Download presentation
Presentation is loading. Please wait.
Published byCameron Cook Modified over 9 years ago
1
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net
2
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 2 10/21/2015 Overview 1. Logistics 2. Students Present 3. Finishing Crime 4. Privacy 5. Assignment
3
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 3 10/21/2015 Logistics Put your name on each slide. This is the last time I will accept slides without. Remember to include speaker notes for your slides.
4
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 4 10/21/2015 Overview 1. Logistics 2. Students Present 3. Finishing Crime 4. Privacy 5. Assignment
5
CS 3043 Social Implications Of Computing 5 9/15/08 BMES Code of Ethics vs. ACM & IEEE Code of Ethics Sahil Bhagat ACM & IEEEBMES Very thorough & detailed □ Short and broad Tailored for IT people □ Very general Specifically talk about: □ More focus on public and patients Treatment of physically disabled Volunteering Professional skills Coercing others to do something Encouraging and assisting colleagues
6
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 6 09/14/08 Sysadmin Holds SF Network Hostage Graham Pentheny San Francisco FiberWAN system Government Emails Payroll Police Documents Locked out other sysadmins Recorded their conversations about him Feared to have remote control over system via phone, etc... Total D.O.S. Estimated at $500,000 Really? Lots of skepticism on actual damage done. Remember, everything is still working.
7
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 7 10/21/2015 Overview 1. Logistics 2. Students Present 3. Finishing Crime 4. Privacy 5. Assignment
8
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 8 10/21/2015 Crime Stop Technical Protect Data Protect Machine Protect Access Non-technical? Social? Legal?
9
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 9 10/21/2015 Overview 1. Logistics 2. Students Present 3. Finishing Crime 4. Privacy 5. Assignment
10
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 10 10/21/2015 A Privacy Quote “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” -- Fourth Amendment to the US Constitution
11
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 11 10/21/2015 Privacy Why do people want it? Keep private from whom? Is there any benefit in not having this stuff private? Who wants to know?
12
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 12 10/21/2015 Privacy Lots of things people would like to keep secret. Lots of people and organizations who would like to find out. Lots of things that could be done with the information. Correlations can be important. Beyond secrecy.
13
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 13 10/21/2015 Privacy Expectations of privacy are: Cultural Philosophical Political Personal Who has the right to know?
14
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 14 10/21/2015 Government What kinds of info should a government legitimately have about its citizens or others? What kinds of info should a government not have? What good things (for society) could a government do with info? What bad things could a government do?
15
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 15 10/21/2015 What Safeguards Are There? In US: Census Taxes Federal Local Search warrants Wiretaps Inter-agency sharing
16
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 16 10/21/2015 Other Factors Police: outstanding warrants Combos: child support /driver’s license Immigration Public health Security of Information
17
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 17 10/21/2015 Other Factors II Surveillance Freedom of association Anonymity? Newsgroups, email, snail mail, posters & flyers, ads. Criminal background Sexual harassment Discrimination Gun registration
18
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 18 10/21/2015 Companies What kinds of info should a company legitimately have about its customers, employees, or others? What kinds of info should a company not have? What good things (for society) could a company do with info? What bad things could a company do?
19
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 19 10/21/2015 Safeguards Privacy policies Special for children Sharing within / between companies Right to correct / comment Privacy in the workplace Surveillance of employees & customers
20
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 20 10/21/2015 Other Business Things Bankruptcy Fraud
21
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 21 10/21/2015 Technology Overall computer security Encryption
22
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 22 10/21/2015 Overview 1. Logistics 2. Students Present 3. Finishing Crime 4. Privacy 5. Assignment
23
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 23 10/21/2015 Assignment Read second half of Chapter 2. Self Search Answer short individual questions assigned during class.
24
CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 24 10/21/2015 Assignment - Self Search Post ways one can search for information, 1 post per way. There will be a special thread for this. Do not repeat an entry made. Use all the search methods listed on yourself and post each result in your own thread (Name the thread with your First and Last name) and which method was used. Provide a description if you’d rather not post the details. For each source of data posted on your thread answer: Exactly how did the data get there? Can any of this data be used to cause harm? Can any of this data be used for profit? Will you profit? Did you authorized use of the data? If not, request its use be discontinued and post the correspondence. Maybe you’d rather share in the profit, if any. Post that kind correspondence as well. Cite where Chapter 2 describes your experiences. Dig deeper than a search engine’s (Google, etc.) results. This assignment requires you revisit the Discussion Forum frequently
25
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 25 Class 5 The End Keith A. Pray Instructor socialimps.keithpray.net
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.