BRITISH PROPOSAL TO EXPAND DIGITAL SURVEILLANCE CSCE390 Computer Ethics Presentation.

Slides:



Advertisements
Similar presentations
 Ethics (relating to ICT) are about the: › Sensible › Legal › Moral uses of ICT.  They are designed to develop and make best use of technology.
Advertisements

By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
Judge Rejects Google’s Deal to Digitize Books Rhea McCaslin CSCE390 – Spring 2011.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
Article: The Cyberweapon that could take down the Internet By Jacob Aron February 11, 2011 Presentation by Jacob Russell CSCE390 April 18 th, 2011.
U.S. federal judge rejects $125 million legal settlement between Google and groups representing authors and publishers. The settlement would have given.
By: Amanda Stephenson. RFID RFID – Radio Frequency Identification tags Hold 128 characters Normally placed in livestock and pets for identification Chips.
China’s attempt to tighten communication Byron Alleman CSCE390 – Computer Ethics April 2011.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Internet probe can track you down to within 690 meters.
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
“Real ID, Real Debate” Alice Lipowicz May 25, 2007 Colin Griffin Article Analysis:
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.6: The.
How Egypt Shutdown the Internet Drew Steptoe April 18th, 2011 CSCE 390 Professor Valtorta References: - JAMES GLANZ. “Egypt Leaders Found ‘Off’ Switch.
Computer Ethics – The Ten Commandments
Computer Ethics in Information Technology
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
Laura Swearingen Bellville Independent School District 2011.
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
C4- Social, Legal, and Ethical Issues in the Digital Firm
5.02 PowerPoint Objective 5.02 Understand ethics and ethical decision-making.
Digital Citizenship Texting vs. Sexting Cyberbullying.
Chapter 5 Info Tech. Plug ins & Extensions  What are plug ins?  Applications/Extensions – Google Chrome Store
ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai Tom Schaeffer.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Digital Citizenship Working and playing in a digital word.
Internet Safety Night Raising Good Digital Citizens.
Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
Ethics.
NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved.
Responsible & Ethical Use of Technology Oak Valley Middle School Adapted from: Johnson, D. (1999). Teaching Students Right from Wrong in the.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
Ethics and Privacy. 3.1 Ethical Issues 3.2 Privacy.
Group 7 CIS03 June 09, Socially responsible computing is a major concern because of the many ways an information worker’s work can affect other.
CHAPTER 5 ETHICS & PRIVACY.
Using Twitter for client communication Original article by Terrence P. Howard Summary by Taran Stryker.
1 Computational Medicine An Ethical View Maliek Mcknight CSCE 390 April 23, 2010.
System Monitoring of Federal Agents Stephen Cevallos.
Lesson 2: Workplace Digital Communication
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Net Neutrality Andrey Gavel. Summary Charge more/less for certain content online Arguments for: o More users = heavy burden o Charge more for heavy traffic.
Signature Mode in 2017 Insurance applications
Facebook privacy policy
UN vs the Internet Summary
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Computer Literacy – Grade 8
Shaw Customer Service Phone Number Call now
Technology, Careers, and Job Hunting
Professional Codes of Ethics
DIGITAL BUSINESS APPLICATIONS
Understand ethics and ethical decision-making.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Computer Literacy – Grade 8
The Psychology of Security
Objective 5.02 Understand ethics and ethical decision-making.
Ch8 Ethics, law and e-commerce
WikiLeaks avoids shutdown as supporters go on the offensive
Understand ethics and ethical decision-making.
Communicating in the IT Industry
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Y12 Transition Project AS Computer Science Free Powerpoint Templates.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CS-480b Network Security Dick Steflik
Presentation transcript:

BRITISH PROPOSAL TO EXPAND DIGITAL SURVEILLANCE CSCE390 Computer Ethics Presentation

Summary  New proposal passed by British Parliament  GCHQ may “order the installation of thousands of devices linked to the networks of Internet service devices”  Examining contents of messages would still require special warrants  May “access information such as the times, destinations and frequencies of phone calls, texts and s without a warrant”  Could compel companies to allow “instant access to real-time information in certain circumstances” (warrant gray area)

Ethical Decision Making  1. The Issue  2. Parties and Desired Outcomes  3. 3 Possible Solutions and Best/Worst Outcomes  4. Universal Adoption? People as Ends or Means?  5. Natural? Balanced?  6. Efficient? Greatest Good?  7. Personal Conscience? Autonomous choice?  8. Most Influential Philosophy

Application of ACM Code  General Moral Imperatives  1.7 Respect the Privacy of Others  1.8 Honor Confidentiality  More Specific Ethical Responsibilities  2.4 Know and Respect Existing Laws Pertaining to Professional Work  2.7 Improve the Public Understanding of Computing and its Consequences

Sources  ACM Tech News April 4th  Original article in the Washington Post:  increased-internet-snooping/2012/04/02/gIQAOerQrS_story_1.html increased-internet-snooping/2012/04/02/gIQAOerQrS_story_1.html  Intro slide photo from macleans.ca  lawful-access/stop-online-spying-web/ lawful-access/stop-online-spying-web/