/
Web Page Design and Development I Web Page Design and Development I

Web Page Design and Development I - PowerPoint Presentation

min-jolicoeur
min-jolicoeur . @min-jolicoeur
Follow
389 views
Uploaded On 2016-04-04

Web Page Design and Development I - PPT Presentation

Standards Standard A Safety and Ethics 3 Identify potential abuse and unethical uses of computers and networks Identity Theft and Fraud Identity theft and fraud are characterized by criminal use of the victims personal information such as a Social Security number to assume the vi ID: 273813

access information unethical company information access company unethical time personal victim computers computer theft identity employee work behavior employees

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Web Page Design and Development I" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Web Page Design and Development IStandards

Standard A Safety and Ethics –

3

Identify potential abuse and unethical uses of computers and networks.Slide2
Slide3

Identity Theft and Fraud

Identity

theft and fraud are characterized by criminal use of the victim's personal information, such as a Social Security number, to assume the victim's identity.

Identity

thieves use the stolen personal information to create fake identifications, obtain credit cards or access other resources and benefits. The criminals may install malicious software to gain access to the victim's computer files and activity, or target commercial and government computer systems to steal the personal information of hundreds or thousands of potential victims at once.Slide4
Slide5

Digital Piracy

The

Internet is often called the "Information Superhighway" because it allows people to find, share, and distribute information quickly and easily using computers.

Not all

that information is ethical or legal. Distributing and accessing illegal copies of copyright-protected digital books, movies, music, artwork, software, and other content is a form of copyright infringement, commonly referred to as "piracy." When digital products and works are pirated, the content creators lose money they would have otherwise earned had that work been legally purchased or licensed. Slide6
Slide7

Financial Theft and Fraud

Thieves and embezzlers can use computers to steal money from individuals or businesses.

A thief can gain online access to an individual's bank account using a victim's stolen password, PIN or personal information or order goods online and later sell those goods for cash.

An employee with access to business accounting systems may falsify records or manipulate the systems to embezzle funds.Slide8
Slide9

Information Theft

Spies, criminals, and snoops can steal private or classified information by gaining unauthorized access to the victim's computer or inappropriately using computers to which they have been given access.

Their goals may be to leak or sell classified government documents, use stolen personal information to extort a victim, gain an advantage over a competitor, or simply pry into the private life of a family member or coworker.

Privacy invasion, spying and information theft may be punishable under a number of laws designed to protect individuals, businesses, or national security. Employees caught snooping or stealing data may lose their jobs even if their acts were technically legal.Slide10
Slide11

Disruption to Computers or Services

Disrupting a computer or network may involve using malicious software to make a computer unusable or using several computers to block access to a website, network or other resource.

These types of attacks may be done to extort money from the victim, make a political statement or force the victim into a specific action.

Sometimes, the attackers commit these acts simply for entertainment.Slide12
Slide13
Slide14

Good Citizenship

DO’s

Build your own brand

Treat others the way you’d like to be treated.Share, but be fair

Report and record bad behaviorListen & think first, talk laterDebateUse Proper EnglishBe Careful what you shareRemember people might not be who they seemBe aware of your footprintSlide15

Good Citizenship

DON’T’s

Share images or videos with strangers

Assume a false identityDon’t just retweet, be original

ShoutGet personalFail to abide by the site rulesFeed the trollsSteal others workForget the human behind the screenhttp://www.knowthenet.org.uk/infographic/be-careful-trolling-can-happen-anyone Slide16
Slide17

Inappropriate Computer Use

Employees

may use company computers to engage in unethical behavior.

For example, an employee who is not permitted to use the Internet for personal reasons commits an unethical act by shopping online while at work.

Random Internet surfing takes away from the time she spends on work-related activities. Employees sometimes use company email to spread inappropriate websites or videos to co-workers, some of which could be deemed offensive by the recipients.Slide18
Slide19

Time Misuse

Unethical

behavior can include "stealing" time from the company, as the company is compensating employees and receiving no productivity in return.

In addition to time spent on aimless Internet surfing, time misuse can consist of extending breaks beyond the allotted time, congregating around the water cooler or engaging in lengthy gossip sessions during working time, falsifying time sheets, coming into work late or leaving early and running personal errands while traveling on company business

.Slide20
Slide21

Sexual Harassment and Bullying

An

employee could commit unethical behavior by sexually harassing co-workers.

This

could involve making lewd comments, touching inappropriately or making unwanted sexual advances. Bullying typically involves attempting to intimidate a co-worker by making demeaning comments about him, spreading gossip or even making verbal or physical threats. In general, a bully attempts to make the workplace as uncomfortable as possible for a co-worker. In some cases, ongoing bullying can escalate into violence in the workplace.Slide22
Slide23

Illegal Acts

Some

unethical acts can also be illegal.

For example, an employee who has access to a company's financial records, such as a bookkeeper or accountant, could use her access and expertise to embezzle company funds.

An employee having access to personnel files, such as a human resources representative, could commit identity theft and use employees' Social Security numbers to raid bank accounts or fraudulently obtain credit cards. Enron scandal, top company executives used questionable accounting practices to manipulate the company's stock price for their own financial gain.Slide24

http://

www.ehow.com/info_7806377_five-unethical-uses-computers.html

https://www.ics.uci.edu/ugrad/policies/Computer_Ethics.php http://

smallbusiness.chron.com/examples-unethical-behavior-organization-13629.html