CLICK HERE FOR THOUSANDS OF FREE BLOGGER TEMPLATES »

Thursday, May 22, 2008

Week 12 Social And Ethical Issues 23 May 2008

Lecture

In today's lecture we discussed the social and ethical issues that arise when we use the Internet. the first part of the lecture discussed the issues dealing with copyright, plagiarism and intellectual property. The lecture discusses why there are problems when using the Internet these include;

Intellectual Property
Copyright
Plagiarism
Security etc



There are a lot of smart people using the Internet alot,here is also no control on what is put on the net. The second part of the lecture discussed privacy, security and freedom of speech and problems facing people concerning each. Another area talked about was how to protect yourself from potentially harmful influences these included installing a firewall, antivirus software and being weary of what information you release the lecture ended with a quiz.






Tutorial


Task1) www.copyright.org.au.

1) Anyone that wishes to use material that is under copyright cannot unless they seek and receive permission from the author or artist of suggested material.
2) Copyright does not protect an idea, information, concepts or styles of a person that is supposingly unique.
3) Also protects artistics works, dramatic works, musical works, films, sound recordings, broadcasts.
4)Most things on the net are copyrighted - this does not make them free. as students, we think the material on the net is free to use, but it is actually under copyright and you are breaking the law if you try to do this.
5) Copyright protects Textual material - for example journals, books, websites, articles.

Task2)


This site asks questions music downloaders and users may need or want to know. There is a information from who holds the copyright to music to what can the authorities do if one is caught with illegal music.

This website would be really useful because it contains information with a lot of depth and has a broad coverage of the topic, covering each and every aspect.


Task3)
Look at the below mentioned sites and write down in your logs what you can do to protect your personal information from being attacked by viruses, hackers and Trojans.?

http://netsecurity.about.com/
http://computer.howstuffworks.com/virus6.htm


Above website I looked at it and it briefly explains how to look after your computer from different viruses. A computer virus is a computer program that can copy itself and infect a computer without agreement or knowledge of the user.
Trojan is mainly a malicious program accompanied by spy ware which you get through email attachment, a messenger program or from an Internet download. Trojans at times take off as a free program you would like. Once you accept the Trojan into your computer, it will perform a basic installation of itself.
Computers can be protected from viruses by making sure to install antivirus software.
To protect your computer from Trojans, you should never download or install any program from any person or web site you don't trust. You should also have your working system running updated with antivirus software and firewall so that you can have less chance of getting this Trojan into your system. You can use a tool like Ad-Aware to scan your system for known spy ware if you think you may have something.







To protect yourself from hackers.

1. Change the system ID- use a better password
2. Stop identifier broadcaster, don't shut to the world you have wireless-it’s an invite for hackers.
3. Install Antivirus software
4. Restrict unnecessary traffic
5. Change the default administrator password.





Readings

Reading1) 12 ways to protect your online privacy

This site is about how to protect your on-line privacy. it suggests 12 points which are
1) Do not expose personal information .
2) Turn on cookie notices in your Web browser, or use cookie management software.
3) Keep a spotless e-mail address.
4) Don't expose personal details to strangers or friends.
5) Beware sites that offer some sort of reward or prize in exchange for your contact information or other personal details.
6) Realize you may be monitored at work, avoid sending highly personal e-mail to mailing lists, and keep open files on your home computer
7) Do not reply to spammer's for any cause.
8) Be aware of Web security.
9) Be aware of home computer security.
10) Look at privacy policies and stop.
11) Remember that you decide what information about yourself to expose when, why,and to whom.
12) Use Peer 2 Peer (P2P) software with caution


Reading2)Electronic monitoring

It encloses information on types of check, privacy and legal issues, optional policies and privacy resources. Under each heading there are several links so that the reader can explore and find more in depth information. The aim of this website is to help everyday internet users gain knowledge about privacy and monitoring issues regarding the internet.



Reading 3) Inelectual property

This webpage contains information on what the most appropriate system are to protect ones intellectual property and what should be protected. There is information about trademarks and copyrights as well as the protection of computer software and domain names.

0 comments: