Presentation is loading. Please wait.

Presentation is loading. Please wait.

CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.

Similar presentations


Presentation on theme: "CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal."— Presentation transcript:

1 CS 1308 Computer Literacy and the Internet

2 How do we look at Social Issues?  Financial  Moral  Ethical  Legal

3 The ATM  Convenience  Unemployment  Alienation and Customer Service  Crime  Loss of Privacy  Errors

4 Philosophical Issues  Do we have a right to Privacy?  Is it in the Constitution?  Value of Privacy  Right to Privacy?  Warren and Brandeis  People have the right to prohibit publication of facts and photographs  JJ Thomson  Depends on the kind of information, some is public  Posner Economics of Privacy  Information has inherent value

5 Consumer Information  Data mining (How is the data gathered?)  Junk Mail  Credit Bureaus  Medical Information

6 Government Files  Computer Matching  Computer Profiling  IRS  National Crime Information Center  US Census  SSN

7 Questions 1) Should the United States create a system with a National Health Card? 2) Should all the public records in the court system be placed on the internet for easy retrieval?

8 Uses of Encryption  Electronic transfer  Personal information  Financial data  Medical records  Trade secrets  Cable TV signals  Others…

9 Is it Needed?  Protection from Terrorists and Criminals  300-500 legal wiretaps per year in ’80s and 90’s  Cost?  Necessity?  Global Competition

10 Key Escrow  Government Key Escrow  Clipper Chip  Commercial Key Escrow  Employee not available  Malicious actions

11 Computer Crime  Fraud  Theft  Hacking

12 Customer Fraud  Common scams  Fraudulent internet sites  Incorrect bar code scanning  How do these compare to the “rigged gas station” or “coffee can?”

13 Defending Against Fraud  Credit Cards  Authenticate first use  Signatures  Photos  “One-time-only” cards  Is the situation different because of the internet?

14 Fraud and Embezzlement  “Insider” crimes  Defending against insider crimes  Common Fraud  Credit Cards  ATMs  Telecommunications  Satellite/Cable TV

15 Sabotage and Information Theft  Insider attacks  Logic Bombs  Deleting or encrypting files  Outside attacks  Competitors  “Hackers”

16 Hacking  The meaning of the word has changed  Traditional hacking  Stolen disk space  Rerouting and stealing phone service  “Captain Crunch”  Internet hacking  Denial of service attacks  Web site defacing  Theft of information

17 Security Weakness  Why is security so weak?  Poor network administration  Operating System design  If they can’t find me…  Security through secrecy  New issues  Broadband to the home

18 Computer Crime Law  Old laws were not enough  New laws difficult to write in time to keep up with technology  Laws tend to punish “crimes against the state” at a higher level  Where to prosecute?

19 Ethical Issues  Is hacking good?  Exposes security flaws  Information should be free  Phone companies are ripping us off anyway

20 Intellectual Property  How valuable are ideas?  DMCA

21 Copyright  Gives copyright holder exclusive rights to:  Make copies  Produce derivative works such as translations or movies based on books  Distribute copies  Perform work in public  Display work in public

22 Fair Use Doctrine  Uses the following factors:  Purpose and nature of the use  Nonprofit, educational  Nature of the work  Amount and significance of the work used  The effect of the use on market value or potential profit

23 Fair Use Cases  Videotaping  Internet  Posting copyrighted material  Reusing copyrighted material  Graphics  CGI scripts  Multiple computers

24 Patents  Reward the inventor with exclusivity  Protects “things” and processes  Not individual expressions  Patent Office not technical experts

25 Software Piracy  Protecting software copyright  Laws  Hardware solutions  Software solutions  Contractual changes  Software Publishers Association (SPA)  Free Software?  Richard Stallman

26 Cyber Gap  Future jobs  White Collar vs. Blue Collar  Service Industry  Computers taking “skilled” jobs  Drafting  Programming  Education

27 Information Access  Universal Access  Is it necessary?  A place to go  Easy to use hardware and software  ADA  Training  Affordability  Subsidized?

28 Political Issues  Information is a force for freedom  Freedom of the press  Curtailing information flow  China  Vietnam  Singapore  US  Iran  Internet developed to withstand failure  Sees censorship as a system failure


Download ppt "CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal."

Similar presentations


Ads by Google