By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr. 2012..

Slides:



Advertisements
Similar presentations
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Advertisements

By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
ICT Ethics 2 ICT 139.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
A Dip in Silicon Valley April 20 th, 2001 R.J. Brown April 20, 2011 CSCE 390
COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background.
Computers and Crime Breaking and Entering Eavesdropping Harassment Vandalism Destruction of Private Property Possession of Stolen Goods Theft.
JCSD-aw Citizenship in an e-World Johnston Community School District.
RahulMIN KU WHAT TO DO IF CYBER-BULLYING OCCURS Firstly protect your number- only give it to friends and don’t leave your mobile where others can.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:
The Threat of Cyber War The Issue of Cyber Security.
Judge Rejects Google’s Deal to Digitize Books Rhea McCaslin CSCE390 – Spring 2011.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
U.S. federal judge rejects $125 million legal settlement between Google and groups representing authors and publishers. The settlement would have given.
China’s attempt to tighten communication Byron Alleman CSCE390 – Computer Ethics April 2011.
Ethical Decision Making Process. How to Resolve Ethical Dilemmas in Business Identify relevant facts Identify relevant issue(s) Identify primary stakeholders.
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
REMOTE CONTROL CARS Jonathan Chandler CSCE April 21, 2011.
Things that make you go hmmm…
Computer Ethics in Information Technology
How to Avoid Crimes and Being Offended in the Internet.
Ethics Lecture Dr. Christina Howe
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
PDE’s Code of Professional Practice and Conduct for Educators
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.
Ethics, Computing, and the Internet
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Lecture 21 Computer Security Ethics
Computer Crimes Career & Technology Education Department.
Teigh Berg ACM tech news: 12/30/11 Source: Reuters (12/28/11) URL: trains-security-idUSTRE7BR0C
Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
© Dr Adnan Gutub Ethics Dr Adnan Gutub. © Dr Adnan Gutub Outline What are Ethics? Protection of Rights Professional Ethics & Computer Ethics Moral & Ethical.
Ethics.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Professional Ethics & Codes of Conduct Lecture 3.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Andrew Woods English 250 HE April 28 th, 2012 MEDIATION: MUSIC PIRACY VS. MUSIC INDUSTRY.
Leadership & Teamwork. QUALITIES OF A GOOD TEAM Shared Vision Roles and Responsibilities well defined Good Communication Trust, Confidentiality, and Respect.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Lecture 3 Ethics in the Workplace Privacy and Social Networks.
System Monitoring of Federal Agents Stephen Cevallos.
ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG. FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Black + White = Grey Ethical Issues Surrounding the Creation and Distribution of Hacker Tools Used in Distributed Denial of Service Attacks Joseph Levine.
Issues for Computer Users, Electronic Devices, Computer and Safety.
 Being free from public attention that means not being watched or disturbed by other people.
Pennsylvania’s Code of Professional Practice and Conduct for Educators.
UN vs the Internet Summary
To Know what Cyber crime is
Confronting an Employee during a Counseling Session
Cyber Crimes Chunlian QU 9/18/2018.
The Psychology of Security
WikiLeaks avoids shutdown as supporters go on the offensive
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Information about each punishment can be found on this website:
Marcial Quinones-Cardona
CS-480b Network Security Dick Steflik
Presentation transcript:

By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr

 Cyber attacks on IT systems would become a criminal offence punishable by at least two years in prison throughout the EU.  Possessing or distributing hacking software and tools would also be an offence, and companies would be liable for cyber attacks committed for their benefit.  IP Spoofing, Cyber-Attack tools, Liability of Legal Persons

 1. Ethical Issue - Is it right to make Hacking IT systems a criminal offense 2. Stakeholders in case and what they want - Government wants to penalize hackers with up to two years in prison - Hackers believe this is not a criminal act - Companies that were attacked want this to be stopped. 3. Three Possible Solutions - Hacking is a crime punishable up to 2 years - this is the one I would choose - They do nothing about it and let it happen - Compromise, make it less of a crime

4. Evaluate Solution - Cyber attacks should be a criminal offense. This can hurt many people and ruin lives. 5. Nature of Solution - This solution is for the safety of the people and Government. This could be made a universal law. 6.Would the majority agree with the solution - Yes for the majority this would be poplular solutions. - Some businesses may not like it because they were gaining information based of these attacks.

7. Solution Commitment - I would commit to this solution because of how harmful this can be. This solution is chosen for privacy of the people.. 8. Philosophy of Decision - I feel this relates to all philosophical views. Although it could lean a bit more towards realism.

 Hackers Violate  ACM 1.2: Avoid harm to others  ACM 1.3: Be honest and trustworthy  ACM 1.7: Respect the privacy of others  ACM 2.8: Access computing and communication resources only when authorized to do so.  ACM 3.3: Acknowledge and support proper and authorized uses of an organizations computing and communication resources.