Presentation on theme: "Cyber Ethics nU!. What is Cyber Ethics? (click me) "— Presentation transcript:
Cyber Ethics nU!
What is Cyber Ethics? www.cyberethics.info (click me) www.cyberethics.info www.cyberethics.info http://www.cybercrime.gov/rules/kidi nternet.htm (click me) http://www.cybercrime.gov/rules/kidi nternet.htm http://www.cybercrime.gov/rules/kidi nternet.htm http://www.usdoj.gov/criminal/cyberc rime/cyberethics.htm (no click me) http://www.usdoj.gov/criminal/cyberc rime/cyberethics.htm http://www.usdoj.gov/criminal/cyberc rime/cyberethics.htm http://www.playitcybersafe.com/reso urces/EthicsCode.pdf My Favorite! http://www.playitcybersafe.com/reso urces/EthicsCode.pdf http://www.playitcybersafe.com/reso urces/EthicsCode.pdf
What the H is he talking about? Cyber bullying? Cyber trespass aka Hacking? Ripping of MP3s, WMVs, etc? Cyber safety? Cyber stalking?
NO! But Hell_UVA NO!!!
Seriously Lock up your stuff on the next Use some common sense Pay attention to the rest of this talk! Remember the SBTS story Cyber protection is no JOKE!
My Turn: There's One More Talk You Need to Have by Martha Stansell-Gamm Sept. 15, 2003 - Not long ago my son received his driver's license. In Virginia, this is a big deal-the ceremony takes place at the county court where a black-robed judge, a police officer and a defense attorney all address the drivers about their newly acquired freedom. It is an impressive rite of passage that marks a teenager's assumption of important new powers and responsibilities. As I watched the ceremony, I was struck by the difference between our approach to teaching kids to drive and teaching them to use computers. www.cybercrime.gov/onemoretalk.htm
Immigrants and Natives The world is upside down Wild Wild West Drivers License
Words for the Day Hegemony Public Domain Perpetuity
Hegemony Leadership, predominance, preponderance; esp. the leadership or predominant authority of one state of a confederacy or union over the others: originally used in reference to the states of ancient Greece, whence transferred to the German states, and in other modern applications. -OED - the domination of one state over its allies or… Natives Immigrants Natives
“I like words – I lick them.” James Cavanaugh
Cyber Ethics nU!
Wikipedia Information ethics it is the field that investigates the ethical issues arising from the development and application of information technologies.
more Wikipedia Human-computer interaction is a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them.
What does this have to do with ME!
(By posting) Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to (company name) an irrevocable, perpetual, non- exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, perform, display, reformat, translate, excerpt (in whole or in part) and distribute such information and content and to prepare derivative works of, or incorporate into other works, such information and content, and to grant and authorize sublicenses of the foregoing. (By posting) Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to (company name) an irrevocable, perpetual, non- exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, perform, display, reformat, translate, excerpt (in whole or in part) and distribute such information and content and to prepare derivative works of, or incorporate into other works, such information and content, and to grant and authorize sublicenses of the foregoing.
STUDENT RESPONSIBILITIES AND RIGHTS Students may also be disciplined for acts committed away from school property and outside school hours if the conduct is detrimental to the interest of the school or adversely affects school discipline or if the conduct results in a criminal charge or conviction. Regulation 2601.19P, Page 12
High Tech - Back in the day!
Phrase for the Day Expectation of Privacy…
Who Owns the Internet What is the Internet? DARPA Ma Bell Circuit v Packet Technology
Timeline of catch up! The Electronic Communications Privacy Act of 2000 The Electronic Communications Privacy Act of 1986 Wire Fraud Act 1952 Communications Act of 1934 Mail Fraud Act of 1872
Some not so obscure cases Smyth v. Pillsbury, 1996 www.loundy.com/CASES/Smyth_v_Pillsbury.html www.loundy.com/CASES/Smyth_v_Pillsbury.html US v. Councilman, 2007 en.wikipedia.org/wiki/United_States_ v._Councilman en.wikipedia.org/wiki/United_States_ v._Councilman en.wikipedia.org/wiki/United_States_ v._Councilman Katz v. United States, 1967 en.wikipedia.org/wiki/Katz_v._United _States en.wikipedia.org/wiki/Katz_v._United _States en.wikipedia.org/wiki/Katz_v._United _States
Packets in action What is a packet and why should I care?
Ping Packet Internet Groper. Send an Internet control message protocol (ICMP) echo request and waiting for a response. (Also called packet internet gopher). [ rwasher@hera rwasher]$ ping www.myspace.com PING www.myspace.com (220.127.116.11) 56(84) bytes of data. 64 bytes from 18.104.22.168: icmp_seq=0 ttl=241 time=298 ms 64 bytes from 22.214.171.124: icmp_seq=1 ttl=241 time=293 ms 64 bytes from 126.96.36.199: icmp_seq=2 ttl=241 time=285 ms 64 bytes from 188.8.131.52: icmp_seq=3 ttl=241 time=302 ms --- www.myspace.com ping statistics --- 4 packets transmitted, 4 received, 0% packet loss, time 4993ms rtt min/avg/max/mdev = 285.487/294.917/302.579/6.347 ms, pipe 2
Traceroute [ rwasher@hera rwasher]$ traceroute www.myspace.com traceroute: Warning: www.myspace.com has multiple addresses; using 184.108.40.206 traceroute to www.myspace.com (220.127.116.11), 30 hops max, 38 byte packets 1 18.104.22.168 (22.214.171.124) 0.269 ms 0.210 ms 0.197 ms 2 126.96.36.199 (188.8.131.52) 1.227 ms 1.457 ms 1.319 ms 3 184.108.40.206 (220.127.116.11) 308.078 ms 304.392 ms 307.906 ms 4 sl-gw21-rly-3-0.sprintlink.net (18.104.22.168) 306.495 ms 312.527 ms 307.252 ms 5 sl-bb21-rly-3-0.sprintlink.net (22.214.171.124) 303.499 ms 300.022 ms 301.861 ms 6 sl-bb25-rly-11-0.sprintlink.net (126.96.36.199) 309.106 ms 302.876 ms 299.596 ms 7 sl-bb23-sj-9-0.sprintlink.net (188.8.131.52) 376.901 ms 376.463 ms 371.568 ms 8 sl-bb24-sj-14-0.sprintlink.net (184.108.40.206) 374.818 ms 371.480 ms 360.549 ms 9 sl-bb20-ana-1-0.sprintlink.net (220.127.116.11) 357.047 ms 358.361 ms 371.964 ms 10 18.104.22.168 (22.214.171.124) 374.571 ms 375.520 ms 354.858 ms 11 sl-st20-la-13-0.sprintlink.net (126.96.36.199) 357.972 ms 353.004 ms 346.921 ms 12 sl-internap-95-0.sprintlink.net (188.8.131.52) 342.207 ms 465.527 ms 411.704 ms 13 border20.po2-bbnet2.lax.pnap.net (184.108.40.206) 351.267 ms 355.007 ms 356.818 ms 14 myspace-2.border20.lax.pnap.net (220.127.116.11) 355.923 ms 346.327 ms 348.024 ms
Some times it helps to have ADD Info Ethics - …the ethical issues arising from the development … HCI - …the study of major phenomena surrounding them… Natives and FOBs
Who’s blog is it? irrevocable, perpetual, non- exclusive, transferable, fully paid, worldwide license … Who’s information is it?
In the News The publication noted in a February 3, 2006 editorial that, "reporter Matt Donegan was fired this week for writing off-color and racially insensitive comments on his personal blog. He was off work at the time."
Right or Wrong? Other bloggers and defenders of free speech jumped to defend him. The American Civil Libertiesdeclined to do so because of Delaware's right-to-fire law. Mr. Donegan worked for Mr. Flood (Editor), and part of his employment agreement is being an acceptable public representative of the Dover Post Co. Mr. Donegan violated that work agreement.
Paul Forbes from All Things Considered January 20, 2006 You know those classic words spoken by countless vice principals, I hope you know that this will go down on your permanent record, well our records, all of them are permanent now. Besides, it's just so easy and efficient to keep track of everyone using big databases. Databases want to be merged. They cry out to be mined and turned into money or knowledge.