Presentation is loading. Please wait.

Presentation is loading. Please wait.

Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials.

Similar presentations


Presentation on theme: "Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials."— Presentation transcript:

1 Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

2 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.2 Outline Personal Safety Personal Safety –AUP, Password, Virus, Fraud, Threat –Software Piracy –Hoaxes, Legends What is Computer Ethics? What is Computer Ethics? Many-to-Many, Anonymity, reproducibility Many-to-Many, Anonymity, reproducibility Ethical Significance Ethical Significance Legal and Social Implications Legal and Social Implications Final Exam Tips, Statistics Final Exam Tips, Statistics

3 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.3 Personal Safety Understand the importance of Acceptable Use Policies (AUP), passwords and vigilance online. Understand the importance of Acceptable Use Policies (AUP), passwords and vigilance online. Know what kind of online activities violate copyright, software piracy laws. Know what kind of online activities violate copyright, software piracy laws. Learn how to protect your personal privacy. Learn how to protect your personal privacy. Discuss how to separate fact and fiction when you see warnings and advice on the Net. Discuss how to separate fact and fiction when you see warnings and advice on the Net.

4 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.4 Acceptable Use Policies (AUP) AUP is a policy that shows the appropriate us of the Internet. AUP is a policy that shows the appropriate us of the Internet. Your Internet Access privileges will be cancelled if you violate the rules. Your Internet Access privileges will be cancelled if you violate the rules. –Illegal use, Harassment –SPAM, E-mail/News Bombing –E-mail/News Forging, impersonation –Copyright, trademark infringement –Network disruptions, unfriendly activity –Distribution of viruses, Inappropriate use of software (e.g. continuous pinging, … )

5 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.5 AUP Example – i-cable

6 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.6 Password Security Someone will break into your university or ISP account, then acquire the system administrator ’ s privileges to destroy the whole system. Someone will break into your university or ISP account, then acquire the system administrator ’ s privileges to destroy the whole system. A safe password always contains: A safe password always contains: –At least six characters (8 preferable) –Both lowercase and uppercase letters –At least one numerical character –At least one “ !#$%^&* …”

7 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.7 Password Tips Never tell anyone your password. Ever, even the system administrator. Never tell anyone your password. Ever, even the system administrator. Don ’ t write down your password where someone else can find it. Don ’ t write down your password where someone else can find it. Change your password about 1 or 2 months. Change your password about 1 or 2 months. Don ’ t use the same password in many different places. Don ’ t use the same password in many different places.

8 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.8 Viruses, Trojans, Worms A virus is an executable program that sticks to another host program. This virus can replicate itself via files and propagate via shared floppies or disks. A virus is an executable program that sticks to another host program. This virus can replicate itself via files and propagate via shared floppies or disks. A Trojan Horse is an executable program that slips into a system under the guise of other program. Deception is a key characteristic of all Trojan horses. A Trojan Horse is an executable program that slips into a system under the guise of other program. Deception is a key characteristic of all Trojan horses. A worm is very similar to a virus, but virus propagate via floppies or other media, a worm needs an active network connection. A worm is very similar to a virus, but virus propagate via floppies or other media, a worm needs an active network connection.

9 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.9 Anti-virus tips Use antivirus software and update regularly Use antivirus software and update regularly Keep floppy disk out of the drive, unless it is actively working on Keep floppy disk out of the drive, unless it is actively working on Disable the Java/JavaScript in the browser Disable the Java/JavaScript in the browser –prevent the attack from malicious applets or scripts Encrypt all files that contain sensitive information, store them on disk or other removable media (e.g. ZIP, Tape drive) Encrypt all files that contain sensitive information, store them on disk or other removable media (e.g. ZIP, Tape drive) Don ’ t connect your computer to the Internet longer than necessary Don ’ t connect your computer to the Internet longer than necessary

10 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.10 E-mail Viruses Macros Viruses Macros Viruses –Melissa Virus –Avoiding Macros by using RTF Script Attacks Script Attacks –In 2000, two e-mail attachment attacks Outlook and Outlook Express users – The LoveLetter, NewLove viruses

11 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.11 Shopping Online Offer lots of benefits that you cannot find shopping in a store. Offer lots of benefits that you cannot find shopping in a store. –The shop is always open, 24/7 –Numerous bargains online –Return policies Online shopping does pose some risks, but you can take precautions to protect yourself against them. Online shopping does pose some risks, but you can take precautions to protect yourself against them.

12 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.12 Shopping Online Tips Use credit cards, but not checks, money orders, debit cards. Use credit cards, but not checks, money orders, debit cards. Examine the URL starts with “ https:// ”. Examine the URL starts with “ https:// ”. https:// Check for a locked padlock or unbroken key icon before entering any credit card information. Check for a locked padlock or unbroken key icon before entering any credit card information. Don ’ t use same password in all your e- commerce accounts. Don ’ t use same password in all your e- commerce accounts. Save a copy of all purchase orders and the confirmation numbers of the records. Save a copy of all purchase orders and the confirmation numbers of the records.

13 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.13 Protect Your Privacy Invasion of privacy Invasion of privacy –Imagine a man following you all day, taking notes, jotting down how much time you spend on the phone and to whom you talk, recording which stores you visit and which items you purchase, then he sells these information to anyone wants it. –It can happen if the web page is programmed to collect information. When you visit the page, which link you click, how long you spend on the web page, etc … When you visit the page, which link you click, how long you spend on the web page, etc …

14 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.14 Protect Your Privacy What kind of information can be collected? Try this What kind of information can be collected? Try thisTry thisTry this

15 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.15 Internet SCAMs A trick or a deception deliberately practiced to get unlawful gain. A trick or a deception deliberately practiced to get unlawful gain. –Loss money National Fraud Information Center National Fraud Information Center National Fraud Information Center National Fraud Information Center –Help consumers distinguish between legitimate and fraudulent promotions in the Internet –Report the suspected fraud on the Net.

16 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.16 National Fraud Information Center

17 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.17 Libel and Lawsuits Libel is any written or pictorial statement that damages a person or organization. Libel is any written or pictorial statement that damages a person or organization. A person who disseminates information that is deemed harmful to a company can be target of a lawsuit even that information is accurate. A person who disseminates information that is deemed harmful to a company can be target of a lawsuit even that information is accurate. All digital information can be reproduced and distributed easily on the Net. All digital information can be reproduced and distributed easily on the Net. –You can ’ t be sure that your private email remains private – think twice before send out.

18 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.18 Defamation case study: Yahoo! In the summer of 2000, the union of Jewish students and the International League Against Racism and Anti- Semitism filed a suit against Yahoo! In the French courts: Buy and Sell Nazi memorabilia on its auction sites. In the summer of 2000, the union of Jewish students and the International League Against Racism and Anti- Semitism filed a suit against Yahoo! In the French courts: Buy and Sell Nazi memorabilia on its auction sites. –The sale of such items is not illegal in the US, but not in EU states.

19 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.19 Threats In April 1999, they killed 12 fellow students and Teacher. There is no evidence that they intended to carry out their threats in the chat Room.

20 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.20 Information War & Digital Crime In 1989, Kevin Mitnick, who was convicted of stealing software from Digital Equipment Corp. (DEC). In 1989, Kevin Mitnick, who was convicted of stealing software from Digital Equipment Corp. (DEC). Information warfare may take the form of propaganda, espionage (commercial or political), or even target n websites Information warfare may take the form of propaganda, espionage (commercial or political), or even target n websites –such as DDoS, happened with Yahoo! And Amazon in 2000 Digital crime is often associated with viruses. (still remember Robert Morris (Worm)? Digital crime is often associated with viruses. (still remember Robert Morris (Worm)?

21 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.21 Surveillance? “ Computerization has a tremendous potential for destructive invasion of privacy …” – Marry Williams. “ Computerization has a tremendous potential for destructive invasion of privacy …” – Marry Williams. –Most people using any form of communication will assume that anything they transmit will remain confidential. –Phone taps may be established to locate criminals. –What will happen in the Internet?

22 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.22 Harassment Another potential problem for Internet Users. Another potential problem for Internet Users. Offensive materials on the Web should not bring to workplace. Offensive materials on the Web should not bring to workplace. An employee who receives an email that contains religiously, or sexually, or racially offensive jokes, should not forwards this email to the coworkers. An employee who receives an email that contains religiously, or sexually, or racially offensive jokes, should not forwards this email to the coworkers.

23 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.23 Software Piracy Piracy – Not Privacy! Piracy – Not Privacy! Public Domain – no copyright, can be freely copied, distributed. Public Domain – no copyright, can be freely copied, distributed. Freeware – has copyright, can be copied and distributed without payment, but donation may be needed. Freeware – has copyright, can be copied and distributed without payment, but donation may be needed. Shareware – copyrighted, can be distributed without payment, but payment is expected in use. Shareware – copyrighted, can be distributed without payment, but payment is expected in use. Licensed software – copyrighted, payment is prior to use. Licensed software – copyrighted, payment is prior to use. If the software costs money, but you are using it in violation of the user agreement  stolen the software If the software costs money, but you are using it in violation of the user agreement  stolen the software Criminal and civil law violation. Criminal and civil law violation.

24 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.24 Copyright Infringements Duplication or distribution of commercial software. Duplication or distribution of commercial software. Unauthorized use of people ’ s invention Unauthorized use of people ’ s invention Owner has the right to exclude people from using, making, selling, importing his products/software. Owner has the right to exclude people from using, making, selling, importing his products/software.

25 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.25 Hoaxes and Legends Don ’ t be Na ï ve Don ’ t be Na ï ve –You cannot believe everything you read, especially on the Internet. Internet is very effective to propagate misinformation that alarm people and generate panic. Internet is very effective to propagate misinformation that alarm people and generate panic. You can visit “ Urban Legends ” if you are not sure something on the Net is right or not. You can visit “ Urban Legends ” if you are not sure something on the Net is right or not. Urban Legends Urban Legends

26 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.26 10 worst Hoaxes - CNN CNN 10. Let the Good Times Roll 10. Let the Good Times Roll 9. Help a Sick Child 9. Help a Sick Child 8. Bill Gates Reaches Out to You 8. Bill Gates Reaches Out to You 7. Dial 809 for Trouble 7. Dial 809 for Trouble 6. Money Nonsense in Nigeria 6. Money Nonsense in Nigeria 5. Save Big Bird 5. Save Big Bird 4. The $250 Cookie Recipe 4. The $250 Cookie Recipe 3. Deodorant Endangers Your Health? 3. Deodorant Endangers Your Health? 2. Last Photo From the World Trade Center Deck? 2. Last Photo From the World Trade Center Deck? 1. Next Time, Just Say "I Don't Know" 1. Next Time, Just Say "I Don't Know"

27 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.27 Internet Ethics The Robert Morris Case The Robert Morris Case –Release the “ worm ” in 1988. –The whole network was clogged with the worm. –3 years ’ probation, fined $10,000, 400 hours of community service. –Someone said that the worm has alerted the vulnerability of the systems. –Different opinions said he should/shouldn ’ t go to jail. –What is your opinion?

28 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.28 Case 2: The Melissa Virus In 1999, David Smith created the Melissa virus. In 1999, David Smith created the Melissa virus. Post on the newsgroup “ Alt.Sex ” and said the attachment contained a list of pass codes of Pornographic website. Post on the newsgroup “ Alt.Sex ” and said the attachment contained a list of pass codes of Pornographic website. Infected million of computers and caused over $80 million damages. Infected million of computers and caused over $80 million damages. What is your opinion for his act? What is your opinion for his act?

29 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.29 Case 3: Credit Card Extortion A 19-year-old Russian involved in the illegal use of credit cards in 1997. A 19-year-old Russian involved in the illegal use of credit cards in 1997. Steal 300,000 credit card numbers from an online music store. Steal 300,000 credit card numbers from an online music store. Extort $100,000 for the stolen information. Extort $100,000 for the stolen information. Several thousand visitors had downloaded over 25,000 credit card numbers. Several thousand visitors had downloaded over 25,000 credit card numbers. What is your opinion for this act? What is your opinion for this act?

30 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.30 Three morally significant When compared to face-to-face communication, Internet provides When compared to face-to-face communication, Internet provides –Global, Many-to-Many communication Interactive comm. with speed and ease. Interactive comm. with speed and ease. –Facilitates anonymity No one knows your name, how you feel … No one knows your name, how you feel … –Provides reproducibility Electronic information can be easily copied and there is no loss of value in reproduction. Electronic information can be easily copied and there is no loss of value in reproduction.

31 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.31 Ethical Significance Many-to-Many scope Many-to-Many scope –That means the individuals can use very little effort to Disrupt, steal, Disrupt, steal, Cause property damage, snoop, Cause property damage, snoop, Harass, stalk, extort, defame, … Harass, stalk, extort, defame, … –Its enormous benefits brings people together and shorten the geographic space and distance.

32 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.32 Ethical Significance Anonymity Anonymity –Individuals do not have to take risks for being seen as they act and interact. Difficult to catch criminals who act anonymity. Difficult to catch criminals who act anonymity. You don ’ t know the source of the information. You don ’ t know the source of the information. It is difficult to gage the trustworthiness of the information. It is difficult to gage the trustworthiness of the information. –On the other hand, consider the race, gender and physical appearance are removed for an online course Would it be more fair for the teacher to evaluate student ’ s performance? Would it be more fair for the teacher to evaluate student ’ s performance?

33 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.33 Ethical Significance Reproducibility Reproducibility –Privacy and property rights issues arise. –Facilitates the words and documents to be forwarded to infinite number of people or sites. –If you receive a document from someone via the Net, can you be sure the document is sent/written by its claimed sender?

34 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.34 Legal and Social Implications Internet offers great riches, but also pose threats. Internet offers great riches, but also pose threats. Remember the right between legal (created by law) and human rights. Remember the right between legal (created by law) and human rights. Facilitates unmediated many-to-many communication, and access to a diversity of online resources. Facilitates unmediated many-to-many communication, and access to a diversity of online resources. Facilitates the formation of new associations across the geographical limitation. Facilitates the formation of new associations across the geographical limitation.

35 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.35 Cyber-Feminism The relationship of women with technology has often been perceived as a problematic one? The relationship of women with technology has often been perceived as a problematic one? Although most inventors and engineers associated with the computer revolution has been men, women have been also involved with computers since their inception. Although most inventors and engineers associated with the computer revolution has been men, women have been also involved with computers since their inception. Reference: http://www.wise-women.org/ Reference: http://www.wise-women.org/http://www.wise-women.org/ –Many good online tutorials from a group of women.

36 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.36 Cyber-Space: Virtual Reality (VR) Ref: http://sulu.npl.co.uk/netshare/guest/recursive/demo.htmlhttp://sulu.npl.co.uk/netshare/guest/recursive/demo.html

37 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.37 Final Exam Date:TBA Date:TBA Time:TBA Time:TBA Venue:TBA Venue:TBA Coverage: Coverage: –Lecture 1 – 15, –Lab and tutorial exercises, –Newsgroup –Open notes (but not open book!!!)

38 CSC1720 – Introduction to InternetAll copyrights reserved by C.C. Cheung 2003.38 References Yahoo! Yahoo! Yahoo! Duke Duke Duke Safe Shopping Online Tips Safe Shopping Online Tips Safe Shopping Online Tips Safe Shopping Online Tips ScamBuster ScamBuster ScamBuster Online Harassment Online Harassment Online Harassment Online Harassment Computer Ethics Computer Ethics Computer Ethics Computer Ethics Computer Ethics – D. G. Johnson Computer Ethics – D. G. Johnson The End. The End. Thank you for taking CSC1720! Thank you for taking CSC1720!


Download ppt "Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials."

Similar presentations


Ads by Google