9/4/20151 Computer Security Social Legal and Ethical issues.

Slides:



Advertisements
Similar presentations
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Advertisements

Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Ethics.
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues.
Your Rights Under the Internet Law By: Sannita S. Lam.
Security, Privacy, and Ethics Online Computer Crimes.
Internet Privacy & Security A Presentation to WPI Student Pugwash Michael J. Ciaraldi Professor of Practice, WPI Computer Science 2003/10/02.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Chapter 10 Privacy and Security McGraw-Hill
Privacy Chris Kelly iLaw July 5, 2002.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Chapter 14 Social and Legal Issues. Chapter Outline A gift of fire A gift of fire Here, there, everywhere Here, there, everywhere Privacy Privacy The.
PowerPoint® Slides to Accompany
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
3 Ethics and Privacy.
Privacy & Personal Information -- Why do we care or do we?
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
Lisa Morales CIS * Online and offline purchase data * Supermarket savings cards * White pages * Surveys * Sweepstakes and contest entries *
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
Business Law for the Entrepreneur and Manager
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
Privacy and Personal Information
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
2.6 Protecting Individual Citizens 1 st & 4 th Amendments In Depth Government & Citizenship Timpanogos High School.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
ETHICS and COMPUTERS An Overview 23/04/2017.
CSE/ISE 312 Ethics Do the Right Thing
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
According to the Bill of Rights, you have the freedom of speech which means that you have the right to practice your religion › The rules are a little.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chapter 4: Laws, Regulations, and Compliance
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Privacy and the Law.
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
PowerPoint® Slides to Accompany
E-Commerce: Regulatory, Ethical, and Social Environments
A Gift of Fire Third edition Sara Baase
Ethical Use of Computers
The Surveillance State
Computer Security Social Legal and Ethical issues
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
Presentation transcript:

9/4/20151 Computer Security Social Legal and Ethical issues.

9/4/20152 Social Legal and Ethical issues Sara Base, A Gift of Fire, Prentice Hall, 2003

9/4/20153 Social Legal and Ethical issues The impact of computers and computer systems The ATM example Unemployment Alienation and customer service Crime Loss of privacy Errors

9/4/20154 Social Legal and Ethical issues General Themes Globalization of cyberspace Tradeoffs of convenience vs privacy & security Personal choices, Business policies and law Negative rights or liberties and positive rights or claim rights –Conflict of negative and positive rights: the claim rights of some may diminish the liberties of others –Privacy protection regulations vs universal access to information services

9/4/20155 Social Legal and Ethical issues Main issues 1.Privacy & personal information 2.Freedom if speech 3.Can we trust computers 4.Intellectual property 5.Computer Crime 6.General social issues 7.Ethics

9/4/ Privacy & personal information Key aspects Freedom from intrusion Control information about oneself Freedom from surveillance

9/4/ Privacy & personal information “Big brother is watching you” Database security

9/4/20158 Database security Provisions of Privacy Act of 1974 Restricts data in federal government records to what is “relevant and necessary” to the legal purpose for which it is collected. Requires federal agencies to publish a notice of their record systems in the Federal Register Allows people to access their records & correct inaccurate information Requires procedures to protect the security of the information in the databases Prohibits disclosure of information about a person without their consent.

9/4/20159 The fourth Amendment, US Constitution The right of the people to be secure in their persons, houses, paper and effects against unreasonable searches and seizures shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

9/4/ Privacy & personal information Satellite surveillance and thermal imaging Automated toll collection and itemized purchase records Search and surveillance tools Fighting terrorism

9/4/ Databases and marketing Credit bureaus Principles for data collection & use –Collect only data needed –Inform people when data about them are collected, what is collected … –Offer a way for people to opt out –Provide stronger protection for sensitive data –Keep data only as long as it is needed –Maintain accuracy and security of data –Provide a means for people to access and correct data stored about them.

9/4/ Databases and marketing Social Security Numbers and National ID systems Personal health and medical records Public records: access vs privacy

9/4/ Privacy & personal information Protecting Privacy: law & regulation Is their a right to privacy The free market view vs the consumer protection view Contract and regulations Conflicts with freedom of speech

9/4/ Freedom of speech Encryption and interception of communications Wiretapping –Telephone –New technologies USA Patriot Act 2001: –Lets the government collect info from financial institutions on any transactions that differs from a customer’s usual pattern, and allows access to the government to many other kinds of personal information without a court order.

9/4/ Freedom if speech Carnivore FBIs system for intercepting FBI must first get a court order to intercept someone’s The Carnivore system is used at the Suspects Internet Service provider and filters all s from that ISP, examining headers to find suspect .

9/4/ Freedom if speech NSA’s Echelon Echelon is similar to Carnivor, but on an international scale. Involves a partnership with intelligence agencies of Canada, Britain, Australia and New Zealand, and operates a huge system of listening stations to intercepts satellite communication. –Targets terrorist and military activities

9/4/ Freedom if speech Cryptography and its uses Use of encryption –Criminal abuse: “ … unfortunately the same technology can be used by terrorists, drug dealers, … “ White House Press, 1994 –Secrecy and export controls Steganography

9/4/ Freedom if speech Secrecy Clipper –Trust in government –How much does technology matter

9/4/ Can we trust computers ? What can go wrong! –Billing errors –database accuracy –failures… Increasing Reliability and Safety –Overconfidence –Redundancy –Good design

9/4/ Intellectual Property Digital Rights Management Problems with new technologies Copyright Law The fair use doctrine Copying Music, Movies, Software Books –From floppies to the web –The Napster case –Beyond Napster Software Piracy

9/4/ Intellectual property Ethical issues Fuzziness about the ethics Arguments used include: –I cant afford to buy –The company is a wealthy corporation –Too expensive anyway –Making a copy from a friend is an act of generosity

9/4/ Intellectual property The future of copyright Doomsday approach: copyright law will disintegrate. Balanced solutions will be found by using a new approach and new technologies –Free software –Copyright or patent?

9/4/ Computer Crime What is hacking The Law –Catching hackers –Penalties appropriate to the crime –Discouraging and punishing “amateur” hackers Design secure “hack-free” systems Online scams –Chain letters, sale of counterfeit goods, phony investments –Collecting credit card numbers, ID and password details Fraud, embezzlement, Sabotage Identity theft

9/4/ General Social Issues Impact on our society Information Have’s and Have-Nots –The digital divide –Trends in computer access –Abdicating responsibility Does the Technology create the need for itself? “… The Web is alive and filled with life, nearly as complex and natural as the primordial swamp…” Who benefits most Prohibiting bad technologies

9/4/ Ethics What is Ethics? The study of what it means to do the “right” thing –And what is the “right” thing? A variety of ethical views –Deontological theories emphasize duty and rules to be followed whether they lead to good or ill consequence –Utalitarialism An example of a consequentialist theory: to increase happiness or “utility” –Natural rights Treat people as ends rather than means, and increase people’s happiness –No simple answers No mathematical solution

9/4/ Ethics What is Ethics? –Some important distinctions Right, Wrong and OK Negative and positive rights, or liberties and claim-rights Distinguishing wrong and harmful Separating goals from constraints Personal Preference and Ethics Law and Ethics –Professional codes and Ethics Professional organizations have codes for professional conduct ACM, IEEE