Download presentation
Presentation is loading. Please wait.
Published byIrene Quinn Modified over 9 years ago
1
CS 1308 Computer Literacy and the Internet
2
How do we look at Social Issues? Financial Moral Ethical Legal
3
The ATM Convenience Unemployment Alienation and Customer Service Crime Loss of Privacy Errors
4
Philosophical Issues Do we have a right to Privacy? Is it in the Constitution? Value of Privacy Right to Privacy? Warren and Brandeis People have the right to prohibit publication of facts and photographs JJ Thomson Depends on the kind of information, some is public Posner Economics of Privacy Information has inherent value
5
Consumer Information Data mining (How is the data gathered?) Junk Mail Credit Bureaus Medical Information
6
Government Files Computer Matching Computer Profiling IRS National Crime Information Center US Census SSN
7
Questions 1) Should the United States create a system with a National Health Card? 2) Should all the public records in the court system be placed on the internet for easy retrieval?
8
Uses of Encryption Electronic transfer Personal information Financial data Medical records Trade secrets Cable TV signals Others…
9
Is it Needed? Protection from Terrorists and Criminals 300-500 legal wiretaps per year in ’80s and 90’s Cost? Necessity? Global Competition
10
Key Escrow Government Key Escrow Clipper Chip Commercial Key Escrow Employee not available Malicious actions
11
Computer Crime Fraud Theft Hacking
12
Customer Fraud Common scams Fraudulent internet sites Incorrect bar code scanning How do these compare to the “rigged gas station” or “coffee can?”
13
Defending Against Fraud Credit Cards Authenticate first use Signatures Photos “One-time-only” cards Is the situation different because of the internet?
14
Fraud and Embezzlement “Insider” crimes Defending against insider crimes Common Fraud Credit Cards ATMs Telecommunications Satellite/Cable TV
15
Sabotage and Information Theft Insider attacks Logic Bombs Deleting or encrypting files Outside attacks Competitors “Hackers”
16
Hacking The meaning of the word has changed Traditional hacking Stolen disk space Rerouting and stealing phone service “Captain Crunch” Internet hacking Denial of service attacks Web site defacing Theft of information
17
Security Weakness Why is security so weak? Poor network administration Operating System design If they can’t find me… Security through secrecy New issues Broadband to the home
18
Computer Crime Law Old laws were not enough New laws difficult to write in time to keep up with technology Laws tend to punish “crimes against the state” at a higher level Where to prosecute?
19
Ethical Issues Is hacking good? Exposes security flaws Information should be free Phone companies are ripping us off anyway
20
Intellectual Property How valuable are ideas? DMCA
21
Copyright Gives copyright holder exclusive rights to: Make copies Produce derivative works such as translations or movies based on books Distribute copies Perform work in public Display work in public
22
Fair Use Doctrine Uses the following factors: Purpose and nature of the use Nonprofit, educational Nature of the work Amount and significance of the work used The effect of the use on market value or potential profit
23
Fair Use Cases Videotaping Internet Posting copyrighted material Reusing copyrighted material Graphics CGI scripts Multiple computers
24
Patents Reward the inventor with exclusivity Protects “things” and processes Not individual expressions Patent Office not technical experts
25
Software Piracy Protecting software copyright Laws Hardware solutions Software solutions Contractual changes Software Publishers Association (SPA) Free Software? Richard Stallman
26
Cyber Gap Future jobs White Collar vs. Blue Collar Service Industry Computers taking “skilled” jobs Drafting Programming Education
27
Information Access Universal Access Is it necessary? A place to go Easy to use hardware and software ADA Training Affordability Subsidized?
28
Political Issues Information is a force for freedom Freedom of the press Curtailing information flow China Vietnam Singapore US Iran Internet developed to withstand failure Sees censorship as a system failure
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.