The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Freedom of Speech (Part 3)
By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
A Dip in Silicon Valley April 20 th, 2001 R.J. Brown April 20, 2011 CSCE 390
1 Network Security Ola Flygt Växjö University
Vote Hacking Kenny Denmark - October For an upcoming election, Washington D.C. was preparing a system to allow some voters to send in their ballots.
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues.
Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:
Security+ Guide to Network Security Fundamentals
The Threat of Cyber War The Issue of Cyber Security.
Judge Rejects Google’s Deal to Digitize Books Rhea McCaslin CSCE390 – Spring 2011.
Article: The Cyberweapon that could take down the Internet By Jacob Aron February 11, 2011 Presentation by Jacob Russell CSCE390 April 18 th, 2011.
U.S. federal judge rejects $125 million legal settlement between Google and groups representing authors and publishers. The settlement would have given.
Garrett DeBruin CSCE390 Professional Issues In Computer Science feb/feb html#
By: Amanda Stephenson. RFID RFID – Radio Frequency Identification tags Hold 128 characters Normally placed in livestock and pets for identification Chips.
China’s attempt to tighten communication Byron Alleman CSCE390 – Computer Ethics April 2011.
IBM Traffic Prediction Breland Miley cfm?fo= apr/apr html#
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
Internet probe can track you down to within 690 meters.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.6: The.
How Egypt Shutdown the Internet Drew Steptoe April 18th, 2011 CSCE 390 Professor Valtorta References: - JAMES GLANZ. “Egypt Leaders Found ‘Off’ Switch.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Security Awareness Norfolk State University Policies.
Staying Safe Online Keep your Information Secure.
 a crime committed on a computer network, esp. the Internet.
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
Digital Citizenship Created By: Kelli Stinson June 2011.
Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Philosophy 223 Technology in the Workplace: The Concern for Privacy.
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
ISP Policy Position: For A university should monitor university networks and connected computers for improper activities such as copyright infringement.
Autonomous Cars Use laser, radar, lidar, GPS, cameras and other sensors to drive autonomously (1) Significant, but diminishing legal hurdles (2) Major.
Teigh Berg ACM tech news: 12/30/11 Source: Reuters (12/28/11) URL: trains-security-idUSTRE7BR0C
Chapter 2.  A set of moral principles or values that governs the conduct of an individual or a group  Ethics and the law are intertwined  The rule.
Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,
Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
6 Ethics and Privacy.
Lecture 8 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
What factors do we use in weighing the order of priorities in a dilemma that pits a professional code of ethics against a societal moral code of ethics?
CHAPTER 5 ETHICS & PRIVACY.
Professional Ethics and Responsibilities
1 Computational Medicine An Ethical View Maliek Mcknight CSCE 390 April 23, 2010.
System Monitoring of Federal Agents Stephen Cevallos.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
BRITISH PROPOSAL TO EXPAND DIGITAL SURVEILLANCE CSCE390 Computer Ethics Presentation.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Chapter 6 Ethics and Privacy © Ilin Sergey/Age Fotostock America, Inc.
Principles Identified - UK DfT -
CS457 Introduction to Information Security Systems
UN vs the Internet Summary
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Saman Elyahoodayan Wire Taping
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Network Security Ola Flygt Växjö University
Mobile App Advertisements
WikiLeaks avoids shutdown as supporters go on the offensive
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Presentation transcript:

The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011

Summary The Chinese government has been interfering with Google’s Gmail service using intercepting, relaying, and possibly altering traffic, while making it appear that Gmail is malfunctioning. This “man in the middle” attack is likely a response to the political unrest in the Middle East in order to track and censor dissidents and protestors. Lemos, Robert. “How China and Others Are Altering Web Traffic.” Technology Review.com. 24 March April 2011.

The Ethical Decision-Making Process Step 1: The ethical issues in this case involve the right to privacy, information, and free speech. Step 2: The stakeholders in this case are the Chinese government, who want to censor the Web to protect the people, and the citizens of China, who want privacy and information. Step 3: -Solution A (Extreme): The Chinese government monitors and censors all Internet traffic in China. -Best Case Scenario: The Internet is safe from protestors and dissidents. -Worst Case Scenario: Internet users in China feel violated for their lack of privacy. -Solution B (Extreme): The Chinese government is not allowed to monitor nor censor any Internet traffic in China. -Best Case Scenario: The Internet remains relatively safe and secure without government interference. -Worst Case Scenario: The Internet becomes unsecure and harmful information can transfer freely.

The Ethical Decision-Making Process (Cont.) -Solution C (Compromise): The Chinese government may monitor certain Web sites (with the public’s knowledge) that appear harmful and censor them as needed. This is the best solution. -Best Case Scenario: The Internet remains relatively safe and secure and the people are aware and comfortable with the surveillance. -Worst Case Scenario: Malicious users work around Internet surveillance and transmit potentially harmful information. Step 4: Everyone would be permitted to use this solution. This solution treats people as ends rather than a means because it respects in right to privacy. Step 5: This solution is in accord with the rights to privacy and free speech. It is a “real world” solution that is a balanced compromise between Solutions A and B. Step 6: This solution is not the most efficient means to the end as one cannot possibly eliminate every apparent threat on the Internet. This solution may not produce that greatest good for the greatest number of people, but it will produce the least harm. Step 7: This solution is the most fair and unbiased for all sides, and personally made, without pressure or outside influence from a group. Step 8: Right and left realism, which focuses on the control and prevention of criminal actions and relative deprivation.

ACM Code of Ethics This ethical issue does not follow the ACM Code of Ethics, as it does not respect the privacy of others (1.7), nor does it avoid harm to others (1.2). In this case, the privacy of the citizens of China is violated without their knowledge, and Google’s integrity is compromised by disguising surveillance as a technical issue on Gmail’s behalf. Association for Computing Machinger, “ACM: Code of Ethics.” ACM.org.. 17 April 2011.