Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Computer Ethics; Alyssa Brouwer

No description
by

Alyssa Brouwer

on 7 July 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Computer Ethics; Alyssa Brouwer

Trends Relating to Computer Crimes
The criminals that commit these types of crimes have gotten smarter, and better at covering up there tracks.
As more and more technology comes out more and more crimes that involve crimes are likely to happen
Many police officers believe that these crimes need to be better regulated to be able to stop them,something that is currently a problem
Computer crime is usually refereed to as illegal activities that make use of computer technology and data.
Computer crimes occur often and are extremely hard to catch.
Although computer crimes are said to be victimless they are not
Bad Uses of Computers
Computer crimes are becoming a bigger and bigger issue in society
Since the computer field is constantly changing it is hard to define moral rules. Some of the crimes include:
Stealing Software
Stealing money via hacking
Hacking
Privacy issues with computers storing many important documents
Computer Ethics
Alyssa Brouwer
Effects of Computer Crimes
Ways to Protect
Some ways to Protect your computer from hackers and computer crimes are:
download anti-virus technology
download anti-spy ware technology
adding complicated passwords
adding firewalls
have a separate computer for all incoming items
Back up everything on your computer ( this way if you get hacked you will still be able to access important documents you have saved to your hard-drive)
Avoid harassment (this way you don't become a target)
Works Cited
Berzai, Lou. "Ethical Problems in Computing -
Association of Information Technology Professionals." Ethical Problems in Computing - Association of Information Technology Professionals. Association of Informaion Technology Professionals, 15 July 2012. Web. 02 May 2013.

Kunz, Michel, and Patrick Wilson. Computer Crime and Computer Fraud. Montgomery
County Md. N.p., 2004. Web. 2 May 2013.

"Computer Crime and Its Effect." Law Teacher. N.p., n.d. Web. 03 May 2013.

Berzai, Lou. "Ethical Problems in Computing - Association of Information Technology
Professionals." Ethical Problems in Computing - Association of Information Technology Professionals. Association of Information Technology Professionals, 15 July 2012. Web. 02 May 2013.
Some computer crimes are used with people losing money from hackers hacking their bank account and other information
Some crimes involve giving a victim a virus on there computer, allowing the criminal to access private information or shut the computer down completely
In some computer crimes the victim does not even know they are being attacked or have been attacked
There are even effects outside the computer itself, for examples if a company's computer system is hacked it might have trouble with people regaining their confidence in the company with their information again
If you are caught doing this you can go to jail or prison
Good Uses of Computers
Some good uses of computers include but are not limited to :
Keeping connected to friends that you don't get to see very oftern
Being able to get connected to family and friends quickly
Being able to check things such as bank accounts and weather
Being able to work on things when you are not at the same computer you are always at
Being able to find out news as it happens
If you are lost technology can be used to trace and find you
Full transcript