Smart PWNs: An Ethical Analysis of Smart Phone Technology Colin O'Hanlon Josh Schwartz Norman Littlejohn.

Slides:



Advertisements
Similar presentations
SESSION TEN Online Relationships. Social Networking Sites There are a number of things to think about when using social networking sites: Be careful what.
Advertisements

Big Data Privacy Issues in Public Social Media Reporter : Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Western Australian Emergency Medicine Research Online WAEMRO Dis-integrating healthcare information systems Professor Peter Sprivulis MBBS PhD FACEM FACHI.
 In some countries, not-for-profit organizations are permitted to run advertisements through certain media outlets free-of-charge if the message contained.
Ethics in a Computing Culture
It is about the website(Named as Reddit.com), which becames the No. 1 Social bookmarking website in the Year of Now many of you must be thinking.
Hidden Apps Carrier IQ and Privacy in Mobile Devices.
The Future of Social Networking in 2050 By Alex, Kim, Nicole, Jessie, and David.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Customer Service In the Social Media Age. What is This Presentation About? The impacts of social media and internet review sites on business today The.
Where does bullying occur? OFSTED Report % at school 55% at school 24% at home 24% at home 18% around where children live 18% around where children.
Jana Dixon Dawson Educational Cooperative
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Presentation By Deepak Katta
Introduction Our Topic: Mobile Security Why is mobile security important?
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
Digital Citizenship and Media Literacy
+ Privacy in the Information Age Year 12, 2012 Lesson 3 January
Digital Citizenship Texting vs. Sexting Cyberbullying.
Ethical And Legal Considerations Ethical Issues  Ethical codes are not set in stone. They serve as principles upon which to guide practice.  There are.
Social Media Operating in the Digital Age March 5, 2010 Chapel Hill, NC Terry Bledsoe, Chief Information Officer Catawba County, NC Matures.
Computer Ethics.
1 Spyware Ryan Myers Andrew Sullivan ECE 4112 – Spring 2005.
Security considerations for mobile devices in GoRTT
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
Workshop 6 - How do you measure Outcomes?
Camille Portelli Shawnah Staples Alisa Frohlinger Cathy Stein.
Tiana Bocuzzi Surfing while Chatting “My Research Notes” Credit: Eisenberg, M. (2004). PowerPoint for Notetaking. Retrieved December 27, 2008, from
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
E-Safety. A great place… Image by: Shutterstock/nasirkhan As we have discussed over the last few lessons, the Internet is a great tool for sharing information,
Online Safety Parent Workshop Windsor Community Primary School December 10 th 2015.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Laws and Rules That Govern Internet Safety Ashley Martin.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
IT has had a big impact social in many different ways. Facebook is a social networking site that allows people to communicate and stay in touch with friends.
9.1 Audience Appreciation
E-Safety Parent Talk Helping to keep your children safe online.
School Law and the Public Schools: A Practical Guide for Educational Leaders, 5e © 2012 Pearson Education, Inc. All rights reserved. Chapter 7 Liability.
Facebook privacy policy
CHAPTER FOUR OVERVIEW SECTION ETHICS
Hot Topics:Mobility in the Cloud
Consumer Health Informatics
I have many checklists: how do I get started with cyber security?
By Joseph Carnevale, CIP Partner & Director of Sales
Brian Kelly UKOLN University of Bath Bath, UK
CHAPTER FOUR OVERVIEW SECTION ETHICS
Vulnerabilities in Mobile Applications and Input Systems
Vulnerabilities in Mobile Applications and Input Systems
Presentation transcript:

Smart PWNs: An Ethical Analysis of Smart Phone Technology Colin O'Hanlon Josh Schwartz Norman Littlejohn

Impact and Control of Smart Phone Technology Definition and concern How technology has impacted this issue Professional arguments and related laws o ACM code and privacy laws Interested and affected parties Risks and benefits of smart phones Ethical scenario and solutions

Definition and Concerns The drastic and rapid rise in the popularity as well as the technological complexity of smart phones has created many changes in how information is collected as well as who has access to it. Data mining potential GPS location features Sensitive data exposure o credit pay passes, boarding info Video on photo capabilities o concerns with instant shared over networks

Impact of Technology Mobile phones have provided the functionality of a full size computer in a pocket size This brings ethical issues regarding privacy of individuals to a new medium Dependence on Smart Phones for , web, and social networking Applications that make our lives easier These same applications sometimes threaten our privacy

Address of Legal and Professional Code ACM Code o Section 1.7 Respect Privacy of Others o Section 2.5 Give Comprehensive and thorough evaluations of computer systems and their implications Legal Issues o Generally laws are not violated because individuals are being recorded with "no reasonable expectation of privacy"

Parties with Stake in Mobile Technology Providers o Carriers (ATT, Verizon, etc) o Hardware Manufacturers (HTC, Apple, Motorola, etc) o Operating System Developers (Google, Apple, Microsoft) o Application Developers Consumers o End Users o Business Owners Governments o RIM vs India - wanted power to monitor encrypted

Positive and Negative Rights Y ouTube’s privacy policy: Grants users the Positive Right of being able to petition a video if they feel it violates their right to privacy However YouTube, also retains a Negative Right of not taking any action if they feel it does not. YouTube makes the final determination.

Risks and Benefits of Smart Phones RISKS o Geotracking- Your phone logs where you have been...Your phone logs where you have been... o Hacking Tools - Run exploits against a WLAN from phoneRun exploits against a WLAN from phone o SpyWare - SpyWare isn't just for WindowsSpyWare isn't just for Windows BENEFITS o Having a single device that does everything and makes your life easier

Ethical Scenario Casey Heynes is an Australian grade school student who retaliated against a bully during an altercation. The incident was recorded via smart phone, uploaded to the internet,and the video of his self defense went viral. The video has had significant impacts on the personal lives of both boys involved. Whose ethical responsibility is it to control how mobile technology is used to quickly distribute self-produced materials? Especially focusing on content that is prone to go viral and could cause potential harm and backlash. Is it the Individuals themselves? Video hosting sites? Service providers? -heynes-vs-bully_fun

Solution Model 1: Poster Responsbility Poster is responsible for what they contribute via mobile devices Consider before posting: o consent of parties involved o age of parties, minors o nature of content o legality of actions recorded o possibility to go viral *Recording an incident can have positive uses such as logging criminal evidence, but should'nt be put online

Solution Model 2: Host Liability It is the responsibility of the host to monitor content. -Expend more resources to implement identity concealing technologies such as: -Voice masking -Face / body blurring -Critical information about the original poster and origin of content should be a requirement Kinect Example: star-kirsten-price-tests-kinects-nude-filter/ star-kirsten-price-tests-kinects-nude-filter/ Voice Masking:

Solution Model 3: Personal Responsibility You are responsible for controlling content about you Impossible for content provider to regulate everything Too difficult to track the source once a video has spread Can't rely on other people to make good decisions Only option is to prevent videos to be taken of you o Must be:  Paranoid  Quick to respond  Ready to sue Some might argue this is how it already works because no one cares about what they post.

Selected Solution Solution 1 o Generally is our current system o Other options generally unfeasible:  volume of material unmanageable for hosts  technology incompetent people are vulnerable  searches for self can be difficult without proper meta tagging (Ex:"Guy gets owned" vs "John Smith of 123 Street, Indiana, PA get owned") o This model of use is a social issue  problems are result of people so a cultural change about posting will be required for a better implementation