Computer tools fo information age pt 2

33
Copyright © 2003 by Prentice Copyright © 2003 by Prentice Hall Hall Computers: Computers: Tools for an Tools for an Information Age Information Age Chapter 9 Chapter 9 Social and Ethical Issues in Social and Ethical Issues in Computing: Computing: Doing the Right Thing Doing the Right Thing

Transcript of Computer tools fo information age pt 2

Copyright © 2003 by Prentice Copyright © 2003 by Prentice HallHall

Computers:Computers:Tools for an Tools for an

Information AgeInformation Age

Chapter 9Chapter 9Social and Ethical Issues in Social and Ethical Issues in

Computing:Computing:Doing the Right ThingDoing the Right Thing

22Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

The Digital DivideThe Digital DivideSeparates the computing Separates the computing haves from the have-notsSeveral initiatives exist to Several initiatives exist to narrow the divide

33Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Haves vs. Have-NotsHaves vs. Have-NotsThose with access to computers and the Those with access to computers and the Internet take advantage of personal and Internet take advantage of personal and economic opportunitieseconomic opportunitiesThose without access fall farther behind Those without access fall farther behind Major divisions within countriesMajor divisions within countries Between urban areas and rural onesBetween urban areas and rural ones Between rich and poorBetween rich and poorMajor divisions among nationsMajor divisions among nations Between industrialized and non-Between industrialized and non-industrialized nationsindustrialized nations

Return

44Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Narrowing the DivideNarrowing the DivideWithin the U.S.Within the U.S. Universal Service Fund helps service Universal Service Fund helps service providers to provide telecommunications providers to provide telecommunications services to rural areasservices to rural areas

E-Rate program provides rate subsidies E-Rate program provides rate subsidies for Internet access for schools and for Internet access for schools and librarieslibraries

WorldwideWorldwide Africa ONE is creating a fiber optic Africa ONE is creating a fiber optic network to connect the nations of Africanetwork to connect the nations of Africa

Return

55Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Workplace IssuesWorkplace IssuesHealthy computingEmployee monitoringEnvironmental concerns

66Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Healthy ComputingHealthy ComputingA number of health questions A number of health questions have been raisedhave been raised Harmful emissions from monitorHarmful emissions from monitor Eyestrain from monitorEyestrain from monitor Back pain from position of chair Back pain from position of chair and deskand desk

Repetitive strain injury

Return

77Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Repetitive Strain InjuryRepetitive Strain InjuryMay affect workers who hold their May affect workers who hold their hands over a keyboard for a long hands over a keyboard for a long period of timeperiod of time Carpal tunnel syndrome is the most Carpal tunnel syndrome is the most common form of RSIcommon form of RSI

CausesCauses SpeedSpeed RepetitionRepetition Awkward positioningAwkward positioning Holding a static position for a long Holding a static position for a long timetime

Return

88Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

ErgonomicsErgonomicsRefers to human factors related Refers to human factors related to the use of computersto the use of computersErgonomic equipmentErgonomic behavior

99Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Ergonomic EquipmentErgonomic EquipmentChair should be Chair should be pneumatically pneumatically adjustableadjustableKeyboard platform Keyboard platform should be set to should be set to proper heightproper heightMonitor must be Monitor must be adjustableadjustableLighting should be Lighting should be adjusted to minimize adjusted to minimize glare on the screenglare on the screen

Return

1010Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Ergonomic BehaviorErgonomic BehaviorErgonomic equipment must be used properlyErgonomic equipment must be used properly Turn the screen away from the window to Turn the screen away from the window to reduce glarereduce glare

Cover your screen with a glare protectorCover your screen with a glare protector Place keyboard to avoid arm and wrist fatiguePlace keyboard to avoid arm and wrist fatigue Use a raised rest for your wristUse a raised rest for your wrist Position your seat back so back is supportedPosition your seat back so back is supported Sit with your feet firmly on the floorSit with your feet firmly on the floor Enlarge fonts so they are easier to seeEnlarge fonts so they are easier to see Take frequent breaksTake frequent breaks

Return

1111Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Employee MonitoringEmployee MonitoringVarious tools allow an employer to Various tools allow an employer to monitor an employee’s performancemonitor an employee’s performance Keystroke monitors measure keystrokes per Keystroke monitors measure keystrokes per secondsecond

Other software tools monitor how long an Other software tools monitor how long an employee is away from the computeremployee is away from the computer

Monitor the files stored on the hard driveMonitor the files stored on the hard drive Monitor the sites visited on the InternetMonitor the sites visited on the InternetMany companies have policies that Many companies have policies that notify employees about monitoring notify employees about monitoring practicespractices

Return

1212Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Environmental ConcernsEnvironmental ConcernsPower consumptionComputer suppliesPC disposal

Return

1313Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Reducing Power Reducing Power ConsumptionConsumption

Energy Star Energy Star standards standards Limit the power the Limit the power the system consumes when system consumes when idleidle

Energy management Energy management featuresfeatures Specify the amount of Specify the amount of time the system will time the system will wait before turning wait before turning off system componentsoff system components

Return

1414Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Computer SuppliesComputer SuppliesUse these strategies to reduce the amount Use these strategies to reduce the amount of paper and toner cartridges usedof paper and toner cartridges used Don’t print out everythingDon’t print out everything Use e-mail instead of faxing or sending a memoUse e-mail instead of faxing or sending a memo Use the back side of already used paper for Use the back side of already used paper for draft copiesdraft copies

Save heavyweight bond paper for critical items Save heavyweight bond paper for critical items and use recycled paper for routine printingand use recycled paper for routine printing

Make sure used paper is recycled rather than Make sure used paper is recycled rather than thrown in the trashthrown in the trash

Refill and reuse empty ink-jet and toner Refill and reuse empty ink-jet and toner cartridgescartridges

Return

1515Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

PC DisposalPC DisposalFind ways to prolong the PC’s Find ways to prolong the PC’s lifelife Upgrade key componentsUpgrade key componentsGive the PC to someone in the Give the PC to someone in the organization with more limited organization with more limited computing needscomputing needsWhen you buy a new PC, reuse the When you buy a new PC, reuse the keyboard, mouse, and monitorkeyboard, mouse, and monitorDonate usable equipment to Donate usable equipment to charities and/or schoolscharities and/or schools

Return

1616Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Jurisdictional IssuesJurisdictional IssuesInternational issuesInternational issues Applying national laws to a world-wide medium is Applying national laws to a world-wide medium is a difficult processa difficult process

It would be impossible to determine if the content of It would be impossible to determine if the content of every Web site was legal according to the laws of every every Web site was legal according to the laws of every countrycountry

Issues exist over which country’s court has Issues exist over which country’s court has jurisdictionjurisdiction

National issuesNational issues Issues exist over which locality’s court has Issues exist over which locality’s court has jurisdictionjurisdiction

Imposition of sales taxes on Internet Imposition of sales taxes on Internet transactionstransactions

1717Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Protecting Children on the Protecting Children on the InternetInternet

The Internet offers many The Internet offers many opportunities for childrenopportunities for children There are also unsavory elements There are also unsavory elements on the Interneton the Internet

Ways to protect childrenWays to protect children Blocking software Child monitoring Laws to protect children

1818Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Blocking SoftwareBlocking SoftwareUsed to prevent Used to prevent children from children from accessing sites on its accessing sites on its updatable list of updatable list of objectionable sitesobjectionable sites

Blocks pornographic Blocks pornographic sites and sites with sites and sites with foul language foul language

Blocks sites requesting Blocks sites requesting names, phone numbers, names, phone numbers, and credit card numbersand credit card numbers

Sometimes criticized Sometimes criticized for being overzealousfor being overzealous

Return

1919Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Child MonitoringChild MonitoringPlace the child’s computer in a Place the child’s computer in a public area instead of his or public area instead of his or her bedroomher bedroomRestrict usage when parents are Restrict usage when parents are not presentnot present

Return

2020Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Laws to Protect ChildrenLaws to Protect ChildrenChildren’s Online Privacy Protection ActChildren’s Online Privacy Protection Act Requires Web sites that target children Requires Web sites that target children under 13 to post a privacy policy and obtain under 13 to post a privacy policy and obtain parental consent before collecting dataparental consent before collecting data

Children’s Internet Protection ActChildren’s Internet Protection Act Requires libraries receiving federal funding Requires libraries receiving federal funding to implement blocking technologyto implement blocking technology

Neighborhood Children’s Internet Neighborhood Children’s Internet Protection ActProtection Act Requires libraries receiving the E-Rate Requires libraries receiving the E-Rate discount to establish an Internet safety discount to establish an Internet safety policypolicy

Return

2121Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Ethics in ComputingEthics in ComputingEthics – standards of moral conductEthics – standards of moral conduct Used to help determine the proper Used to help determine the proper course of action in difficult course of action in difficult situationssituations

Computing IssuesComputing Issues Computer ethics Professional ethics Programmer responsibility Ethical use of computers

2222Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Computer EthicsComputer EthicsTen Commandments of Ten Commandments of Computer EthicsComputer Ethics Apply general ethical Apply general ethical principles to principles to computingcomputing

Developed by the Developed by the Computer Ethics Computer Ethics InstituteInstitute

Return

2323Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Professional EthicsProfessional EthicsRelates to ethics of those whose Relates to ethics of those whose work focuses on computer systemswork focuses on computer systemsCode of Ethics and Professional Code of Ethics and Professional Conduct developed by the Association Conduct developed by the Association for Computing Machineryfor Computing MachineryDivided into sectionsDivided into sections General principlesGeneral principles Professional responsibilitiesProfessional responsibilities Guidelines for organizational systemsGuidelines for organizational systems

Return

2424Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Programmer Programmer ResponsibilityResponsibility

Bug-free software does not existBug-free software does not exist Testing can only show the presence Testing can only show the presence of bugs, not their absenceof bugs, not their absence

Issues related to software Issues related to software qualityquality How much testing is enough?How much testing is enough? How many minor bugs are acceptable How many minor bugs are acceptable in software about to be released?in software about to be released?

Return

2525Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Ethical Use of ComputersEthical Use of ComputersData qualityProtecting customers’ personal dataDigitally altering data

Return

2626Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Data QualityData QualityUsers are responsible for the Users are responsible for the quality of data entered into quality of data entered into the systemthe systemProcedures must be in place to Procedures must be in place to detect and correct inaccurate detect and correct inaccurate informationinformation

Return

2727Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Protecting Customers’ Protecting Customers’ DataData

Particularly relevant to companies Particularly relevant to companies doing business over the Internetdoing business over the InternetDevelop privacy policies stating how Develop privacy policies stating how data will be useddata will be usedTwo approachesTwo approaches Opt-in policy – customers are notified of Opt-in policy – customers are notified of privacy policy and must agree before their privacy policy and must agree before their data can be releaseddata can be released

Opt-out policy – customers are assumed to Opt-out policy – customers are assumed to agree to the release of their data unless agree to the release of their data unless they specifically request it be kept privatethey specifically request it be kept private

Return

2828Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Altering RealityAltering RealityComputers can Computers can alter photographsalter photographs How much alteration How much alteration is ethical?is ethical?

E-mail messages E-mail messages can be destroyedcan be destroyed In a legal action, In a legal action, is this altering is this altering evidence?evidence?

Return

2929Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Intellectual Property Intellectual Property RightsRights

Refers to results of Refers to results of intellectual activity in the intellectual activity in the industrial, scientific, industrial, scientific, literary, or artistic fieldsliterary, or artistic fieldsU.S. Copyright Act provides U.S. Copyright Act provides protection in three areasprotection in three areas CopyrightsCopyrights PatentsPatents TrademarksTrademarks

3030Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

CopyrightsCopyrightsProvides the creator of a literary Provides the creator of a literary or artistic work with control over or artistic work with control over its use and distributionits use and distribution Widespread distribution of music and Widespread distribution of music and video sover the Internet has created video sover the Internet has created quite a controversyquite a controversy

Defining fair use has been difficultDefining fair use has been difficult Under fair use, you may use copyrighted Under fair use, you may use copyrighted works for limited purposesworks for limited purposes

Digital issuesDigital issuesReturn

3131Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

Digital Fair Use IssuesDigital Fair Use IssuesCopy-protection schemes make it Copy-protection schemes make it impossible to copy CDs and DVDsimpossible to copy CDs and DVDs Users claim that violates their fair use Users claim that violates their fair use rightsrights

SoftwareSoftware Users may not modify copyrighted softwareUsers may not modify copyrighted softwareDigital imagesDigital images Images on the Web may be downloaded and used Images on the Web may be downloaded and used as screen savers, but they may not be as screen savers, but they may not be distributed or altereddistributed or altered

PlagiarismPlagiarism Work taken from the Internet must be cited if Work taken from the Internet must be cited if it is used in a paper or other presentation it is used in a paper or other presentation

Return

3232Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

PatentsPatentsDesigned to protect inventions Designed to protect inventions and encourage inventorsand encourage inventors Grant patent holder exclusive rights Grant patent holder exclusive rights to the inventionto the invention

Patent Office will grant patent Patent Office will grant patent protection to software algorithms protection to software algorithms and techniquesand techniques Will also grant patents for business Will also grant patents for business methods implemented in softwaremethods implemented in software

Return

3333Copyright © 2003 by Prentice Copyright © 2003 by Prentice

HallHall

TrademarksTrademarksA word, name, symbol, or device A word, name, symbol, or device used to distinguish one company used to distinguish one company and its products from anotherand its products from anotherTwo issues in the digital arenaTwo issues in the digital arena Unauthorized use of one company’s Unauthorized use of one company’s trademarks on another’s Web sitetrademarks on another’s Web site

Cybersquatting – obtaining a domain Cybersquatting – obtaining a domain name that includes another company’s name that includes another company’s trademark, then selling that domain trademark, then selling that domain name at a profitname at a profit

Return