Ethics and Aesthetics
ETHICS AND AESTHETICS
1. Personal safety
When it comes to security, the most important thing is protecting people. Damage to the computer is,
after all, no more than material damage, but damaged caused to people stays with them over time
and affects other aspects of life. We will focus on online safety here, although personal safety covers
many other areas, such as adopting the correct when sitting at the computer or the risk of computer
addiction.
after all, no more than material damage, but damaged caused to people stays with them over time
and affects other aspects of life. We will focus on online safety here, although personal safety covers
many other areas, such as adopting the correct when sitting at the computer or the risk of computer
addiction.
https://www.youtube.com/watch?v=bZn0IfOb61U
Threats to people ir their identity
We are all vulnerable and our vulnerability increases the more we expose ourselves. On the Internet,
we reveal ourselves to others to a varying degree. Among the dangers that can threaten us are:
we reveal ourselves to others to a varying degree. Among the dangers that can threaten us are:
- Unintended access to ilegal or harmful information.
- Identity theft, robbery or fraud. For example, phising is a type of computer fraud that consists
of acquiring information on a user (bank details, passwords, etc) using deceptive techniques,
which is then used fraudulently. The name refers to ‘fishing’ for passwords. The most common
example is an e-mail that reaches a user, replacing an e-mail from a bank and asking for
passwords due to a false security alert. - Loss of our intimacy or harm to our identity or image.
- Cyberbullying, which is a type of harassment, consisting of threats, blackmail, etc., between
peers over the Internet, mobile or video games.
Software for personal protection
Programs are available to facilitate parental control over Internet use.
They can limit searches, permit or block websites, control instant messaging programs, establish filters by age
and so on.
and so on.
Examples of parental control programs are KidsWatch (www.kidswatch.com ) and K9Web Protection
(http://www1.k9webprotection.com).
(http://www1.k9webprotection.com).
Our attitude, the best protection
As well as the software available to us, we must be clear that the best protection we can have is ourselves and
adults we trust: parents, teachers and specialists.
adults we trust: parents, teachers and specialists.
The following page provides some basic recommendations for your protection, which could be considered a
basic code for surfing the internet for Young people.
basic code for surfing the internet for Young people.
Habits to protect personal intimacy
Talk to your parents about your internet browsing; they can always help if you are unsure about anything. If
you receive something unusual or unpleasant, talk to an adult about it or report it.
you receive something unusual or unpleasant, talk to an adult about it or report it.
On the internet, do not ask for or give our data such as addresses, passwords, telephone numbers, the place
where you study, places where you normally hang out or any other information that could identify you. Use
aliases and nicknames that do not contain your date of birth or information about you.
where you study, places where you normally hang out or any other information that could identify you. Use
aliases and nicknames that do not contain your date of birth or information about you.
Do not talk to strangers. People are not always what they say they are. Be wary of anybody who wants to
know a lot of information about you. Remember that there are safer ways to make new friends.
know a lot of information about you. Remember that there are safer ways to make new friends.
Turn your webcam to a dead angle or put a sticker over it when you are not using it so that cannot record
images. Webcams can be operated remotely by malicious software. The pólice have been warning us for
years that the images we think come from the webcam or another person are often actually images that
they have faked.
images. Webcams can be operated remotely by malicious software. The pólice have been warning us for
years that the images we think come from the webcam or another person are often actually images that
they have faked.
Think before you publish photos or videos of yourself; if you decide to do it, only publish things that will not
damage your current or future image and publish them in places with restricted access and with the consent
of your parents. Remember not to post pictures of anybody without their consent. Be respectful to others.
damage your current or future image and publish them in places with restricted access and with the consent
of your parents. Remember not to post pictures of anybody without their consent. Be respectful to others.
Keep up to date with technology and limit how long you spend on the Internet.
Make sure that you are of the mínimum age required to enter a site . you will find this age in the terms of use
of the site. You must read these terms before clicking on “I agree”. If you don’t read them, you may be
allowing the site owners to use your data, pictures, etc.
of the site. You must read these terms before clicking on “I agree”. If you don’t read them, you may be
allowing the site owners to use your data, pictures, etc.
Inform yourself about sites. On some sites you cannot “unsubscribe” so we must be careful about what we
post on them; we can sometimes give away our data forever.
post on them; we can sometimes give away our data forever.
Never exchange prívate information on open Wi-Fi networks that are not trustworthy. Both the administrator
and some of the connected users can use techniques to steal your information.
and some of the connected users can use techniques to steal your information.
In short: use common sense and do not do things on a computer that you would not do in everyday life.
2. Digital identity. Digital certificates.
Everything you do on the Internet leaves a trace, a digital footprint that talks about you. This
information is your digital identity. It is your duty to take care of it an the law protects you for this
purpose. As well as the precautions described throught this unit, there are other mechanisms that can
help us protect our online identity and prevent fraud, such as digital certificates.
information is your digital identity. It is your duty to take care of it an the law protects you for this
purpose. As well as the precautions described throught this unit, there are other mechanisms that can
help us protect our online identity and prevent fraud, such as digital certificates.
A digital (or electronic) certificate is a digital document that contains electronically validated personal
identification data, which can be used as a means of identifying the signatory.
identification data, which can be used as a means of identifying the signatory.
A digital certificate lets you carry out procedures securely from your personal computer, 24 hours a day,
without having to travel or queue.
without having to travel or queue.
In particular, an electronic signature is a type of digital certificate that has the same validity as a
written signature. Another digital certificate is the electronic ID, which is issued by the Ministry of the
Interior.
written signature. Another digital certificate is the electronic ID, which is issued by the Ministry of the
Interior.
All digital certificates permit access to public services so that the two parties involved in a procedure
(the user and a government body) can identify each other securely as the parties involved in the
interaction. In addition, they prevent other people from finding out the information that is being shared.
(the user and a government body) can identify each other securely as the parties involved in the
interaction. In addition, they prevent other people from finding out the information that is being shared.
Getting an electronic certificate is free; to do it, you have to follow this procedure:
- On a computer with Internet access, apply for the certificate from a certification service
provider. - Accredit your identity in person at a registration office.
- Download the certificate from the Internet.
3. Ownership and distribution of software and information
The Internet can provide us with a lot of information and services of interest. We can also find all
kinds of software online that it might be useful to have.
kinds of software online that it might be useful to have.
It is very important to know that software, as with other artistic creations, such as books, songs, grap
hic works, etc., is protected by intellectual property law.
hic works, etc., is protected by intellectual property law.
Copyright is a set of standards and principles that regulate the legally recognized moral and property
rights given to authors for the creation of a published or original work. Intellectual property covers
all forms of copyright regarding the availability and use of the author’s creation.
rights given to authors for the creation of a published or original work. Intellectual property covers
all forms of copyright regarding the availability and use of the author’s creation.
When we access a website to download an application, it is very important to know what type of
licence the software has.
licence the software has.
Not all downloads are illegal or infringe intellectual property rights.
Software licences
All software used or acquired by different means (shops, downloads, the Internet etc) has a user
licence, in other words, a contract with a series of terms and conditions that must be observed.
licence, in other words, a contract with a series of terms and conditions that must be observed.
Commercial software
|
A company’s software sold for profit. It sometimes called
proprietary software, although not all proprietary software is commercial. Examples: Microsoft Office Windows 8. |
Freeware
|
This is software not monetary cost but which is not free. It
is proprietary software. Examples: Internet Explorer, Adobe Flash Player. |
Free software
|
This can be freely used, copied, modified and redistributed.
Its source code is avalaible and is known as open source. Examples: LibreOffice, GIMP, Audacity. |
Copyleft
|
User licence that accompanies free software so it can be
modified or redistributed. |
GNU/GPL (general public licence)
|
A licence that accompanies packages distributed by the GNU
project. The author reserves the rights and permits redistribution and modification under the same licence |
File exchange: P2P networks
On the most widespread ways of obtaining software online are P2P networks (peer-to-peer
networks). Computers on these networks behave as peers, acting as both clients (information
requesters) and servers (information providers). This permits the direct exchange of information
computers in the network. P2P networks optimise the bandwidth of all the network users, making use
of the connectivity between them.
networks). Computers on these networks behave as peers, acting as both clients (information
requesters) and servers (information providers). This permits the direct exchange of information
computers in the network. P2P networks optimise the bandwidth of all the network users, making use
of the connectivity between them.
The information is split up and sent over the network. Users exchange these information packets
when the user has received all the components. This permits the exchange of large files and is one of the
characteristics that made them popular.
when the user has received all the components. This permits the exchange of large files and is one of the
characteristics that made them popular.
However the fact that the information is exchanged directly between users has made it possible to share
applications that are not free. This has generated a great deal of controversy about the legality of exchanging
content protected by intellectual property rights and copyright.
applications that are not free. This has generated a great deal of controversy about the legality of exchanging
content protected by intellectual property rights and copyright.
This point requires reflection: we should objectively value the creator’s efforts and work to obtain the product
(software, music books, etc.) and the harm caused when this product is improperly obtained by others without
copyright.
(software, music books, etc.) and the harm caused when this product is improperly obtained by others without
copyright.
There are a large number of Internet sites where content can be downloaded legally and even, in many cases, for
free.
free.
Comentarios
Publicar un comentario