Computer Networking - Ethical aspects of the Internet Dr Sandra I. Woolley.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
A lecturer’s perspective Social media & social work Martin Webber 12 th Maudsley Workshop.
The benefits and pitfalls of using social media to inform learning and teaching Crowd-sourcing, blogging and blagging Martin Webber 6 th Excellence in.
Safety, Privacy, Copyright and Fair Use, Legal By: Khaaliq Henry.
DO NOT USE THIS SPACE DO NOT USE THIS SPACE Internet Privacy How private is your identity? How private are your activities? Digital media ( , photos,
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Employee Medical and Exposure Records Keeping and providing access to medical and exposure records November, 2010.
Social Networking Safety. Dangers of online social networking Facebook Twitter Instagram.
CODE OF ETHICS South Australian Public Sector Public Sector Act, 2009.
Miguel E. Andrés. What is information leakage? An incident where the confidentiality of information has been compromised. Examples [2010] Gmail accounts.
Dessler, Cole, Goodman, and Sutherland
The Uses of White Hat Hacking Tyler Schumacher
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
By Corinne Vassallo, Melody Lu, Natalie Severson, Michael Ghormley, Stephanie Mao.
Computer Security Fundamentals
USA Patriot Act FBI Public FISA Foreign policy ExecutiveCongressSupreme Court Government agencies International surveillance.
Cyberlaw Laws intended to govern computer, E-commerce, and Internet use. Cases involve computers and subject areas such as: Jurisdiction Trademarks Copyrights.
First of all….. it’s never too late to start. “blogger” is not “viral” is not “avatar” is not.
Anonymous Speech & Reading
Freedom and responsibility: The Leveson Inquiry Thomas Abraham.
“The Fourth Amendment protects people, not places.”
Elements of an Argument. What exactly is an argument? An argument involves the process of establishing a claim and then proving it with the use of logical.
1.8 vs. 5.3 Benefits and Risks of Social Media in Healthcare Andy Malinoski Director of Risk Management Andy Malinoski Director of Risk Management.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Criticism Of Google By: Kyle Singler. Privacy Policies One of the main concerns regarding online search is that an individual’s information is kept private.
Your Guides Sally and Benny. So Sally what is a Virus all I know is that it is a program, right? Your right Benny, but a Virus is an destructive program.
Leadership Skills Lunch and Learn Networking and Relationship Building August 2014.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
Information System Security. Agenda Survey Results Social Networking Multi-Factor Authentication & Passwords Phishing Schemes Cyber Bullying Advice.
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
IB TES Information Technology in a Global Society.
COMM 226 Information Privacy: A personal and societal perspective Chitu Okoli Associate Professor in Business Technology Management John Molson School.
GUIDELINES FOR THE USE OF COMPUTER TECHNOLOGY AND ELECTRONIC COMMUNICATION WITHIN THE SU UNDER FACILITIES MANAGEMENT This guideline must be read in conjunction.
The media. We interrupt this program for a last- minute slant on the news The mass media Last minute news.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
By Bernard Ikoli.  Introduction  What is Internet?  Impact of the Internet in the society  What is Ethic ?  Applying Ethic to the internet  Conclusion.
Assessment & Reporting Spalding High School Community.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Discourse community A group of people communication.
WISHA, 7/23/04 Employee Medical and Exposure Records Chapter WAC Employer Responsibilities.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
Group 5 Ciara, Emily, Ruby, Mel, Ali, Omar and Karen.
9.1 Audience Appreciation
National Security Agency (NSA) Surveillance Christopher Boyd.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
EDWARD SNOWDEN IS HE A WORTHLESS HUMAN BEING OR AMERICAS HERO?
Social Media Privacy By: Jordan Mallore. What is Social Media?  Electronic communication in which users use online websites to communicate, spread ideas,
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Online Safety The Campion School.
Name: Sayyid Ali Hussein Gaabane
Chapter 10 Cyberlaw, Social Media, and Privacy
Calgary Computer Security Services -
Information Security Footprint.
Brendan Foody, Sharon O’Malley, Ryan McGrane
Employee Privacy and Privacy of Employee Information
Define the Problem Constant surveillance of citizens in our country
Regulating Online Speech
The dark web By Riley. Sampare.
(Information) Privacy
The Rapid Loss of Privacy in the Era of the Internet
ONLINE TOURISM MARKETING- Introduction
My Digital Footprint….
Directions / Template **When done, please delete this slide.**
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Networks, Legal and Ethical Behaviors BSU CS4MS - 4/9/19
Presentation transcript:

Computer Networking - Ethical aspects of the Internet Dr Sandra I. Woolley

2 The Technology and Ethics of Internet Behaviour  Private study questions for assessment and in-class discussion.  Does everyone have a right to privacy?  Why is Internet misuse increasingly common as a reason for employment dismissal?  What is on-line disinhibition and why is it a problem?  White hat, grey hat, black hat – what are the ethics of hacking?  Is the “dark Internet” as dark as it seems? Does TOR ensure anonymity?  Is that phone/device on or off? Are deleted messages deleted?

Mass Surveillance  Edward Snowdon was contracted to the American National Security Agency (NSA) and released a large number of classified documents regarding global surveillance.  Thomas Andrews Drake had been a senior NSA executive. His case was referred to by Snowdon.  Opinion is polarised and whether Snowdon is a “Hero or Traitor?” is debated in the media.  How is the case of Drake relevant?  What is at the substance of the constitutional disagreement?

Online disinhibition effect  Suler defined six factors to account for online disinhibition and differentiated between benign and toxic disinhibition.  What are benign and toxic behaviours?  What are the six factors?  Which is the dominant factor?  Example: The Twitter troll experience accounted by Leo Traynor was discussed in class as an example of toxic disinhibition.

Thank You