Académique Documents
Professionnel Documents
Culture Documents
Ethical Responsibility
Employment Privacy
Health
Crime
Computer Viruses
Piracy
Hacking
Cyber Theft
The obsessive use of computers, or the unauthorized access and use of networked computer systems Involves unauthorized network entry and the fraudulent alteration of computer databases Also called time and resource theft May range from doing private consulting or personal finances, to playing video games, to unauthorized use of the Internet on company networks Other forms of intellectual property covered by copyright laws
Music, Videos, Images, Articles, Books
Worm
Privacy Issues
Privacy issues are at the top of the list in regards to ethical use of information.
Loss of control Misuse of information Risk to physical privacy Risk of identity theft Unwanted intrusions into daily life
Privacy laws
Users of the Internet are highly visible and open to violations of privacy Unsecured with no real rules Cookies capture information about you every time you visit a site That information may be sold to third parties Attempt to enforce the privacy of computer-based files and communications Electronic Communications Privacy Act Computer Fraud and Abuse Act
Employment Challenges
Employment Lost Job Lost New jobs Opportunities Individuality have been created and productivity Working has Conditions increased, yet there has been a significant Computer Health Monitoring Issues reduction in some types of jobs as a result of IT.
Other Challenges
Health Issues
- Job stress - Muscle damage - Eye strain - Radiation exposure - Accidents
Individuality
Working Conditions
Computer-based systems criticized as impersonal systems that dehumanize and depersonalize activities IT has eliminated many monotonous, obnoxious tasks, but has created others
Security Management
Security Measures
Encryption Fire Walls
Virus Defenses
Monitor E-mail
Security Monitors
Firewalls
Defensive measures and security precautions must be taken at all three levels
Virus Defenses
Security codes
Centralized distribution and updating of antivirus software Outsourcing the virus protection responsibility to ISPs or to telecommunications or security management companies
Log onto the computer system, Gain access into the system, Access individual files
Security Monitors
Biometric Security
Thank you!!!!!!!!!!
By : Rashmi Ankit Rohan Akash Sonali Sabanaz Thakurdas Yashdeep