Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.

Slides:



Advertisements
Similar presentations
Professional Ethics Social Implications of Computers.
Advertisements

Social and Ethical Implications CMSC 101 November 21, 2013 Bhuvana Bellala and Marie desJardins.
By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
INTERNET SAFETY FOR STUDENTS
ICT Ethics 2 ICT 139.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
BY: WILL READE Cyber and Drone Warfare. Overview Cyber attacks & Drones leave the human out of the battlefield Makes waging war “easier” when the technology.
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues.
Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:
The Threat of Cyber War The Issue of Cyber Security.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
Article: The Cyberweapon that could take down the Internet By Jacob Aron February 11, 2011 Presentation by Jacob Russell CSCE390 April 18 th, 2011.
Internet probe can track you down to within 690 meters.
Software Creates Privacy Mode to Help Secure Android Phones Author: Matt Shipman Researcher: Dr. Xuxian Jiang Presenter: Brett Shofner.
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
Cyber-SecurityCyber-Security Your Privacy and the NSA.
Amount of daily searches on Google 150 million searches per day from 100 different countries 150 million searches per day from 100 different countries.
INTERNET SAFETY FOR EVERYONE
Sophos Mobile Security
Introduction Our Topic: Mobile Security Why is mobile security important?
Josh Olson April 24,  What is the "Cloud"?  Why a "Cloud"?  What is the "Cloud" in cloud computing?
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
“Building a Smarter Forest” -Joe Otis. Summary Several computer scientists are testing a thesis involving the use of robots in forests in order to help.
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr
A Presentation on Flipkart
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Teigh Berg ACM tech news: 12/30/11 Source: Reuters (12/28/11) URL: trains-security-idUSTRE7BR0C
Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
CompSci 725 RiskRanker Authors Michael Grace - North Carolina State University, Raleigh, NC, USA & NQ Mobile Security Research Center, Beijing, China Yajin.
Ethics.
Ethics Wednesday, 10th Week. Technology  Technology is not an immutable force – people make decisions about what technologies and products to develop.
Arpit Jain Mtech2. Outline Introduction Attacks Solution Experimental Evaluation References.
Balancing Safety and Access: Moving Beyond the Acceptable Use Policy Bill Johnsen Virginia Beach City Public Schools
E-Safety THURSDAY 12 TH FEBRUARY. E-Safety  What are the risks?  Jenny’s Story  The Byron report  Evaluation of resources  Planning an e-safety lesson.
Dumar Canas CSCE 390 April 12,  Scientists at the University of Ottawa, Canada are designing a life-like robot  Goal: To create a robot that mimics.
Computer Security By Duncan Hall.
Professional Ethics and Responsibilities
PicFolio App By: Brett Carpenter, Kathryn Erlich, & Jason Spencer.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Computer Security Mike Asoodeh & Ray Dejean Office of Technology Southeastern Louisiana University.
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
A Quick and Easy Crash Course Internet Safety for Everyone.
Smart PWNs: An Ethical Analysis of Smart Phone Technology Colin O'Hanlon Josh Schwartz Norman Littlejohn.
The world’s libraries. Connected. Contactdag 2013.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Finding Spammers' Vulnerabilities Tracy Paul CSCE 390 Dr. Valtorta University of South Carolina REFERENCES:
INTERNET SAFETY FOR EVERYONE
CSCI 392 Review of Computing and Society
Android App Permission Manager
Easily secure your EDGE data, unlock the value
Please read the entire presentation.
The Ethics of Implementing Watson-like Algorithms in Neonatal Care
Internet Safety for Everyone
University of California, Santa Barbara
Internet Safety for Everyone
What's in an Ad? Connor Leonhardt.
Mobile App Advertisements
WikiLeaks avoids shutdown as supporters go on the offensive
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Web site mechanics Winners and losers Computers in Libraries 2019
ACM Code of Ethics CSCI 362: Data Structures.
CS-480b Network Security Dick Steflik
Presentation transcript:

Joseph Eckstrom

The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.  These apps obviously pose a serious security risk.

Decision-Making Process  Step 1: App developers are opening the door to malware and hackers.  Step 2: The user and the developer are the main parties.  Step 3: Three possible options are to, ○ 1: Disallow all ads in mobile apps. ○ 2: Force developers to filter malicious ads. ○ 3: Leave it to Google and Apple to protect their systems.

Decision-Making Process (2)  Step 4: Anyone developing a mobile application should abide by this solution.  Step 5: This solution seems like the natural solution, and seems balanced between the parties.  Step 6: App Developers may not be happy with it, but most will agree.

Decision-Making Process (3)  Step 7: I feel completely committed to this solution.  Step 8: This solution leans towards pragmatism.

ACM Code Application  1.2: Avoid Harm to Others  Possibly 1.7: Respect the Privacy of Others  2.5: Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks.

References  Shipman, Matt. "Study: Including Ads in Mobile Apps Poses Privacy, Security Risks." NC State News. NC State University, 19 Mar Web. 11 Apr  Barger, Robert N. Computer Ethics, A Case-Based Approach. New York, NY: Cambridge UP, Print.