{"id":2632,"date":"2018-01-12T10:37:28","date_gmt":"2018-01-12T10:37:28","guid":{"rendered":"https:\/\/old.staging-teachcomputerscienceuk.kinsta.cloud\/?p=289"},"modified":"2024-07-24T11:23:17","modified_gmt":"2024-07-24T11:23:17","slug":"computer-ethics","status":"publish","type":"post","link":"https:\/\/teachcomputerscience.com\/computer-ethics\/","title":{"rendered":"Computer Ethics"},"content":{"rendered":"<div class=\"gb-container gb-container-c346daca upsell-block\"><div class=\"gb-inside-container\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-e47f9679\">\n<div class=\"gb-grid-column gb-grid-column-a43cdb9a\"><div class=\"gb-container gb-container-a43cdb9a\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-ebc63eb5 gb-headline-text\">GCSE Ethics Resources (14-16 years)<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>An editable PowerPoint lesson presentation<\/li><li>Editable revision handouts<\/li><li>A glossary which covers the key terminologies of the module<\/li><li>Topic mindmaps for visualising the key concepts<\/li><li>Printable flashcards to help students engage active recall and confidence-based repetition<\/li><li>A quiz with accompanying answer key to test knowledge and understanding of the module<\/li><\/ul>\n\n\n<div class=\"gb-button-wrapper gb-button-wrapper-d11d44f6\">\n\n<a class=\"gb-button gb-button-fbbad8a7 gb-button-text\" href=\"https:\/\/teachcomputerscience.com\/gcse\/security\/ethics\/\">View GCSE Ethics Resources<\/a>\n\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-2da4e67b\"><div class=\"gb-container gb-container-2da4e67b\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-cbb86620 gb-headline-text\">A-Level Ethical Issues (16-18 years)<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>An editable PowerPoint lesson presentation<\/li><li>Editable revision handouts<\/li><li>A glossary which covers the key terminologies of the module<\/li><li>Topic mindmaps for visualising the key concepts<\/li><li>Printable flashcards to help students engage active recall and confidence-based repetition<\/li><li>A quiz with accompanying answer key to test knowledge and understanding of the module<\/li><\/ul>\n\n\n<div class=\"gb-button-wrapper gb-button-wrapper-e71b7918\">\n\n<a class=\"gb-button gb-button-93f356a7 gb-button-text\" href=\"https:\/\/teachcomputerscience.com\/a-level\/legal-moral-cultural-and-ethical-issues\/moral-and-ethical-issues\/\">View A-Level Moral and ethical Issues Resources<\/a>\n\n<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n\n<h2 class=\"wp-block-heading\">What are Ethics?<\/h2>\n\n\n\n<p>Ethics are a structure of standards and practices that influence how people lead their lives.&nbsp; It is not strictly implemented to follow these ethics, but it is basically for the benefit of everyone that we do.<\/p>\n\n\n\n<p>Ethics are unlike laws that legally mandate what is right or wrong.&nbsp; Ethics illustrate society\u2019s views about what is right and what is wrong.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Computer Ethics<\/h2>\n\n\n\n<p><strong>Computer ethics<\/strong>\u00a0are a set of moral standards that govern the use of computers.\u00a0 It is society\u2019s views about the use of computers, both hardware and software.\u00a0 Privacy concerns, intellectual property rights and effects on society are some of the common issues of computer ethics.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Privacy Concerns<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Hacking<\/strong> \u2013 is unlawful intrusion into a computer or a network. A hacker can intrude through the security levels of a computer system or network and can acquire unauthorised access to other computers.<\/li><li><strong>Malware<\/strong> \u2013 means malicious software which is created to impair a computer system. Common malware are viruses, spyware, worms and trojan horses.&nbsp; A virus can delete files from a hard drive while a spyware can collect data from a computer.<\/li><li><strong>Data Protection<\/strong> \u2013 also known as information privacy or data privacy is the process of safeguarding data which intends to influence a balance between individual privacy rights while still authorising data to be used for business purposes.<\/li><li><strong>Anonymity<\/strong> \u2013 is a way of keeping a user\u2019s identity masked through various applications.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Intellectual Property Rights<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Copyright<\/strong> \u2013 is a form of intellectual property that gives proprietary publication, distribution and usage rights for the author. This means that whatever idea the author created cannot be employed or disseminated by anyone else without the permission of the author.<\/li><li><strong>Plagiarism<\/strong> \u2013 is an act of copying and publishing another person\u2019s work without proper citation. It\u2019s like stealing someone else\u2019s work and releasing it as your own work.<\/li><li><strong>Cracking<\/strong> \u2013 is a way of breaking into a system by getting past the security features of the system. It\u2019s a way of skipping the registration and authentication steps when installing a software.<\/li><li><strong>Software License<\/strong> \u2013 allows the use of digital material by following the license agreement. Ownership remains with the original copyright owner, users are just granted licenses to use the material based on the agreement.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Effects on Society<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Jobs<\/strong> \u2013 Some jobs have been abolished while some jobs have become simpler as computers have taken over companies and businesses. Things can now be done in just one click whereas before it takes multiple steps to perform a task.&nbsp; This change may be considered unethical as it limits the skills of the employees.\n<ul>\n<li>There are also ethical concerns on health and safety of employees getting sick from constant sitting, staring at computer screens and typing on the keyboard or clicking on the mouse.<\/li>\n<\/ul>\n<\/li><li><strong>Environmental Impact<\/strong> \u2013 Environment has been affected by computers and the internet since so much time spent using computers increases energy usage which in turn increases the emission of greenhouse gases.\n<ul>\n<li>There are ways where we can save energy like limiting computer time and turning off the computer or putting on sleep mode when not in use.&nbsp; Buying energy efficient computers with Energy Star label can also help save the environment.<\/li>\n<\/ul>\n<\/li><li><strong>Social Impact<\/strong> \u2013 Computers and the internet help people stay in touch with family and friends. Social media has been very popular nowadays.\n<ul>\n<li>Computer gaming influenced society both positively and negatively.&nbsp; Positive effects are improved hand-eye coordination, stress relief and improved strategic thinking.&nbsp; Negative effects are addiction of gamers, isolation from the real world and exposure to violence.<\/li>\n<li>Computer technology helps the government in improving services to its citizens.&nbsp; Advanced database can hold huge data being collected and analysed by the government.<\/li>\n<li>Computer technology aids businesses by automating processes, reports and analysis.<\/li>\n<\/ul>\n<\/li><\/ul>\n\n\n\n<h3 class=\"gb-headline gb-headline-ee18c6b7 gb-headline-text\">Further Readings:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_ethics\" target=\"_blank\" rel=\"noopener\">Computer ethics<\/a><\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/teachcomputerscience.com\/wp-content\/uploads\/2019\/08\/057-programmer.png\" alt=\"Computer ethics\u00a0are a set of moral standards that govern the use of computers.\u00a0 It is society\u2019s views about the use of computers, both hardware and software.\" class=\"wp-image-5786\" width=\"385\" height=\"385\" title=\"\" srcset=\"https:\/\/teachcomputerscience.com\/wp-content\/uploads\/2019\/08\/057-programmer.png 512w, https:\/\/teachcomputerscience.com\/wp-content\/uploads\/2019\/08\/057-programmer-150x150.png 150w, https:\/\/teachcomputerscience.com\/wp-content\/uploads\/2019\/08\/057-programmer-300x300.png 300w\" sizes=\"auto, (max-width: 385px) 100vw, 385px\" \/><\/figure><\/div>\n","protected":false},"excerpt":{"rendered":"<p>What are Ethics? Ethics are a structure of standards and practices that influence how people lead their lives.&nbsp; It is not strictly implemented to follow these ethics, but it is basically for the benefit of everyone that we do. Ethics are unlike laws that legally mandate what is right or wrong.&nbsp; Ethics illustrate society\u2019s views &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Computer Ethics\" class=\"read-more button\" href=\"https:\/\/teachcomputerscience.com\/computer-ethics\/\" aria-label=\"More on Computer Ethics\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_generate-full-width-content":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[25],"tags":[204,47],"class_list":["post-2632","post","type-post","status-publish","format-standard","hentry","category-ethics","tag-article","tag-hide-old-upsell","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50"],"acf":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/posts\/2632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/comments?post=2632"}],"version-history":[{"count":2,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/posts\/2632\/revisions"}],"predecessor-version":[{"id":607160,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/posts\/2632\/revisions\/607160"}],"wp:attachment":[{"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/media?parent=2632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/categories?post=2632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teachcomputerscience.com\/wp-json\/wp\/v2\/tags?post=2632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}