Loading

Module 1: Computer Security and Privacy

Notes
Study Reminders
Support
Text Version

Lesson 5 Computer Ethics

Set your study reminders

We will email you at these times to remind you to study.
  • Monday

    -

    7am

    +

    Tuesday

    -

    7am

    +

    Wednesday

    -

    7am

    +

    Thursday

    -

    7am

    +

    Friday

    -

    7am

    +

    Saturday

    -

    7am

    +

    Sunday

    -

    7am

    +

Computer Ethics
* Lesson 5 - COMPUTER ETHICS LESSON INTRODUCTION AND
OBJECTIVES [1] Computer Ethics

[Computer Ethics]

Lesson Introduction
-------------------------

On the Internet, you can find a wide range of information that includes
news, articles, pictures, songs, movies, and software. Searching the
Internet is often the fastest and easiest way to gather information, at any
time. For example, you can use the Internet to search for information for
your school assignments, or ideas to include in an office presentation. You
can also download songs and movies from various Web sites.

You do not have to pay money to download information from most of the Web
sites. But, these free downloads may not actually be free. The information
in a Web site is legally owned by the author who created it or by the Web
site which published it. Therefore, you may need the permission of the
author or the owner of the Web site to use the contents. You need to be
aware of the rights or permissions you have on the contents available in a
Web site before downloading them.

This lesson explains the meaning of intellectual property in the field of
computing, and how unauthorized use of intellectual property can lead to
copyright violation. In this lesson, you will also learn about the various
legal concerns associated with information exchange.Lesson Objectives
-------------------------

After completing this lesson, you will be able to:

*

Explain Intellectual Property and copyright as they apply to computing.
*

Identify the various acts of copyright violation and measures to prevent
those acts.
*

Identify the legal concerns that are associated with information exchange.



Links:
------
[1]
http://alison.com/mod/scorm/player.php?a=306¤torg=eXeRM_Module44823c6301d2c8becd92&scoid=14636