Presentation is loading. Please wait.

Presentation is loading. Please wait.

CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.

Similar presentations


Presentation on theme: "CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net."— Presentation transcript:

1 CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net

2 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 2 10/21/2015 Overview 1. Logistics 2. Students Present 3. Finishing Crime 4. Privacy 5. Assignment

3 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 3 10/21/2015 Logistics Put your name on each slide.  This is the last time I will accept slides without. Remember to include speaker notes for your slides.

4 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 4 10/21/2015 Overview 1. Logistics 2. Students Present 3. Finishing Crime 4. Privacy 5. Assignment

5 CS 3043 Social Implications Of Computing 5 9/15/08 BMES Code of Ethics vs. ACM & IEEE Code of Ethics Sahil Bhagat ACM & IEEEBMES  Very thorough & detailed □ Short and broad  Tailored for IT people □ Very general  Specifically talk about: □ More focus on public and patients Treatment of physically disabled Volunteering Professional skills Coercing others to do something Encouraging and assisting colleagues

6 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 6 09/14/08 Sysadmin Holds SF Network Hostage Graham Pentheny San Francisco FiberWAN system  Government Emails  Payroll  Police Documents Locked out other sysadmins  Recorded their conversations about him  Feared to have remote control over system via phone, etc... Total D.O.S. Estimated at $500,000  Really?  Lots of skepticism on actual damage done. Remember, everything is still working.

7 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 7 10/21/2015 Overview 1. Logistics 2. Students Present 3. Finishing Crime 4. Privacy 5. Assignment

8 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 8 10/21/2015 Crime Stop Technical  Protect Data  Protect Machine  Protect Access Non-technical?  Social?  Legal?

9 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 9 10/21/2015 Overview 1. Logistics 2. Students Present 3. Finishing Crime 4. Privacy 5. Assignment

10 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 10 10/21/2015 A Privacy Quote “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”  -- Fourth Amendment to the US Constitution

11 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 11 10/21/2015 Privacy Why do people want it? Keep private from whom? Is there any benefit in not having this stuff private? Who wants to know?

12 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 12 10/21/2015 Privacy Lots of things people would like to keep secret. Lots of people and organizations who would like to find out. Lots of things that could be done with the information. Correlations can be important.  Beyond secrecy.

13 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 13 10/21/2015 Privacy Expectations of privacy are:  Cultural  Philosophical  Political  Personal Who has the right to know?

14 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 14 10/21/2015 Government What kinds of info should a government legitimately have about its citizens or others? What kinds of info should a government not have? What good things (for society) could a government do with info? What bad things could a government do?

15 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 15 10/21/2015 What Safeguards Are There? In US:  Census  Taxes Federal Local  Search warrants  Wiretaps  Inter-agency sharing

16 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 16 10/21/2015 Other Factors Police: outstanding warrants Combos: child support /driver’s license Immigration Public health Security of Information

17 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 17 10/21/2015 Other Factors II Surveillance Freedom of association Anonymity? Newsgroups, email, snail mail, posters & flyers, ads. Criminal background Sexual harassment Discrimination Gun registration

18 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 18 10/21/2015 Companies What kinds of info should a company legitimately have about its customers, employees, or others? What kinds of info should a company not have? What good things (for society) could a company do with info? What bad things could a company do?

19 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 19 10/21/2015 Safeguards Privacy policies  Special for children Sharing within / between companies Right to correct / comment Privacy in the workplace Surveillance of employees & customers

20 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 20 10/21/2015 Other Business Things Bankruptcy Fraud

21 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 21 10/21/2015 Technology Overall computer security Encryption

22 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 22 10/21/2015 Overview 1. Logistics 2. Students Present 3. Finishing Crime 4. Privacy 5. Assignment

23 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 23 10/21/2015 Assignment Read second half of Chapter 2. Self Search Answer short individual questions assigned during class.

24 CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 24 10/21/2015 Assignment - Self Search Post ways one can search for information, 1 post per way. There will be a special thread for this. Do not repeat an entry made. Use all the search methods listed on yourself and post each result in your own thread (Name the thread with your First and Last name) and which method was used. Provide a description if you’d rather not post the details. For each source of data posted on your thread answer:  Exactly how did the data get there?  Can any of this data be used to cause harm?  Can any of this data be used for profit? Will you profit?  Did you authorized use of the data?  If not, request its use be discontinued and post the correspondence.  Maybe you’d rather share in the profit, if any. Post that kind correspondence as well.  Cite where Chapter 2 describes your experiences.  Dig deeper than a search engine’s (Google, etc.) results. This assignment requires you revisit the Discussion Forum frequently

25 CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 25 Class 5 The End Keith A. Pray Instructor socialimps.keithpray.net


Download ppt "CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net."

Similar presentations


Ads by Google