Thursday, March 7, 2019

Computer Ethics, Privacy

* calculator Ethics * Are the moral guidelines that prescribe the go for of computers and randomness systems. tuition Accuracy * Information accuracy today is concern because m any(prenominal) drug users access training maintained by early(a) people or companies, such as on the internet. * Do non assume that because the information is on the web that is correct * Users should evaluate the protect of the web page originally relying on its content. expert property rights* Intellectual property (IP) refers to unique and original works such as ideas, inventions, art, processes, beau monde and product names and logos. IP are the right to which creators are authorize for their work. * Copyright * Gives authors and artists exclusive rights to duplicate, publish and sell their materials. A copyright protects any tangible form of expression. * Piracy is the common infringement of copyright. Information privateness * refers to the right of individuals and companies to deny or re strict the collection and use of information about them. How to safeguard private information 1. Fill in merely necessary information on rebate, warranty and registration forms. 2.Do non preprint your knell number or sociable security number on own(prenominal) checks. 3. Have an unlisted or unpublished telephone number. 4. If caller ID is usable in your area, find out how to block your number from displaying on the pass catchers system. 5. Do not write your telephone number on charge or opinion receipts. 6. Ask merchants not to write reliance card numbers, telephone numbers, social security numbers and drivers license numbers on the back of your individualized checks. 7. Purchase goods with cash, quite a than credit or checks.8. Avoid shopping club and buyer cards. . If merchants expect private questions, find out why they want to know before releasing the information. 10. Inform merchants that you do not want them to distribute your personal information. 11. Request in writing, to be removed from mailing lists. 12. Obtain your credit report once a year from each of the three major(ip) credit reporting agencies and correct any errors. 13. Request a disembarrass copy of your medical records once a year from the medical Information Bureau. 14. Limit the amount of information you provide to web sites. Fill in only required information. 15. give a cookie manager to filter cookies. 16. fetch your history file when you are finished browsing. 17. Set up a free mail account. Use this e-mail address for merchant forms. 18. kink off file and computer sharing on your internet connection. 19. Install a personal firewall. 20. Sign-up for e-mail filtering through your internet service provider or use an anti-junk e-mail program such as Brightmail. 21. Do not reply to spam for any reason. 22. Surf the web anonymously with a program such as freedom web secure or through an anonymous web site such as anonymizer. om electronic Profiles * When you fill out a form such as a magazine subscription, product warranty registration card, or contest doorway form the merchant that usually enters it into a selective informationbase. Likewise, every time you wrap up an advertisement on the electronic network or register software online ,your information and preferences enter a database. * Cookies E-commerce and other web applications often rely on cookies to identify users.Cookie files typically contain data about you, such as your user name or viewing references. Spyware and Adware Spyware is a program put on a computer without the users knowledge that in secret collects information about the user. * Spyware can enter a computer as a virus or as a result of a user installing a new program. * Spyware program communicates information it collects to many outside source while you are online. * Adware is a program that displays an online advertisement in a banner or pop-out window on Web pages, e-mail messages or other internet services. Phishing * Phishing is a scam in which a perpetrator sends an official looking e-mail messages that attempts to harbor your personal and financial information.Pharming is a scam similar to phishing where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing. netmail * Spam is an unsolicited e-mail messages or newsgroup posting sent to multiple recipients or newsgroups at once. * Spam is Internet junk mail * The content of spam ranges from selling a product or service, to promoting a business opportunity, to denote offensive material. Privacy Laws * The concern about privacy has led to the principle of federal and state laws regarding the terminus and disclosure of personal data. refers to the laws which deal with the standard of personal information about individuals which can be collected by governments and other public as well as private organizations and its storage and use.Social Engineering * Defined as gaining unauthorized access or obtaining unavowed information by taking advantage of the trusting human constitution of some victims and the naivety of others. * Some social engineers trick their victims into revealing clandestine information such as usernames and passwords on telephones, in person or on the Internet. Employee Monitoring Involves the use of computers to observe, record and review an employees use of computer, including communication such as e-mail messages, keyboard activity and Web sites visited. circumscribe filtering * Is the process of restricting access to certain material on the web. * topic filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.* Web filtering software is a program that restricts access to specified Web sites. information processing system Forensics * Also called digital forensics, network forensics or cyber forensics. Is the discovery, collection and depth psychology of evidence found on compute rs and networks. * Forensic analysis, involves the examination of computer media, programs, data and log files on computers, servers, and networks. Health Concerns of Computer Use Computer wellness risks * Repetitive strain Injury (RSI) * is an injury or disorder of the muscles, nerves, tendons, ligaments and joints. * Computer relate RSIs include tendonitis and carpal tunnel syndrome. * Tendonitis Is turmoil of tendon due to some repeated motion or filter on that tendon. * Carpal Tunnel syndromeIn inflammation of the nerve that connects the forearm to the treat of the wrists. * Computer Vision syndrome * You may have CVS if you have sore, tired, burning, itching or dry eyes, blurred or double raft, distance blurred vision after prolonged staring at a display cunning, care or sore neck, difficulty shifting focus between device and documents. Ergonomics and Workplace Design * Ergonomics * Is an applied science devoting to incorporating comfort, efficiency, and pencil eraser in to the architectural plan of items in the workplace. * Workplace design * has a profound conflict on the productivity of workers.Making the best use of space through optimum placement of equipment, integrating the human factor into workplace design, and effectively align the workplace into the surrounding environment are important aspects of ergonomics. * The workplace design should aim to propagate intuition, teamwork, and more importantly, provide a safe and well-to-do environment. Computer Addiction * Occurs when the computer consumes someones entire social life. Computer addiction is a growing health problem. * Symptoms of a user with computer addiction include the following* Craves computer time * gladden when at the computer Unable to stop computer activity * vexatious when not at the computer * Neglects family and friends * Problems at work and school * Computer addiction is a treatable illness through therapy and support groups. Green cypher * Involves reducing the el ectricity and environmental bollocks while using a computer. * Green computing is the environmentally responsible use of computers and related resources. such practices include the implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption and proper disposal of electronic waste (e-waste).

No comments:

Post a Comment