By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.

Slides:



Advertisements
Similar presentations
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Advertisements

ICT Ethics 2 ICT 139.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
A Dip in Silicon Valley April 20 th, 2001 R.J. Brown April 20, 2011 CSCE 390
SAFETYCHECK Eric Hatch | David Allen |Bailee Lucas| Austin Rhodes.
Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:
The Threat of Cyber War The Issue of Cyber Security.
Judge Rejects Google’s Deal to Digitize Books Rhea McCaslin CSCE390 – Spring 2011.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
U.S. federal judge rejects $125 million legal settlement between Google and groups representing authors and publishers. The settlement would have given.
Colin Stewart.  Darpa announced it’s new project BOLT, Broad Operational Language Translation.  Given that the US fights a lot of wars in places where.
Internet probe can track you down to within 690 meters.
Software Creates Privacy Mode to Help Secure Android Phones Author: Matt Shipman Researcher: Dr. Xuxian Jiang Presenter: Brett Shofner.
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.6: The.
Ethical Principles.
Mobile Tracker. 2 - Company Confidential - Mobile Tracker Low cost location sharing from iPhone and Android Embedded feature within GPS Fleet Tracker.
Health: › PepsiCo’s advertisement campaigns take advantages of teenagers and encourage them to buy and consume products that are harmful to their health.
CS 3043 Social Implications Of Computing © 2010 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
Nudging People Janne Lindqvist WINLAB, Dept. of ECE, Rutgers University NSF/DIMACS Workshop for Aspiring PIs in Secure and Trustworthy Cyberspace October.
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
Chapter 2 Taking Charge of Your Health >> Main Menu Next >> >> Chapter 2 Assessment Click for: Lesson 1 Making Responsible Decisions Teacher’s notes are.
Autonomous Cars Use laser, radar, lidar, GPS, cameras and other sensors to drive autonomously (1) Significant, but diminishing legal hurdles (2) Major.
1. On your smartphone or tablet, visit the Apple App Store or the Google Play Store. Search for: In Case of Crisis Education OR, with the QR code reader.
General Moral imperatives
Teigh Berg ACM tech news: 12/30/11 Source: Reuters (12/28/11) URL: trains-security-idUSTRE7BR0C
Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.
By Nik Ewing Phone Applications. Competition Apple App Store Google Android Market BlackBerry App World Nokia Download!/Ovi Store Palm App Catalog/Software.
Ethics.
NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved.
DROPBOX VS. GOOGLE DOCS WHICH ONE TO USE?. QUESTIONS TO ASK YOURSELF – SELF ASSESSMENT Do you have too many copies of the same files on multiple computers?
with For students choosing post 18.
QR Codes at Crittenden Middle School We can make it work! In the classrooms In the classrooms In the hallways In the hallways In the library In the library.
1 Computational Medicine An Ethical View Maliek Mcknight CSCE 390 April 23, 2010.
BRITISH PROPOSAL TO EXPAND DIGITAL SURVEILLANCE CSCE390 Computer Ethics Presentation.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Ethics. About this lecture Do something a bit different Get you to start thinking about ethical issues Specifically focussing on privacy Leads onto other.
Smart PWNs: An Ethical Analysis of Smart Phone Technology Colin O'Hanlon Josh Schwartz Norman Littlejohn.
(Part 1). Before we get started…  Why Facebook? Built in Audience ○ 800 Million users as of July 1 st 2011 ○ Users “share” applications with each other,
Brought to you by the makers of SIMPLE 2290
CSCI 392 Review of Computing and Society
Brought to you by the makers of SIMPLE TRUCK TAX
UN vs the Internet Summary
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
User Guide – Apple / Android
CS 450/650 Fundamentals of Integrated Computer Security
Thanks for being a Hero Customer!
CSCE 390 Professional Issues in Computer Science and Engineering Ch
The Ethics of Implementing Watson-like Algorithms in Neonatal Care
How to Install Norton Antivirus on Android Phone? We are providing easy steps to install Norton antivirus on android phone. If you facing any technical issue related to installing then you should contact via support. Get more details to visit our website
Free and Fast Assessment Technology
CSCE 390 Professional Issues in Computer Science and Engineering Ch
What's in an Ad? Connor Leonhardt.
Computer Ethics: Men & Women
Mobile App Advertisements
WikiLeaks avoids shutdown as supporters go on the offensive
Decision Making.
ALISON MCMILLAN TECHNOLOGY ASSISTANT
How to Download And Install McAfee Mobile Security on iOS?
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Download the My Learning App
CrowdCompass AttendeeHub
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CS-480b Network Security Dick Steflik
Presentation transcript:

By: Lucas Clarkson

 “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone numbers, list of apps.  App may be harmless, but “the app’s ad library may download harmful or invasive code after installation.”

1. The ethical issue is that these ad libraries might harm mobile devices. 2. The app user doesn’t want their mobile device harmed. The app maker doesn’t want to harm your mobile device. The ad maker wants to harm your mobile device. 3. Solution 1: No ads Solution 2: App makers choose ads Solution 3: Google & Apple provide ad-isolation mechanisms (best)

4. Solution 3 is best for all ethical parties involved, and every ad should be looked at. 5. This solution would be effective and not farfetched. It is equally balanced between excessive and deficient. 6. The majority of the people involved would choose this solution.

7.I feel most committed to this solution in my own conscience even though it does affect me. This choice was autonomous and without the influence of others. 8.This follows the Realist philosophy because this solution allows ads to be what they naturally are.

This ethical issue violates the following ACM Code guidelines: 1. (1.2) Avoid harm to others. 2. (1.3) Be honest and trustworthy. 3. (1.7) Respect the privacy of others. 4. (1.8) Honor confidentiality.

The End Thank You