Ethical Issues of Computer Networks

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
PowerPoint Presentation Possible Topics Related to General Education Area VI Computer Science Appendix B.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Boyertown Area School District Acceptable Use Policy.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
4.1 © 2007 by Prentice Hall 4 Chapter Ethical and Social Issues in Information Systems.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
1 Business Ethics and Technology Chapter 9 Professor Craig Diamond BA 385 October 28, 2009.
J. Chansavang. Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics.
Discovering Computers 2010
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Chapter 11 Security and Privacy: Computers and the Internet.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
Digital Citizenship Project
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Unethical use of Computers and Networks
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Digital Citizenship Project By Allen Naylor Ed 505.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Computer crimes.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Security, Social and Legal Issues Regarding Software and Internet
A Gift of Fire Third edition Sara Baase
Year 10 ICT ECDL/ICDL IT Security.
Five Unethical Uses of Computers
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Internet Safety Vocabulary
Computer Programming I
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Ethical Issues of Computer Networks

Computer Network Ethics The study of what it means to “do the right thing” Assume people are rational and make free choices Rules to follow in our interactions and our actions that affect others Computer Network Ethics resulted from the growth of the Internet A branch of professional ethics How computing professionals should make decisions regarding professional and social conduct

Rapid Pace of Change Computer and the Internet Cell Phones Social Networking Facebook, MySpace Collaboration Wikipedia E-commerce and Free Stuff Online books, games, online videos

Issues Resulted From These rapid Changes Hacking and Crimes Identity Theft and Credit-Card Fraud Privacy and Anonymity Intellectual Property and Copyright Censorship

Hacking and Crimes Network security issues resulted from the growth of the Internet and of E-commerce The term “hacking” has changed over time Examples Defaced Web pages Computer viruses and worms Scam emails and phishing attacks Hacktivism: the use of hacking to promote a political cause Unauthorized access to sensitive information

Hacking and Crimes (Con’t) Is it ethical to break into a system without permission Security professionals inform the software company responsible for the software to close security holes before making a public announcement Is “harmless hacking” harmless? It is difficult to distinguish a non-malicious hacker from a thief or terrorist It takes efforts and costs to stop the intrusion

Hacking and Crimes (Con’t) The law The Computer Fraud and Abuse Act (CFAA) passed in 1986 Covers government computers, financial and medical systems, and activities that involve computers in more than one state, including computers connected to the Internet The USA PATROIT Act Expands the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems

Hacking and Crimes (Con’t) A variety of methods for catching hackers Law enforcement agents read hacker newsletters and participate in chat rooms undercover They can often track a handle by looking through newsgroup archives Security professionals set up ‘honey pots’ which are Web sites that attract hackers, to record and study Computer forensics is used to retrieve evidence from computers

Identity Theft and Credit-Card Fraud We do our banking and investing on the Web Risks: It is possible to steal our identity, e.g., credit card numbers, SSN, account numbers, etc. Example Phishing emails to confirm information about your account and password Pharming to lure people to fake Web sites Trojan horse may track keystrokes and send them over the Internet Online resumes and job hunting sites may reveal SSN, work history, birth dates, and other information that can be used in identity theft E-commerce has made it easier to steal card numbers and use without having the physical card

Identity Theft and Credit-Card Fraud (Con’t) Responses to Identity Theft: Authentication of e-mail and Web sites Use of encryption to securely store data, so it is useless if stolen Authenticating customers to prevent use of stolen numbers, may trade convenience for security In the event information is stolen, a fraud alert can flag your credit report; some businesses will cover the cost of a credit report if your information has been stolen

Privacy Consider one example: Key aspects of Privacy Computerized record systems for customers in a community clinic – for routine Web access and email communication The sensitivity of the information in the records The inappropriate release of the information can result in embarrassment Key aspects of Privacy Freedom from intrusion Control of information about oneself Freedom from surveillance

Example 1– Location Tracking GPS, cell phones, RFID, etc. enable the development of many new applications Provide where a person is at a particular time These applications provide many benefits These applications also pose potential threats to privacy Pros and cons

Example 2 – Telephone Communication Wiretapping 1934 Communications Act prohibited interception of messages 1968 Omnibus Crime Control and Safe Streets Act allowed wiretapping and electronic surveillance by law-enforcement (with court order) Telephone Records and Privacy Protection Act of 2006 made it a federal crime to obtain someone’s telephone records without the person’s permission Pros and cons

Example 3 – Internet Bots and Privacy Software applications running automated tasks over the Internet Web spidering Many applications Internet bots may also be used for malicious purposes Pros and cons

Anonymity For people who advocate anonymity Protecting privacy Protecting against identity theft and consumer profiling Protecting against oppressive governments For people who against anonymity People should take responsibility for their opinions and statements Potential to shield criminal activity and incompatible with online netiquette U.S. and European countries working on laws that require ISPs to maintain records of the true identity of each user and maintain records of online activity for potential use in criminal investigations

Intellectual Property and Copyright The intangible creative work, not its particular physical form Protected by copyright and patent law Copyright holders have exclusive rights to To make copies To produce derivative works, such as translations into other languages or movies based on books To distribute copies To perform the work in public (e.g. music, plays) To display the work in public (e.g. artwork, movies, computer games, video on a Web site)

Intellectual Property and Copyright (Con’t) Computer and communications technologies raise challenge to intellectual-property protection Storage of all sorts of information in standard formats (e.g. graphics, video and audio files) High-volume, relatively inexpensive digital storage media Scanners Compression technologies The Web Broadband Internet connections Peer-to-Peer technology

Intellectual Property and Copyright (Con’t) Putting the digital content on the Internet Unauthorized copying and sharing of computing software, music, and video files continue at a huge rate Search engines and online libraries Negotiate contracts with intellectual-property owners to provide digital content

Copyright Law and Significant Cases Sony v. Universal City Studios (1984) Supreme Court decided that the makers of a device with legitimate uses should not be penalized because some people may use it to infringe on copyright Supreme Court decided copying movies for later viewing was fair use Arguments against fair use People copied the entire work Movies are creative, not factual

Copyright Law and Significant Cases (cont.) Sony v. Universal City Studios (1984) (cont.) Arguments for fair use The copy was for private, noncommercial use and generally was not kept after viewing The movie studios could not demonstrate that they suffered any harm The studios had received a substantial fee for broadcasting movies on TV, and the fee depends on having a large audience who view for free

Censorship of the Internet We need to make the Internet safe for the people E.g. Pornographic pictures shared among minors and children – Cyberporn The Child Online Protection Act (COPA) Passed in 1998 It is a federal crime for commercial Web sites to make available to minors materials “harmful to minors” as judged by community standards Found to be unconstitutional

Censorship of the Internet Children's Internet Protection Act of 2000 (CIPA): Requires schools and libraries that participate in certain federal programs to install filtering software Filters Blocks sites with specific words, phrases or images Parental control for sex and violence Updated frequently but may still screen out too much or too little Not possible to eliminate all errors What should be blocked?

Employee Monitoring Electronic monitoring capabilities For employer Computer network, Telephone network, digital camera, etc. For employer To evaluate individual employee and to measure and increase productivity For employee Complain dignity, independence, privacy and confidence

Whose Law Rule the Web? Different countries have different law ruling the Web Content control/censorship (including politics, religion, pornography, criminal investigations and trials, etc.) Intellectual property Gambling Hacking/Viruses Privacy Commerce (advertising and sales) Spam Some countries ban all or certain types of access to the Internet

Reference Sara Baase, “A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet,” Third Edition, Prentice Hall, ISBN 0-13-601918-3, 2007.