Ethics and Aesthetics

ETHICS AND AESTHETICS
1. Personal safety
When it comes to security, the most important thing is protecting people. Damage to the computer is, 
after all, no more than material damage, but damaged caused to people stays with them over time 
and affects other aspects of life. We will focus on online safety here, although personal safety covers 
many other areas, such as adopting the correct when sitting at the computer or the risk of computer 
addiction.
https://www.youtube.com/watch?v=bZn0IfOb61U
Threats to people ir their identity
We are all vulnerable and our vulnerability increases the more we expose ourselves. On the Internet, 
we reveal ourselves to others to a varying degree. Among the dangers that can threaten us are:
  • Unintended access to ilegal or harmful information.
  • Identity theft, robbery or fraud. For example, phising is a type of computer fraud that consists 
    of acquiring information on a user (bank details, passwords, etc) using deceptive techniques, 
    which is then used fraudulently. The name refers to ‘fishing’ for passwords. The most common 
    example is an e-mail that reaches a user, replacing an e-mail from a bank and asking for 
    passwords due to a false security alert.
  • Loss of our intimacy or harm to our identity or image.
  • Cyberbullying, which is a type of harassment, consisting of threats, blackmail, etc., between 
    peers over the Internet, mobile or video games.





Software for personal protection
Programs are available to facilitate parental control over Internet use.
They can limit searches, permit or block websites, control instant messaging programs, establish filters by age 
and so on.
Examples of parental control programs are KidsWatch (www.kidswatch.com ) and K9Web Protection 
(http://www1.k9webprotection.com).
Resultado de imagen de ETHICS IN THE NET
Our attitude, the best protection
As well as the software available to us, we must be clear that the best protection we can have is ourselves and 
adults we trust: parents, teachers and specialists.
Resultado de imagen de ETHICS IN THE NET
The following page provides some basic recommendations for your protection, which could be considered a 
basic code for surfing the internet for Young people.
Resultado de imagen de ETHICS IN THE NET




Habits to protect personal intimacy
Talk to your parents about your internet browsing; they can always help if you are unsure about anything. If 
you receive something unusual or unpleasant, talk to an adult about it or report it.
On the internet, do not ask for or give our data such as addresses, passwords, telephone numbers, the place 
where you study, places where you normally hang out or any other information that could identify you. Use  
aliases and nicknames that do not contain your date of birth or information about you.
Do not talk to strangers. People are not always what they say they are. Be wary of anybody who wants to 
know a lot of information about you. Remember that there are safer ways to make new friends.
Turn your webcam to a dead angle or put a sticker over it when you are not using it so that cannot record 
images. Webcams can be operated remotely by malicious software. The pólice have been warning us for 
years that the images we think come from the webcam or another person are often actually images that 
they have faked.
Resultado de imagen de WEBCAM  control
Think before you publish photos or videos of yourself; if you decide to do it, only publish things that will not 
damage your current or future image and publish them in places with restricted access and with the consent 
of your parents. Remember not to post pictures of anybody without their consent. Be respectful to others.
Keep up to date with technology and limit how long you spend on the Internet.
Make sure that you are of the mínimum age required to enter a site . you will find this age in the terms of use 
of the site. You must read these terms before clicking on “I agree”. If you don’t  read them, you may be 
allowing the site owners to use your data, pictures, etc.
Inform yourself about sites. On some sites you cannot “unsubscribe” so we must be careful about what we 
post on them; we can sometimes give away our data forever.
Never exchange prívate information on open Wi-Fi networks that are not trustworthy. Both the administrator 
and some of the connected users can use techniques to steal your information.
In short: use common sense and do not do things on a computer that you would not do in everyday life.





















2. Digital identity. Digital certificates.
Everything you do on the Internet leaves a trace, a digital footprint that talks about you. This 
information is your digital identity. It is your duty to take care of it an the law protects you for this 
purpose. As well as the precautions described throught this unit, there are other mechanisms that can 
help us protect our online identity and prevent fraud, such as digital certificates.
A digital (or electronic) certificate is a digital document that contains electronically validated personal
identification data, which can be used as a means of identifying the signatory.
A digital certificate lets you carry out procedures securely from your personal computer, 24 hours a day, 
without having to travel or queue.
In particular, an electronic signature is a type of digital certificate that has the same validity as a 
written signature. Another digital certificate is the electronic ID, which is issued by the Ministry of the 
Interior.
All digital certificates permit access to public services so that the two parties involved in a procedure 
(the user and a government body) can identify each other securely as the parties involved in the 
interaction. In addition, they prevent other people from finding out the information that is being shared.
Getting an electronic certificate is free; to do it, you have to follow this procedure:
  • On a computer with Internet access, apply for the certificate from a certification service 
    provider.
  • Accredit your identity in person at a registration office.
  • Download the certificate from the Internet.






3. Ownership and distribution of software and information
The Internet can provide us with a lot of information and services of interest. We can also find all 
kinds of software online that it might be useful to have.
It is very important to know that software, as with other artistic creations, such as books, songs, grap
hic works, etc., is protected by intellectual property law.
Copyright is a set of standards and principles that regulate the legally recognized moral and property
rights given to authors for the creation of a published or original work. Intellectual property covers
all forms of copyright regarding the availability and use of the author’s creation.

When we access a website to download an application, it is very important to know what type of 
licence the software has.
Not all downloads are illegal or infringe intellectual property rights.
Software licences
All software used or acquired by different means (shops, downloads, the Internet etc) has a user 
licence, in other words, a contract with a series of terms and conditions that must be observed.   
Commercial software
A company’s software sold for profit. It sometimes called  
proprietary software, although not all proprietary 
software is commercial. Examples: Microsoft Office 
Windows 8.
Freeware
This is software not monetary cost but which is not free. It 
is proprietary software. Examples: Internet Explorer, Adobe 
Flash Player.
Free software
This can be freely used, copied, modified and redistributed. 
Its source code is avalaible and is known as open source
Examples: LibreOffice, GIMP, Audacity.
Copyleft
User licence that accompanies free software so it can be 
modified or redistributed.
GNU/GPL (general public licence)
A licence that accompanies packages distributed by the GNU
project. The author reserves the rights and permits 
redistribution and modification under the same licence

File exchange: P2P networks
On the most widespread ways of obtaining software online are P2P networks (peer-to-peer 
networks). Computers on these networks behave as peers, acting as both clients (information 
requesters) and servers (information providers). This permits the direct exchange of information 
computers in the network. P2P networks optimise the bandwidth of all the network users, making use 
of the connectivity between them.
Resultado de imagen de p2p
The information is split up and sent over the network. Users exchange these information packets  
when the user has received all the components. This permits the exchange of large files and is one of the 
characteristics that made them popular.
However the fact that the information is exchanged directly between users has made it possible to share 
applications that are not free. This has generated a great deal of controversy about the legality of exchanging 
content protected by intellectual property rights and copyright.
This point requires reflection: we should objectively value the creator’s efforts and work to obtain the product 
(software, music books, etc.) and the harm caused when this product is improperly obtained by others without 
copyright.
There are a large number of Internet sites where content can be downloaded legally and even, in many cases, for 
free.   


Comentarios

Entradas populares de este blog

Creation and Edition of Multimedia Content

Europe Internet Usage and Statistics

Technical Vocabulary