Ethics CS351. What are ethics? Dictionary: –1. A system or set of moral principles. –2. The rules of conduct recognized in respect to a particular class.

Slides:



Advertisements
Similar presentations
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Advertisements

Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
An "internship" is an opportunity offered by an employer to students/"interns", to work at a firm for a fixed period of time.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Welcome to CS408 Living in a Networked World: The Good, the Bad, and the Ugly CS408 Spring Semester 2013 Section 01 TR 11:10 – 12:30 Parsons NB 22 Section.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
INTERNET SAFETY.
INTERNET SAFETY FOR STUDENTS
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Internet Safety/Cyber Ethics
Security, Privacy, and Ethics Online Computer Crimes.
Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.
Riverside Community School District
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Computers in Principle & Practice I - V Deena Engel Computers in Principle and Practice I V , Sections 1 & 2 Fall, 2009 Deena Engel .
Pragya Gupta. 1 Background checks and Reference Analysis.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
INTERNET SAFETY FOR STUDENTS
Improving productivity using IT
Information Age In Which We Live Session 2. Introduction Knowledge is Power What you don’t know will hurt you Business are using information to reel in.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
PC Support & Repair Chapter 10 Communication Skills.
Let’s talk about Internet Safety!
OCR Nationals Technological Innovation and E-Commerce Unit version.
Level 2 IT Users Qualification – Unit 1 Improving Productivity
Introduction to Computer Science
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Section 9.2 Ethical Behavior.
 You will face ethical dilemmas in your career – count on it!  Your decisions will affect: ◦ your professional reputation. ◦ your employability. ◦ the.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
COMPUTER ETHICS Do you know the difference between right and wrong?
Honors Co-Op Orientation College of Engineering & Computer Science Shan Barkataki Ph D Academic Director CECS Honors Co-Op Program May
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
ARE THE FOLLOWING SITUATIONS ETHICAL?. Your new computer comes with Microsoft Office 2003 already installed on it. Included in your box of software is.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
What is Ethics? Ethics is the study of what is means to “do the right thing” Ethical rules are followed in our interactions with other people Ethical theories.
ETHICS and COMPUTERS An Overview 23/04/2017.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Role of Communication Systems b INTERNET Hardware, Software, ServicesHardware, Software, Services Information searching, Publication of informationInformation.
FERPA Family Educational Rights and Privacy Act A Tutorial.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
© Dr Adnan Gutub Ethics Dr Adnan Gutub. © Dr Adnan Gutub Outline What are Ethics? Protection of Rights Professional Ethics & Computer Ethics Moral & Ethical.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
 Dr. Caile E. Spear ◦  -include internship in subject line  Phone  Cell
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Business Ethics and Social Responsibility
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
LEGAL AND MORAL ISSUES – CODE OF CONDUCT Year 13.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
Please read the entire presentation.
Legal and Ethical Issues in E-Commerce
GEC 0113 Ethics in IT Practices
BCT 2.00 Analyze Technology Issues
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

Ethics CS351

What are ethics? Dictionary: –1. A system or set of moral principles. –2. The rules of conduct recognized in respect to a particular class of human actions or governing a particular group, culture. (e.g. medical ethics). –3. The branch of philosophy dealing with values relating to human conduct, with respect to the rightness and wrongness of actions, and the goodness and badness of motives and ends. What saves us from the lawyers!

Situations The following situations come from “real life”. They were told by Dr. Starkey who was department head at the time. Dr. Starkey has given his permission for me to use these situations in CS351.

Situation 1 A few years ago, a first semester senior in Computer Science at MSU, top in his/her class with a 3.85 cumulative with OSCS. (S)he asked an OSCS manager for the superuser password on the Computer Science systems so that “(s)he could do some systems improvements.”

Situation 1 (cont.) The manager gave him/her the password with no further questions and without checking with CS. (S)he used the password to break into Dr. Paxton's protected account and look at a CS 436 test in preparation. (S)he also copied Dr. Paxton's solution to a CS 436 programming assignment and submitted it, with minor modifications, as his/her own.

Situation 1 (cont.) When challenged, (s)he admitted the actions described above, and signed a letter agreeing to all charges. All faculty agreed that there was no sign that problems like this had occurred with this student before, and that this time (s)he seems to have been tempted by a wide open door in OSCS security, combined with fear of getting a B.

Situation 1 (cont.) There were a number of questions that came up immediately: 1. What action should Dr. Paxton take against the student. Major options include: –a. a warning –b. F's on the programming assignment and/or the test –c. F on the course –d. report to the Dean of Students for possible dismissal or suspension –2. What action should OSCS take against the student? –3. What action should OSCS take against the manager?

Situation 1 (cont.) 4. Five months later Dr. Starkey was having lunch with a recruiter who announced that she was intending to make an offer to the student. –If he is asked for any comments, should Dr. Starkey report the incident? –If he is not asked for any comments, should Dr.\ Starkey report the incident?

Situation 2 A former student phones up Dr. Starkey at 8:15 in the morning (i.e. before his first cup of coffee) and asks for advice. (S)he says that (s)he graduated three years before, but will not give his/her name or company. (S)he works for a small company, and is currently the systems manager there.

Situation 2 (cont.) The President (and owner) of the company asks him/her whether his/her former manager has a particular file on a company computer, and if he has, then the President wants a copy of the file. (S)he knows that the former manager does have the file, and also expects that if (s)he gives a copy of the file to the President then his/her former manager will probably be fired.

Situation 2 (cont.) Meanwhile, the former manager comes to him/her and asks that (s)he download the file on to his personal PC and then delete the file from the company computers. (S)he appears to be a friend of his/her former manager. If (s)he does give the file to the President all other employees would know that (s)he was the only one capable of doing this.

Situation 2 (cont.) What should Dr. Starkey advise him/her to do?

Situation 3 An MSU CS graduate works for a large software company, which lets employees buy company PC software packages, at cost, for their personal use. (S)he shares an apartment with another company employee who has been using this to obtain software very cheap and then trading it for hardware.

Situation 3 (cont.) The roomate has used this to acquire a personal system that is worth about $10,000. The former student contacts a friend at MSU who asks Dr. Starkey for advice to pass on to him/her. What should Dr. Starkey advise him/her to do?

Situation 4 The security officer (SO) in OSCS phoned up Dr. Starkey and told him that a graduate student account had connected twice to Starkey’s account. After some more research the SO found that two rlogins had been attempted, but password attempts had failed, so the student had not made it into the faculty account

Situation 4 (cont.) The SO also reported the incident to the Dean of Students for further action. Subsequently the student was able to demonstrate that the login attempt was accidental. If it had not been accidental, what should the department and/or university have done.

DOLCE Developing OnLine Computer Ethics A Quiz Decide if each issue involves an ethical decision:

QUIZ Deciding whether to buy a paper online?

QUIZ Ethical Decision Non-Ethical Decision Deciding whether to buy a paper online? Deciding whether to make your Website handicap accessible.

QUIZ Deciding whether to buy a paper online? Deciding whether to make your Website handicap accessible. Requiring that all freshmen buy laptops.

QUIZ (cont.) Deciding whether to meet your software engineering project group or to go to the movies?

QUIZ (cont.) Deciding whether to meet your software engineering project group or to go to the movies? Deciding whether to sell encryption s/w abroad.

QUIZ (cont.) Deciding whether to meet your software engineering project group or to go to the movies. Deciding whether to sell encryption s/w abroad. Deciding to sell personal information acquired at your Web site.

QUIZ (cont.) Writing a virus to explore the security holes of a network.

QUIZ (cont.) Writing a virus to explore the security holes of a network. Trying that virus out.

QUIZ (cont.) Writing a virus to explore the security holes of a network. Trying that virus out. Using shareware for your course projects.

QUIZ (cont.) Writing a virus to explore the security holes of a network. Trying that virus out. Using shareware for your course projects. Talking in a chat room.

QUIZ (cont.) Writing a virus to explore the security holes of a network. Trying that virus out. Using shareware for your course projects. Talking in a chat room. Deciding to release your product to meet a deadline even though testing has not been completed.

QUIZ (cont.) Forwarding a chain letter through .

Issues with ethical implications Privacy Security Identity Theft Common Business Practices Company Policy Intellectual Property Non-Disclosure Agreements

Issues (cont.) Property rights. Accountability. Legal Liability. Prejudice. –Race –Age –Sex

Issues (cont.) Hacking Crime Community Values Campus Ethics Education (ABET)

Issues (cont.) Copyright Censorship Freedom of Speech Patents Trademarks