Compsci 82, Fall 2011 131 Sex, Gambling, (Rock and Roll) Online l Gambling in the USA:  Where is gambling legal?

Slides:



Advertisements
Similar presentations
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
Advertisements

Legal and Ethical Issues: Privacy and Security Chapter Five.
4-1. Business in a Changing World McGraw-Hill/Irwin Copyright © 2009 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Managing Information.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Your children are connected to the World… Who is connected to your children? INTERNET SAFETY SEMINAR The Technology Policies We Need Now and Why Becky.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Chapter 7 The environment of electronic commerce: legal, ethical, and tax issues Joseph Mitchum and TsunSheng, Tao.
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Filtering, CIPA, Internet Safety, and Your Sanity Art Wolinsky Andy Carvin
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
You Just “Gotta” See. Other kinds of electronic media.
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
COPYRIGHT & THE WEB LIS Information Technologies – Dr. Gilok Choi Pratt Institute, School of Information & Library Science Spring, 2009 By Diane.
Tia Dimou.  The internet is a wonderful resource for people of all ages  Users must be cautious and aware of what information they input  Credit card.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Are Your Equipped to Fight Against Cyber Sharks of Internet to Protect your Kids?
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Five This multimedia product and its contents.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
INTERNET SAFETY Public Hearing  September 8, 2014.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Complying with CIPA: What Libraries Need to Know Bob Bocher Technology Consultant Wisconsin Department of Public Instruction State Division for Libraries,
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Federal Trade Commission required to issue and enforce regulations concerning children’s online privacy. Initial COPPA Rule effective April 21, 2000;
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
The Legal, Safe and Ethical Use of Technology in the Classroom Gabriella Wheeler s
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Can We Keep Our Kids Safe on the Internet? By Kim Hollingsworth - ETEC 562.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
COPs You Won’t See on TV Good COPPA? Bad COPPA? Art Wolinsky Laurie Maak Full Version and Additional Resources
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Helping Keep Kids Safe in a Digital World. G-K Tech / Safety Efforts at School  “Regular” Machines  Filtering at School  iPads  Computers  Chromebooks.
Internet Information for Parents. Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Society & Computers PowerPoint
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 30 Security, Knowledge and Freedom of Expression.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Private Information Stay Safe Online. Having Fun Online There are lots of websites where you can go to do fun things To participate on many websites,
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
By: Katie Rosengrant, Jacquelyn Brode, & Jamie Wheeler.
Keeping Kids Safe on the Internet Jennifer VanDoren & Sarah Boughner Wilkes – Emerging Technology October 2009.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Anna Buchanan & Alix Gilmore. 6:43.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Safety.
Digital Citizenship Grades 4-6
Do’s & Don'ts: Online Shopping
Teaching Internet Safety
5 Techniques for a Proper Website Security Testing.
Board of Education September 1, 2015.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Presentation transcript:

Compsci 82, Fall Sex, Gambling, (Rock and Roll) Online l Gambling in the USA:  Where is gambling legal? Why?  Is online gambling legal? Where?  Revenue? Security? Issues?  What about the world? l Porn in the USA:  How much money?  COPA, COPPA, and CIPA 

Compsci 82, Fall COPA, COPPA, CIPA, CDA l Communications Decency Act (1996)  Attempt to regulate porn, struck down  Section 230 still in force, immunity for ISPs l COPA (1998)  Never took effect, first and fifth amendments l COPPA: children's online privacy protection  1998/2000, about privacy and 13-year old rule  FTC regulation, non-profit exemption l CIPA: Children's Internet Protection Act  Internet filters required-schools/libraries (erate)

Compsci 82, Fall Academic Porn Research The intricacies of the elaborate system of traffic arbitrage that have grown up around the world of porn traffic direction on the web are way beyond the scope of this blog post, but it's possible that the rest of the media world could learn a thing or two from the way that for-pay adult sites have created a seething ecosystem of traffic affiliates constantly skimming clicks and pennies off of one another.

Compsci 82, Fall Ethics of analyzing adult content l Hosted adult content  Is this an ethical problem?  What about money?  What about tracking users? l Web-crawling of adult sites  DOS attack? Gathering data?  Vector of malware attacks?  Understanding typo-squatting, other avenues

Compsci 82, Fall Gambling and the web l Kentucky 141, 2009,  How did this work? What was the idea? l Online Poker is a "giant Ponzi scheme"   pokerstars.net compared to pokerstars.com?  l How does payment work, technical issues?  How do credit cards work?

Compsci 82, Fall Internet Poker takedown l How does pokerstars.com go offline?  How does FBI take down site?  Is it really down? Where is the money? l What about UIGEA  Unlawful Internet Gambling Enforcement Act  History and future  Interstate vs. Intrastate  Lotteries etc.

Compsci 82, Fall Trustworthy Software l Hacking pacemakers and smart cards  Security analysis  RFID and encryption l ICD: implantable cardioverter defbrillator  reprogram no surgery  But, consequences?

Compsci 82, Fall More on trustworthy software l Reliability, safety, security, availability, maintainability  Trusted to satisfy requirements (what are they?)  What about embedded systems l How to make software trustworthy  Specify outcomes not technology  Collect data on software in devices  Encourage research l From Therac-25 to implanted devices  Nancy Leveson "invents" software-safety