“Scientists Work to Keep Hackers Out of Implanted Medical Devices” Justin Fisher.

Slides:



Advertisements
Similar presentations
What You’ll Learn How to define negligence (p. 88)
Advertisements

4Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Negligence and Strict Liability Section 4.2.
Alistair D N Edwards Chair Physical Sciences Ethics Committee Ethics in Student Projects.
Computer Literacy and ICT Engineers 橋本 義平 Hashimoto Yoshihei (情報工学)
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
ICT Ethics 2 ICT 139.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
Chapter 1- Ethics Lecture 2.
Tort Law – Unintentional torts
Rules of Practice for Engineers BY Mohammed AL-Abdul Hadi & Mohammed AL-Miyad.
“Female Teachers Transfer Fear of Math” Quentin McCall April 21, 2011 CSCE
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
Ethics in Student Projects Alistair D N Edwards (Helen Petrie) University of York, UK
1 SPIRIT Silicon Prairie Initiative on Robotics in Information Technology Engineering Ethics.
Having a Professional Code of Ethics To Inform One’s Work and Ensure Optimal Success ETHICS IN PSYCHOLOGY.
4Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Intentional Torts Section 4.1.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Introduction Implantable Medical Devices (IMDs) are vulnerable to exploitation (last paper) Unauthorized data retrieval Malicious commands Millions of.
Professional Ethics: Should Software Engineers Adhere to a Professional Code of Conduct? Jonathan Schiff CS 301.
Ethics Jonathan J. Makela Based on material from P. Scott Carney, T. Galvin, J. P. Makela, and the National Ethics Center.
Do computer scientists need a code of ethics like the ACM code? “Seek not the answers, but to understand the questions.” Do computer scientists need a.
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
Engineering Ethics ENGR 300 Dept. of Computer Science and Engineering
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
General Moral imperatives
Component 16- Professionalism/Customer Service in the Health Environment Unit 9- Personal Communications and Professionalism This material was developed.
1 Book Cover Here Copyright © 2015, Elsevier Inc. All rights Reserved Chapter # 12 The Supervisor’s Role in Safety Security Supervision and Management.
© Dr Adnan Gutub Ethics Dr Adnan Gutub. © Dr Adnan Gutub Outline What are Ethics? Protection of Rights Professional Ethics & Computer Ethics Moral & Ethical.
Ethics.
Professional Ethics & Codes of Conduct Lecture 3.
Ethical considerations for Bionic Eyes Dr Kate Fox In conjunction with Dr Frederic Gilbert (UTas)
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Ethical Issues in Computing
THE RIGHTS AND OBLIGATIONS OF EMPLOYER AND EMPLOYEE
Do software developers have an ethical duty? KELLEN STUART.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Computer Ethics 4 4 Chapter.  Ethics Pertaining to right or wrong in conduct  Ethical In accordance with the rules or standards for right conduct or.
1 Computational Medicine An Ethical View Maliek Mcknight CSCE 390 April 23, 2010.
Ethical Implications of Computing Should Computer Scientists worry about ethics? Impact on Dr Lemma’s decision Intelligence vs. Expertise.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
Copyright © 2008 Delmar Learning Chapter 7 Legal Issues.
Professional Ethics and Responsibilities Part-II
Chap (3)1 Chapter 3 Professional Codes of Ethics Almost every professional organization dealing with the field of computing has published its own code.
CSCI 392 Review of Computing and Society

Objectives Understand legal aspects of software
Risk Assessments.
Section 4.2.
Engineering Design is an Iterative Process
The Ethics of Implementing Watson-like Algorithms in Neonatal Care
Ethics in Student Projects
Professional and Ethical Responsibility for Engineers
Electrical Engineering
Having a Professional Code of Ethics To Inform One’s Work and Ensure
The Psychology of Security
Section Outline Unintentional Torts Negligence Strict Liability
Software Engineering Code of Ethics
I IEEE Code of Ethics Electrical and Computer Engineers
Professional and Ethical Responsibility for Engineers
Engineering Design is an Iterative Process
ACM Code of Ethics CSCI 362: Data Structures.
CS-480b Network Security Dick Steflik
Presentation transcript:

“Scientists Work to Keep Hackers Out of Implanted Medical Devices” Justin Fisher

Summery of this article Computer scientist figured out that it is possible for someone to hack a person’s electrical medical implant. This effects insulin pumps, pacemakers, and cardiac defibrillators, all of which emit wireless signals. Computer scientist are debating different solutions for security on these devices.

Issues In The Article ACM Code- 1.1 Contribute to society and human well being, – The principal obligates computer scientist to protect the quality of life of all people, including threats to health and safety. – When designing or implementing systems, computer scientist must ensure that the products that their efforts will be used in a social responsible ways, will meet social needs, and will avoid harmful effects to health and welfare.

Issues In The Article ACM Code- 1.2 Avoid harm to others – “Harm” means, among other things injury or negative consequences, such as loss of property, property damage, or more simply the harm of an actual person.

Issues in The Article ACM code- 1.3 Be honest and trustworthy – The computing professional will not make deliberately false or deceptive claims about a system or system design, but will instead provide full disclosure of all pertinent system limitations and problems.

Conclusion I believe that this article was published to inform the computing world about the problems and possible solutions to this manner. Or possibly get others thinking and interested in the cause at hand.