Diferencia entre revisiones de «Página principal/en»
De FdIwiki ELP
(→Computer crimes) |
|||
(No se muestran 24 ediciones intermedias de 4 usuarios) | |||
Línea 32: | Línea 32: | ||
* [[Computer Ethics]] | * [[Computer Ethics]] | ||
* [[Free will]] | * [[Free will]] | ||
+ | * [[Ethical Hacking]] | ||
+ | * [[Ethics]] | ||
+ | * [[Computer Ethics in video games]] | ||
=== Privacy === | === Privacy === | ||
Línea 41: | Línea 44: | ||
**** [[TV Documents – Why I am not on Facebook]] | **** [[TV Documents – Why I am not on Facebook]] | ||
**** [[ Facebook's Shadow Profile]] | **** [[ Facebook's Shadow Profile]] | ||
+ | **** [[ Fake news filtering]] | ||
+ | *** [[ Affinaty (eng)]] | ||
*** [[ Snapchat ]] | *** [[ Snapchat ]] | ||
+ | *** [[ SoundCloud (eng) ]] | ||
*** [[ Telegram ]] | *** [[ Telegram ]] | ||
+ | *** [[ Whatsapp ]] | ||
*** [[ Twitter ]] | *** [[ Twitter ]] | ||
− | *** [[ Skype ]] | + | *** [[ Instagram (eng)]] |
− | *** [[ Shazam ]] | + | *** [[ Skype/en ]] |
+ | *** [[ Shazam APP]] | ||
*** [[ Vine ]] | *** [[ Vine ]] | ||
*** [[ LinkedIn ]] | *** [[ LinkedIn ]] | ||
+ | *** [[ Xing (eng)]] | ||
** Videogames | ** Videogames | ||
*** [[ Candy Crush ]] | *** [[ Candy Crush ]] | ||
Línea 57: | Línea 66: | ||
** [[Storage services]] | ** [[Storage services]] | ||
*** [[ Dropbox ]] | *** [[ Dropbox ]] | ||
+ | *** [[ Owncloud (eng) ]] | ||
*[[Your browser]] | *[[Your browser]] | ||
− | *[[Google Hacking]] | + | *[[Google Hacking/en| Google Hacking]] |
* [[RFID]] | * [[RFID]] | ||
* [[NFC]] | * [[NFC]] | ||
Línea 123: | Línea 133: | ||
− | === [[ | + | === [[Cybercrimes]] === |
* [[Telematic crimes - Óscar de la Cruz]] | * [[Telematic crimes - Óscar de la Cruz]] | ||
* [[Hacker Ethics]] | * [[Hacker Ethics]] | ||
* [[Cracking]] | * [[Cracking]] | ||
+ | * [[Shellcode (eng)]] | ||
* [[Conferencia_seguridad|Security]] | * [[Conferencia_seguridad|Security]] | ||
* [[Botnet]]s | * [[Botnet]]s | ||
Línea 137: | Línea 148: | ||
* [[Cyberbullying]] | * [[Cyberbullying]] | ||
* [[Other crimes and their sentences]] | * [[Other crimes and their sentences]] | ||
− | * [[Ransomware]] | + | * [[Ransomware/en|Ransomware]] |
+ | * [[Pharming]] | ||
* [[Ingeniería social/en|Social Engineering]] | * [[Ingeniería social/en|Social Engineering]] | ||
− | * [[ | + | * [[Dumpster Diving]] |
+ | * [[Sniffing]] | ||
+ | * [[Attacks Man In The Middle]] | ||
+ | * [[WEP Security]] | ||
+ | * [[WPA Security]] | ||
+ | * [[WPS Security]] | ||
+ | * [[Nmap (eng)]] | ||
=== Profesión === | === Profesión === | ||
Línea 179: | Línea 197: | ||
*** [[The private eye]] | *** [[The private eye]] | ||
*** [[Fahrenheit 451(novel)]] | *** [[Fahrenheit 451(novel)]] | ||
+ | ** [[Series]] | ||
+ | ***[[Westworld]] | ||
+ | ***[[Humans]] | ||
+ | ***[[Ghost in the Shell]] | ||
+ | ***[[Psycho-Pass]] | ||
+ | ***[[Mr Robot]] | ||
+ | ***[[Halt and Catch Fire]] | ||
** [[Films]] | ** [[Films]] | ||
*** [[I, Robot (film)]] | *** [[I, Robot (film)]] | ||
Línea 192: | Línea 217: | ||
* [[Bitcoin]] | * [[Bitcoin]] | ||
* [[Digital breakthrough]] (age, origin, class, [[gender]], region) | * [[Digital breakthrough]] (age, origin, class, [[gender]], region) | ||
− | * [[ | + | * [[Three laws of robotic]] |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
* [[Augmented reality]] | * [[Augmented reality]] | ||
+ | * [[Core War]] | ||
+ | * [[Autonomous cars]] | ||
=== Reliability and responsibility=== | === Reliability and responsibility=== | ||
Línea 205: | Línea 227: | ||
* Dependency | * Dependency | ||
* [[Certifications]] | * [[Certifications]] | ||
− | * Normalization | + | * [[Specification of software requirements according to the IEEE 830 standard]] |
− | * [[De Facto and De Jure Standards]]. | + | * [[Normalization]] |
+ | * [[De Facto and De Jure Standards]] | ||
+ | * [[File security levels]]. | ||
=== [[Assignment:Professional ethics code|Proffesional ethics codes]] === | === [[Assignment:Professional ethics code|Proffesional ethics codes]] === | ||
* Interests conflicts | * Interests conflicts | ||
* [[ACM code]] | * [[ACM code]] | ||
+ | * [[Ethical codes in companies]] | ||
</div> | </div> | ||
Última revisión de 18:29 10 jun 2018
Welcome to Computer Ethic's Wiki (ELP) This is an experimental wiki for the subject "Computer Ethics" at Facultad de Informática of Universidad Complutense de Madrid Contents available are the result of co-creation from ELP students, and are free under Creative Commons license International 4.0. You can check already created posts up until this moment and recent changes. |
322 articles |
Topics · Assignments · Lectures · Community Website · Café · Help |
Contenido
Starting out
- In the Contents user guide you can check how to create articles, edit, search, etc on this wiki.
- Important: when creating a page for a Social Impact Project we use the prefix Project: followed by the title without leaving a space, like so Trabajo:Distribuciones para niños. This title format is that of namespaces and is meant for Project to be one.
ELP Topics
Introduction to ethics
Privacy
- Vigilance
- Social Networks
- Videogames
- Companies
- Storage services
- Your browser
- Google Hacking
- RFID
- NFC
- LOPD
- Cyphering of communications
- Cryptography
- Stenography
- PGP/GPG
- GNU LibreJs
- Proxy
- Manuals
- Privacy map
- Google privacy on devices
- Assignment:Encryption, licenses, privacy
- Assignment:Cookies policy
- Cookies
- How to remain anonymous on the Internet
- Assignment:Accepted privacy politics
- Safe Harbor
- SOPA Law
Gender digital breakthrough
Important Inventions of Women in Technology
Freedom of speech on the Internet
- Blogsphere
- Cyberspace
- Frontiers
- Online communities
- Anonymity
- Censorship
- Transparency
- Neutrality of the web
- LE-Commerce Law
- The fighting kit for the Internet
- LulzSec
Intelectual property
- Intelectual property Javier de la Cueva
- Author rights
- Copyright
- Copyleft
- Licenses
- Free software
- Free hardware
- FSF and OSI
- Free culture
- Round Table of Free Culture
- Pro-common
- Private copy
- DRM
- Piracy
- P2P
- Patents. Protection of inventions Eduardo Martín
- SGAE. Monopolies. Software patents
- Fork
- TFG - Who intelectual property rights belong to
Cybercrimes
- Telematic crimes - Óscar de la Cruz
- Hacker Ethics
- Cracking
- Shellcode (eng)
- Security
- Botnets
- Honeypots
- Virus
- Spam
- Spam(links)
- Phishing
- Infowar
- Cyberbullying
- Other crimes and their sentences
- Ransomware
- Pharming
- Social Engineering
- Dumpster Diving
- Sniffing
- Attacks Man In The Middle
- WEP Security
- WPA Security
- WPS Security
- Nmap (eng)
Profesión
- What is to be a computer engineer
- Assignment:Guía laboral del sector de las TIC en España
- Assignment: How to make a curriculum
- Workers regulations
- Labour Agreement Computer Science
- Types of employers
- Investigation
- Assignment: What can I do after leaving University
- Professional options
- Enterprising
- Job interview
- How theatre affects a job interview
- Internship
- Version control with Git and GitHub
Security at work
Responsible use of technology
- Fiction
- Luddism
- Science
- Technology and society
- Technological determinism
- Distopia and utopia
- Control of technology
- Social control bottom-up
- Centralised control top-down
- Distributed systems.
- Bitcoin
- Digital breakthrough (age, origin, class, gender, region)
- Three laws of robotic
- Augmented reality
- Core War
- Autonomous cars
Reliability and responsibility
- Faults, errores, risks
- Critical systems
- Dependency
- Certifications
- Specification of software requirements according to the IEEE 830 standard
- Normalization
- De Facto and De Jure Standards
- File security levels.
Proffesional ethics codes
- Interests conflicts
- ACM code
- Ethical codes in companies