CS245 - CS II SPRING 1997

Chapter 14 - Ethics, Electronic Spies and Privacy

14.1 Introduction - Vulnerability and Technological Abuse computer abuse stems from three major causes:

Vulnerabilities

Ethical Concerns

14.2 High Tech Crime: the computer as a Criminal Tool

  1. a computer crime is any criminal act that has been committed using a computer as the principal tool
  2. a computer crime is an illegal activity which could not take place without a computer
  3. a computer crime is any illegal activity using computer software, data or access as the object, subject or instrument of the crime

14.3 Software Piracy
Software Piracy - unauthorized copying or use of software for which you have not paid the appropriate licensing fee

14.4 Hacking

14.5 The Virus Epidemic

14.6 Invasions of Privacy

EXERCISES;Due Dec. 5, 1997

  1. Name 2 Moral Imperative of the ACM Code of Ethics.
  2. Name 2 specific Professional Responsibilities of an ACM computing professional.
  3. What is the difference between shareware and freeware?
  4. Is there a computer security problem (in general)? Elaborate!
  5. What is a computer virus?
  6. List two different antivirus software products.