CPS 82, Fall 2009 17.1 Leftover bits (honoring Thanksgiving) l Compliance with RIAA and p2p  Campus level issues l Voting: electronic, internet, and other.

Slides:



Advertisements
Similar presentations
IT: Communication and Impacts
Advertisements

Good or Bad?.  One of the closest contests in US history  Florida was the pivotal state  Neither Democrat Al Gore nor Republican George W. Bush had.
How Free is Free? Downloading on the Internet U101 - Fall 2012.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Audible Magic Corporation 985 University Avenue #35 Los Gatos, CA USA x145 Tools to Help Universities.
Understanding Issues in Implementing Technology in the Classroom Legal, Ethical, Social, and Human Issues National Educational Technology Standards for.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
1 Freedom of Expression Prepared By Joseph Leung.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Property in Cyberspace 1.What is “Intellectual Property”?Intellectual Property Intellectual Property Is: Intangible creative work—not necessarily the physical.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Elizabeth C. Rodriguez.  A copyright is a form of protection provided by the laws of the United States to authors of “original works of authorship.”
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
EDUCAUSE Security 2006 Internet John Brown University.
 Only say what you are willing to say to someone face to face.  Make yourself look nice online.  People can save what you say online.
Objectives Analyze how the administration of elections in the United States helps make democracy work. Define the role of local precincts and polling places.
P2P file sharing Know the risks. Peer-to-peer (P2P) file sharing convenient way to share public-domain: – music – audio – images – documents – software.
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
12/9-10/2009 TGDC Meeting Vote-by-Phone David Flater / Sharon Laskowski National Institute of Standards and Technology
Chapter 7: The Electoral Process Section 2
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Computer Ethics.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
Computer Ethics Christina McCorkle.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
CPS 82, Fall Illustrated History of Voting l l.
Digital Democracy: A look at Voting Machines Presented by Justin Dugger April 2003.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Digital Citizenship Created By: Kelli Stinson June 2011.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 11 Issues in Implementing Technology in Schools START This multimedia product and its contents are.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
1 Analysis of Consumer Issues and Paths for Concrete Approaches Dr. Carsten Orwat Forschungszentrum Karlsruhe in the Helmholtz Association, Institute for.
Final review Our final exam will be held on Wednesday, May 3rd from 4:00 to 5:50 in room 109 WWH.
Voting System Grant Program. Help America Vote Act  Provides funding to help accomplish the various requirements of the Act.
Get the Job You Want Your Résumé: Your First Contact Employers use résumés to choose a short list of applicants to invite to a job interview. What Makes.
Digital Access Digital Commerce Digital Communication Digital Literacy Digital Etiquette Digital Law Digital Rights and Responsibilities Digital Health.
1 The Evolution of Voting Systems Paul DeGregorio Vice Chairman Donetta Davidson Commissioner The U.S. Election Assistance Commission.
Computers in Society Electronic Voting. Team Projects What is your name? Application? Presentation? Copyright The software industry The open source business.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
Gaby Orduna Period 1. Public records contain info about individuals, often very sensitive information. Are accessible electronically Courts and government.
Copyright © 2011, Oxford University Press, Inc. Converging Media A New Introduction to Mass Communication.
Election Reform The Open Voting Consortium. Elections are important Voting is how we ultimately control.our government Many elections are decided by just.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
 Legal Issues-copyright and fair use, privacy, software piracy, acceptable use  Social Issues- digital divide, cyber bullying, online interaction 
Network Security and Security in Industry Paul Curtis.
Compsci 82, Fall Peer to Peer l What is peer to peer?  Useful? Disruptive?  Manageable, governable?  Architecture l Napster, Gnutella, Limeware,
Politics & Government Session 11 April 28, Federal Elections Senators & Representatives elected by plurality vote – the candidate winning the most.
Social, Ethical, Legal and Human Issues The Role of the Technology Coordinator Johnson Bible College, Dr. Tony Krug.
Internet Economics What does the internet facilitate?
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Summary of today What's happening in Compsci 82?
Securing Information Systems
Election Security Best Practices
Computer Programming I
The Issues with Technology in education
A Better Way Forward For P2P: Voluntary Collective Licensing
Protecting Data and Information
Presentation transcript:

CPS 82, Fall Leftover bits (honoring Thanksgiving) l Compliance with RIAA and p2p  Campus level issues l Voting: electronic, internet, and other  Why is there less of this in the news? l Court cases affect: life, liberty, technology  What are the key issues here?

CPS 82, Fall Costs of dealing with campus p2p l Campus Computing Project, Paul Green, 10/08  l Private universities spend (average, ’07- ’08)  $105K software, $158K hardware, $144K other direct costs (e.g., personnel)  Software for monitoring, shaping p2p  Hardware, e.g., Copysense appliance  Keeping up with RIAA: IT and student support  Stanford three-strikes policy?

CPS 82, Fall Audible Magic: Copysense Appliance l EFF ‘analysis’ of solutions  l What does this do? Database of copyrighted works with digital fingerprints  Compare packet data with database  If there’s a match do “something” to squelch use  $60-75K/year

CPS 82, Fall Campus tussles in p2p monitoring l How much of IT budget for p2p monitoring?  Vendor lock, support, open-source solutions? l Academic freedom, student expectations of privacy  How is p2p traffic monitored? Wiretapping? l Discourage infringement, respect laws and students  Laws require universities to do something  Student expectations and reality

CPS 82, Fall Packet shaping l From $1,500 to $58,000 (Packeteer, there are others)  Look at where packets go, specific port http: 80, limewire: 6346, eDonkey: 4662, …  Look at what type of information packet carries Typically don’t need to do “deep” inspection l Throughput, latency, throttling  Change network behavior

CPS 82, Fall Illustrated History of Voting l l Privacy, Reliability, Anonymity, …  Who gets to vote, whose votes are counted?

CPS 82, Fall History of Voting l

CPS 82, Fall Voting, Technology, Internet l “If elections are defective, the entire democratic system is at risk … Americans are losing confidence in the fairness of elections, and while we do not face a crisis today, we need to address the problems of our electoral system.” Commisson on Federal Election Reform l From 1876 (Rutheford B. Hayes) to 2000 (George Bush), pushes for “voting machine reform”: HAVA 2002

CPS 82, Fall How hard to attack voting machines? l How hard to hack/attack paper ballot?  What about Internet voting? DRE machine? l How hard is it to find the phone number of John Smith using a phone book?  What about whose number is ? l How data is organized affects “difficulty”  Given a reverse-number phone book…  Given Google …

CPS 82, Fall Complexity and Computer Science l Time doubles when items double in size  Linear or O(n) l Time quadruples when items double  Quadratic or O(n 2 ): 3 to 9, 5 to ? l Time constant/unchanging when doubling  Constant time or O(1) l Why does this matter?

CPS 82, Fall Attacks (see Wallach paper)see Wallach paper l Absentee/vote-by-mail  To steal N votes must do O(N) work, bribe or coerce each voter. What about using postal workers? O(N/P)  Centralized DoS attack, potentially O(1), throw out all envelopes, all from some zip-code, etc. l DRE attack  Anonymity using O(P) or O(1) since order of votes is kept in machine (maybe)  Visits, poll-workers, …

CPS 82, Fall Legal v Technical: Courts of Law l Perfect 10 v everyone  Mostly copyright: fair-use, infringement l Blizzard v BNETD and MDY  Copyright, licensing, section 117 l Blumenthal v Drudge and AOL  Who is liable for libel online?

CPS 82, Fall Perfect 10 v Google (and others) l Thumbnails “transformative”  Anatomy of Google results l History of Perfect 10  Who is sued and why? l Who files Amicus Briefs?

CPS 82, Fall Blizzard v BNETD and MDY l Blizzard: $100Million/month on WOW Blizzard: $100Million/month on WOW  MMO, how is it played? Licensed? Purchased  Network and updates (currently Bittorrent!) l BNETD, open source, network alternative l MDY, “Glider”, autoplayer  Warden as either spyware or protection  Tremendous implications if Blizzard wins

CPS 82, Fall Blumenthal v Drudge and AOL l Drudge alleges spousal abuse  Retracts “immediately” l Blumenthal sues both  Why is AOL dismissed? l What recourse here?  Good Samaritan clause Section 230 of CDA