Download presentation
Presentation is loading. Please wait.
1
Chapter 10
2
Module 10A Ethics Module 10B Security Module 10C Current Issues & Controversies Module 10D Emerging Technologies Chapter 10
3
Ethics Avoiding Computer-Related Legal Problems Introducing Ethics
Computer Ethics for Computer Users Computer Ethics for Computer Professionals Module A
4
Avoiding Computer-Related Legal Problems
Ethics Avoiding Computer-Related Legal Problems Plagiarism copyright infringement Software Piracy public domain software General Public License (GPL) shareware software license archival backups site license Module A
5
Avoiding Computer-Related Legal Problems
Ethics Avoiding Computer-Related Legal Problems Module A At some colleges, plagiarism can get you thrown out of school on the first offense Several sites make hundreds of thousands of public domain and shareware programs available for downloading via the Internet, including shareware.com and Filez.
6
Avoiding Computer-Related Legal Problems
Ethics Avoiding Computer-Related Legal Problems The following actions are illegal incorporating all or part of a GPL-licensed program in a program that you sell violating the terms of a software license making copies of site-licensed programs for your personal use at home giving or selling copies of commercial programs to others Module A
7
Avoiding Computer-Related Legal Problems
Ethics Avoiding Computer-Related Legal Problems Module A use Your is not private! Many people have lost their jobs after making fun of their boss in what they thought was a private message
8
Avoiding Computer-Related Legal Problems
Ethics Avoiding Computer-Related Legal Problems Module Adult sites & erotica newsgroups hostile environment Obscenity Unauthorized computer access hacker A
9
Ethics Introducing Ethics Module A Ethics is the branch of philosophy that’s concerned with determining what’s right and wrong, especially in the context of moral dilemmas
10
Introducing Ethics Moral dilemmas arise in two situations
when it’s not clear which, if any, moral rule applies when 2 or more rules apply, and they conflict An act is ethical if . . . were everyone to act the same way, society as a whole would benefit it treats people as an end in themselves, rather than as a means to an end impartial observers would judge that it is fair to all parties concerned Module A
11
Thinking Through Moral Dilemmas
Ethics Thinking Through Moral Dilemmas A practical guide: You’d be proud to tell your mom or dad If you were in the other person’s shoes, you’d admit that your action was fair If you did it at work, your company’s customers would agree that you did the right thing . . . You wouldn’t mind reading about your action on the front page of your newspaper Module A
12
Ethics for Computer Users
Computer ethics for computer users respecting yourself respecting others respecting academic integrity Module A
13
Ethics for Computer Professionals
Excerpt from the Code of Ethics of the Institute for Certification of Computing Professionals Module Essential elements relating to conduct that identify a professional activity: high standard of skill & knowledge confidential relationship with people served public reliance upon the standards of conduct in established practice observance of an ethical code A
14
Ethics for Computer Professionals
Safety first Additional ethical responsibilities competence responsibility integrity Module A Dozens of professional associations govern computing professionals. For links to their codes of ethics, see the Illinois Institute of Technology’s Codes of Ethics Online: Computing & Information Systems page
15
Ethics for Computer Professionals
Programmer liability Computer ethics in business Whistle-blowing Module A For more information on the controversies surrounding whistle-blowing, see the Whistle-blowing links page put together by students at North Carolina State University
16
Security Scope of the Problem Computer Intruders’ Tools and Techniques
Meet the Attackers What’s at Stake? Safeguarding Computer Systems Module B
17
Security Security The scenario . . . Module B On Christmas Day, 1995, Tsutomu Shimomura, a computational physicist, was about to leave for a skiing trip. But he made a most unwelcome discovery. By means of the Internet, an intruder broke into the computers he keeps at his beach cottage near San Diego. Stolen were hundreds of pages of information concerning Shimomura’s research on cellular phone security . . .
18
Security Scope of the Problem Most unauthorized intrusions go undetected and the attackers are never caught Module B Kevin D. Mitnick was charged with violating several Federal laws including computer fraud and causing damage to computer systems
19
Computer Intruders’ Tools & Techniques
Security Computer Intruders’ Tools & Techniques Tricks for obtaining passwords: password guessing shoulder surfing packet sniffers dumpster diving social engineering superuser status Module B
20
Computer Intruders’ Tools & Techniques
Security Computer Intruders’ Tools & Techniques Salami shaving & data diddling Forgery Security loophole detection programs Computer viruses file infectors boot sector virus macro virus time bombs worm trojan horse Module B
21
Meet the Attackers Computer hobbyists Disgruntled employees Spies
Security Meet the Attackers Computer hobbyists hackers crackers computer virus authors Disgruntled employees logic bomb Spies corporate espionage Module B
22
Meet the Attackers Enemies & terrorists information warfare
Security Meet the Attackers Enemies & terrorists information warfare network warfare structural sabotage information terrorism Module B Find the latest news about virus hoaxes at Rob Rosenberger’s Computer Virus Myths Home Page For more information on information warfare, including news reports, links, and analysis, see infowar.com
23
What’s at Stake Consumption of staff time Downtime Fraud and theft B
Security What’s at Stake Consumption of staff time Downtime Fraud and theft Module B For security measures, users should lock their doors and turn off their computers. In some cases, it may be wise to secure hardware to desks to prevent theft
24
What’s at Stake Adverse publicity Vandalism Character assassination
Security What’s at Stake Adverse publicity Vandalism Character assassination Loss of privacy Risks to public safety Denial of service Module B
25
Safeguarding Computer Systems
Security Safeguarding Computer Systems Protecting computers from power-relate problems power surges & power outages autosave uninterruptible power supply (UPS) Module B A UPS is battery powered device that provides power to your computer for a limited time in a power outage
26
Safeguarding Computer Systems
Security Safeguarding Computer Systems Controlling access callback systems tokens digital certificates smartcards biometric authentication Module B Smartcards are credit-card-sized devices wit their own internal memories
27
Safeguarding Computer Systems
Security Safeguarding Computer Systems Firewalls Encryption Antivirus programs or vaccines Data backups full backups incremental backups disaster recovery plan Module B
28
Current Issues and Controversies
Module The Encryption Debate Obscenity and Indecency Privacy C
29
Current Issues & Controversies
The scenario . . . Module C Identity theft is one of the fastest-growing crimes in the U.S. and Canada. Criminals obtain enough information about you to open a credit account in your name, and then max it out -- leaving you with the bill.
30
The Encryption Debate Encryption (coded message) basics
Current issues & controversies The Encryption Debate Encryption (coded message) basics rot-13 Problem of key interception Public-key encryption public-key Module C For more information concerning public-key encryption, visit the RSA Laboratories’ Frequently-Asked Questions on Cryptography page
31
The Encryption Debate Security issues of strong encryption
Current issues & controversies The Encryption Debate Security issues of strong encryption key escrow key recovery Export restrictions bit length Global dimension Module C To get the latest news and perspectives about cryptography issues, visit the Center for Democracy and Technology’s Crypto Debate page
32
Obscenity & Indecency Obscenity Indecency
Current issues & controversies Obscenity & Indecency Obscenity Indecency Communications Decency ACT (CDA) Filtering software World Wide Web Consortium (W3C) Platform for Internet Content Selection (PICS) The Global Dimension Module C
33
Current issues & controversies
Obscenity & Indecency Net Nanny is one example of filtering software that enables parents to screen out Web sites that contain indecent or obscene material Module C
34
Current issues & controversies
Privacy Module C Defined by U.S. Supreme Court Justice Louis Brandeis in 1928 as “the right to be left alone,” privacy refers to an individual’s ability to keep their personal and family business away from prying eyes
35
Privacy Privacy rights in the U.S. Databases of personal information
Current issues & controversies Privacy Privacy rights in the U.S. Databases of personal information How is information collected? Is self-regulation sufficient? Proposed solutions Platform for Privacy Preferences (P3) The Global Dimension Module C
36
Protecting Your Privacy Online
Current issues & controversies Protecting Your Privacy Online To safeguard your privacy . . . Don’t use your employer’s computers for personal Tell children not to divulge personal information to strangers online Don’t fill out site registration forms unless you see a privacy policy statement Module C Web sites can collect information without your knowledge and consent. To see an example, visit the Center for Democracy and Technology’s CDT Privacy Demonstration Page
37
Emerging Technologies
Module Tomorrows Hardware: Faster, Cheaper, Connected Artificial Intelligence: Toward the Smart Machine? Social Impact of AI: Sharing the World with Machines Who Think D
38
Emerging Technologies
The prediction . . . Module D What will computers be like in the future? It’s very easy to predict the future -- the hard part is getting it right, and that’s particularly true where technology is concerned. Past predictions don’t offer much comfort . . .
39
Tomorrow’s Hardware: Faster, Cheaper, Connected
Emerging technologies Tomorrow’s Hardware: Faster, Cheaper, Connected Module D Moore’s Law Metcalfe’s Law As computers become faster, cheaper, and more valuable, they’ll encourage the trend towards the digitization of all the world’s information and knowledge
40
The Short Term Typical personal computer: Today & 2005 D
Emerging technologies The Short Term Typical personal computer: Today & 2005 Module D
41
Tomorrow’s Hardware: Faster, Cheaper, Connected
Emerging technologies Tomorrow’s Hardware: Faster, Cheaper, Connected Module D The long term ubiquitous (everywhere) computing Limits of trend extrapolation
42
Artificial Intelligence: Toward the Smart Machine
Emerging technologies Artificial Intelligence: Toward the Smart Machine Defining intelligence learn and retain the learned knowledge reason on the basis of the knowledge plan (develop strategies) communicate recognize patterns Module D For information on artificial intelligence, an excellent starting point is AI on the Web.
43
Artificial Intelligence: Toward the Smart Machine
Emerging technologies Artificial Intelligence: Toward the Smart Machine AI is the field that attempts to endow computers with intelligence. Although scientists know little about the human brain, it's clear that the brain is far more complex than any computer Module D
44
The Human Brain As a CPU Speculative estimates D Emerging technologies
Module D
45
Emerging technologies
The Turing Test British computer scientist Alan Turing. According to most psychologists, the Turing Test's type-and-response method is too simplistic. Module D
46
Artificial Intelligence
Emerging technologies Artificial Intelligence Brute force AI achievements On May 11, 1997, Big Blue defeated Russian chess master Garry Kasparov Module D
47
Artificial Intelligence
Emerging technologies Artificial Intelligence Module D Natural language speech recognition Major advances have been made in speech recognition, in which computers translate spoken speech into text
48
Artificial Intelligence
Emerging technologies Artificial Intelligence Machine translation Expert systems knowledge representation knowledge base Intelligent agents Pattern recognition Fuzzy logic Module D Try machine translation yourself by visiting Babelfish, an online Web translator created by AltaVista
49
Robots Emerging technologies Increasingly, robots are performing tasks such as assembly, welding, material-handling, and material transport Module D Like to build your own robot? Visit Mondo-Tronics Robot Store where you’ll find nearly 300 robot kits and accessories
50
Artificial Intelligence
Emerging technologies Artificial Intelligence Strong AI CYC Cog neural networks genetic algorithms Module D The brain contains billions neurons. In a neural net, thousands of computer processing units are connected in multiple ways, just as the neurons in the brain are connected
51
Social Impact of AI: Sharing the World with Machines Who Think
Emerging technologies Social Impact of AI: Sharing the World with Machines Who Think Asimov’s Three Laws of Robotics First: A robot may not injure a human being . . . Second: A robot must obey the orders given it by human beings except where it may conflict with the First Law Third: A robot must protect its own existence as long as such protection does not conflict with the First or Second Law Module D
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.