200 likes | 477 Views
1CITIZEN PORTFOLIO Candidate ||MOHD KHUSAIRI BIN MUSLEH|| Student ID ||09106078|| Institution ||UNIVERSITI MALAYSIA PERLIS||. ethics IN cyber WORLD. Violation. To disturb rudely or improperly ; break in upon. To treat irreverently or disrespectfully ; outrage. Mistreat .
E N D
1CITIZEN PORTFOLIO Candidate ||MOHD KHUSAIRI BIN MUSLEH|| Student ID ||09106078|| Institution ||UNIVERSITI MALAYSIA PERLIS|| ethics IN cyberWORLD
Violation • To disturb rudely or improperly; break in upon. • To treat irreverently or disrespectfully; outrage. • Mistreat.
Computer Violations Computer Violation is mistreat any of below:- • Privacy and confidentiality • Unimpaired service • Controlling access to resources • Integrity — assuring that data and programs are not modified without proper authority
Some example of violation • Banking fraud
Piracy • Exceed bandwidth
Computer Ethics Computer Ethicsis a system of moral standards or values used as a guideline for computer users.
The Ten Commandments of computer ethics Thou shall not use a computer to harm other people. Thou shall not interfere with other people’s computer work. Thou shall not snoop around in other people’s files. Thou shall not use a computer to steal.
The Ten Commandments of computer ethics Thou shall not use a computer to bear false witness. Thou shall not copy or use proprietary software for which you have not paid. Thou shall not use other people’s computer resources without authorization or proper compensation.
The Ten Commandments of computer ethics Thou shall not appropriate other people’s intellectual output. Thou shall think about the social consequences of the program you write or the system you design. Thou shall use a computer in ways that show consideration and respect for your fellow humans.
Understanding of 8 Critical Value e-Access the right to having equal, secure and reliable access. e-Literate knowing when, when not and how to use it properly. e-Rule respect for ownership and authorship. e-Safety guard personal safety and the security of their networks.
Understanding of 8 Critical Value e-interaction and Collaboration humility, loyalty and respect for others when communicating. e-Enterprise appropriate online buying behavior and making secure transaction. e-Care physical and psychological well being. e-Accountability responsibility, credibility and integrity as well as critical thinking of what is true/false.
Respects RESPECT YOURSELF • Do not give out your passwords • Don’t say or do anything that could damage your reputation, even if you think it’s impossible for someone to find it or know it was you • Protect your identity • Log out of portals • Don’t leave copies of your printed pages in a common printer
Respects RESPECT OTHERS • Don’t harass or threaten anyone using a computer • Don’t abuse your access to resources like storage space • Remember that your personal site still has BGSU in the URL and reflects on the University
Respects RESPECT ACADEMIC INTEGRITY • Cite any information copied from the Internet • Ask permission to copy or modify software unless it is in the public domain
BASIC NETIQUETTE DO Use Your Accounts Wisely. Use Your Equipment Wisely. Share Our Bandwidth Responsibly. Check your email as much as possible and respond quickly to messages you receive; your input may be critical to someone else. Clear your cache after each login of hot account; banking, email.
BASIC NETIQUETTE DO Get good virus protection software and make sure it scans your incoming files. Make sure the URL is safe; padlock symbol. Professionalism. Obeying the law. When shopping at low credibility web, COD is better.
BASIC NETIQUETTE Don’t Don’t type in all capital letters; it looks like you are screaming. Never simply send anything that you wouldn’t want someone other than the recipient to read; spam. Try not to use sarcasm or humour, it doesn’t always come across well. Give anyone access your personal gadget. Use the same password for every single account. Easily reveal information about you.
everyone is responsible for knowing what constitutes computer crime and computer fraud. Reference: http://www.bgsu.edu/its/security/page11082.html