Professional Documents
Culture Documents
T11 (Security3) - Computer Ethics and Netiquette
T11 (Security3) - Computer Ethics and Netiquette
2
Information Technology and Life
• Information Technology, not only increases productivity,
but also having better living standard.
3
Think
• What convenience can IT brings you?
– The cyberspace 網路空間 constructed a virtual country,
which has similar activities in the real-world, such as
shopping, entertainment, health care, election and friends.
4
Think
• What convenience can IT brings you?
– Cyber World anonymous features, people are liable
to bold violation of ethical behavior, such as
• spreading false rumors謠傳
• Infringement違反 of information privacy
• illegal transactions
5
Classification of Ethics
• Information Ethics 資訊倫理
– It covers all IT development and related ethics issues,
including computer ethics 電腦倫理 and
Internet ethics 網路倫理.
– This specifications is not only for IT professional, but
for all the computer users and Internet activities
worldwide, who must have awareness.
Computer
Ethics
Internet Information
Ethics Ethics
6
Classification of Ethics
• Computer Ethics 電腦倫理
– People’s behavior that related to the ethical norms and
affected by the great impact of computer technology
– E.g. Personal responsibility when using shared computer
7
Outline
• Computer Crimes
• Netiquette 網路禮儀
8
Topic 1
9
What is Computer Ethics電腦倫理?
• Computer ethics is based on standard norms 標準 of
morality 道德 and law 法律.
– Morality 道德 refers to a person’s awareness of the
value of right and wrong, accumulated by education and
experience. When a person's behavior or thinking
conflicts with his/her value or conscious mind, he/she will
be uncomfortable, and has sad feeling. These are
the strength of morality.
– Law 法律 refers to the system of law governing a society.
10
What is Computer Ethics?
• Computer ethics aims to prevent unethical behavior
and also reduce computer crime by giving people the
motivation or behavioral standards of right and wrong
judgments.
11
Ethics 倫理學 and Legality 合法性 (1)
12
Ethics 倫理學 and Legality 合法性 (2)
Q1: Choose the best description for the following situation.
“Dismiss an employee who did not follow the
contractual obligations or expectations of the work”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal
13
Ethics 倫理學 and Legality 合法性 (3)
Q2: Choose the best description for the following situation.
“Buy copyrighted software to create customer
accounts”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal
14
Ethics 倫理學 and Legality 合法性 (4)
Q3: Choose the best description for the following situation.
“Buy copyrighted CD to listen to music”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal
15
Ethics 倫理學 and Legality 合法性 (5)
Q4: Choose the best description for the following situation.
“Copy the copyrighted software for backup”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal
16
Ethics 倫理學 and Legality 合法性 (6)
Q5: Choose the best description for the following situation.
“Setup improper sites to copy copyrighted software in
countries with incomplete law”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal
17
Ethics 倫理學 and Legality 合法性 (7)
Q6: Choose the best description for the following situation.
“Spreading email address list or obtaining personal
information legally”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal
18
Ethics 倫理學 and Legality 合法性 (8)
Q7: Choose the best description for the following situation.
“Unauthorized copying of copyrighted software, books
or works”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal
19
Ethics 倫理學 and Legality 合法性 (9)
Q8: Choose the best description for the following situation.
“Implanted virus programs to attack or destroy
someone else’s computer”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal
20
Ethics 倫理學 and Legality 合法性 (10)
Q9: Choose the best description for the following situation.
“Download and use unauthorized software and video
files”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal
21
Ethics 倫理學 and Legality 合法性 (11)
Q10: Choose the best description for the following situation.
“Slander or intimidate others by email”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal
22
Ethics 倫理學 and Legality 合法性 (12)
Q11: Choose the best description for the following situation.
“Act as hero, Robin Hood 羅賓漢(傳說中劫富濟貧的
綠林好漢)”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal
23
Ethics 倫理學 and Legality 合法性 (13)
Q12: Choose the best description for the following situation.
“The report does not indicate the source of reference
information”.
(A) Ethical and legal
(B) Ethical but illegal
(C) Unethical but legal
(D) Unethical and illegal
24
Topic 2
Computer Crimes
25
Think
26
Have you disclose your personal information?
27
Have you use pirated software?
28
Have you download copyrighted works?
29
Lure誘惑 of Computer World for People
• Speed 速度
30
Computer Crime
• Aim: to use any kind of computer technology in a crime
31
Categories of Computer Crime (1)
• Theft of money 金錢盜竊
- e.g. Internet gambling
• Theft of goods 貨物盜竊
- e.g. Internet fraud 盜竊
• Theft of information 資料盜竊
– e.g. obtain data which contain evidence value of
electronic data
• Sabotage 故意破壞
– e.g. crimes which target computer or computer
system directly, computer server intrusion or damage
to web pages
32
Categories of Computer Crime (2)
• Injection of viruses 注入電腦病毒
– e.g. spread computer viruses and computer hackers
電腦駭客 intrusion
• Piracy 盜版侵權
- e.g. Internet sale of contraband 走私貨, controlled
items
• Internet pornography 網路色情
– e.g. spread of child pornography
on the Internet
33
Impact of Computer Crime (1)
• Loss of data and information
• Destruction of Information Technology resources
34
Impact of Computer Crime (2)
• Time-consuming to read, check and verify
hoax e-mail
• Time-consuming to reset the system
35
Impact of Computer Crime (3)
• Bandwidth-consuming
• No access to services
• Unauthorized use or misuse of computer system
36
Impact of Computer Crime (4)
• Loss of customer trust
• Loss of public confidence
• Production system crashes
• Financial loss
• Impairment of goodwill
37
Preventive Measures on
Computer Crimes
• Proper use of the Internet Code of Practice
• Guidelines for handling the account and password
• Use software notice
• Browse the Web and e-shopping
• Information processing of personal data
• Safe use of blog
38
Personal Responsibility (1)
• Know online information is not entirely reliable
• Good use of my time and resources on the Internet
• Maintain a balanced lifestyle
• Be a healthy online game player
• Make friends carefully
• Do not disclose your personal information to
strangers, such as phone number and address
39
Personal Responsibility (2)
• Share and download virus-free files
• Do not use, download and purchase pirated software
• Try to prevent computer being infected by viruses
• Prevention of computer hacking
40
Personal Responsibility (3)
• Regularly update computer software
• Regularly back up your data
• Avoid watching bad material
• Be a sensible e-banking user
• Carefully choose a password
41
Social Responsibility
• Computer Crimes Ordinance電腦罪行條例
• Copyright Ordinance版權條例
42
Topic 3
Netiquette 網路禮儀
43
Think
• Have you ever received a virus warning letter, and
passed on to the people on your contact list
immediately without looking at who the sender was?
44
Think
• Have you ever seen something you feel which is
worth to circulate, you then send it to everyone on
the address book?
45
What is Netiquette?
• Use the Internet responsibly
47
Importance of Netiquette
• The Internet can obscure the user's identity in real life,
so people feel like wearing masks, true faceless.
48
Summary (1)
• Classification of Ethics
– Information Ethics
– Computer Ethics
– Internet Ethics
• Computer Ethics
– What is Computer Ethics?
– Ethics 倫理學 and Legality 合法性
• Computer Crimes
– Lure of Computer World for People
– What is Computer Crimes?
49
Summary (2)
• Computer Crimes (continued)
– Categories of Computer Crime
• Theft of money 金錢盜竊
• Theft of goods 貨物盜竊
• Theft of information 資料盜竊
• Sabotage 故意破壞
• Injection of viruses 注入電腦病毒
• Piracy 盜版侵權
• Internet pornography 網路色情
– Impact of Computer Crime
– Preventive Measures on Computer
Crimes
– Personal Responsibility
50
Summary (3)
• Computer Crimes (continued)
– Social Responsibility
• Computer Crimes Ordinance電腦罪行條例
• Electronic Transactions Ordinance電子交易條例
• The Unsolicited Electronic Messages Ordinance
非應邀電子訊息條例
• Personal Data(Privacy) Ordinance個人資料(私隱)條例
• Copyright Ordinance版權條例
• Netiquette
– What is Netiquette?
– Basic Netiquette
– Importance of Netiquette
51
Glossary 詞語表 (1)
• Boundaries邊界
• Characteristics of digital media 數位媒體的特質
• Computer Crimes Ordinance電 腦罪行條例
• Computer ethics 電腦倫理
• Computer hackers 電腦駭客
• Confusion 困惑
• Copyright Ordinance 版權條例
• Contraband 走私貨
• Cyberspace 網路空間
52
Glossary 詞語表 (2)
• Destructive capacity 破壞性的能力
• Electronic Transactions Ordinance電子交易條例
• Ethics 倫理學
• Fraud 盜竊
• Increase the rate of victims 受害者的比率增加
• Information Ethics 資訊倫理
• Infringement 違反
• Injection of viruses 注入電腦病毒
• International boundaries 國際化的疆界
53
Glossary 詞語表 (3)
• Internet ethics 網路倫理
• Internet pornography 網路色情
• Interpersonal alienation 人際關係的疏離感
• Law 法律
• Legality 合法性
• Lure 誘惑
• Morality 道德
• Netiquette 網路禮儀
• Norms 標準
54
Glossary 詞語表 (4)
• Personal Data (Privacy) Ordinance個人資料(私隱)條例
• Piracy 盜版侵權
• Privacy and anonymity 隱私與匿名
• Rumors 謠傳
• Sabotage 故意破壞
• Speed 速度
• Technology intoxicated 技術陶醉
55
Glossary 詞語表 (5)
• The Unsolicited Electronic Messages Ordinance
非應邀電子訊息條例
• Theft of goods 貨物盜竊
• Theft of information 資料盜竊
• Theft of money 金錢盜竊
56
~ End ~