science computer matriculation

4.1 computer ethics 

definition  

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct. Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into three primary influences:
  1. The individual's own personal code.
  2. Any informal code of ethical conduct that exists in the work place.
  3. Exposure to formal codes of ethics.  

netiquette 

The etiquette guidelines that govern behavior when communicating on the Internet have become known as netiquette. Netiquette covers not only rules of behavior during discussions but also guidelines that reflect the unique electronic nature of the medium. Netiquette usually is enforced by fellow users who are quick to point out infractions of netiquette rules.

Netiquette: Rules of Behavior on the Internet

  • Identify yourself:
    • Begin messages with a salutation and end them with your name.
    • Use a signature (a footer with your identifying information) at the end of a message
  • Include a subject line. Give a descriptive phrase in the subject line of the message header that tells the topic of the message (not just "Hi, there!").
  • Avoid sarcasm. People who don't know you may misinterpret its meaning.
  • Respect others' privacy. Do not quote or forward personal email without the original author's permission.
  • Acknowledge and return messages promptly.
  • Copy with caution. Don't copy everyone you know on each message.
  • No spam (a.k.a. junk mail). Don't contribute to worthless information on the Internet by sending or responding to mass postings of chain letters, rumors, etc.
  • Be concise. Keep messages concise—about one screen, as a rule of thumb.
  • Use appropriate language:
    • Avoid coarse, rough, or rude language.
    • Observe good grammar and spelling.
  • Use appropriate emoticons (emotion icons) to help convey meaning. Use "smiley's" or punctuation such as :-) to convey emotions.
  • Use appropriate intensifiers to help convey meaning.
    • Avoid "flaming" (online "screaming") or sentences typed in all caps.
    • Use asterisks surrounding words to indicate italics used for emphasis (*at last*).
    • Use words in brackets, such as (grin), to show a state of mind.
    • Use common acronyms (e.g., LOL for "laugh out loud").  

      area of computer ethics 

      information accuracy 

      measure of the reliability of information held within an IT system 
      • Do not assume the information on the web is correct, should evaluate the value of webpage before relying on its content.
      • some individuals & organization raise questions about the ethics of using computers to alter output, primary graphic photo as a retouched  photo.       

      green computing  

      • involves reducing the electricity and environmental waste while using a computer, mobile devices and related technologies.
        • green computing tips:
      1. Do not leave a computer or device running overnight.
      2. Turn off the monitor, printer, and other devices when not in use. 
      3. use paperless methods to communicate.
      4.  recycle paper and buy recycled paper.   
      5. use videoconferencing and VOIP for meetings.

      codes of conduct 

      • Is a written guideline that helps determine whether a specific computer action is ethical or unethical.                                                                                                                                         
       information privacy 

      Information privacy is the privacy of personal information and usually relates to personal data stored on computer systems.The need to maintain information privacy is applicable to collected personal information, such as medical records, financial data, criminal records, political records, business related information or website data.
      Information privacy is also known as data privacy.

      • organization often use huge databases to store records such as employee records, medical record, financial record, etc-these data are confidential and should be accessible only to authorize users.   
      • some companies and individuals collect information without authorization,
      • website often collect data about you, so that they can customize advertisements & send you personalized email messages.
      intellectual properties  
       Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.

      • intelectual properties rights are the right to which creators are entitled for their work.
      • copyright infringement of copyright is piracy, where people illegally copy software,movies, and music.


      Patents

      A patent is a form of right granted by the government to an inventor, giving the owner the right to exclude others from making, using, selling, offering to sell, and importing an invention for a limited period of time, in exchange for the public disclosure of the invention. An invention is a solution to a specific technological problem, which may be a product or a process and generally has to fulfill three main requirements: it has to be new, not obvious and there needs to be an industrial applicability.


      Copyright

      A copyright gives the creator of an original work exclusive rights to it, usually for a limited time. Copyright may apply to a wide range of creative, intellectual, or artistic forms, or "works". Copyright does not cover ideas and information themselves, only the form or manner in which they are expressed.


      Trademarks

      A trademark is a recognizable sign, design or expression which distinguishes products or services of a particular trader from the similar products or services of other traders.

      4.2 computer security

      computer security risks

      what is computer security risks ?

      a computer security risk is any action that could cause a loss of or damage to computer hardware, software, data and information or processing capability.

      what is computer security measures?

      a security measures is the protections that can reduce the risk of a problem occurring due to the computer security risk.

      malicious code (malicious software) 

      malware is malicious software, which are programs that act without a user's knowledge and deliberately/ purposely alter the computer's operations.

      information transmitted over network has a higher degree of security risk than information kept on an organization's premises.






Comments