Computer Safety and Ethics Viruses A properly constructed













- Slides: 13
Computer Safety and Ethics
Viruses • A properly constructed virus can disrupt productivity causing billions of dollars in damage • A virus is a small piece of software that piggybacks on real programs • Common viruses are e-mail (as attachments), trojan horses, or worms
How to Protect Your Computer From Virus Attacks • Installing virus protection software, such as Norton Anitvirus, Mac. Afee, or AVG • Avoid programs from unknown sources (especially on the Internet) • Enable Macro Virus Protection (don’t run a macro unless you know what it does) • Don’t double-click an e-mail attachment that runs an executable file (. exe). Other dangerous file extensions are. jpg, . com, or. pbs
Unethical Use of Computers • Identity Theft • Cheating • Plagiarism • Cyber-bullying • Pornography
Software Piracy • Licensed user duplication for unlicensed users • Illegal Internet distribution • Distributing versions to unauthorized markets • Copying and using commercial software purchased by someone else
Illegal Downloading �Most peer-to-peer programs are level. Sharing a lot of the materials on them is not. �Some P 2 P software contains malware and will share everything on your computer, whether you intend it to or not. �A general rule of thumb is to consider all content copyrighted unless you can prove otherwise (a site may include a statement that they have obtained permission, or may grant you permission to use the digital media). �Lists of sites that provide legal downloading can be found at EDUCAUSE, RIAA, MPAA
Copyright Law �Copyright gives the right to copy, adapt, and distribute original work. Usually given to the creator of the work. �Does not have to be registered �Copyright covers items such as books, maps, sheet music, paintings, photos (this includes clip art), sound recordings, motion pictures, and computer programs �Copyright laws are partially standard, but not universally recognized. �Applies to moral rights, such as the right to be credited for work
Copyright � Typically lasts either 50 or 70 years (but can be as long as 120 years) after the death of the author. �Some copyrights need to be periodically renewed. �When a copyright expires, the work becomes part of public domain. � The Digital Millennium Copyright Act was established specifically to deal with copyright of digital files and software programs
Fair Use • Copyright does not prohibit all copying or replication • To decide fair use, the following are considered: • • • the purpose and character of the use; • the effect of the use upon the potential market for or value of the copyrighted work. the nature of the copyrighted work; the amount and substantialness of the portion used in relation to the copyrighted work as a whole; and • Common fair uses include research and study, review and critique, parody and satire
How Does This Affect Us in the Classroom • Students may download images from the Internet for student projects but may not be reposted on the Internet without permission from the original author/artist • Audio or video can be included as long as it is the shorter of 3 minutes or 10% or the original, and is not re-published.
Freeware, Shareware, Public Domain • Freeware is computer software that is available for no cost or for an optional fee (with restricted rights) • Shareware is software provided to users without payment on a trial basis (either limited features or time) • Public domain software has no ownership of copyright and can be used freely • The most common type of software, obviously, is commercial. This is produced for sale.
Netiquette �Short for network and etiquette, general guidelines for behaving on the Internet. �Common rules include: �Remember the human �Adhere to the same standards of behavior online that you follow in real life �Respect other people's time and bandwidth �Make yourself look good online �Share expert knowledge �Help keep flame wars under control �Respect other people's privacy �Be forgiving of other people's mistakes
Protecting Business Confidentiality �Businesses routinely have access to sensitive information about their clients and customers involving everything from health data to finance to trade secrets �Confidential information businesses collect on their employees, ranging from salaries to Social Security numbers �Businesses must build appropriate technological safeguards into systems, back it up with clear nondisclosure policies and practices, and train employees to be careful about what they disclose