Download presentation
Presentation is loading. Please wait.
1
Chapter 14 Social and Legal Issues
2
Chapter Outline A gift of fire A gift of fire Here, there, everywhere Here, there, everywhere Privacy Privacy The Computer said so The Computer said so Computer crime Computer crime Constitutional and civil liberties issues Constitutional and civil liberties issues Communication issues: encryption and wiretapping Communication issues: encryption and wiretapping
3
A Gift of Fire Computer technology, most people agree, is the most significant new technology since the beginning of the Industrial Revolution. Computer technology, most people agree, is the most significant new technology since the beginning of the Industrial Revolution. Can do many goods. Can do many goods. But like fire, the power of computers has introduced serious problems: million-dollar thefts, potential loss of privacy, breakdowns of large, complex systems such as communication networks and banking systems. But like fire, the power of computers has introduced serious problems: million-dollar thefts, potential loss of privacy, breakdowns of large, complex systems such as communication networks and banking systems.
4
Level 6 Examine relationships between the use of computers and law, work, public policy, ethics, responsibility, science, freedom of action, and quality of life. Examine relationships between the use of computers and law, work, public policy, ethics, responsibility, science, freedom of action, and quality of life.
5
Benefits Information services Information services Consumer services Consumer services Communications Communications Education Education Entertainment Entertainment Medical equipment and research … Medical equipment and research … Bring changes … Bring changes …
6
Privacy Government databases Government databases Unauthorized use by insidersUnauthorized use by insiders Inadvertent leakage of information through negligence or carelessnessInadvertent leakage of information through negligence or carelessness Propagation of errors and the harm caused by themPropagation of errors and the harm caused by them Intentional uses that some people find objectionable.Intentional uses that some people find objectionable. Big Brother ’ s Files Big Brother ’ s Files Fifty little brothers Fifty little brothers
7
How to Protect Privacy Using trusted 3 rd party Using trusted 3 rd party Audit trail Audit trail Encryption Encryption Informed consent Informed consent Issues Issues RegulationRegulation Ownership of dataOwnership of data ContractsContracts
8
The Computer Said So Many people still think the computer is always right. Many people still think the computer is always right. Major failures do occur. Major failures do occur. How much should we rely on computers? Consider risks and benefits How much should we rely on computers? Consider risks and benefits Case study on evaluating computer models: crashing cars and global warming Case study on evaluating computer models: crashing cars and global warming
9
Computer Crime Fraud, embezzlement, and theft Fraud, embezzlement, and theft Stealing data Stealing data Hacking or cracking Hacking or cracking Viruses and worms Viruses and worms
10
Constitutional and civil liberties issues Censorship versus Freedom of speech: Communications Decency ACT (CDA), 1996 Censorship versus Freedom of speech: Communications Decency ACT (CDA), 1996 Search and seizure and freedom of the electronic “ press ” Search and seizure and freedom of the electronic “ press ” More freedom-of-speech issues on the Internet More freedom-of-speech issues on the Internet
11
Communication Issues Use of encryption Use of encryption The wiretapping law The wiretapping law
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.