China’s attempt to tighten communication Byron Alleman CSCE390 – Computer Ethics April 2011.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
ICT Ethics 2 ICT 139.
A Dip in Silicon Valley April 20 th, 2001 R.J. Brown April 20, 2011 CSCE 390
JUSTIN MINGLEDORFF CSCE390 APRIL 11, 2012 CONSUMER TECH AND ELECTRONIC WARFARE.
BY: WILL READE Cyber and Drone Warfare. Overview Cyber attacks & Drones leave the human out of the battlefield Makes waging war “easier” when the technology.
Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:
The Threat of Cyber War The Issue of Cyber Security.
Judge Rejects Google’s Deal to Digitize Books Rhea McCaslin CSCE390 – Spring 2011.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
U.S. federal judge rejects $125 million legal settlement between Google and groups representing authors and publishers. The settlement would have given.
Computational Thinking William C. Ridgeway 4/17/2011 CSCE 390 Professional Issues in Computer Science and Engineering.
Garrett DeBruin CSCE390 Professional Issues In Computer Science feb/feb html#
By: Amanda Stephenson. RFID RFID – Radio Frequency Identification tags Hold 128 characters Normally placed in livestock and pets for identification Chips.
IBM Traffic Prediction Breland Miley cfm?fo= apr/apr html#
Stevenson/Whitmore: Strategies for Engineering Communication 1 of 8 Rhetorical Situation.
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.6: The.
How Egypt Shutdown the Internet Drew Steptoe April 18th, 2011 CSCE 390 Professor Valtorta References: - JAMES GLANZ. “Egypt Leaders Found ‘Off’ Switch.
REMOTE CONTROL CARS Jonathan Chandler CSCE April 21, 2011.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Internet Filtering with DansGuardian By Daniel Zobel Director of Technology Heyworth CUSD#4.
Professional Ethics in Computing Dr. David Sinclair L253
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
1 Professionalism Professionals develop competence in Career planning and development Knowledge skill organization emotional I.Q. basic.
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr
Student Technology Code of Ethics
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Autonomous Cars Use laser, radar, lidar, GPS, cameras and other sensors to drive autonomously (1) Significant, but diminishing legal hurdles (2) Major.
Teigh Berg ACM tech news: 12/30/11 Source: Reuters (12/28/11) URL: trains-security-idUSTRE7BR0C
Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved.
Ethics Wednesday, 10th Week. Technology  Technology is not an immutable force – people make decisions about what technologies and products to develop.
Healthy Relationships Developing Communication Skills.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
HECMA Program Friendships and Peer Pressure Ms. Sandra Gorman.
Dumar Canas CSCE 390 April 12,  Scientists at the University of Ottawa, Canada are designing a life-like robot  Goal: To create a robot that mimics.
What do we want people to: know, feel or do? …as a result of our communications?
1 Computational Medicine An Ethical View Maliek Mcknight CSCE 390 April 23, 2010.
Role Of Network IDS in Network Perimeter Defense.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
BRITISH PROPOSAL TO EXPAND DIGITAL SURVEILLANCE CSCE390 Computer Ethics Presentation.
0 MANAGING CONFLICT. 1 2 Managing Conflict Finding common ground Providing tools to settle disputes Stepping in to make unilateral decisions (on rare.
KS2 E-Safety assembly How to be smart and keep safe online.
Finding Spammers' Vulnerabilities Tracy Paul CSCE 390 Dr. Valtorta University of South Carolina REFERENCES:
1.04 Ethics in healthcare.
Acceptable Use Policy.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
1.04 Ethics in healthcare.
THANK YOU… Welcome to Roadrunner Support Welcome to Roadrunner Support For More Visit on:
Looking for Gmail Help? JUST CALL (800)
1.04 Ethics in healthcare.
MANAGING CONFLICT.
China is Losing a War Over Internet
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Firewall.
1.04 Ethics in healthcare.
Mobile App Advertisements
WikiLeaks avoids shutdown as supporters go on the offensive
1.04 Ethics in healthcare.
#1 – Clean up your social media profiles
MANAGING CONFLICT.
1.04 Ethics in healthcare.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Presentation transcript:

China’s attempt to tighten communication Byron Alleman CSCE390 – Computer Ethics April 2011

The Story Due to political unrest in the Middle East, China has tightened communications An attack is blocking s from being sent sometimes in a way that makes it look like it is an error with gmail Google claims that it isn’t a technical issue on their side Security experts say that the Chinese government is likely using transparent proxies to intercept network messages.

8-step ethical decision process 1. There are two main ethical issues that I can think of. If every is being filtered and checked for content there is an issue of privacy. Second, China has the ability to warp what the user views, creating possibly misleading information. 2. The two stakeholders are Google and China. China denies the allegations. Google wants China to stop filtering the data and causing issues for Google’s users.

Continued. 3. Two extremes would be China not being capable of modifying content and China having full access to content filtering. A compromise would possibly be allowing China to filter content with a notification to the user about why the information is being filtered. The only one I would tolerate is removing any filtering or tampering. 4. I would be willing for everyone to be permitted to use this solution because I think its unethical for people to modify information. I don’t believe my solution treats people as ends rather than as means.

Continued. 5. I think the solution is in accord with what is natural. People expect the information that they are presented with to be true. 6. I think that the majority of people (unfortunately not the people that rule) would find this solution satisfactory. 7. I feel like I am unbiased in my decision. 8. I feel like in this situation, the philosophical belief system that is most influential in my solution is idealism. Perhaps it is too idealistic and naive to believe that information should not be filtered. Controlling information is a good way of controlling population.

Application of the ACM Code The two sections of the code that apply in this situation are: 1.3 Be honest and trustworthy and 1.7 Respect the privacy of others.

References mar/mar html#