Download presentation
Presentation is loading. Please wait.
Published byCamron Farmer Modified over 5 years ago
1
Computer Security Social Legal and Ethical issues
4/3/2019
2
Social Legal and Ethical issues
Sara Base, A Gift of Fire, Prentice Hall, 2003 4/3/2019
3
Social Legal and Ethical issues
The impact of computers and computer systems The ATM example Unemployment Alienation and customer service Crime Loss of privacy Errors 4/3/2019
4
Social Legal and Ethical issues
General Themes Globalization of cyberspace Tradeoffs of convenience vs privacy & security Personal choices, Business policies and law Negative or liberties and positive rights or claim rights 4/3/2019
5
Social Legal and Ethical issues
Main issues Privacy Freedom if speech Can we trust computers Intellectual property Computer Crime General social issues Ethics 4/3/2019
6
1. Privacy & personal information
Key aspects Freedom from intrusion Control information about oneself Freedom from surveillance 4/3/2019
7
1. Privacy & personal information
“Big brother is watching you” Database security 4/3/2019
8
Database security Provisions of Privacy Act of 1974
Restricts data in federal government records to what is “relevant and necessary” to the legal purpose for which it is collected. Requires federal agencies to publish a notice of their record systems in the Federal Register Allows people to access their records & correct inaccurate info Requires procedures to protect the security of the info in the databases Prohibits disclosure of info about a person without their consent. 4/3/2019
9
The fourth Amendment, US Constitution
The right of the people to be secure in their persons, houses, paper and effects against unreasonable searches and seizures shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. 4/3/2019
10
Privacy & personal information
Satellite surveillance and thermal imaging Automated toll collection and itemized purchase records Search and surveillance tools Fighting terrorism 4/3/2019
11
Databases and marketing
Credit bureaus Principles for data collection & use Collect only data needed Inform people when data about them are collected, what is collected … Offer a way for people to opt out Provide stronger protection for sensitive data Keep data only as long as it is needed Maintain accuracy and security of data Provide a means for people to access and correct data stored about them. 4/3/2019
12
Databases and marketing
Social Security numbers and National ID systems Personal health and medical records Public records: access vs privacy 4/3/2019
13
Privacy & personal information
Protecting Privacy: law & regulation Is their a right to privacy The free market view vs the consumer protection view Contract and regulations Conflicts with freedom of speech 4/3/2019
14
2. Freedom of speech Encryption and interception of communications
Wiretapping Telephone New technologies USA Patriot Act 2001: Lets the government collect info from financial institutions on any transactions that differs from a customer’s usual pattern, and allows access to the government to many other kinds of personal information without a court order. 4/3/2019
15
Freedom if speech Carnivore
FBIs system for intercepting FBI must first get a court order to intercept someone’s The Carnivore system is used at the Suspects Internet Service provider and filters all s from that ISP, examining headers to find suspect . 4/3/2019
16
Freedom if speech NSA’s echelon
Similar to Carnivor, but on an international Scale. Involves a partnership with intelligence agencies of Canada, Britain, Australia and New Zealand, and operates a huge system of listening stations to intercepts satellite communication. Targets terrorist and military activities 4/3/2019
17
Freedom if speech Cryptography and its uses
Uses of encryption Criminal abuse: “ … unfortunately the same technology can be used by terrorists, drug dealers, … “ White House Press, 1994 Secrecy and export controls Steganography 4/3/2019
18
Freedom if speech Secrecy
Clipper Trust in government How much does technology matter 4/3/2019
19
3. Can we trust computers What can go wrong!
Billing errors database accuracy failures… Increasing reliability and Safety Overconfidence Redundancy Good design 4/3/2019
20
4. Intellectual property
Problems with new technologies Copyright Law The fair use doctrine Copying Music, Movies, Software Books From floppies to the web The Napster case Beyond Napster Software Piracy 4/3/2019
21
4. Intellectual property
Ethical issues Fuzziness about the ethics: Arguments used include: I cant afford to buy The company is a wealthy corporation Too expensive anyway Making a copy from a friend is an act of generosity 4/3/2019
22
4. Intellectual property
The future of copyright Doomsday approach: copyright law will disintegrate. Balanced solutions will be found by using a new approach and new technologies Free software Copyright or patent? 4/3/2019
23
5. Computer Crime Hacking The Law Design secure “hack-free” systems
Catching hackers Penalties appropriate to the crime Discouraging and punishing “amateur” hackers Design secure “hack-free” systems Scams Fraud, embezzlement, Sabotage Identity theft 4/3/2019
24
6. General social issues Impact on our society
Information Haves and have-Nots The digital divide Trends in computer access Abdicating responsibility Does the Technology create the need for itself? “… The Web is alive and filled with life, nearly as complex and natural as the primordial swamp…” Who benefits most Prohibiting bad technologies 4/3/2019
25
7. Ethics What is Ethics The study of what it means to do the “right” thing And what is the “right” thing? Deontological theories Utalitarialism Natural rights No simple answers Right, wrong and OK Negative and positive rights, or liberties and claim-rights Distinguishing wrong and Harmful Separating goals from constraints Personal Preference and Ethics Law and Ethics Professional codes and Ethics 4/3/2019
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.