Internet probe can track you down to within 690 meters.

Slides:



Advertisements
Similar presentations
Dove Real Beauty Case Study By Samantha Emerine. Facts Was called the campaign for real beauty Features real women with real beauty Questioned what real.
Advertisements

Banner Ad Delivery. Components of a Website Ads Content.
Chapter 10 Ethical Issues in Nursing Research. Perspectives for Assessing Ethical Acceptability Utilitarian Perspective - the good of a project is defined.
By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
SECURITY CHECK Protecting Your System and Yourself Source:
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
Netiquette Rules.
2–1 4 MNG200 Dr. Salma Chad.  Ethics is a code of moral principles and values that governs the behaviours of a person or group with respect to what is.
The Threat of Cyber War The Issue of Cyber Security.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
Computational Thinking William C. Ridgeway 4/17/2011 CSCE 390 Professional Issues in Computer Science and Engineering.
Introduction to Computer Ethics
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
 IT pro’s work raises ethical issues involves privacy. Ex: Should company have right to monitoring employees’ ? Should company have right to log.
Keeping Medical Data Private By Srivatsan Venkatesan.
Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
Amount of daily searches on Google 150 million searches per day from 100 different countries 150 million searches per day from 100 different countries.
Privacy By Mohammed Al-Ghamdi. Outline Introduction Privacy How to Provide Privacy Ethics Summary.
Professional Codes of Ethics Professionalism and Codes of Ethics.
Business Ethics BY: Joshua m. Standifer.
Filtering, CIPA, Internet Safety, and Your Sanity Art Wolinsky Andy Carvin
Ethics and Social Responsibility
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
5.02 PowerPoint Objective 5.02 Understand ethics and ethical decision-making.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Questions, Quandaries, and Random Thoughts Laura E. Hunter
Staying Safe Online Keep your Information Secure.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Computer Ethics.
Ethics Jonathan J. Makela Based on material from P. Scott Carney, T. Galvin, J. P. Makela, and the National Ethics Center.
Dangers of Social Media
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
DIGITAL CITIZENSHIP/CYBER BULLYING.  Privacy - Protect Personal Information  Respect – Avoiding Cyberbullying, Plagiarism, Downloading Music Appropriately.
Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Protecting Students on the School Computer Network Enfield High School.
Engineering Ethics ENGR 300 Dept. of Computer Science and Engineering
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
ETHICS and COMPUTERS An Overview 23/04/2017.
history, hardware, software, safety, and computer ethics
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
Ethics.
Promoting safe and healthy ways of using the internet in the classroom Ms. Sherman.
What’s the Big Deal About Internet Privacy?. Today’s Objective I can explain to Mr. Bates why companies collect information about visitors on their websites.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
System Monitoring of Federal Agents Stephen Cevallos.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
BRITISH PROPOSAL TO EXPAND DIGITAL SURVEILLANCE CSCE390 Computer Ethics Presentation.
Basic Principles: Ethics and Business
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
Chapter 6 Ethics and Privacy © Ilin Sergey/Age Fotostock America, Inc.
Finding Spammers' Vulnerabilities Tracy Paul CSCE 390 Dr. Valtorta University of South Carolina REFERENCES:
CSCI 392: Seminar in Computing and Society
UN vs the Internet Summary
Dangers of Social Media
The Ethics of Implementing Watson-like Algorithms in Neonatal Care
Professional Codes of Ethics
Big Data Considerations
Database Administrators
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Mobile App Advertisements
Michael Lacewing Rights Michael Lacewing © Michael Lacewing.
ACM Code of Ethics CSCI 362: Data Structures.
CS-480b Network Security Dick Steflik
Presentation transcript:

Internet probe can track you down to within 690 meters

Summary Yong Wang, a computer scientist at the University of Electronic Science and Technology of China, and colleagues at Northwestern University in Evanston, Illinois, have developed a new method of tracking down internet users using the IP addresses of nearby businesses and landmarks. Using this method a user can be located to within 690 meters and sometimes as close as 100 meters. url: n20336-internet-probe-can-track-you- down-to-within-690-metres.html

8-Steps 1. This new tracking method traces an internet user to within blocks of his/her location. Is it right to give this kind of power to advertisers/companies/regular people? 2. Advertisers would want to have this kind of technology in order to serve users with location appropriate ads. On the other hand, some internet users might not like the idea of Companies or 3rd parties being able to track them down that closely. Users might be worried about the security risks involved, concerned about people with malicious intent tracking them down and finding them. 3. Possible outcomes: A) Freely allow access to this technology B) Only allow certain, certified companies access to this technology C) Ban the technology completely 4. I feel as though outcome B would be the most appropriate: -It takes into account the goals of the advertising companies. -It also take into consideration the needs and concerns of the users.

8-Steps 5. This solution is in accord with the companies goal of making money and providing users with the best and most appropriate ads. It is also in accord with the user’s interest in staying safe and anonymous on the internet. 6. I feel as though this solution would be acceptable with all parties involved and produce the greatest good for the most number of people. 7. I am comfortable with this solution and am willing to stand behind it with a clean conscience. 8. I see this as a Pragmatist solution to the problem. It seeks to please the greatest number of people while minimizing bad results mathematically by limiting access to the technology to only those with legitimate intentions.

ACM code This solution follows the ACM code of ethics. Specifically the General Moral Imperatives. It seeks to protect others from harm. It seeks to use this technology in a responsible way where it can contribute to society. It seeks to protect the privacy of others by not giving out their locations to the wrong parties.