/
Five Unethical Uses of Computers Five Unethical Uses of Computers

Five Unethical Uses of Computers - PowerPoint Presentation

tawny-fly
tawny-fly . @tawny-fly
Follow
380 views
Uploaded On 2016-04-04

Five Unethical Uses of Computers - PPT Presentation

Essential Question How can I use a computer unethically What are the consequences for using a computer unethically Is it wrong to share your music Like a crowbar or hammer computers are designed to make our lives and jobs easier ID: 273805

computers information computer victim information computers victim computer access personal theft identity stolen gain unethical digital software fraud systems money music share

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Five Unethical Uses of Computers" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Five Unethical Uses of Computers Slide2

Essential Question

How can I use a computer unethically?

What are the consequences for using a computer unethically?

Is it wrong to share your music?Slide3

Like a crowbar or hammer, computers are designed to make our lives and jobs easier.

Just like a crowbar or hammer, computers can be used either as constructive tools or destructive weapons.

Unethical computer use is a violation of trust that can:

Damage finances and reputations; or

Lead to serious consequences (e.g. Jail time).

When computers are used in unethical ways, it is people who are harmed.Slide4

Identity Theft and Fraud

Identity theft and fraud are:

Characterized by criminal use of the victim's personal information such as a social security number, to assume the victim's identity.

Identity thieves use the stolen personal information to:

Create fake identifications

Obtain credit cards or access other resources and benefits.

The criminals may install malicious software to:

Gain access to the victim's computer files and activity, or

Target commercial and government computer systems to steal the personal information of hundreds or thousands of potential victims at once.Slide5

Financial Theft or Fraud

Thieves and embezzlers can use computers to:

Steal money from individuals or businesses.

A thief can gain online access to an individual's bank account using:

A victim's stolen password,

PIN, or Personal information. Using stolen credit card information, a thief can: Order goods online and later sell those goods for cash. An employee with access to business accounting systems may: Falsify records or manipulate the systems to embezzle funds.Slide6

Digital Piracy

The internet is often called

The

"information superhighway"

because it allows people to find, share, and distribute information quickly and easily using computers.

Not all that information is ethical or legal. Piracy is considered as:Distributing and accessing illegal copies of:Copyright-protected digital books, Movies, Music, Artwork, Software, and Other content.When digital products and works are pirated, the content creators lose money they would have otherwise earned had that work been legally purchased or licensed. Slide7

Information Theft

Spies, criminals, and snoops can steal private or classified information by gaining unauthorized access to the victim's computer or inappropriately using computers to which they been given access.

Their goals may be to:

Leak or sell classified government documents,

Use stolen personal information to extort a victim,

Gain an advantage over a competitor, or Simply pry into the private life of a family member or coworker. Privacy invasion, spying and information theft may be punishable under a number of laws designed to protect individuals, businesses, or national security. Employees caught snooping or stealing data may lose their jobs even if their acts were technically legal.Slide8

Disruption to Computers or Services

Disrupting a computer or network may involve:

Using malicious software to make a computer unusable, or

Using several computers to block access to a website, network or other resource.

These types of attacks may be done to:

Extort money from the victim, Make a political statement, or Force the victim into a specific action. Sometimes, the attackers commit these acts simply for entertainment.Slide9

Individual Practice

Is it wrong to share your music? (discuss)