Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:

Slides:



Advertisements
Similar presentations
Professional Ethics Social Implications of Computers.
Advertisements

BUSINESS ETHICS (Some Summary Only)
By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Chapter 1 An Overview of Ethics
Vladimir Misic: 10 Professionalism and Ethics Ownership and Protection.
ICT Ethics 2 ICT 139.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
A Dip in Silicon Valley April 20 th, 2001 R.J. Brown April 20, 2011 CSCE 390
JCSD-aw Citizenship in an e-World Johnston Community School District.
Andrew DePriest 4/12/2011 CSCE 390 – 001 Professional Issues in Computer Science and Engineering (Article found in the March 14, 2011 edition of ACM TechNews,
The Threat of Cyber War The Issue of Cyber Security.
Judge Rejects Google’s Deal to Digitize Books Rhea McCaslin CSCE390 – Spring 2011.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
Article: The Cyberweapon that could take down the Internet By Jacob Aron February 11, 2011 Presentation by Jacob Russell CSCE390 April 18 th, 2011.
U.S. federal judge rejects $125 million legal settlement between Google and groups representing authors and publishers. The settlement would have given.
Colin Stewart.  Darpa announced it’s new project BOLT, Broad Operational Language Translation.  Given that the US fights a lot of wars in places where.
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
How Egypt Shutdown the Internet Drew Steptoe April 18th, 2011 CSCE 390 Professor Valtorta References: - JAMES GLANZ. “Egypt Leaders Found ‘Off’ Switch.
Equality and Diversity
Professional Codes of Ethics Professionalism and Codes of Ethics.
What is Ethics? Ethics is concerned with: n The values and guidelines by which we live, and how they are justified n Standards of right and wrong n Identification.
5.02 PowerPoint Objective 5.02 Understand ethics and ethical decision-making.
 Lesson 06: Ethics. IEEE Code of Ethics Accept Responsibility. Avoid conflicts of interest. Reject bribery. Improve understanding of technology Do.
Objective 5.02 Understand ethics and ethical decision-making.
CS 3043 Social Implications Of Computing © 2010 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
Professional Ethics: Should Software Engineers Adhere to a Professional Code of Conduct? Jonathan Schiff CS 301.
Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
“Building a Smarter Forest” -Joe Otis. Summary Several computer scientists are testing a thesis involving the use of robots in forests in order to help.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
Ch. 24: Social and Ethical Responsibility. Social Responsibility  What is Social Responsibility?  More than running your enterprise responsibility every.
Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.
Digital Citizenship: Active Participants in a Digital World.
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
Autonomous Cars Use laser, radar, lidar, GPS, cameras and other sensors to drive autonomously (1) Significant, but diminishing legal hurdles (2) Major.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
General Moral imperatives
© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 5-1 Business and Society POST, LAWRENCE, WEBER Ethical Dilemmas in Business.
Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
Ethics in Business Intelligence An Ferris State MISM-740 Student Presentation By: Adam M. Erickson 4/16/2011 What is Ethics? Does IT have to consider ethics.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2004 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.
Ethics.
Professional Ethics & Codes of Conduct Lecture 3.
Vitor Giesteira, 9E. The Nine Elements of Digital Citizenship 1. Access 2. Communication 3. Literacy 4. Security and Safety 5. Etiquette 6. Rights and.
Ethical Issues in Computing
Group 7 CIS03 June 09, Socially responsible computing is a major concern because of the many ways an information worker’s work can affect other.
Computer Ethics 4 4 Chapter.  Ethics Pertaining to right or wrong in conduct  Ethical In accordance with the rules or standards for right conduct or.
System Monitoring of Federal Agents Stephen Cevallos.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Intellectual Property An iSafe Lesson By: Audrey.
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
Chapter 6 Ethics and Privacy © Ilin Sergey/Age Fotostock America, Inc.
Lecture. 1.What are ethics? Why needed? 2.Islamic code of ethics 3.Network etiquette (8 broad rules) 4.Brief overview of ACM code of ethics 5.How to acquire.
Net Neutrality Andrey Gavel. Summary Charge more/less for certain content online Arguments for: o More users = heavy burden o Charge more for heavy traffic.
CSCI 392 Review of Computing and Society
The Ethics of Implementing Watson-like Algorithms in Neonatal Care
Professional Codes of Ethics
WikiLeaks avoids shutdown as supporters go on the offensive
CS-480b Network Security Dick Steflik
Presentation transcript:

Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:

Summary A group of Hackers is planning on launching communication satellites into orbit to create a internet that cannot be censored by any government.

Ethical Decision-Making Description of the Ethical Issue: Lost of internet privacy Uncontrolled Property Lost Parties involved: General Population – Many would like the internet uncensored, while others would like to just see less. Government - Government would not want to see a hacker controlled/uncensored internet. Property Holders - Most would not like to see a censor free internet since this could lead to a lost in property.

Possible Solutions: The hacker group makes an uncensored internet: Best Case: The internet is just used for people to communicate Worst Case: The internet is used to download copyright material and other illegal activities that law enforcement can not regulate and leads to people losing money. The hacker group does not make an uncensored internet: Best Case: Nothing Changes Worst Case: Hacker retalliate cause they believe it was stopped by the government or corporations. The hacker groups makes an uncensored internet but regulates its themselves and agrees to give information to law enforcement if needed: (I would chose this one) Best Case: The internet is used by people, properly regulated and any unlawful activities is given to law enforcement. Worst Case: The internet is used by people and the hackers can not regulate it leading to basically the same situation we have now the current internet.

Would you be willing for everyone to be permitted to use your solution? Yes, It has the possibility of satisfy everyone and it treats people as the ends. Nature of Solution: Human Nature: It protects the interests of people. This solution would not benefit the hackers as much since their would not get a fully uncensored internet. Would it be a popular solution? Probably not, since it doe not give the hackers the completely uncensored internet. Solution Commitment I am fully committed to this solution because it has a chance of benefiting everyone, which is way I chose it. Belief System: Pragmatism, because it is a solution that could completely change the internet as we know it and benefit the most people.

ACM Code of Ethics Follows Be fair and take action not to discriminate Contribute to society and human well-being Violations that may happen: Avoid harm to others Honor property rights Give proper credit Respect the privacy of others Honor Confidentiality