ICT ETHICS 1 Privacy ICT privacy generally means
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-1.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-2.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-3.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-4.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-5.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-6.jpg)
![จรยธรรมเกยวกบการใชเทคโนโลยคอม พวเตอรและสารสนเทศ ICT ETHICS • 1. Privacy: ICT privacy, generally means; rights of being จรยธรรมเกยวกบการใชเทคโนโลยคอม พวเตอรและสารสนเทศ ICT ETHICS • 1. Privacy: ICT privacy, generally means; rights of being](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-7.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-8.jpg)
![จรยธรรมเกยวกบการใชเทคโนโลยคอม พวเตอรและสารสนเทศ ICT ETHICS Obvious privacy intrusions are; • 1. 1 Email accessibility and จรยธรรมเกยวกบการใชเทคโนโลยคอม พวเตอรและสารสนเทศ ICT ETHICS Obvious privacy intrusions are; • 1. 1 Email accessibility and](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-9.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-10.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-11.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-12.jpg)
![จรยธรรมเกยวกบการใชเทคโนโลยคอม พวเตอรและสารสนเทศ ICT ETHICS 2. Information Accuracy To manage information to be accurate and จรยธรรมเกยวกบการใชเทคโนโลยคอม พวเตอรและสารสนเทศ ICT ETHICS 2. Information Accuracy To manage information to be accurate and](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-13.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-14.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-15.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-16.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-17.jpg)
![ความลบทางการคา Secrets) (Trade . 1 Trade Secrets means all the intellectual properties such as ความลบทางการคา Secrets) (Trade . 1 Trade Secrets means all the intellectual properties such as](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-18.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-19.jpg)
![ลขสทธ (Copyright). 2 Copyright is the ownership of creations such as; literatures, music, arts ลขสทธ (Copyright). 2 Copyright is the ownership of creations such as; literatures, music, arts](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-20.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-21.jpg)
![งานสรางสรรคทมลขสทธ Copyright Creations • Literatures such as; books, booklets, writings, publications, computer programs. • งานสรางสรรคทมลขสทธ Copyright Creations • Literatures such as; books, booklets, writings, publications, computer programs. •](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-22.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-23.jpg)
![สทธบตร (Patent) • . 3 Patent means the official letter issued by the government สทธบตร (Patent) • . 3 Patent means the official letter issued by the government](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-24.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-25.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-26.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-27.jpg)
![• Distributing copied software among friends is caution because the programs might be • Distributing copied software among friends is caution because the programs might be](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-28.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-29.jpg)
![จรยธรรมเกยวกบการใชเทคโนโลย คอมพวเตอรและสารสนเทศ 4. Data Accessibility The right to access the programs or computer systems จรยธรรมเกยวกบการใชเทคโนโลย คอมพวเตอรและสารสนเทศ 4. Data Accessibility The right to access the programs or computer systems](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-30.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-31.jpg)
![อาชญากรรมคอมพวเตอร crimes Computer Using computers as a tool for crime. 1. to steal credit อาชญากรรมคอมพวเตอร crimes Computer Using computers as a tool for crime. 1. to steal credit](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-32.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-33.jpg)
![ลกษณะของอาชญากรรม คอมพวเตอร Computer Crimes Samples of 3 computer crimes; 1. Accessing and using one’s ลกษณะของอาชญากรรม คอมพวเตอร Computer Crimes Samples of 3 computer crimes; 1. Accessing and using one’s](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-34.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-35.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-36.jpg)
![. 1ไวรสคอมพวเตอร Virus( (Computer Is a program written for making some modifications to other . 1ไวรสคอมพวเตอร Virus( (Computer Is a program written for making some modifications to other](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-37.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-38.jpg)
![. 1ไวรสคอมพวเตอร Virus( (Computer viruses are divided into 3 types: 1. Boot sector viruses . 1ไวรสคอมพวเตอร Virus( (Computer viruses are divided into 3 types: 1. Boot sector viruses](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-39.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-40.jpg)
![. 2เวรมหรอหนอนอนเทอรเนต (Worm( • A computer program that can spread itself like a virus . 2เวรมหรอหนอนอนเทอรเนต (Worm( • A computer program that can spread itself like a virus](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-41.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-42.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-43.jpg)
![. 4ขาวหลอกลวง (Hoax) Send a message to each other like a chain letter, to . 4ขาวหลอกลวง (Hoax) Send a message to each other like a chain letter, to](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-44.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-45.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-46.jpg)
![ขอสงเกตเพอการตรวจสอบวาเครองคอมพวเตอร ไดรบไวรส เวรม และมาโทรจน หรอไม Observations to check whether your computer is infected by ขอสงเกตเพอการตรวจสอบวาเครองคอมพวเตอร ไดรบไวรส เวรม และมาโทรจน หรอไม Observations to check whether your computer is infected by](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-47.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-48.jpg)
![การขโมยขอมลและอปก รณคอมพวเตอร Identity theft, and computer equipment • Such as; unauthorized access to data การขโมยขอมลและอปก รณคอมพวเตอร Identity theft, and computer equipment • Such as; unauthorized access to data](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-49.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-50.jpg)
![วธการปองกนการเขาถงขอมลแ ละคอมพวเตอร How to prevent access to information and computers. 1. The username, user วธการปองกนการเขาถงขอมลแ ละคอมพวเตอร How to prevent access to information and computers. 1. The username, user](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-51.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-52.jpg)
![ควรสราง password ทยากตอการคาดเดา และไมควรใหเครองจำ password You should create a password that is difficult to ควรสราง password ทยากตอการคาดเดา และไมควรใหเครองจำ password You should create a password that is difficult to](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-53.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-54.jpg)
![วธการปองกนการเขาถงขอมลและ อมพวเตอร Accessibility Protection 3. Using biometric devices to check the personal characteristics, to วธการปองกนการเขาถงขอมลและ อมพวเตอร Accessibility Protection 3. Using biometric devices to check the personal characteristics, to](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-55.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-56.jpg)
![วธการปองกนการเขาถงขอมลและ วธการปองกนการเขาถงขอมลแ อมพวเตอร ละคอมพวเตอร Accessibility Protection ค 4. Callback system is a system which วธการปองกนการเขาถงขอมลและ วธการปองกนการเขาถงขอมลแ อมพวเตอร ละคอมพวเตอร Accessibility Protection ค 4. Callback system is a system which](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-57.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-58.jpg)
![วธการปองกนการเขาถงขอมลและ การปองกนระบบคอมพวเตอรและเ อมพวเตอร Accessibility Protection ครอขาย Firewall program is installed on the computer to วธการปองกนการเขาถงขอมลและ การปองกนระบบคอมพวเตอรและเ อมพวเตอร Accessibility Protection ครอขาย Firewall program is installed on the computer to](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-59.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-60.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-61.jpg)
![การปองกนไวรสคอมพวเตอร Virus Protection 1. Never open stranger’s email, because of the high risk of การปองกนไวรสคอมพวเตอร Virus Protection 1. Never open stranger’s email, because of the high risk of](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-62.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-63.jpg)
![จรรยาบรรณในการใชงานคอมพวเตอร Ethics in computer professions Ethics means the Codes of Behavior that is established จรรยาบรรณในการใชงานคอมพวเตอร Ethics in computer professions Ethics means the Codes of Behavior that is established](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-64.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-65.jpg)
![จรรยาบรรณในการใชงานคอมพวเตอร อร Ethics in computer usages จรรยาบรรณในการใชคอมพวเตอร computer usages are as follows; ม ดงน จรรยาบรรณในการใชงานคอมพวเตอร อร Ethics in computer usages จรรยาบรรณในการใชคอมพวเตอร computer usages are as follows; ม ดงน](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-66.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-67.jpg)
![กฎหมายเทคโนโลยสารสนเทศ IT Act Why there need to be information technology legislation? 1. The advance กฎหมายเทคโนโลยสารสนเทศ IT Act Why there need to be information technology legislation? 1. The advance](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-68.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-69.jpg)
![กฎหมายเทคโนโลยสารสนเทศของไทย Thailand's Information Technology Law Cabinet has approved the information technology Law of Thailand กฎหมายเทคโนโลยสารสนเทศของไทย Thailand's Information Technology Law Cabinet has approved the information technology Law of Thailand](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-70.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-71.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-72.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-73.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-74.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-75.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-76.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-77.jpg)
![ตวอยางคดอาชญากรรมทาง คอมพวเตอร • Theft of money from others’ bank account • Theft of corporate ตวอยางคดอาชญากรรมทาง คอมพวเตอร • Theft of money from others’ bank account • Theft of corporate](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-78.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-79.jpg)
![. 4 กฎหมายคมครองขอมลสวนบ คคล Protection of personal information. The information in digital photo can . 4 กฎหมายคมครองขอมลสวนบ คคล Protection of personal information. The information in digital photo can](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-80.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-81.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-82.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-83.jpg)
![าตรา 78 Secondary legislation Law, in the Section 78, in the section 78 of าตรา 78 Secondary legislation Law, in the Section 78, in the section 78 of](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-84.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-85.jpg)
![• Current IT law was enacted, it is the Act of electronic Transaction • Current IT law was enacted, it is the Act of electronic Transaction](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-86.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-87.jpg)
![• Current problem in Thailand is the law is unable to guarantee adequate • Current problem in Thailand is the law is unable to guarantee adequate](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-88.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-89.jpg)
![สรป Conclusion • IT and IT system are important for modern lifestyle, so there สรป Conclusion • IT and IT system are important for modern lifestyle, so there](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-90.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-91.jpg)
- Slides: 91
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-1.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-2.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-3.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-4.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-5.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-6.jpg)
![จรยธรรมเกยวกบการใชเทคโนโลยคอม พวเตอรและสารสนเทศ ICT ETHICS 1 Privacy ICT privacy generally means rights of being จรยธรรมเกยวกบการใชเทคโนโลยคอม พวเตอรและสารสนเทศ ICT ETHICS • 1. Privacy: ICT privacy, generally means; rights of being](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-7.jpg)
จรยธรรมเกยวกบการใชเทคโนโลยคอม พวเตอรและสารสนเทศ ICT ETHICS • 1. Privacy: ICT privacy, generally means; rights of being isolated or the ownership of individual to control their data accessibility to other, this rights includes the ownership of individual, group of people, and organizations. For instance, the e-mails and user’s profile for accessing a website. 7
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-8.jpg)
![จรยธรรมเกยวกบการใชเทคโนโลยคอม พวเตอรและสารสนเทศ ICT ETHICS Obvious privacy intrusions are 1 1 Email accessibility and จรยธรรมเกยวกบการใชเทคโนโลยคอม พวเตอรและสารสนเทศ ICT ETHICS Obvious privacy intrusions are; • 1. 1 Email accessibility and](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-9.jpg)
จรยธรรมเกยวกบการใชเทคโนโลยคอม พวเตอรและสารสนเทศ ICT ETHICS Obvious privacy intrusions are; • 1. 1 Email accessibility and file-saving on a computer along with stored and exchanged profiles of users on the internet services. • 1. 2 Using technologies to trail or closely observe a person’s behavior such as; a company uses computers to monitor and watch the employees’ operation till it immorally intrudes their privacy. • 1. 3 Using customers’ information from many sources for commercial and marketing benefits. • 91. 4 Collecting customers’ contacts and details to create customer’s database and sell it to others companies.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-10.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-11.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-12.jpg)
![จรยธรรมเกยวกบการใชเทคโนโลยคอม พวเตอรและสารสนเทศ ICT ETHICS 2 Information Accuracy To manage information to be accurate and จรยธรรมเกยวกบการใชเทคโนโลยคอม พวเตอรและสารสนเทศ ICT ETHICS 2. Information Accuracy To manage information to be accurate and](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-13.jpg)
จรยธรรมเกยวกบการใชเทคโนโลยคอม พวเตอรและสารสนเทศ ICT ETHICS 2. Information Accuracy To manage information to be accurate and reliable, the administrators need to check and verify the information before uploaded to the server and need to frequently update to make the information to be as up-to-date as possible. Besides, admin should provide users authority to check and correct their profiles such as; 13
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-14.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-15.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-16.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-17.jpg)
![ความลบทางการคา Secrets Trade 1 Trade Secrets means all the intellectual properties such as ความลบทางการคา Secrets) (Trade . 1 Trade Secrets means all the intellectual properties such as](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-18.jpg)
ความลบทางการคา Secrets) (Trade . 1 Trade Secrets means all the intellectual properties such as chemical formula, production plans, product design, tools which are not publicized to keep them secret. The owners can patent for the copyright which the regulations can be vary by the places or states of registration. Example: - patent of carbonate drinks formula - patent of chili paste ingredients A part of details is informed to the customers but all details will not be publicized.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-19.jpg)
![ลขสทธ Copyright 2 Copyright is the ownership of creations such as literatures music arts ลขสทธ (Copyright). 2 Copyright is the ownership of creations such as; literatures, music, arts](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-20.jpg)
ลขสทธ (Copyright). 2 Copyright is the ownership of creations such as; literatures, music, arts which are not allowed to copy by others except formal permission from authorities even if the creations are exhibit over the internet. According to the law, the copyright will exist for 50 years after the creation’s first
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-21.jpg)
![งานสรางสรรคทมลขสทธ Copyright Creations Literatures such as books booklets writings publications computer programs งานสรางสรรคทมลขสทธ Copyright Creations • Literatures such as; books, booklets, writings, publications, computer programs. •](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-22.jpg)
งานสรางสรรคทมลขสทธ Copyright Creations • Literatures such as; books, booklets, writings, publications, computer programs. • Dramatic works such as; choreography, dancing, acting. • Artistic works such as; painting, sculptures, printings, architectural designs, and photos. • Musical works are including with the lyrics and melodies along with music compositions and rearrangement. • Audiovisual works such as; videotapes, laser discs, etc. • Motion pictures.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-23.jpg)
![สทธบตร Patent 3 Patent means the official letter issued by the government สทธบตร (Patent) • . 3 Patent means the official letter issued by the government](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-24.jpg)
สทธบตร (Patent) • . 3 Patent means the official letter issued by the government to the person for the protection of the innovative creations. Patent will last 20 years from the registration date. • Unlike trade secrets, patents and copyright aim to protect the products which are manufactured for customers and the information which are publicized.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-25.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-26.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-27.jpg)
![Distributing copied software among friends is caution because the programs might be • Distributing copied software among friends is caution because the programs might be](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-28.jpg)
• Distributing copied software among friends is caution because the programs might be copyright and should acknowledge the user’s authority, for example; • Copyright or Software license - the license is included with the product payment and authority is under conditions. • Shareware – you can try the software before you buy.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-29.jpg)
![จรยธรรมเกยวกบการใชเทคโนโลย คอมพวเตอรและสารสนเทศ 4 Data Accessibility The right to access the programs or computer systems จรยธรรมเกยวกบการใชเทคโนโลย คอมพวเตอรและสารสนเทศ 4. Data Accessibility The right to access the programs or computer systems](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-30.jpg)
จรยธรรมเกยวกบการใชเทคโนโลย คอมพวเตอรและสารสนเทศ 4. Data Accessibility The right to access the programs or computer systems is usually controlled by the rank of users to protect the system and other users’ profile. Therefore, the development of computer systems concerns the security and It has been designed to secure user accessibility. The access from unauthorized user is considered a violation as well as personal 30
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-31.jpg)
![อาชญากรรมคอมพวเตอร crimes Computer Using computers as a tool for crime 1 to steal credit อาชญากรรมคอมพวเตอร crimes Computer Using computers as a tool for crime. 1. to steal credit](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-32.jpg)
อาชญากรรมคอมพวเตอร crimes Computer Using computers as a tool for crime. 1. to steal credit card numbers. 2. To impersonate other people, act as one another by using his/her identities such as ID number. 3. The computer scam is done by deceiving others through computers such as, text messaging or fault ads.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-33.jpg)
![ลกษณะของอาชญากรรม คอมพวเตอร Computer Crimes Samples of 3 computer crimes 1 Accessing and using ones ลกษณะของอาชญากรรม คอมพวเตอร Computer Crimes Samples of 3 computer crimes; 1. Accessing and using one’s](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-34.jpg)
ลกษณะของอาชญากรรม คอมพวเตอร Computer Crimes Samples of 3 computer crimes; 1. Accessing and using one’s computer without permission. 2. Harassment or data deletion. 3. Identity and computer hardware theft.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-35.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-36.jpg)
![1ไวรสคอมพวเตอร Virus Computer Is a program written for making some modifications to other . 1ไวรสคอมพวเตอร Virus( (Computer Is a program written for making some modifications to other](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-37.jpg)
. 1ไวรสคอมพวเตอร Virus( (Computer Is a program written for making some modifications to other programs. The number of infected programs will increase rapidly. They can be embedded in files or storage devices such as hard disks. For the damage will be divided into two types. 1. Virus which shows messages or slow down your computer. But it doesn’t destroy the data. 2. Damages from virus which causes the system destruction includes with files deletion or the computer shutdown.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-38.jpg)
![1ไวรสคอมพวเตอร Virus Computer viruses are divided into 3 types 1 Boot sector viruses . 1ไวรสคอมพวเตอร Virus( (Computer viruses are divided into 3 types: 1. Boot sector viruses](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-39.jpg)
. 1ไวรสคอมพวเตอร Virus( (Computer viruses are divided into 3 types: 1. Boot sector viruses (system virus) will run when the computer starts. 2. File or program Viruses. The viruses are embedded in the various files, mostly with the extension “. exe” and “. com” The files are usually infected by downloading from the Internet or opening email attachments. 3. Macro viruses work on programs that use macros such as word processor and spreadsheet.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-40.jpg)
![2เวรมหรอหนอนอนเทอรเนต Worm A computer program that can spread itself like a virus . 2เวรมหรอหนอนอนเทอรเนต (Worm( • A computer program that can spread itself like a virus](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-41.jpg)
. 2เวรมหรอหนอนอนเทอรเนต (Worm( • A computer program that can spread itself like a virus but a bit different that viruses need the command to trigger while worms are able to spread from computer to computer via email and the Internet. • The uniqueness of worms is they can duplicate itself immensely in just a few minutes. • The samples of well-known worms are "Nimda", "W 32. Sobig", "W 32. bugbear", "W 32. blaster" and "Love Bug" etc.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-42.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-43.jpg)
![4ขาวหลอกลวง Hoax Send a message to each other like a chain letter to . 4ขาวหลอกลวง (Hoax) Send a message to each other like a chain letter, to](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-44.jpg)
. 4ขาวหลอกลวง (Hoax) Send a message to each other like a chain letter, to misunderstand others by using psychological techniques such as; • "Virtual Card for You" • "Life is Beautiful“ • "FAMILY PICTURES“ • Please do not drink. . . • Beverage brands. . . • Please do not use mobile brand. . .
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-45.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-46.jpg)
![ขอสงเกตเพอการตรวจสอบวาเครองคอมพวเตอร ไดรบไวรส เวรม และมาโทรจน หรอไม Observations to check whether your computer is infected by ขอสงเกตเพอการตรวจสอบวาเครองคอมพวเตอร ไดรบไวรส เวรม และมาโทรจน หรอไม Observations to check whether your computer is infected by](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-47.jpg)
ขอสงเกตเพอการตรวจสอบวาเครองคอมพวเตอร ไดรบไวรส เวรม และมาโทรจน หรอไม Observations to check whether your computer is infected by viruses, worms or Trojan horses or not. 1. unknown text or images are shown on the screen. 2. Unusual noise or music are sometimes played. 3. Computer memory is lower than it should be. 4. Programs or files are missing even you did not delete them. 5. There is unknown program. 6. Unusually large file size. 7. Files or programs are malfunctioned.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-48.jpg)
![การขโมยขอมลและอปก รณคอมพวเตอร Identity theft and computer equipment Such as unauthorized access to data การขโมยขอมลและอปก รณคอมพวเตอร Identity theft, and computer equipment • Such as; unauthorized access to data](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-49.jpg)
การขโมยขอมลและอปก รณคอมพวเตอร Identity theft, and computer equipment • Such as; unauthorized access to data or computer, stealing credit card numbers from the accounting database. • May be accessed externally or internally. • Protective devices and security should be installed and check the entry of visitors who access the system by
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-50.jpg)
![วธการปองกนการเขาถงขอมลแ ละคอมพวเตอร How to prevent access to information and computers 1 The username user วธการปองกนการเขาถงขอมลแ ละคอมพวเตอร How to prevent access to information and computers. 1. The username, user](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-51.jpg)
วธการปองกนการเขาถงขอมลแ ละคอมพวเตอร How to prevent access to information and computers. 1. The username, user ID, and password should not be simple and can be easily guess like birthday. 2. Using any other items to access like using ATM card to do banking transactions, this card is typically encrypted by a unique set of 4 -digit numbers as the password. The owner should realize of its importance and use more complicate numbers than date of birth or do not write the numbers onto the card.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-52.jpg)
![ควรสราง password ทยากตอการคาดเดา และไมควรใหเครองจำ password You should create a password that is difficult to ควรสราง password ทยากตอการคาดเดา และไมควรใหเครองจำ password You should create a password that is difficult to](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-53.jpg)
ควรสราง password ทยากตอการคาดเดา และไมควรใหเครองจำ password You should create a password that is difficult to predict and avoid using password recognizing program. • Do not use any word in the dictionary. • Do not use any word related to us, such as telephone number, birthday, pet name, nickname, etc. • Do not write your password anywhere. • Do not tell your password to others for any reason. • Randomly use letters, numbers and special characters together. • Do not let your computer remember the
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-54.jpg)
![วธการปองกนการเขาถงขอมลและ อมพวเตอร Accessibility Protection 3 Using biometric devices to check the personal characteristics to วธการปองกนการเขาถงขอมลและ อมพวเตอร Accessibility Protection 3. Using biometric devices to check the personal characteristics, to](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-55.jpg)
วธการปองกนการเขาถงขอมลและ อมพวเตอร Accessibility Protection 3. Using biometric devices to check the personal characteristics, to allow applications such as audio identification, fingerprint or palm-scan, signature, iris and face scan so the device will convert the personal biometrics into digital data for further biometric access comparison. If the information does not match, the computer will reject the login. ค
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-56.jpg)
![วธการปองกนการเขาถงขอมลและ วธการปองกนการเขาถงขอมลแ อมพวเตอร ละคอมพวเตอร Accessibility Protection ค 4 Callback system is a system which วธการปองกนการเขาถงขอมลและ วธการปองกนการเขาถงขอมลแ อมพวเตอร ละคอมพวเตอร Accessibility Protection ค 4. Callback system is a system which](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-57.jpg)
วธการปองกนการเขาถงขอมลและ วธการปองกนการเขาถงขอมลแ อมพวเตอร ละคอมพวเตอร Accessibility Protection ค 4. Callback system is a system which the user needs to identify the name and password to get access to the system. If the information is correct, it will automatically grant the user to access. Operating in this way will be more effective if the applicant uses computer or devices from the unchanged location (same phone number).
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-58.jpg)
![วธการปองกนการเขาถงขอมลและ การปองกนระบบคอมพวเตอรและเ อมพวเตอร Accessibility Protection ครอขาย Firewall program is installed on the computer to วธการปองกนการเขาถงขอมลและ การปองกนระบบคอมพวเตอรและเ อมพวเตอร Accessibility Protection ครอขาย Firewall program is installed on the computer to](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-59.jpg)
วธการปองกนการเขาถงขอมลและ การปองกนระบบคอมพวเตอรและเ อมพวเตอร Accessibility Protection ครอขาย Firewall program is installed on the computer to work as a security guard who monitors the accessibility of the system. It controls the external connections to get directly into the organization, as well as, controlling the internal connections to get to the Internet outside. Firewall installation pattern of an ค
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-60.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-61.jpg)
![การปองกนไวรสคอมพวเตอร Virus Protection 1 Never open strangers email because of the high risk of การปองกนไวรสคอมพวเตอร Virus Protection 1. Never open stranger’s email, because of the high risk of](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-62.jpg)
การปองกนไวรสคอมพวเตอร Virus Protection 1. Never open stranger’s email, because of the high risk of being a virus or a spam. 2. Keep observing the topic of the email. Especially the attractive English subject. 3. Install antivirus software such as; Norton Antivirus, PC -cillin, and regularly update the virus database. 4. Follow and pay attention to the news about the virus. 5. Learn to be careful. Do not open email without a second thought, since the survey found that 70 to 80 percent of all email is spam and email viruses. 6. Follow the news about the prevention of harassment and destruction from Thai Computer Emergency
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-63.jpg)
![จรรยาบรรณในการใชงานคอมพวเตอร Ethics in computer professions Ethics means the Codes of Behavior that is established จรรยาบรรณในการใชงานคอมพวเตอร Ethics in computer professions Ethics means the Codes of Behavior that is established](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-64.jpg)
จรรยาบรรณในการใชงานคอมพวเตอร Ethics in computer professions Ethics means the Codes of Behavior that is established in each field of vocation to guarantee and promote the reputation and fame of members such as; the ethics of medical staffs, ethics teachers, ethics of journalists, etc. Each professionals associated with computer should respect and adopt the ethics to their occupation, such as; the ethics of systems analysts that the analyst should always keep the company's data low-profile – that the information is confidential, programmers should not write code or virus attached to the application that
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-65.jpg)
![จรรยาบรรณในการใชงานคอมพวเตอร อร Ethics in computer usages จรรยาบรรณในการใชคอมพวเตอร computer usages are as follows ม ดงน จรรยาบรรณในการใชงานคอมพวเตอร อร Ethics in computer usages จรรยาบรรณในการใชคอมพวเตอร computer usages are as follows; ม ดงน](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-66.jpg)
จรรยาบรรณในการใชงานคอมพวเตอร อร Ethics in computer usages จรรยาบรรณในการใชคอมพวเตอร computer usages are as follows; ม ดงน Ethics in the 1. Must not use the computer to commit a crime or violate the rights of others. 2. Must not use the computer to harass others. 3. Must not spy or modify the documents or files of others without prior permission. 4. Must not use the computer to steal information. 5. Must not use the computer to create false evidence. 6. Must not use a computer to copy the copyrighted program. 7. Must not violate or use the unauthorized computer resources. 8. Must not use the computer to steal the work of others to be their own.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-67.jpg)
![กฎหมายเทคโนโลยสารสนเทศ IT Act Why there need to be information technology legislation 1 The advance กฎหมายเทคโนโลยสารสนเทศ IT Act Why there need to be information technology legislation? 1. The advance](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-68.jpg)
กฎหมายเทคโนโลยสารสนเทศ IT Act Why there need to be information technology legislation? 1. The advance of science and technology make people use more IT. 2. Law guarantees the reliability and confidence to do electronic transactions and trade over electronic commerce (E-Commerce E-Business). 3. Every organization is stepping to the Information society with paperless policy, in order to reduce the use of paper by using electronic data instead that make it easy to do the Electronic Data Interchange (EDI). 4. Doing business over the Internet more and more
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-69.jpg)
![กฎหมายเทคโนโลยสารสนเทศของไทย Thailands Information Technology Law Cabinet has approved the information technology Law of Thailand กฎหมายเทคโนโลยสารสนเทศของไทย Thailand's Information Technology Law Cabinet has approved the information technology Law of Thailand](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-70.jpg)
กฎหมายเทคโนโลยสารสนเทศของไทย Thailand's Information Technology Law Cabinet has approved the information technology Law of Thailand on December 15, 1998, the Ministry of Science and Technology, in hands with the National Electronics and Computer Technology Center to induce 6 drafts of IT Laws include; Act of Electronic Transactions. Act of Electronic Signature. Act of Computer Crimes. Act of Personal Information Privacy. Act of Electronic Funds Transfer. Secondary Legislation Act, Section 78 of the Constitution of Thailand.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-71.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-72.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-73.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-74.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-75.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-76.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-77.jpg)
![ตวอยางคดอาชญากรรมทาง คอมพวเตอร Theft of money from others bank account Theft of corporate ตวอยางคดอาชญากรรมทาง คอมพวเตอร • Theft of money from others’ bank account • Theft of corporate](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-78.jpg)
ตวอยางคดอาชญากรรมทาง คอมพวเตอร • Theft of money from others’ bank account • Theft of corporate secrets stored in the computer • Virus spread by sending, sharing malicious programs to others • The use of computers in counterfeit documents and sabotage • Stealing the domain name without shapes • Piracy
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-79.jpg)
![4 กฎหมายคมครองขอมลสวนบ คคล Protection of personal information The information in digital photo can . 4 กฎหมายคมครองขอมลสวนบ คคล Protection of personal information. The information in digital photo can](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-80.jpg)
. 4 กฎหมายคมครองขอมลสวนบ คคล Protection of personal information. The information in digital photo can be published and distributed quickly. Forwarding the broadcast could affect the right of privacy and against the Personal Information Protection Act. - U. S. and European privacy laws prohibit the act of seizing or stealing the data sent over the network unless given government official permission. In the past, Thailand has one of the electronic commerce website which was hacked by a UK
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-81.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-82.jpg)
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-83.jpg)
![าตรา 78 Secondary legislation Law in the Section 78 in the section 78 of าตรา 78 Secondary legislation Law, in the Section 78, in the section 78 of](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-84.jpg)
าตรา 78 Secondary legislation Law, in the Section 78, in the section 78 of the Constitution of the Kingdom of Thailand on the state to decentralization and local self-reliance and decision making on their own local affairs, economic, and infrastructure development. Also the information system infrastructure that cover the local area thoroughly and equally.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-85.jpg)
![Current IT law was enacted it is the Act of electronic Transaction • Current IT law was enacted, it is the Act of electronic Transaction](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-86.jpg)
• Current IT law was enacted, it is the Act of electronic Transaction 2002, 2002 which combined 2 laws of the electronic commerce and the electronic signature, on April 3, 2002 • The law greatly benefits both the electronic customers and the legal officials because the law accepts electronic evidences in the hearing procedure.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-87.jpg)
![Current problem in Thailand is the law is unable to guarantee adequate • Current problem in Thailand is the law is unable to guarantee adequate](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-88.jpg)
• Current problem in Thailand is the law is unable to guarantee adequate electronic protection and it is the main reason making the investors and businessperson to do any transactions over the internet. Because of the inefficiency of the system security and the uncertainty of interlude and intervention from outsiders, including with the fear of intellectual property violations(piracy), A stronger IT law is very necessary for electronic commerce to grow in Thailand.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-89.jpg)
![สรป Conclusion IT and IT system are important for modern lifestyle so there สรป Conclusion • IT and IT system are important for modern lifestyle, so there](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-90.jpg)
สรป Conclusion • IT and IT system are important for modern lifestyle, so there must be the protection system to secure the users’ safety which can be done three ways; protect the computers in the organization, secure the safe connection, and protect the privacy. These concerns are similar in the main purpose is to protect from outside intrusions such as; virus, hacking, stealth, which cause a lot of damages to the users and information system.
![](https://slidetodoc.com/presentation_image/3252e5e703c7f177b1060b5e91eaf486/image-91.jpg)
Cvs privacy awareness and hipaa training answers
Chapter 9 privacy security and ethics
Chapter 9 privacy security and ethics
Destructive event or prank a virus was created to deliver
Chapter 9 privacy security and ethics
Ict and ethics notes
Ict ethics and legislation
What is ict ethics
Deontology ethics example
Normative ethical questions
Descriptive ethics vs normative ethics
Teleological ethics vs deontological ethics
Micro ethics and macro ethics
Theological voluntarism
Beneficence examples
Descriptive ethics vs normative ethics
L
Descriptive ethics
Metaethics vs normative ethics
Emajene
What is ict means
Whats is ict
Business ethics is relative myth
Meta and morph means
Biodiversity and its conservation
Triangle quadrilateral pentagon hexagon octagon
Bio means 'life
Morphe means in metamorphism
Cost benefit constraint in accounting
A right handed operator generally begins seated at
Draping a client for shampoo
Microcultural groups
Brainpop precipitation
In a minimum cardinality, minimums are generally stated as
Example of time period principle
In reactions to form ionic compounds metals generally
Scientifically minded people generally
Created when a line becomes connected and encloses space
Divine masculine and feminine
Epiphytes plants
Continental polar canadian air masses generally move
Complementary proteins
First christian martyr
At the end of the 1800s, colonies were generally seen as a
Commercial paper in finance
Narrow belts of high speed winds
Sound waves from a radio generally travel in which medium?
Learning is relatively permanent change
Etvx criteria
Ward controlled system comes under the category of.......
Shapes that have smooth even edges and are measurable
Gaap akuntansi adalah
Parts of a business letter quiz
Generally speaking, the use of carburetor heat tends to
A note is generally defined as:
Compared to atoms of metals, atoms of nonmetals generally
Place and route tool generally produces
Differences between products and services
Culture and society are intricately related
Ashley began her banking career as a teller
A purposeful refusal to become generally involved
Members of the progressive movement generally supported
Chapter 16 hair cutting
Generally, people use facial management techniques to
It is generally refers to human movement
An access matrix is generally dense
Prep phrases
Capacity requirement planning flow chart
Enumerate the types of revolve section view
Information retrieval generally refers to
What is an ide
Shapes that have smooth even edges and are measurable
Comma after generally
Mosses and their relatives are generally called
Phil allport
Steve cisowski
Hipaa privacy and security awareness training
Platform for privacy preferences project
New mexico privacy
Microsoft from back doors patch gov
Protect privacy
Complexity of differential privacy
Asia pacific privacy authorities
Harlotry 2016 privacy, lewdness
Acson privacy policy
Gdpr privacy
Microsoft office privacy settings popup
Privacy by design template
Big data privacy issues in public social media
George theodorakopoulos
Differential privacy
Malaysia data privacy law