Privacy, Security, and Ethics
There are more than one billion personal computers in use today. What are the consequences of the widespread presence of this technology? Does technology make it easy for others to invade our personal privacy? When we use the web, is information about us being collected and shared with others?
To efficiently and effectively use computers, we need to be aware of the potential impact of technology on people and how to protect yourself on the web. We need to be sensitive to and knowledgeable about personal privacy and organizational security.
At the end of this week, you will be able to:
- Discuss the primary privacy issues of accuracy, property, and access.
- Describe the impact of large databases, private networks, the Internet, and the web on privacy.
- Discuss online identity and the major laws on privacy.
- Discuss cybercrimes including creation of malicious programs such as viruses, worms, Trojan horses, and zombies as well as denial of service attacks, Internet scams, identity theft, cyberbullying, rogue Wi-Fi hotspots, and data manipulation.
- Detail ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing data loss.
- Discuss computer ethics including copyright law, software piracy, and digital rights management.
- Read 'Privacy, Ethics, and Security' chapter SIMBook in SIMnet.
- Complete the Privacy, Security, and Ethics Quiz.
- Complete the Privacy, Security, and Ethics Lab.