Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Ethics nU!. What is Cyber Ethics?  (click me) 

Similar presentations


Presentation on theme: "Cyber Ethics nU!. What is Cyber Ethics?  (click me) "— Presentation transcript:

1 Cyber Ethics nU!

2 What is Cyber Ethics?  (click me)  nternet.htm (click me) nternet.htm nternet.htm  rime/cyberethics.htm (no click me) rime/cyberethics.htm rime/cyberethics.htm  urces/EthicsCode.pdf My Favorite! urces/EthicsCode.pdf urces/EthicsCode.pdf

3

4

5 What the H is he talking about?  Cyber bullying?  Cyber trespass aka Hacking?  Ripping of MP3s, WMVs, etc?  Cyber safety?  Cyber stalking?

6 NO! But Hell_UVA NO!!!

7 Seriously  Lock up your stuff on the next  Use some common sense  Pay attention to the rest of this talk!  Remember the SBTS story Cyber protection is no JOKE!

8 My Turn: There's One More Talk You Need to Have by Martha Stansell-Gamm Sept. 15, Not long ago my son received his driver's license. In Virginia, this is a big deal-the ceremony takes place at the county court where a black-robed judge, a police officer and a defense attorney all address the drivers about their newly acquired freedom. It is an impressive rite of passage that marks a teenager's assumption of important new powers and responsibilities.  As I watched the ceremony, I was struck by the difference between our approach to teaching kids to drive and teaching them to use computers.

9 Immigrants and Natives  The world is upside down  Wild Wild West  Drivers License

10 Words for the Day  Hegemony  Public Domain  Perpetuity

11 Hegemony Leadership, predominance, preponderance; esp. the leadership or predominant authority of one state of a confederacy or union over the others: originally used in reference to the states of ancient Greece, whence transferred to the German states, and in other modern applications. -OED - the domination of one state over its allies or… Natives Immigrants Natives

12 “I like words – I lick them.” James Cavanaugh

13 Cyber Ethics nU!

14 nU! Information

15 Wikipedia Information ethics it is the field that investigates the ethical issues arising from the development and application of information technologies.

16 more Wikipedia Human-computer interaction is a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them.

17 What does this have to do with ME!

18 (By posting) Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to (company name) an irrevocable, perpetual, non- exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, perform, display, reformat, translate, excerpt (in whole or in part) and distribute such information and content and to prepare derivative works of, or incorporate into other works, such information and content, and to grant and authorize sublicenses of the foregoing. (By posting) Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to (company name) an irrevocable, perpetual, non- exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, perform, display, reformat, translate, excerpt (in whole or in part) and distribute such information and content and to prepare derivative works of, or incorporate into other works, such information and content, and to grant and authorize sublicenses of the foregoing.

19 STUDENT RESPONSIBILITIES AND RIGHTS Students may also be disciplined for acts committed away from school property and outside school hours if the conduct is detrimental to the interest of the school or adversely affects school discipline or if the conduct results in a criminal charge or conviction. Regulation P, Page 12

20 High Tech - Back in the day!

21 Phrase for the Day Expectation of Privacy…

22  Who Owns the Internet  What is the Internet?  DARPA  Ma Bell  Circuit v Packet Technology

23 Timeline of catch up!  The Electronic Communications Privacy Act of 2000  The Electronic Communications Privacy Act of 1986  Wire Fraud Act 1952  Communications Act of 1934  Mail Fraud Act of 1872

24 Some not so obscure cases  Smyth v. Pillsbury,  US v. Councilman, 2007 en.wikipedia.org/wiki/United_States_ v._Councilman en.wikipedia.org/wiki/United_States_ v._Councilman en.wikipedia.org/wiki/United_States_ v._Councilman  Katz v. United States, 1967 en.wikipedia.org/wiki/Katz_v._United _States en.wikipedia.org/wiki/Katz_v._United _States en.wikipedia.org/wiki/Katz_v._United _States

25

26 Packets in action  What is a packet and why should I care?

27 Ping  Packet Internet Groper. Send an Internet control message protocol (ICMP) echo request and waiting for a response. (Also called packet internet gopher). [ rwasher]$ ping PING ( ) 56(84) bytes of data. 64 bytes from : icmp_seq=0 ttl=241 time=298 ms 64 bytes from : icmp_seq=1 ttl=241 time=293 ms 64 bytes from : icmp_seq=2 ttl=241 time=285 ms 64 bytes from : icmp_seq=3 ttl=241 time=302 ms --- ping statistics packets transmitted, 4 received, 0% packet loss, time 4993ms rtt min/avg/max/mdev = / / /6.347 ms, pipe 2

28 Traceroute [ rwasher]$ traceroute traceroute: Warning: has multiple addresses; using traceroute to ( ), 30 hops max, 38 byte packets ( ) ms ms ms ( ) ms ms ms ( ) ms ms ms 4 sl-gw21-rly-3-0.sprintlink.net ( ) ms ms ms 5 sl-bb21-rly-3-0.sprintlink.net ( ) ms ms ms 6 sl-bb25-rly-11-0.sprintlink.net ( ) ms ms ms 7 sl-bb23-sj-9-0.sprintlink.net ( ) ms ms ms 8 sl-bb24-sj-14-0.sprintlink.net ( ) ms ms ms 9 sl-bb20-ana-1-0.sprintlink.net ( ) ms ms ms ( ) ms ms ms 11 sl-st20-la-13-0.sprintlink.net ( ) ms ms ms 12 sl-internap-95-0.sprintlink.net ( ) ms ms ms 13 border20.po2-bbnet2.lax.pnap.net ( ) ms ms ms 14 myspace-2.border20.lax.pnap.net ( ) ms ms ms

29 Some times it helps to have ADD  Info Ethics - …the ethical issues arising from the development …  HCI - …the study of major phenomena surrounding them…  Natives and FOBs

30 Who’s blog is it? irrevocable, perpetual, non- exclusive, transferable, fully paid, worldwide license … Who’s information is it?

31 Check out:     primer.htm primer.htm primer.htm

32 In the News The publication noted in a February 3, 2006 editorial that, "reporter Matt Donegan was fired this week for writing off-color and racially insensitive comments on his personal blog. He was off work at the time."

33 Right or Wrong? Other bloggers and defenders of free speech jumped to defend him. The American Civil Libertiesdeclined to do so because of Delaware's right-to-fire law.  Mr. Donegan worked for Mr. Flood (Editor), and part of his employment agreement is being an acceptable public representative of the Dover Post Co. Mr. Donegan violated that work agreement.

34 Paul Forbes from All Things Considered January 20, 2006 You know those classic words spoken by countless vice principals, I hope you know that this will go down on your permanent record, well our records, all of them are permanent now. Besides, it's just so easy and efficient to keep track of everyone using big databases. Databases want to be merged. They cry out to be mined and turned into money or knowledge.


Download ppt "Cyber Ethics nU!. What is Cyber Ethics?  (click me) "

Similar presentations


Ads by Google