Chapter 11 Computers and
Society, Security, Privacy, and Ethics
Chapter 11 Objectives
Computer Security Risks
Computer Viruses, Worms,
and Trojan Horses
Computer Viruses, Worms,
and Trojan Horses
Computer Viruses, Worms,
and Trojan Horses
Computer Viruses, Worms,
and Trojan Horses
Computer Viruses, Worms,
and Trojan Horses
Computer Viruses, Worms,
and Trojan Horses
Computer Viruses, Worms,
and Trojan Horses
Computer Viruses, Worms,
and Trojan Horses
Unauthorized Access and
Use
Unauthorized Access and
Use
Unauthorized Access and
Use
Unauthorized Access and
Use
Unauthorized Access and
Use
Unauthorized Access and
Use
Unauthorized Access and
Use
Unauthorized Access and
Use
Unauthorized Access and
Use
Unauthorized Access and
Use
Hardware Theft and
Vandalism
Software Theft
Software Theft
Software Theft
Information Theft
Information Theft
System Failure
System Failure
Backing Up — The Ultimate
Safeguard
Internet Security Risks
Internet Security Risks
Internet Security Risks
Internet Security Risks
Internet Security Risks
Ethics and Society
Ethics and Society
Information Privacy
Information Privacy
Information Privacy
Information Privacy
Information Privacy
Information Privacy
Information Privacy
Information Privacy
Information Privacy
Information Privacy
Information Privacy
Health Concerns of
Computer Use
Health Concerns of
Computer Use
Health Concerns of
Computer Use
Health Concerns of
Computer Use
Health Concerns of
Computer Use
Summary of Computers and
Society, Security, Privacy, and Ethics