introduction
Download
Skip this Video
Download Presentation
Introduction

Loading in 2 Seconds...

play fullscreen
1 / 14

Introduction - PowerPoint PPT Presentation


  • 43 Views
  • Uploaded on

Introduction. Social Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way to govern the use of computers.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Introduction' - sigourney-wyatt


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
introduction
Introduction
  • Social Implications & Ethics
  • Since the introduction of the Internet, many policies have been introduced as a way to govern the use of computers.
  • The Internet has become wide spread throughout the world and everyone is has the ability to obtain any piece of information they choose to download just by searching for it.
  • The capabilities of users to get any information about someone increases the vulnerability of the other users of the system.
increasing the capabilities of an individual
Increasing the Capabilities of an Individual
  • Fraud and Identity theft
    • The internet makes it easy to have your information stolen by somebody because they don’t have to have face verification when using a credit card and can easily use this to go online and buy anything they want.
  • The extent of the damage done to you is at the will of the person who steals your identity.
  • The computer is the new tool of a super-criminal.
user vulnerability
User Vulnerability
  • Have you ever received an e-mail that asked for your bank account numbers? Or have you ever had a website asking for your username and password on a site that is not the site you know?
  • Emails and messages that you receive online do not always have the integrity that they should. This makes you vulnerable..
ethics of internet users

Ethics of Internet users

by

Wm. Eric Eggleston

ethics
Ethics
  • Ethics are often summed up in what is considered the “golden rule”—do unto others as you would have them do unto you. While this makes sense as a general rule of thumb, it does not truly offer much in terms of helping one to make moral decisions in daily life.
the main points of ethics
The Main Points of Ethics
  • Integrity
  • Commitment
  • Truth
  • Confidentiality
  • Legality
ethics of internet users1
Ethics of Internet Users
  • False information
    • Users going on websites and posting information that is not true. “Wikipedia”
  • Downloading
    • Users downloading music, movies or softer ware for there own personal use. “ limewire , Kasa”
  • Privacy
    • User posting pictures and videos of friends and family on websites “ Myspace, Facebook and Youtube”
ethics of internet users2
Ethics of Internet Users
  • Computer Abuse
    • Computer Crimes
      • Users hacking in to personal information and taking identities of people.
      • stealing a username and password
      • creating or releasing a malicious computer program “virus”
what is an internet service provider isp
What is an Internet Service Provider (ISP)
  • A company or organization that supplies Internet connectivity to home and/or business customers. ISPs support one or more forms of Internet access, ranging from traditional modem dial-up to DSL and cable modem broadband service. An ISP may provide a combination of services including Internet access, domain name registration, hosting, and Web hosting.
  • ISPs policies concerns, \'cookies,\' third party sites and access, collection of personal information - what, how and usage, security of information, regulation of children\'s access to the Internet, globalization issues and legal issues.
what is prohibited content
What is prohibited content?
  • ISP prohibits sexual activity, child pornography, depictions of bestiality, material containing excessive violence or sexual violence, detailed instruction in crime, violence or drug use, and/or material that advocates the doing of a terrorist act.
what other responsibilities do isps have
What other responsibilities do ISPs have?
  • ISPs to take appropriate steps to protect the public from prohibited content. The codes set out opt-in filtering arrangements that require ISPs to offer customers filters on a cost recovery basis. Filters are made available either directly or via a filter software portal maintained by the Internet Industry Association.
  • Consider the use of law enforcement or civil action against spammers and hackers when appropriate.
  • Providers has to protect the users information. Example: credit card, address or personal information.
  • ISP uses cookies to collect non-personally identifiable information
what if an isp does not comply with an industry code of practice
What if an ISP does not comply with an industry code of practice
  • Some mechanisms, such as withdrawal of industry association rights or privileges, and compliance incentives, such as the right to display compliance symbols will need to be approved by government authorities.
  • Otherwise Contravention of an online provider rule is a criminal offence and a continuing offence for each day the contravention continues.
references
References
  • http://nemesis.lonestar.org/reference/internet/mail/anti-spam/isp-general.html
  • http://www.yourdictionary.com/dictionary-articles/Define-Ethics.html
  • http://plato.stanford.edu/entries/ethics-it-phenomenology
ad