Professional Documents
Culture Documents
Gt101: Learning and Information Technology Tu107: Computing Essentials
Gt101: Learning and Information Technology Tu107: Computing Essentials
Gt101: Learning and Information Technology Tu107: Computing Essentials
TECHNOLOGY
TU107: COMPUTING ESSENTIALS
MEETING 6
CHAPTER 16: PRIVACY, SECURITY AND ETHICS
Prepared by:
ITC team – AOU, Kuwait branch
Based on the content of GT101 smart book @McGraw-Hill Education
LEARNING OUTCOMES
• Identify the most significant concerns for effective implementation of
computer technology.
• Discuss the primary privacy issues of accuracy, property, and access.
• Describe the impact of large databases, private networks, the Internet,
and the web on privacy.
• Discuss online identity and the major laws on privacy.
• Discuss cybercrimes types including creation of malicious programs.
• Discuss computer ethics including copyright law, software piracy and
digital rights management.
PEOPLE
• Technology makes it possible to collect and use date of all kinds, including
information about people.
• The Web sites you visit, the stores where you shop ….
• Privacy concerns the collection and use of data about individuals.
• Three primary privacy issues:
- Accuracy: relates to the responsibility of those who collect data to ensure
that the data is correct.
- Property: relates to who owns data.
- Access: relates to the responsibility of those who have data to control and
able to use that data.
PRIVACY: LARGE DATABASES
• Large organizations are constantly compiling information about us. Everyday, data is
gathered about us and stored in large databases. This ever-growing volume of data
is often called big data.
• A vast industry of data gatherers known as information resellers or information
brokers now exists that collects, analyzes, and sells such personal data.
• Information resellers create electronic profiles, or highly detailed and personalized
descriptions of individuals.
• These profiles can reveal more than you might wish and this can raise many
important issues, including:
Collecting public, but personally identifying information
Spreading information without personal consent
Spreading inaccurate information
PRIVACY: PRIVATE NETWORKS
• Weare all concerned with our personal security (e.g. lock our doors).
What about computer security?
• Computer hackers are the persons who try to gain unauthorized access
to our computers or other computers that contain information about us.
• Security involves protecting individuals and organizations from theft and
danger.
• Computer security specifically focuses on protecting information,
hardware, and software from unauthorized use, as well as preventing or
limiting the damage from intrusions, sabotage, and natural disasters.
SECURITY: CYBERCRIMES
• Cybercrime or computer crime is any criminal offense that involves a computer and a network.
Examples of Cybercrimes
SECURITY: CYBERCRIMES
• Virusesand worms can find their way into PCs through e-mail
attachments and programs downloaded from the Internet.
• Zombie is a computer infected by a malware that allows it to be
remotely controlled for malicious purposes.
•A collection of zombie computers is known as a botnet, or robot
network.
• Antivirusprograms such as Symantec and McAfee provide services
that keep track and alert users about virus threats.
ETHICS
• The essential element that controls how computers are used is ethics.
• Ethics are standards of moral conduct.
• Computer ethics are guidelines for the morally acceptable use of
computers in our society.
ETHICS: COPYRIGHT & DRM