Computer Security Social Legal and Ethical issues

Slides:



Advertisements
Similar presentations
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Advertisements

Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Ethics.
Security, Privacy, and Ethics Online Computer Crimes.
Internet Privacy & Security A Presentation to WPI Student Pugwash Michael J. Ciaraldi Professor of Practice, WPI Computer Science 2003/10/02.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Chapter 10 Privacy and Security McGraw-Hill
Privacy Chris Kelly iLaw July 5, 2002.
Chapter 14 Social and Legal Issues. Chapter Outline A gift of fire A gift of fire Here, there, everywhere Here, there, everywhere Privacy Privacy The.
PowerPoint® Slides to Accompany
CS 305 Topics Covered. Chapter 1: Overview of Ethics What is ethics? Ethics is a set of beliefs about right and wrong behavior. These beliefs are guided.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
3 Ethics and Privacy.
Privacy & Personal Information -- Why do we care or do we?
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
9/4/20151 Computer Security Social Legal and Ethical issues.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Ethics Applied to Computerized World “Privacy” (Morality and Machines S. L. Edgar) **** CS575 *** Jules R. NYA BAWEU.
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
2.6 Protecting Individual Citizens 1 st & 4 th Amendments In Depth Government & Citizenship Timpanogos High School.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
According to the Bill of Rights, you have the freedom of speech which means that you have the right to practice your religion › The rules are a little.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Privacy and the Law.
Surveillance around the world
Constitution Debated.
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Introduction to Constitutional Law
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Personal protections and liberties added to the Constitution for you!
E-Commerce: Regulatory, Ethical, and Social Environments
Wiretapping and Encryption
PowerPoint® Slides to Accompany
Introduction to Constitutional Law
Understanding Law: Mr Thompson, APT Academy
A Gift of Fire Third edition Sara Baase
Other Sources of Information
Constitution Debated.
Ethical Use of Computers
Bill of Rights Do Now: Paraphrase the Fourth Amendment to the Constitution. Rewrite it into your own words without leaving out any information. You can.
The Surveillance State
IA455 Chris Danieli and Zachary gibson
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Presentation transcript:

Computer Security Social Legal and Ethical issues 4/3/2019

Social Legal and Ethical issues Sara Base, A Gift of Fire, Prentice Hall, 2003 4/3/2019

Social Legal and Ethical issues The impact of computers and computer systems The ATM example Unemployment Alienation and customer service Crime Loss of privacy Errors 4/3/2019

Social Legal and Ethical issues General Themes Globalization of cyberspace Tradeoffs of convenience vs privacy & security Personal choices, Business policies and law Negative or liberties and positive rights or claim rights 4/3/2019

Social Legal and Ethical issues Main issues Privacy Freedom if speech Can we trust computers Intellectual property Computer Crime General social issues Ethics 4/3/2019

1. Privacy & personal information Key aspects Freedom from intrusion Control information about oneself Freedom from surveillance 4/3/2019

1. Privacy & personal information “Big brother is watching you” Database security 4/3/2019

Database security Provisions of Privacy Act of 1974 Restricts data in federal government records to what is “relevant and necessary” to the legal purpose for which it is collected. Requires federal agencies to publish a notice of their record systems in the Federal Register Allows people to access their records & correct inaccurate info Requires procedures to protect the security of the info in the databases Prohibits disclosure of info about a person without their consent. 4/3/2019

The fourth Amendment, US Constitution The right of the people to be secure in their persons, houses, paper and effects against unreasonable searches and seizures shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. 4/3/2019

Privacy & personal information Satellite surveillance and thermal imaging Automated toll collection and itemized purchase records Search and surveillance tools Fighting terrorism 4/3/2019

Databases and marketing Credit bureaus Principles for data collection & use Collect only data needed Inform people when data about them are collected, what is collected … Offer a way for people to opt out Provide stronger protection for sensitive data Keep data only as long as it is needed Maintain accuracy and security of data Provide a means for people to access and correct data stored about them. 4/3/2019

Databases and marketing Social Security numbers and National ID systems Personal health and medical records Public records: access vs privacy 4/3/2019

Privacy & personal information Protecting Privacy: law & regulation Is their a right to privacy The free market view vs the consumer protection view Contract and regulations Conflicts with freedom of speech 4/3/2019

2. Freedom of speech Encryption and interception of communications Wiretapping Telephone New technologies USA Patriot Act 2001: Lets the government collect info from financial institutions on any transactions that differs from a customer’s usual pattern, and allows access to the government to many other kinds of personal information without a court order. 4/3/2019

Freedom if speech Carnivore FBIs system for intercepting email FBI must first get a court order to intercept someone’s email The Carnivore system is used at the Suspects Internet Service provider and filters all e-mails from that ISP, examining headers to find suspect email. 4/3/2019

Freedom if speech NSA’s echelon Similar to Carnivor, but on an international Scale. Involves a partnership with intelligence agencies of Canada, Britain, Australia and New Zealand, and operates a huge system of listening stations to intercepts satellite communication. Targets terrorist and military activities 4/3/2019

Freedom if speech Cryptography and its uses Uses of encryption Criminal abuse: “ … unfortunately the same technology can be used by terrorists, drug dealers, … “ White House Press, 1994 Secrecy and export controls Steganography 4/3/2019

Freedom if speech Secrecy Clipper Trust in government How much does technology matter 4/3/2019

3. Can we trust computers What can go wrong! Billing errors database accuracy failures… Increasing reliability and Safety Overconfidence Redundancy Good design 4/3/2019

4. Intellectual property Problems with new technologies Copyright Law The fair use doctrine Copying Music, Movies, Software Books From floppies to the web The Napster case Beyond Napster Software Piracy 4/3/2019

4. Intellectual property Ethical issues Fuzziness about the ethics: Arguments used include: I cant afford to buy The company is a wealthy corporation Too expensive anyway Making a copy from a friend is an act of generosity 4/3/2019

4. Intellectual property The future of copyright Doomsday approach: copyright law will disintegrate. Balanced solutions will be found by using a new approach and new technologies Free software Copyright or patent? 4/3/2019

5. Computer Crime Hacking The Law Design secure “hack-free” systems Catching hackers Penalties appropriate to the crime Discouraging and punishing “amateur” hackers Design secure “hack-free” systems Scams Fraud, embezzlement, Sabotage Identity theft 4/3/2019

6. General social issues Impact on our society Information Haves and have-Nots The digital divide Trends in computer access Abdicating responsibility Does the Technology create the need for itself? “… The Web is alive and filled with life, nearly as complex and natural as the primordial swamp…” Who benefits most Prohibiting bad technologies 4/3/2019

7. Ethics What is Ethics The study of what it means to do the “right” thing And what is the “right” thing? Deontological theories Utalitarialism Natural rights No simple answers Right, wrong and OK Negative and positive rights, or liberties and claim-rights Distinguishing wrong and Harmful Separating goals from constraints Personal Preference and Ethics Law and Ethics Professional codes and Ethics 4/3/2019