reader -
to help people organize and prioritize their
messages.
4. Let the recipient know who is sending the
message.
– From: or end your messages with your name
– Signature
iSchools - CILC for Teachers 23
NETIQUETTE
5. When forwarding messages:
– Check the reliability of the source of a forwarded
message and the accuracy of the message or story
before passing it on.
• Do not unnecessarily alarm people, waste their precious time,
and clog the network.
– Clean up your messages before you forward them.
• Take out unnecessary header information and forwarding
symbols (usually the > sign).
• Retain only those that are important to your recipient.
– Choose the recipients of your forwarded message.
iSchools - CILC for Teachers 24
NETIQUETTE
6. When replying to a mass email, avoid hitting
Reply to All.
7. When sending mass email, it would be better to
use BCCs (Blind Carbon Copies)
– respect your recipients’ privacy
• NOTE: Be careful when corresponding to
strangers on a network.
– Do not give out sensitive or personal information to
people you do not personally know.
– Be wary of people who give out or lie about their
own information to gain your trust.
Commission on Information and Communications Technology
CASESCASES
discussion points
iSchools - CILC for Teachers 26
Case 1
You are a unit supervisor. A member of
your unit is out sick and another
member requests a copy of all files from
the sick employee's computer to his so
that he can do some work.
iSchools - CILC for Teachers 27
Case 2
My brother and I saw this really cool
game being played in the network
gaming shop. We would really like to
get a copy but it costs a lot of money.
My classmate told me that that there is a
website where I can copy it for free.
That way, I can enjoy the game without
having to shell out any money!
adapted from www.cybercrime.gov/rules/kidinternet.htm
From Computing for Life - Book A by Tan, 2nd
edition. FNB Publications, 2005.
iSchools - CILC for Teachers 28
Case 3
When I went over to James’ workstation
to copy a file, I found that he left his
Instant Messenger open. A mutual
friend, who is on the other end, just sent
a message. Since nobody is looking, I
sat down, typed a response, and sent it
pretending to be James.
adapted from www.cybercrime.gov/rules/kidinternet.htm
From Computing for Life - Book A by Tan, 2nd
edition. FNB Publications, 2005.
Commission on Information and Communications Technology
Thank you

More Related Content

What's hot

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Society law & ethics.pdf
Society law & ethics.pdfSociety law & ethics.pdf
Society law & ethics.pdfAditya901507
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 

What's hot (20)

Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Society law & ethics.pdf
Society law & ethics.pdfSociety law & ethics.pdf
Society law & ethics.pdf
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 

Viewers also liked

Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Rakshit Sharma
 
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015Priyanka Aash
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldRownel Cerezo Gagani
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethicsaleeya91
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityGareth Davies
 
Information security
Information securityInformation security
Information securityLJ PROJECTS
 

Viewers also liked (20)

Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Ethical issues in cyberspace
Ethical issues in cyberspaceEthical issues in cyberspace
Ethical issues in cyberspace
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
 
Wireless security
Wireless securityWireless security
Wireless security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Sharing of Information
Sharing of InformationSharing of Information
Sharing of Information
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Information security
Information securityInformation security
Information security
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 

Similar to Commission on ICT Cyber Ethics Cases

Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01TechSoup
 
Types of Ethics
Types of EthicsTypes of Ethics
Types of EthicsSaqib Raza
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspaceoudesign
 
labComputer lab rules and ethics concept outline
labComputer lab rules and ethics concept outlinelabComputer lab rules and ethics concept outline
labComputer lab rules and ethics concept outlineSwapnil Sawale
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@MsCCostello
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipMsCCostello
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipMsCCostello
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipMsCCostello
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Kimberley Dray
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schoolsElectricshepherds
 
Netiquette
NetiquetteNetiquette
NetiquetteGlory
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schoolsPaul Chamberlain
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxCatherineBagaan
 
Social Media: Philosophy and Policy
Social Media: Philosophy and PolicySocial Media: Philosophy and Policy
Social Media: Philosophy and Policydrpeppermuseum
 

Similar to Commission on ICT Cyber Ethics Cases (20)

LESSON 1.ppt
LESSON 1.pptLESSON 1.ppt
LESSON 1.ppt
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 
Types of Ethics
Types of EthicsTypes of Ethics
Types of Ethics
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
 
labComputer lab rules and ethics concept outline
labComputer lab rules and ethics concept outlinelabComputer lab rules and ethics concept outline
labComputer lab rules and ethics concept outline
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Law 483 cyberethics
Law 483 cyberethicsLaw 483 cyberethics
Law 483 cyberethics
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schools
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schools
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
Social Media: Philosophy and Policy
Social Media: Philosophy and PolicySocial Media: Philosophy and Policy
Social Media: Philosophy and Policy
 

More from WonderingAriana (20)

Presentation
PresentationPresentation
Presentation
 
Practical biometrics
Practical biometricsPractical biometrics
Practical biometrics
 
Uses of Internet
Uses of InternetUses of Internet
Uses of Internet
 
Uses of Internet
Uses of InternetUses of Internet
Uses of Internet
 
Inset 2014 TLE
Inset 2014 TLEInset 2014 TLE
Inset 2014 TLE
 
Tips in Powerpoint Presentation
Tips in Powerpoint PresentationTips in Powerpoint Presentation
Tips in Powerpoint Presentation
 
Uses of Powerpoint
Uses of PowerpointUses of Powerpoint
Uses of Powerpoint
 
Quick reference card
Quick reference cardQuick reference card
Quick reference card
 
Ms office ppt_2010_views
Ms office ppt_2010_viewsMs office ppt_2010_views
Ms office ppt_2010_views
 
L1 introenparts
L1 introenpartsL1 introenparts
L1 introenparts
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Objects and effects
Objects and effectsObjects and effects
Objects and effects
 
Picture effects
Picture effectsPicture effects
Picture effects
 
Animation effects
Animation effectsAnimation effects
Animation effects
 
Inserting Audio
Inserting AudioInserting Audio
Inserting Audio
 
Picture Effects
Picture EffectsPicture Effects
Picture Effects
 
Picture Effects
Picture EffectsPicture Effects
Picture Effects
 
Modifying Objects
Modifying ObjectsModifying Objects
Modifying Objects
 
Slide Layout
Slide LayoutSlide Layout
Slide Layout
 
Countdown
CountdownCountdown
Countdown
 

Recently uploaded

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Commission on ICT Cyber Ethics Cases

  • 1. Commission on Information and Communications Technology Cyber EthicsCyber Ethics Source: Rommel Andong & Mel Tan iSchools Project Team HUMAN CAPITAL DEVELOPMENT GROUP
  • 2. iSchools - CILC for Teachers 2 Issues • Privacy and Personal Information • Trust • Freedom of speech • Intellectual Property • Computer crime • Computers and Work • Professional Ethics and Responsibilities
  • 3. iSchools - CILC for Teachers 3 Computer Ethics • Category of professional ethics similar to medical, accounting, legal ethics • For computer professionals & those who select, manage or use computers in a professional setting • many people do not understand technology well... –Concerns relationships & responsibilities towards customers, clients, coworkers, users, people affected by computers, ...
  • 4. iSchools - CILC for Teachers 4 What is Ethics ? • Study of what it means to "do the right thing" • View ethical rules as –fundamental & universal –made up to provide a framework to interact with other people • Behaving ethically is often practical • Needs courage sometimes ...
  • 5. iSchools - CILC for Teachers 5 Some important distinctions • Right, wrong, OK, prohibited, acceptable • Distinguising Wrong and Harm • Separating Goals from Constraints • Personal Preference and Ethics • Law and Ethics
  • 6. iSchools - CILC for Teachers 6 • To handle information in a responsible way you must understand: – The importance of ethics in the ownership and use of information. – The importance to people of personal privacy and the ways in which it can be compromised. – The value of information to an organization. – Threats to information and how to protect against them (security). Introduction
  • 7. iSchools - CILC for Teachers 7 Ethics • Ethics - the principles and standards that guide our behavior toward other people.
  • 8. iSchools - CILC for Teachers 8 Ethics Two Factors That Determine How You Decide Ethical Issues 1. Your basic ethical structure, which you developed as you grew up. 2. The set of practical circumstances involved in the decision that you’re trying to make — that is, all the shades of gray in what are rarely black or white decisions.
  • 9. how much do you identify with the person or persons who will receive the benefit or suffer the harm? Ethics: Practical Considerations how much or how little benefit or harm will come from a particular decision? what is your perception of what society really thinks of your intended action? what is the probability of the harm or benefit that will occur if you take the action? what length of time will it take for the benefit or harm to take effect? how many people will be affected by your action?
  • 10. iSchools - CILC for Teachers 10 Intellectual Property • Intellectual property - intangible creative work that is embodied in physical form. • Copyright - the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents. • Fair Use Doctrine - says that you may use copyrighted material in certain situations — for example, for teaching purposes.
  • 11. iSchools - CILC for Teachers 11 Intellectual Property • Pirated software - the unauthorized use, duplication, distribution or sale of copyrighted software. • Counterfeit software - software that is manufactured to look like the real thing and sold as such.
  • 12. iSchools - CILC for Teachers 12 Privacy • Privacy - the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
  • 13. iSchools - CILC for Teachers 13 Privacy • E-mail is completely insecure. • Each e-mail you send results in at least 3 or 4 copies being stored on different computers. • You can take measures to protect your e-mail.
  • 14. iSchools - CILC for Teachers 14 Privacy • Cookie - a small record deposited on your hard disk by a Web site containing information about you and your Web activities. • Adware - software to generate ads that installs itself on your computer when you download some other (usually free) program from the Web. • Trojan-horse software - software you don’t want hidden inside software you do want.
  • 15. iSchools - CILC for Teachers 15 Privacy • Spyware (also called sneakware or stealthware) - software that comes hidden in free downloadable software – tracks your online movements – mines the information stored on your computer – uses your computer’s CPU and storage • Key logger, or key trapper, software, -a program, when installed on a computer, records every keystroke and mouse click.
  • 16. iSchools - CILC for Teachers 16 THE TEN COMMANDMENTS FOR COMPUTER ETHICS from the Computer Ethics Institute ✔ Thou shalt not use a computer to harm other people. ✔ Thou shalt not interfere with other people's computer work. ✔ Thou shalt not snoop around in other people's files. ✔ Thou shalt not use a computer to steal. ✔ Thou shalt not use a computer to bear false witness. ✔ Thou shalt not use or copy software for which you have not paid. ✔ Thou shalt not use other people's computer resources without authorization. ✔ Thou shalt not appropriate other people's intellectual output. ✔ Thou shalt think about the social consequences of the program you write. ✔ Thou shalt use a computer in ways that show consideration and respect.
  • 17. iSchools - CILC for Teachers 17 NETIQUETTE 1. be responsible enough not to waste other people’s time or bandwidth by posting unnecessarily long messages or unimportant messages and sending large attachments – Keep your messages to the point - you may opt to use common abbreviations – Limit the size of attachments to 100 kb. From Computing for Life - Book A by Tan, 2nd edition. FNB Publications, 2005.
  • 18. iSchools - CILC for Teachers 18 NETIQUETTE 2. Promote civility. Be pleasant and polite. Although the Internet advocates freedom of speech, it does not give anyone the right to write anything he wants without minding how it will affect others. – Avoid using CAPS LOCK. – Minimize the use of exclamation points. – Use smileys or emoticons when appropriate – Do not use offensive language.
  • 19. iSchools - CILC for Teachers 19 Sample Emoticons :-) Happy face ;-) Kidding or teasing :-D Laughing hard :-I Indifferent. Either way is O.K. |-O Yawning |-I Asleep :-/ Not quite sure about something :-( Frowning >:-( Angry :-@ Screaming :-C Disappointed :'-( Crying :-O Surprise or amazement :-X Your secret is safe with me }:-) A devil O:-) An angel ^5 High 5
  • 20. iSchools - CILC for Teachers 20 Sample Acronyms • AFAIK As Far As I Know • AFK Away From Keyboard • ASAP As Soon As Possible • B4N Bye For Now • BBL Be Back Later • BRB Be Right Back • BBS Be Back Soon • CYA See You (Seeya) • CU See You • DLTBBB Don't Let The Bed Bugs Bite • CYAL8R See You Later (Seeyalata) • FC Fingers Crossed • F2F Face To Face • G Grin • FTBOMH From The Bottom Of My Heart • GL Good Luck • FWIW For What It's Worth • H&K Hug and Kiss • GFN Gone For Now • HAGU Have A Good 'Un • GMTA Great Minds Think Alike • HIG How's It Going • HAGN Have A Good Night • IC I See • HAND Have A Nice Day • IMNSHO In My Not So Humble Opinion • HT Hi There
  • 21. iSchools - CILC for Teachers 21 Sample Acronyms • IMCO In My Considered Opinion • ILY I Love You • IMS I'm Sorry • IMHO In My Humble Opinion • JK Just Kidding • IMO In My Opinion • IRL In Real Life • IOW In Other Words • JTLYK Just To Let You Know • J4G Just For Grins • KIT Keep In Touch • JMO Just My Opinion KWIM Know What I Mean • KISS Keep It Simple, Stupid • L8R Later • KOTC Kiss On The Cheek • LHO Laughing Head Off • L8R G8R Later 'Gator • LOL Laugh Out Loud • LMSO Laughing My Socks Off • LY4E Love You Forever • LSHMBH Laughing So Hard My Belly Hurts • ROTFL Rolls On The Floor Laughing • LY Love Ya • STO Sticking Out Tongue • OIC Oh, I See • OTOH On The Other Hand
  • 22. iSchools - CILC for Teachers 22 NETIQUETTE 3. Use descriptive subject lines for your messages as a courtesy to your reader - to help people organize and prioritize their messages. 4. Let the recipient know who is sending the message. – From: or end your messages with your name – Signature
  • 23. iSchools - CILC for Teachers 23 NETIQUETTE 5. When forwarding messages: – Check the reliability of the source of a forwarded message and the accuracy of the message or story before passing it on. • Do not unnecessarily alarm people, waste their precious time, and clog the network. – Clean up your messages before you forward them. • Take out unnecessary header information and forwarding symbols (usually the > sign). • Retain only those that are important to your recipient. – Choose the recipients of your forwarded message.
  • 24. iSchools - CILC for Teachers 24 NETIQUETTE 6. When replying to a mass email, avoid hitting Reply to All. 7. When sending mass email, it would be better to use BCCs (Blind Carbon Copies) – respect your recipients’ privacy • NOTE: Be careful when corresponding to strangers on a network. – Do not give out sensitive or personal information to people you do not personally know. – Be wary of people who give out or lie about their own information to gain your trust.
  • 25. Commission on Information and Communications Technology CASESCASES discussion points
  • 26. iSchools - CILC for Teachers 26 Case 1 You are a unit supervisor. A member of your unit is out sick and another member requests a copy of all files from the sick employee's computer to his so that he can do some work.
  • 27. iSchools - CILC for Teachers 27 Case 2 My brother and I saw this really cool game being played in the network gaming shop. We would really like to get a copy but it costs a lot of money. My classmate told me that that there is a website where I can copy it for free. That way, I can enjoy the game without having to shell out any money! adapted from www.cybercrime.gov/rules/kidinternet.htm From Computing for Life - Book A by Tan, 2nd edition. FNB Publications, 2005.
  • 28. iSchools - CILC for Teachers 28 Case 3 When I went over to James’ workstation to copy a file, I found that he left his Instant Messenger open. A mutual friend, who is on the other end, just sent a message. Since nobody is looking, I sat down, typed a response, and sent it pretending to be James. adapted from www.cybercrime.gov/rules/kidinternet.htm From Computing for Life - Book A by Tan, 2nd edition. FNB Publications, 2005.
  • 29. Commission on Information and Communications Technology Thank you