“Real ID, Real Debate” Alice Lipowicz May 25, 2007 Colin Griffin Article Analysis:

Slides:



Advertisements
Similar presentations
CREATING WEB PAGES INTERNET IN THE CURRICULUM MODULE 8:
Advertisements

Software Development Life Cycle. Why Do We need Software Development Models Helps to make sure that we cover all bases during planning and implementation.
6.02 Create a career portfolio that exemplifies personal acquisition of academic, occupational, and SCANS competencies/employability skills.
April '081 The Requirements Balance Test Managers Forum - April ‘08 Stevan Zivanovic
Vote Hacking Kenny Denmark - October For an upcoming election, Washington D.C. was preparing a system to allow some voters to send in their ballots.
Six Main Decision-Making Options Lon Dehnert – Facilitator October 14, 2:00 Lon Dehnert – Facilitator October 14, 2:00.
Advantages and disadvantages. Libraries must evaluate the advantages and disadvantages of consortium membership. Sometimes these are difficult to define.
Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
Article: The Cyberweapon that could take down the Internet By Jacob Aron February 11, 2011 Presentation by Jacob Russell CSCE390 April 18 th, 2011.
U.S. federal judge rejects $125 million legal settlement between Google and groups representing authors and publishers. The settlement would have given.
By: Amanda Stephenson. RFID RFID – Radio Frequency Identification tags Hold 128 characters Normally placed in livestock and pets for identification Chips.
China’s attempt to tighten communication Byron Alleman CSCE390 – Computer Ethics April 2011.
IBM Traffic Prediction Breland Miley cfm?fo= apr/apr html#
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
Working group discussion 1 Cyber Risk Security, Privacy ?
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.6: The.
Choosing the Best Business Structure. Choosing the Legal Structure of Your Business Sole Proprietorship Partnership Limited Liability Company Corporation.
Choosing the Best Business Structure
Analysing News Articles. Questions for Analyzing Social Issues 1. What are the social issues associated with a particular IT development? 2. How did.
IST Databases and DBMSs Todd S. Bacastow January 2005.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
Electronic Health Records 3.3 Health. Definition “An electronic health record (EHR) (also electronic patient record/computerised patient record/electronic.
New Grants Model Document Retention 1 District 5240 Grants Document Retention District Assembly /6/2013.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
D5240 Document Retention System 8/20/ District 5240 The Rotary Foundation Grants Document Retention System Rotary Year
Monitoring Patients 3.3 Health. IT Features A Process is monitored by Sensors Sensors are usually connected to an Interface that is connected to a computer.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Autonomous Cars Use laser, radar, lidar, GPS, cameras and other sensors to drive autonomously (1) Significant, but diminishing legal hurdles (2) Major.
Chapter 8 Ethics and Technology
Teigh Berg ACM tech news: 12/30/11 Source: Reuters (12/28/11) URL: trains-security-idUSTRE7BR0C
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved.
Database Management Systems (DBMS)
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
 Audio is also available over a phone line: ◦ Dial in number: ◦ Conference Code:  Submit questions at any time during the presentation:
CSCE 201 Secure Software Development Best Practices.
Computer Information Technology. I need you to submit your project electronically to the Hancock website. Before you can submit your project you will.
1 Computational Medicine An Ethical View Maliek Mcknight CSCE 390 April 23, 2010.
System Monitoring of Federal Agents Stephen Cevallos.
BRITISH PROPOSAL TO EXPAND DIGITAL SURVEILLANCE CSCE390 Computer Ethics Presentation.
Fundamental Digital Electronics
Forms of Business Ownership GOALS UNDERSTAND THE THREE MAJOR FORMS OF BUSINESS OWNERSHIP. DETERMINE WHEN EACH FORM OF BUSINESS OWNERSHIP IS MOST APPROPRIATE.
Consensus Decision Making Third World Group 2010.
POLITICAL PROCESS Lana Bilani. Voting and elections Electronic voting is also known as e-voting.
System Administration Security Philosophy. Why should you care about security? ● You may be obligated to do so under various rules or laws: – FERPA –
Databases and DBMSs Todd S. Bacastow January
Business Structures.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Athina Antoniou and Lilian Mitrou
CSCE 390 Professional Issues in Computer Science and Engineering Ch
The Ethics of Implementing Watson-like Algorithms in Neonatal Care
Cost To Develop Blockchain Wallet App?. It is difficult to define the exact price of the Bitcoin wallet application development, however, Here is a cost.
Digital Pacman: Firewall Edition
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
Computer Programming Machine and Assembly.
Business Structures.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Today’s Agenda: Ethics Cont. Methods HW: Read Deception
ALIO ARCHIVE ANDREW DANIEL.
Lets Talk About Ethics.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Alternative Classification
The ethics of data sharing and biobanking in health research: proposals on guidance and policy issues A critical review of the current governance framework.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Presentation transcript:

“Real ID, Real Debate” Alice Lipowicz May 25, 2007 Colin Griffin Article Analysis:

Summary 2005 Real ID Act Requires collection and electronic storage of personal information Recommended by 9/11 Commission Debate over feasibility, advantages vs. disadvantages Security questions like the debate of electronic voting machines

Ethical Decision-Making Process 1) Ethical Issues: Security, Misuse, Cost 2)Interested Parties/Outcomes: – The people: A secure and easy to use ID – The Government: Electronic records system. Difficult to forge. National ID system 3) 3 possible solutions – A) Keep current ID system (do nothing) – B) Go fully digital – C) Interlink current state systems and add digital ID feature

Ethical Decision-Making Process 4) Permission and means – A) I would permit everyone to use the compromise solution – B) Treats people as an ends. Results in little change in current policy 5) Natural/Balanced – A) In accordance with what is natural – B) Balanced approach 6) Majority Agreement / Greatest Good – A) Majority but not complete agreement – B) Most good for greatest number of people

Ethical Decision-Making Process 7) Conscience, Autonomous – A) No personal loss or gain – B) Mostly autonomous. Does not effect me exclusively 8) Most Influential Philosophy – Pragmatism – Most good for most people

Joint Code of Ethics I have a question in the about this Code Effected: – Public – Product – Judgement – Management – Self