Professional Documents
Culture Documents
Learning Outcomes 2
Learning Outcomes 2
Learning Outcomes 2
1.2.1 Definition
1.2.1.1 Define Computer Ethics ,Code of Ethics ,Intellectual Property ,Privacy ,Computer
Crime and Cyber Law.
Computer ethics is a branch of practical philosophy which deals with how computing
professionals should make decisions regarding professional and social conduct.
Intellectual Property means that can be protected under federal law, including
copyrightable works, ideas, discoveries, and inventions. Such property would include
novels, sound recordings, a new type of mousetrap, or a cure for a disease.
Computer crime generally refers to criminal activity where a computer or network is the
source, tool, target, or place of a crime.
Cyber Law means the rapidly evolving area of civil and criminal law as applicable to the
use of computers, and activities performed and transactions conducted over internet and
other networks.
1.2.1.2 Differentiate between ethics and law.
A)Ethics
B)Law
Respecting Ownership
We must respect ownership by not stealing other people’s work either by duplicating or
distributing it. Duplicating and distributing copies of audio tapes ,video tapes and
computer programs without permission and authorization from the individual or company
that create the program are immoral or illegal.
Respecting Property
Property here means ownership. Since an individual data and information are considered
as property .Therefore ,an act of tempering and changing electronic information is
considered as vandalism and disrespect for other people’s property.
1.2.2 Privacy
Anonymity is essential to privacy and free speech. It protects whistle blowers and writers
of controversial material; most simply, it may enable one to publish without a forwarding
address. The e-mail technology creates problems for the right to anonymous
communication since the sender of a message can be traced back through digital paths.
Online forms may be digitally transported in ways that leave them vulnerable to
undesired access. Alternatively, online forms may be encrypted so that only the intended
recipients can readily translate the information. Ensuring that your information is stored
and transferred in secure ways is one of the keys to protecting your privacy.
"Cookies" are tidbits of information that Web sites store on your computer, temporarily
or more-or-less permanently. In many cases cookies are useful and innocuous. They may
be passwords and user IDs, so that you do not have to keep retyping them every time you
load a new page at the site that issued the cookie. Other cookies however, can be used for
"data mining" purposes, to track your motions through a Web site, the time you spend
there, what links you click on and other details that the company wants to record, usually
for marketing purposes.
Make stuff up
Whenever possible avoid giving your real contact information. Obviously you need to
give your name, address, credit card number when ordering a book from Amazon. The
same is not true when you’re registering to read the New York Times online. When asked
to provide personal information you should never give away any more information than
you have to. When in doubt, make something up.
There are two commonly used authentication methods ,which are biometric device and
call back system.
Biometric device is a device that translates personal characteristics into a digital code
that is compared with a digital code stored in the database.
Call back system refers to the checking system that authenticates the user.
A)Biometric device
Finger print recognition
In order to prevent fake fingers from being used ,many biometric fingerprint systems also
measure blood flow/check for correctly arrayed ridges of at the edges of the fingers.
Facial recognition
Hand geometry scanning involving the measurement and analysis of the shape of one’s
hand .Unlike fingerprints ,the human hand isn’t unique. Individual hand features are not
descriptive enough for identification.
Iris scanning
Iris scanning analyses the features that exist in the coloured tissue surrounding the pupil
which has more than 200 points that can be used for comparison ,including rings ,furrows
,and freckles.
The scans use a regular video camera and can be done from further away than a retinal
scan. It will work perfectly fine through glasses and in fact has the ability to create an
accurate enough measurement that it can be used for identification purposes.
The accuracy of this method is excellent while the cost is high.
Signature verification system uses special pen and tablet .After re-processing the
signature ,several features are extracted.
The similarity between an input signature and an reference set is computed using string
matching and the similarity value is compared to threshold.
The accuracy in signature verification system is high and the cost involved is fair.
The call back system is commonly used in the bank operation and the business
transaction .For example ,when you book for the taxi service ,the operator will ask
you to hang up and she will call you back to confirm for the service required.
Verification
Verification is the act of proving or disproving the correctness of a system with
respect to a certain formal specification.
Method of verification
User identification and processed object is the two common methods used in
verification.
Processed object refers to something the user has such as identification card ,security
token and cell phone.
A. User identification
-Key in the username to log into a system and the system will verify the user is valid
or invalid user.
-Show the exam slip to verify that you are the valid candidate of the exam.
-The policeman will check on the driver’s license to identify the valid driver.
The definition of Pornography is any form of media or material that depicts erotic
behaviour and is intended to cause sexual excitement.
Slander is a legal term for false and malicious statement about someone.
Effects of pornography
-can develop low moral value toward other man ,women or children
-can erode good religious ,cultural and social beliefs and behaviour
Effects of slander
Keywords blocking
One of the strategies is by using the keywords blocking method. This method uses a
list of banned words or objectionable terms.
As the page is downloading ,the filter searches for any for these words .If found ,it
will block the page completely ,stop downloading the page ,block the banned words
and even shut down the browser.
Site blocking
-some software provides control over what categories of information user block
Websites are rated in terms of nudity ,sex ,violence and language. The Recreational
Software Advisory Council (RSACI) is responsible for the rating of the websites of
the content of the internet.
-rating done either by the web page author or by the independent bureau
In the recent years ,many concerns and issues will raise on the integrity and security
of information ,legal status of online transaction ,privacy and confidentiality of
information ,intellectual property rights and security of government data placed on
the Internet.
-Fraud
-Copyright Infringement
-Theft
-Attacks
A Computer Crimes is defined as any criminal activity that is related to the use of
computers.
Computer Fraud
Copyright Infringement
Computer Theft
Computer theft is define as unauthorized use of another person’s property with the
intension to deny the owner the rightful possession that property or its use.
Computer attacks
Computer attacks may defined as any activities taken to disrupt the equipment of
computer systems ,change processing control or corrupt stored data.
-physical attack that disrupt the computer facility or its transmission lines.
-an electronic attack that uses the power of electronic magnetic energy to overload
computer circuitry.
Patents
Trade marks
Designs
Copyright