Custom Search

Computer Applications with Security

Tuesday, January 6, 2009

Security, Privacy, and Ethics


Computers can store both public and private data. You ensure that what is stored on your computer is secure you can use a password to protect the material. User names and passwords can also protect the information stored on a computer. When using the Internet, one should use caution when giving out personal information.

Information Privacy

Intellectual property is a product someone creates based upon his or her thoughts or ideas. Copyright laws exits to protect those who create an idea or product. When using computers, one must respect the property, rights, and privacy of others.

One of the problems related to privacy is the tendency to regard anything displayed on a computer screen as public information. Although most people, including students, would never pick up and read a document lying on someone else's desk, many people do not hesitate to read someone else's computer screen. As word-processing and other tool software becomes more and more common, we must extend the courtesy of privacy from written documents to material displayed on computer screens or stored on disks.

Ethics and the Information Age

Ethics are the standards of honest, morality, and fairness. These standards relate to using computers. One has a responsibility to respect the property, rights, and privacy of others in the way you use computers. Today in the Information Age, one must follow a code of ethics to respect others properties and others personal information.

The legal aspects of computing are complex and multilayered. Teachers can help society by practicing ethical computer use, avoiding software piracy, and providing direct instruction on ethical computing practices.


  © Blogger template Columnus by 2008

Back to TOP