Chapter 10 Power Point

Chapter 10 Power Point - Privacy Security Ergonomics...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Privacy Security Ergonomics Environmental Protection Privacy Computer ethics are guidelines for moral computer use. Four computer ethics issues are privacy, accuracy, property, and access. Privacy Large Databases Large organizations are constantly compiling information about us. Reverse directories list telephone numbers followed by subscriber names. Information resellers (information brokers) collect and sell personal data. Electronic profiles are compiled from databases to provide highly detailed information about individuals.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Privacy Large Databases (cont.) Identity theft is the illegal assumption of someone’s identity for the purpose of economic gain. Mistaken identity occurs when an electronic profile of one person is switched with another. The Freedom of Information Act entitles individuals access to governmental records relating to them. Privacy Private Networks Many organizations monitor employee e-mail and computer files using special software called snoopware. Privacy Internet and the Web Many people believe that, while using the Web, as long as they are selective about disclosing their name and other personal information, little can be done to invade their privacy. This is called the illusion of anonymity.
Background image of page 2
3 Privacy Internet and the Web Created by browsers, history files record locations of sites visited by computer systems. Cookies are specialized programs deposited onto your computer system to record sites visited, activity at
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/03/2008 for the course CIS 105 taught by Professor Mccarthy during the Fall '08 term at ASU.

Page1 / 9

Chapter 10 Power Point - Privacy Security Ergonomics...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online