Download presentation
Presentation is loading. Please wait.
Published byAmber Turner Modified over 10 years ago
1
Ethics In Computing Aimee Shirreffs Kevin Silver Jin Zhang
2
Introduction Ethics: The branch of philosophy dealing with morality, distinguishing between right & wrong. Ethics: The branch of philosophy dealing with morality, distinguishing between right & wrong. Derived from: Derived from: Ethos-character in GreekEthos-character in Greek mores-customs in Latinmores-customs in Latin
3
Topics Aimee: Electronic Medical Records Aimee: Electronic Medical Records Unsecured Wireless Networks Unsecured Wireless Networks Kevin: Spyware Sony Rootkit Kevin: Spyware Sony Rootkit Jin: International Ethics Hacking Jin: International Ethics Hacking
4
Electronic Medical Records EMR: A medical record stored and accessed in digital format EMR: A medical record stored and accessed in digital format Past, Present & Future EMRs Failed Icelandic project Failed Icelandic project Alberta Netcare, Canada Alberta Netcare, Canada The NHS centralised EMR begins uploading data in 2007 The NHS centralised EMR begins uploading data in 2007
5
Electronic Medical Records Ethical Issues arise due to: Ethical Issues arise due to: Conflicting opinions between individuals and groups in societyConflicting opinions between individuals and groups in society Concern over who can and who will have access to an EMRConcern over who can and who will have access to an EMR Patient consent and the apparent lack of empowerment it offersPatient consent and the apparent lack of empowerment it offers Sources include The Guardian, Journal of Medical Research, Financial Times
6
Unsecured Wireless Networks The advent of Wi-Fi technology has created new opportunities and new concerns The advent of Wi-Fi technology has created new opportunities and new concerns Alarmingly, approximately 80% of US residential Wireless Networks will be classified as unsecure in 2007 Alarmingly, approximately 80% of US residential Wireless Networks will be classified as unsecure in 2007 Current laws are not in place, so we must be guided by ethics… Current laws are not in place, so we must be guided by ethics…
7
Unsecured Wireless Networks Ethical dilemmas relate to: Ethical dilemmas relate to: Wardrivers & wardrivingWardrivers & wardriving Wireless piggybackersWireless piggybackers The differing opinions between individuals and these groups of their conductsThe differing opinions between individuals and these groups of their conducts The difficulty of defining where the boundary lies between ethics and the law in new technologiesThe difficulty of defining where the boundary lies between ethics and the law in new technologies Sources include zdnet.com, NY Times, online news articles & blogs
8
Hacking What is Hacking? What is Hacking? Why Hack? Why Hack? 1) Challenge 2) Desire Money 3) Steal Information 4) Destroy Systems
9
Hacking Hacker Types Hacker Types 1) White Hats Ethical Hackers Ethical Hackers Opposed to abuse of Computer Systems Opposed to abuse of Computer Systems Hack Systems to illuminate flaws Hack Systems to illuminate flaws 2) Black Hats Criminal Hackers Criminal Hackers Promote freedom and accesibility Promote freedom and accesibility 3) Grey Hats Release information about security holes to public Release information about security holes to public Do so indiscriminately and without regard to consequences Do so indiscriminately and without regard to consequences Ethically between Black and White Ethically between Black and White
10
International Ethics America vs China Similarities: Chat Room Content Chat Room Content Theft Theft Piracy Piracy Differences Differences Pornography Pornography Legitimate Market in America Legitimate Market in America Completely illegal in China Completely illegal in China Internet Café Internet Café No under 18s in china No under 18s in china Online Gambling Online Gambling Illegal in China Illegal in China
11
Spyware/Adware Spyware: Spyware: Computer software that collects personal information about a user without their informed consent. Computer software that collects personal information about a user without their informed consent. Term is used interchangably with malware Term is used interchangably with malware Adware: Adware: any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used.
12
Spyware/Adware Ethical issues Ethical issues Adware Adware Not necessarily considered malwareNot necessarily considered malware Should companies be allowed to advertise in this way?Should companies be allowed to advertise in this way? Inconvenience for usersInconvenience for users Spyware Spyware Commonly considered malwareCommonly considered malware Businesses use hidden spyware in their products for advertising – Right or wrong?Businesses use hidden spyware in their products for advertising – Right or wrong?
13
Sony Rootkit Rootkit: Rootkit: A rootkit is a set of software tools used by a third party after gaining access to a computer system. These tools conceal running processes, files or system data, which helps maintain access to a system without the users knowledge.A rootkit is a set of software tools used by a third party after gaining access to a computer system. These tools conceal running processes, files or system data, which helps maintain access to a system without the users knowledge. Serves to conceal malicious software such as spyware Serves to conceal malicious software such as spyware
14
Sony Rootkit 2005 Sony BMG CD copy protection scandal 2005 Sony BMG CD copy protection scandal We will develop technology that transcends the individual user. We will firewall Napster at source - we will block it at your cable company, we will block it at your phone company, we will block it at your [ISP]. We will firewall it at your PC...These strategies are being aggressively pursued because there is simply too much at stake. Sony Pictures Entertainment US senior VP Steve Heckler Steve Heckler Sony installed software as a Copy Protection measure Sony installed software as a Copy Protection measure Left computers vulnerable to virus/hacker attack Left computers vulnerable to virus/hacker attack
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.