Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Networked Communications (Quinn Chapter 3)
Breaking Trust On The Internet
William H. Bowers – Ethics for the Information Age Chapter 3 - Networking.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Riverside Community School District
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3: Networking Ethics for the Information Age Third Edition by Michael.
Chapter 3 Networking. Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Chapter Overview (1/2) Introduction .
1 Networking Sevak Asadorian & James Brunelle. 2 Topics Introduction Introduction & Spam (how to fight spam) & Spam (how to fight spam) The.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Jae-Hyun Seong Comp. 450 May  What is Internet?  Why do people use the Internet?  Why do people want to censor the Internet?  Why do people.
Chapter 3 Networking. Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Chapter Overview (1/2) Introduction .
Team Excel What is SPAM ?. Spam Offense Team Excel '‘a distinctive chopped pork shoulder and ham mixture'' Image Source:Appscout.com.
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
Responsible Targeting Chapter One. Content from The Essential Guide to Web Strategy for Entrepreneurs unless otherwise noted Chapter One Opt-in.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Unit 4, Lesson 11 How Data Travels the Internet
1 Internet Safety By: Nicole Sutton, Kenny Messinger, and Emily Whitman.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Ethics for the Information Age Fourth Edition by Michael J. Quinn Chapter.
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
FINAL PROJECT Shelby LeVasseur CSC Fall 2012 November 27 th, December 13 th, 2012.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
E-commerce--is Based on the use of internet-commerce is fasting becoming an alternative.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Protecting Students on the School Computer Network Enfield High School.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
When young people go online:  13% received unwanted sexual solicitations  34% communicate with individuals they never met  11% establish close personal.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
Laws and Rules That Govern Internet Safety Ashley Martin.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
What is the Internet?. The Internet is millions of computers all over the world connected together so they can exchange information.
Any criminal action perpetrated primarily through the use of a computer.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3: Networking Ethics for the Information Age Forth Edition by NYANZI A.
DIGITAL CITIZENSHIP What You Should Know!.
Learn how to protect yourself against common attacks
CHAPTER 5 FREEDOM OF EXPRESSION.
Ethics Tutorial Assignment#2
In order of appearance:
A Gift of Fire Third edition Sara Baase
AbbottLink™ - IP Address Overview
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Computer Ethics

2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The first part of an address (before sign) identifies a particular computer user. The second part of an address (after sign) contains a domain name.

Spam is unsolicited, bulk . Amount of that is spam has increased –8% in 2001 –40% in 2003 –More than 50% in 2004 Spam is effective –Cheap –Profitable even if only 1 in 100,000 buys product

How firms get addresses –Opt-in lists –Dictionary attacks Spammers seek anonymity –Change and IP addresses to disguise sending machine –Hijack another system as a spam launch pad Spam blockers –Attempt to screen out spam –Have led to more picture-based spam

A spam blocker attempts to keep spam from reaching someone’s mailbox by identifying and discarding (or routing to a special folder) s that appear to be spam. Mail Abuse Protection System (MAPS) maintains a list of networks that either forward spam or allow spam to be created. The list is called the Realtime Blackhole List. Some Internet service providers refuse to accept sent from hosts on the Realtime Blackhole List.

MAPS is a not-for-profit organization Contacts marketers who violate MAPS standards for bulk Puts marketers who violate standards on a Realtime Blackhole List (RBL) Some mail relays refer to RBL list –Looks up host name on RBL list –If name on list, the gets bounced back All from blacklisted hosts gets bounced, even from non-spammers

Ethical Evaluation of Spamming Kantian evaluation Act utilitarian evaluation Rule utilitarian evaluation Social contract theory evaluation From all these perspectives, it is wrong to send spam

Attributes of the Web: It is decentralized Every Web object has a unique address It is based on the Internet

Oher uses of the Web: (a) We sell stuff in on-line auctions (such as eBay). (b) We seek medical information from on- line special interest groups of people suffering from particular diseases. (c) We learn about the weather. (d) We find out about current traffic conditions before deciding whether to leave work..

Controlling The Web: Not everyone in world has Internet access Sudan: centralized control center People’s Republic of China: ISPs sign “self-discipline” agreement Germany: Forbids access to neo-Nazi sites United States: Repeated efforts to limit access of minors to pornography

Censorship : Is the attempt to suppress or regulate public access to material considered offensive or harmful. Direct censorship –Government monopolization –Prepublication review –Licensing and registration Self-censorship –Most common form of censorship –Group decides for itself not to publish materials

Censorship is difficult on the Internet because: (a) The Internet supports many-to-many communication. The Internet has far more information outlets than television or radio. (b) The Internet is dynamic. Millions of computers are being added to the Internet every year. (c) The Web is huge, containing billions of pages. Nobody can keep track of everything published on the Web.

(d) The Internet is global. Laws passed in one nation may have no effect outside that nation’s borders. (e) It is hard to distinguish between children and adults on the Internet.

Challenges Posed by the Internet Internet supports many-to-many communication Internet is dynamic Internet is huge Internet is global Difficulty distinguishing between children and adults online

Children and the Web Many parents believe they ought to protect their children from exposure (display) to pornographic and violent materials on the web. Child Internet Protection Act (CIPA) –Libraries receiving federal networking funds must filter pages containing obscenity or child pornography.

Web filters Web filter: software that prevents display of certain Web pages –May be installed on an individual PC –ISP may provide service for customers Methodologies –Maintain “black list” of objectionable sites –Examine content for objectionable words/phrases 16

Ethical evaluations of CIPA –Kantian evaluation: CIPA is wrong –Act utilitarian evaluation: depends on how benefits and harms are weighed –Social contract theory: freedom of conscience should be given precedence 17

Identity theft –when a person uses another person’s electronic identity –Two-thirds of cases begin with an solicitation –Many victims are experienced computer users comfortable with typing credit card number online 18