You are on page 1of 57

T11 (Security3) - Computer Ethics and Netiquette

Information Technology and Life


• Information Technology provides people convenience in
– shopping and entertainment
– banking services
– home electrical appliances
– office automation
– production scheduling
– military applications
– wireless communications
– tourism planning
– weather forecasts

2
Information Technology and Life
• Information Technology, not only increases productivity,
but also having better living standard.

• Like a knife, Information Technology:


– can benefit human when being used properly
– can endanger human living space when being used
improperly

3
Think
• What convenience can IT brings you?
– The cyberspace 網路空間 constructed a virtual country,
which has similar activities in the real-world, such as
shopping, entertainment, health care, election and friends.

– Formation of virtual group community, people can have


information sharing and exchange, break through
the cultural and national boundaries邊界.

– Addicted to virtual world, slowly losing the ability to


communicate with people face to face, resulting in
interpersonal alienation人際關係的疏離感.

4
Think
• What convenience can IT brings you?
– Cyber World anonymous features, people are liable
to bold violation of ethical behavior, such as
• spreading false rumors謠傳
• Infringement違反 of information privacy
• illegal transactions

– Social systems and norms can not keep up the speed


of progress in information technology, resulting in a
confusion 困惑 in which new order has not yet been
established but old order has been destroyed.

5
Classification of Ethics
• Information Ethics 資訊倫理
– It covers all IT development and related ethics issues,
including computer ethics 電腦倫理 and
Internet ethics 網路倫理.
– This specifications is not only for IT professional, but
for all the computer users and Internet activities
worldwide, who must have awareness.

Computer
Ethics

Internet Information
Ethics Ethics

6
Classification of Ethics
• Computer Ethics 電腦倫理
– People’s behavior that related to the ethical norms and
affected by the great impact of computer technology
– E.g. Personal responsibility when using shared computer

• Internet Ethics 網路倫理


– Due to the use and popularity of the Internet, it extends out
of the new ethical issues. Internet is a part of computer
system. Internet ethics issues are part of computer
ethics.
– E.g. Netiquette 網路禮儀

7
Outline

• Computer Ethics 電腦倫理

• Computer Crimes

• Netiquette 網路禮儀

8
Topic 1

Computer Ethics 電腦倫理

9
What is Computer Ethics電腦倫理?
• Computer ethics is based on standard norms 標準 of
morality 道德 and law 法律.
– Morality 道德 refers to a person’s awareness of the
value of right and wrong, accumulated by education and
experience. When a person's behavior or thinking
conflicts with his/her value or conscious mind, he/she will
be uncomfortable, and has sad feeling. These are
the strength of morality.
– Law 法律 refers to the system of law governing a society.

10
What is Computer Ethics?
• Computer ethics aims to prevent unethical behavior
and also reduce computer crime by giving people the
motivation or behavioral standards of right and wrong
judgments.

• If the computer world is without


ethics, computer is easily to
become a tool for criminals
which cause many problems.

11
Ethics 倫理學 and Legality 合法性 (1)

12
Ethics 倫理學 and Legality 合法性 (2)
Q1: Choose the best description for the following situation.
“Dismiss an employee who did not follow the
contractual obligations or expectations of the work”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal

13
Ethics 倫理學 and Legality 合法性 (3)
Q2: Choose the best description for the following situation.
“Buy copyrighted software to create customer
accounts”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal

14
Ethics 倫理學 and Legality 合法性 (4)
Q3: Choose the best description for the following situation.
“Buy copyrighted CD to listen to music”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal

15
Ethics 倫理學 and Legality 合法性 (5)
Q4: Choose the best description for the following situation.
“Copy the copyrighted software for backup”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal

16
Ethics 倫理學 and Legality 合法性 (6)
Q5: Choose the best description for the following situation.
“Setup improper sites to copy copyrighted software in
countries with incomplete law”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal

17
Ethics 倫理學 and Legality 合法性 (7)
Q6: Choose the best description for the following situation.
“Spreading email address list or obtaining personal
information legally”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal

18
Ethics 倫理學 and Legality 合法性 (8)
Q7: Choose the best description for the following situation.
“Unauthorized copying of copyrighted software, books
or works”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal

19
Ethics 倫理學 and Legality 合法性 (9)
Q8: Choose the best description for the following situation.
“Implanted virus programs to attack or destroy
someone else’s computer”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal

20
Ethics 倫理學 and Legality 合法性 (10)
Q9: Choose the best description for the following situation.
“Download and use unauthorized software and video
files”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal

21
Ethics 倫理學 and Legality 合法性 (11)
Q10: Choose the best description for the following situation.
“Slander or intimidate others by email”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal

22
Ethics 倫理學 and Legality 合法性 (12)
Q11: Choose the best description for the following situation.
“Act as hero, Robin Hood 羅賓漢(傳說中劫富濟貧的
綠林好漢)”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal

23
Ethics 倫理學 and Legality 合法性 (13)
Q12: Choose the best description for the following situation.
“The report does not indicate the source of reference
information”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal

24
Topic 2

Computer Crimes

25
Think

Have you ever done the followings?

What is the problem of the followings?

26
Have you disclose your personal information?

27
Have you use pirated software?

28
Have you download copyrighted works?

29
Lure誘惑 of Computer World for People
• Speed 速度

• Privacy and anonymity 隱私與匿名

• Characteristics of digital media 數位媒體的特質

• Technology intoxicated 技術陶醉

• Increase the rate of victims 受害者的比率增加

• International boundaries 國際化的疆界

• Destructive capacity 破壞性的能力

30
Computer Crime
• Aim: to use any kind of computer technology in a crime

31
Categories of Computer Crime (1)
• Theft of money 金錢盜竊
- e.g. Internet gambling
• Theft of goods 貨物盜竊
- e.g. Internet fraud 盜竊
• Theft of information 資料盜竊
– e.g. obtain data which contain evidence value of
electronic data
• Sabotage 故意破壞
– e.g. crimes which target computer or computer
system directly, computer server intrusion or damage
to web pages

32
Categories of Computer Crime (2)
• Injection of viruses 注入電腦病毒
– e.g. spread computer viruses and computer hackers
電腦駭客 intrusion
• Piracy 盜版侵權
- e.g. Internet sale of contraband 走私貨, controlled
items
• Internet pornography 網路色情
– e.g. spread of child pornography
on the Internet

33
Impact of Computer Crime (1)
• Loss of data and information
• Destruction of Information Technology resources

34
Impact of Computer Crime (2)
• Time-consuming to read, check and verify
hoax e-mail
• Time-consuming to reset the system

35
Impact of Computer Crime (3)
• Bandwidth-consuming
• No access to services
• Unauthorized use or misuse of computer system

36
Impact of Computer Crime (4)
• Loss of customer trust
• Loss of public confidence
• Production system crashes
• Financial loss
• Impairment of goodwill

37
Preventive Measures on
Computer Crimes
• Proper use of the Internet Code of Practice
• Guidelines for handling the account and password
• Use software notice
• Browse the Web and e-shopping
• Information processing of personal data
• Safe use of blog

38
Personal Responsibility (1)
• Know online information is not entirely reliable
• Good use of my time and resources on the Internet
• Maintain a balanced lifestyle
• Be a healthy online game player
• Make friends carefully
• Do not disclose your personal information to
strangers, such as phone number and address

39
Personal Responsibility (2)
• Share and download virus-free files
• Do not use, download and purchase pirated software
• Try to prevent computer being infected by viruses
• Prevention of computer hacking

40
Personal Responsibility (3)
• Regularly update computer software
• Regularly back up your data
• Avoid watching bad material
• Be a sensible e-banking user
• Carefully choose a password

41
Social Responsibility
• Computer Crimes Ordinance電腦罪行條例

• Electronic Transactions Ordinance電子交易條例

• The Unsolicited Electronic Messages Ordinance


非應邀電子訊息條例

• Personal Data (Privacy) Ordinance個人資料(私隱)條例

• Copyright Ordinance版權條例

42
Topic 3

Netiquette 網路禮儀

43
Think
• Have you ever received a virus warning letter, and
passed on to the people on your contact list
immediately without looking at who the sender was?

44
Think
• Have you ever seen something you feel which is
worth to circulate, you then send it to everyone on
the address book?

45
What is Netiquette?
• Use the Internet responsibly

• Respect for each other


Basic Netiquette
• Speech and language used should be cautious
• Network resources should not be abused
• Respect for copyright
• Do not spread rumors
• Comply with the rules and
regulations of the site
• Do not engage in illegal behavior

47
Importance of Netiquette
• The Internet can obscure the user's identity in real life,
so people feel like wearing masks, true faceless.

• Without netiquette, the Internet become:


• speak irresponsibly
• attack
• emotional abuse
• cyberbullying
• commit libel 誹謗

48
Summary (1)
• Classification of Ethics
– Information Ethics
– Computer Ethics
– Internet Ethics

• Computer Ethics
– What is Computer Ethics?
– Ethics 倫理學 and Legality 合法性

• Computer Crimes
– Lure of Computer World for People
– What is Computer Crimes?

49
Summary (2)
• Computer Crimes (continued)
– Categories of Computer Crime
• Theft of money 金錢盜竊
• Theft of goods 貨物盜竊
• Theft of information 資料盜竊
• Sabotage 故意破壞
• Injection of viruses 注入電腦病毒
• Piracy 盜版侵權
• Internet pornography 網路色情
– Impact of Computer Crime
– Preventive Measures on Computer
Crimes
– Personal Responsibility

50
Summary (3)
• Computer Crimes (continued)
– Social Responsibility
• Computer Crimes Ordinance電腦罪行條例
• Electronic Transactions Ordinance電子交易條例
• The Unsolicited Electronic Messages Ordinance
非應邀電子訊息條例
• Personal Data(Privacy) Ordinance個人資料(私隱)條例
• Copyright Ordinance版權條例

• Netiquette
– What is Netiquette?
– Basic Netiquette
– Importance of Netiquette
51
Glossary 詞語表 (1)
• Boundaries邊界
• Characteristics of digital media 數位媒體的特質
• Computer Crimes Ordinance電 腦罪行條例
• Computer ethics 電腦倫理
• Computer hackers 電腦駭客
• Confusion 困惑
• Copyright Ordinance 版權條例
• Contraband 走私貨
• Cyberspace 網路空間

52
Glossary 詞語表 (2)
• Destructive capacity 破壞性的能力
• Electronic Transactions Ordinance電子交易條例
• Ethics 倫理學
• Fraud 盜竊
• Increase the rate of victims 受害者的比率增加
• Information Ethics 資訊倫理
• Infringement 違反
• Injection of viruses 注入電腦病毒
• International boundaries 國際化的疆界

53
Glossary 詞語表 (3)
• Internet ethics 網路倫理
• Internet pornography 網路色情
• Interpersonal alienation 人際關係的疏離感
• Law 法律
• Legality 合法性
• Lure 誘惑
• Morality 道德
• Netiquette 網路禮儀
• Norms 標準

54
Glossary 詞語表 (4)
• Personal Data (Privacy) Ordinance個人資料(私隱)條例
• Piracy 盜版侵權
• Privacy and anonymity 隱私與匿名
• Rumors 謠傳
• Sabotage 故意破壞
• Speed 速度
• Technology intoxicated 技術陶醉

55
Glossary 詞語表 (5)
• The Unsolicited Electronic Messages Ordinance
非應邀電子訊息條例
• Theft of goods 貨物盜竊
• Theft of information 資料盜竊
• Theft of money 金錢盜竊

56
~ End ~

You might also like