Week 3
Week 3
SECURITY ISSUES
INTRODUCTION
ICT Ethics, Security & Policy
Issues
Policy =
Acceptable
Use
guidelines
Security =
Anti-theft,
Ethics = Anti-virus,
The “Rights” Anti-Hacker,
& “Wrongs” Anti-fraud
of ICT measures
usage.
Discussion
PART 1: ICT Ethics
Discussion questions (Slide # 12
PART 2: ICT Policy
EXPRESSION –
Concerns, Free Speech, Netiquette (polite-
use conventions), etc.
ICT related standards aim to control(among
other things) hate motivated or indecent
communication, whilst protecting free-
speech rights.
DETAILS OF ICT ETHICS
PRIVACY –
Concerns E-mail Privacy, Anonymity,
Spamming, encryption, database or
personal information Privacy etc.
Ethical standards protect personal &
commercial information such as login &
password info, credit card and account
information and government and commercial
databases. It also controls unwanted
internet mail and ads (Spam).
DETAILS OF ICT ETHICS
SOCIAL JUSTICE –
Social Justice relates to The Digital Divide
(unequal ICT access), Accessibility for
students with special needs , etc.
Ethical standards relate to making ICT
available and accessible to all peoples,
including the disabled and the deprived.
Accessibility needs to be kept in mind
during curriculum design(in educational
contexts), in order to maximize the
capabilities of the technology
DETAILS OF ICT ETHICS
INTELLECTUAL PROPERTY – concerns
Intellectual Content, Student Authenticity,
Software Piracy. Patents & Copyright Law,
Electronic Copyright etc.
ICT Ethical standards aim to control
plagiarism, student identity fraud, and
the use of copyrighted material, etc.
MORAL RESPONSIBILITY –
Concerns individual action such as Whistle-
blowing (exposing ethical violations) and
personal adherence to ethical codes.
Ethical standards include a personal moral
dimension.
DETAILS OF ICT ETHICS
RISKS –
Risk faced by ICT users relate to username
thefts, Computer hardware & Software Reliability,
etc.
Related ICT Ethical standards govern Internet Service
Providers (ISP), responsibility to protect client
information and the quality of computer hardware
and software.
COMPUTER ABUSE
Computer abuse includes Hacking, dissemination of
software Worms, software Viruses, Trojan Horses
(program that introduces viruses to computers),
etc.
Related ethical standards aim to penalize
violators.
QUESTIONS - ICT ETHICS
What means do educational institutions
use currently, to ensure student
authenticity; that is; registered
students produce and present their own
work?