Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security Social Legal and Ethical issues

Similar presentations


Presentation on theme: "Computer Security Social Legal and Ethical issues"— Presentation transcript:

1 Computer Security Social Legal and Ethical issues
4/3/2019

2 Social Legal and Ethical issues
Sara Base, A Gift of Fire, Prentice Hall, 2003 4/3/2019

3 Social Legal and Ethical issues
The impact of computers and computer systems The ATM example Unemployment Alienation and customer service Crime Loss of privacy Errors 4/3/2019

4 Social Legal and Ethical issues
General Themes Globalization of cyberspace Tradeoffs of convenience vs privacy & security Personal choices, Business policies and law Negative or liberties and positive rights or claim rights 4/3/2019

5 Social Legal and Ethical issues
Main issues Privacy Freedom if speech Can we trust computers Intellectual property Computer Crime General social issues Ethics 4/3/2019

6 1. Privacy & personal information
Key aspects Freedom from intrusion Control information about oneself Freedom from surveillance 4/3/2019

7 1. Privacy & personal information
“Big brother is watching you” Database security 4/3/2019

8 Database security Provisions of Privacy Act of 1974
Restricts data in federal government records to what is “relevant and necessary” to the legal purpose for which it is collected. Requires federal agencies to publish a notice of their record systems in the Federal Register Allows people to access their records & correct inaccurate info Requires procedures to protect the security of the info in the databases Prohibits disclosure of info about a person without their consent. 4/3/2019

9 The fourth Amendment, US Constitution
The right of the people to be secure in their persons, houses, paper and effects against unreasonable searches and seizures shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. 4/3/2019

10 Privacy & personal information
Satellite surveillance and thermal imaging Automated toll collection and itemized purchase records Search and surveillance tools Fighting terrorism 4/3/2019

11 Databases and marketing
Credit bureaus Principles for data collection & use Collect only data needed Inform people when data about them are collected, what is collected … Offer a way for people to opt out Provide stronger protection for sensitive data Keep data only as long as it is needed Maintain accuracy and security of data Provide a means for people to access and correct data stored about them. 4/3/2019

12 Databases and marketing
Social Security numbers and National ID systems Personal health and medical records Public records: access vs privacy 4/3/2019

13 Privacy & personal information
Protecting Privacy: law & regulation Is their a right to privacy The free market view vs the consumer protection view Contract and regulations Conflicts with freedom of speech 4/3/2019

14 2. Freedom of speech Encryption and interception of communications
Wiretapping Telephone New technologies USA Patriot Act 2001: Lets the government collect info from financial institutions on any transactions that differs from a customer’s usual pattern, and allows access to the government to many other kinds of personal information without a court order. 4/3/2019

15 Freedom if speech Carnivore
FBIs system for intercepting FBI must first get a court order to intercept someone’s The Carnivore system is used at the Suspects Internet Service provider and filters all s from that ISP, examining headers to find suspect . 4/3/2019

16 Freedom if speech NSA’s echelon
Similar to Carnivor, but on an international Scale. Involves a partnership with intelligence agencies of Canada, Britain, Australia and New Zealand, and operates a huge system of listening stations to intercepts satellite communication. Targets terrorist and military activities 4/3/2019

17 Freedom if speech Cryptography and its uses
Uses of encryption Criminal abuse: “ … unfortunately the same technology can be used by terrorists, drug dealers, … “ White House Press, 1994 Secrecy and export controls Steganography 4/3/2019

18 Freedom if speech Secrecy
Clipper Trust in government How much does technology matter 4/3/2019

19 3. Can we trust computers What can go wrong!
Billing errors database accuracy failures… Increasing reliability and Safety Overconfidence Redundancy Good design 4/3/2019

20 4. Intellectual property
Problems with new technologies Copyright Law The fair use doctrine Copying Music, Movies, Software Books From floppies to the web The Napster case Beyond Napster Software Piracy 4/3/2019

21 4. Intellectual property
Ethical issues Fuzziness about the ethics: Arguments used include: I cant afford to buy The company is a wealthy corporation Too expensive anyway Making a copy from a friend is an act of generosity 4/3/2019

22 4. Intellectual property
The future of copyright Doomsday approach: copyright law will disintegrate. Balanced solutions will be found by using a new approach and new technologies Free software Copyright or patent? 4/3/2019

23 5. Computer Crime Hacking The Law Design secure “hack-free” systems
Catching hackers Penalties appropriate to the crime Discouraging and punishing “amateur” hackers Design secure “hack-free” systems Scams Fraud, embezzlement, Sabotage Identity theft 4/3/2019

24 6. General social issues Impact on our society
Information Haves and have-Nots The digital divide Trends in computer access Abdicating responsibility Does the Technology create the need for itself? “… The Web is alive and filled with life, nearly as complex and natural as the primordial swamp…” Who benefits most Prohibiting bad technologies 4/3/2019

25 7. Ethics What is Ethics The study of what it means to do the “right” thing And what is the “right” thing? Deontological theories Utalitarialism Natural rights No simple answers Right, wrong and OK Negative and positive rights, or liberties and claim-rights Distinguishing wrong and Harmful Separating goals from constraints Personal Preference and Ethics Law and Ethics Professional codes and Ethics 4/3/2019


Download ppt "Computer Security Social Legal and Ethical issues"

Similar presentations


Ads by Google