NTR 100 COMPLETE Syllabus and Academic Integrity Acknowledgement Arizona State University
NTR 100 COMPLETE Syllabus and Academic Integrity Acknowledgement Question 1 1 / 1 pts I have read the ASU ā¦
UNIT 10: ASSIGNMENT 1
Computer Use Policy
Kaplan University
IT190-01
Professor Abramson
May 5, 2015
Computer Use Policy
Ethical computing is the moral values and standards that control the actions of a person or a group when using a computer. Ethical computing means that you are aware of the harm that can been done such as, identity theft, bank account information stolen people
can become a victim of fraud.
Plagiarism is copying or steal someoneās work and using it as if it is yours without giving credit to the sources. Plagiarism is against academic requirements. There are programs such as Turnitin that check for plagiarism. Copyright infringement is a violation of the
copyright and you can sue. Meaning that you cannot copy music, software or videos. In the news āA CNN News Editor was fired for plagiarismā According to the article āthe
editor had plagiarized at 50 articleā Ohlheiser (2014).
Copy left is software that can be free or paid and it allows users to copy, change and redistribute the software. It also known to be proprietary because can convert the
program.
Software piracy is when you copy software that is legally protected under a copyright and is considered copyright infringement. Software piracy is a direct violation of the EULA and penalties for an individual are fines up to $93,500 and for a company the fines are up
to $467,500 and both can up to five years imprisonment.
Internet connection sharing (ICS) is when you are able to have network of computers (two or more) that share the same internet connection. It is unethical for you to allow your neighbor to piggyback off your connection because it goes against the ISP
restrictions and EULA.
Social media can be misleading and people misuse the internet. If you post a picture of someone hitting a dog, the message that is perceived that this person has committed cruelty to animals. If you post a picture of you at a Caribbean event dressed in carnival
custom, people with assume that you are doing something inappropriate.
I read an article from St. Louis, MO server that worked for Applebeeās posted a picture of a receipt of a customer that refused to give her a tip. The customer wrote on the receipt of
$34.93 āI give God 10%. Why do you get 18%?āLarson (2013).
Your employer have the right to monitor your internet usage and any websites that you visit while using their network. Your employer also has the right to review company email accounts and monitor your keylogging to ensure productivity does not decline.
References:
http://online.vitalsource.com/books/9781323028339/id/ch05figu6 http://online.vitalsource.com/books/9781323028339/id/ch05lev3sec41 http://ethicalcomputing.net/
http://www.techopedia.com/definition/5499/computer-ethics http://techterms.com/definition/computerethics http://techterms.com/definition/plagiarism
http://techterms.com/definition/copyright_infringement
http://tudorlawfirm.com/the-difference-between-plagiarism-and-copyright-infringement/ http://www.plagiarismchecker.com/plagiarism-vs-copyright.php
http://www.thewire.com/national/2014/05/cnn-editor-fired-for-plagiarism/371045/ http://searchenterpriselinux.techtarget.com/definition/copyleft
http://www.techopedia.com/definition/3261/copyleft http://www.gnu.org/copyleft/ http://online.vitalsource.com/books/9781323028339/id/ch04lev3sec22 http://online.vitalsource.com/books/9781323028339/id/gloslev1sec3 http://www.wisegeek.com/what-is-software-piracy.htm
http://techterms.com/definition/piracy
http://www.pcmag.com/encyclopedia/term/51693/software-piracy http://ww2.bsa.org/country/Anti-Piracy/Know%20the%20Law.aspx?sc_lang=en-AU http://www.bsa.org/anti-piracy/tools-page/software-piracy-and-the-law/?sc_lang=en-US http://www.scottandscottllp.com/main/software_piracy_penalties.aspx http://www.wisegeek.com/what-is-internet-connection-sharing.htm
http://www.pcworld.com/article/246953/can_my_neighbor_and_i_share_an_internet_con nection_.html
http://www.wisegeek.com/what-are-media-ethics.htm
http://www.usatoday.com/story/news/nation/2014/03/08/data-online-behaviorresearch/5781447/
http://www.americanbar.org/publications/blt/2014/01/03_harvey.html http://mashable.com/2013/02/01/applebees-fired/ https://www.privacyrights.org/workplace-privacy-and-employee-monitoring http://www.natlawreview.com/article/employers-using-social-media-to-monitoremployees-risks-and-liability
NTR 100 COMPLETE Syllabus and Academic Integrity Acknowledgement Question 1 1 / 1 pts I have read the ASU ā¦
HEP 456 Module 6 Section 14 Communication and Dissemination of The Findings HEP 456: Health Promotion Program ā¦
HEP 456 Module 5 Section 12 and 13 Planning for Analysis and Interpretation and Gantt chartĀ Name HEP 456: ā¦