1 of 6

Slide Notes

DownloadGo Live

Computer Ethics

Published on Nov 19, 2015

No Description

PRESENTATION OUTLINE

COMPUTER ETHICS
Jasmine Watson
Andrew Helfenberger
5/1/2014

ETHICAL ISSUES


COMPUTER TECHNOLOGY

  • There are numerous ethical isuues when it come to computer ethics
  • Unauthorized hardware
  • Disputed rights to product
  • Use of computers to commit fraud

UNAUTHORIZED HARDWARE

  • Unauthorized hardware may include computers connected to network segments or hubs and peripheral communication or input/output equipment such as modems, terminals, printers
  • Intruders actively attempt to circumvent network perimeter defenses. If they can gain physical access to your organization's internal network, they can install their own equipment and software. Alternatively, intruders may learn of insecure (unauthorized) equipment added by users that they can use to gain access to your organization's network.
  • For example, users might install modems for the purpose of remote access to their office computers from home. Intruders often use automated tools to identify modems attached to public telephone lines.

RIGHTS TO PRODUCT

  • Digital products are often sold with different rights that determine how the buyer can use the product.
  • PLR - Private Label Rights, RR - Resell rights, MRR - Master Resale Rights
  • PLR (Private Label Rights) allow the buyer to use the product any way they choose
  • MRR (Rights allow you to resell not only the product but also the rights to others to resell the product.

THEFT OF SOFTWARE

  • This usually means unauthorised copying, either by individuals for use by themselves or their friends or by companies who then sell the illegal copies to users.
  • Many kinds of software protection have been invented to try to reduce software theft
  • Software theft in 1994 was estimated to have cost $15 billion in worldwide lost revenues to software publishers.