By: Amanda Stephenson. RFID RFID – Radio Frequency Identification tags Hold 128 characters Normally placed in livestock and pets for identification Chips.

Slides:



Advertisements
Similar presentations
Driverless Cars By: Chris Broom. Summary The dream of a car that can drive itself has grown over the last decade as the necessary technologies have gradually.
Advertisements

Professional Ethics Social Implications of Computers.
ICT Ethics 2 ICT 139.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
A Dip in Silicon Valley April 20 th, 2001 R.J. Brown April 20, 2011 CSCE 390
JUSTIN MINGLEDORFF CSCE390 APRIL 11, 2012 CONSUMER TECH AND ELECTRONIC WARFARE.
Vote Hacking Kenny Denmark - October For an upcoming election, Washington D.C. was preparing a system to allow some voters to send in their ballots.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
Article: The Cyberweapon that could take down the Internet By Jacob Aron February 11, 2011 Presentation by Jacob Russell CSCE390 April 18 th, 2011.
U.S. federal judge rejects $125 million legal settlement between Google and groups representing authors and publishers. The settlement would have given.
Computational Thinking William C. Ridgeway 4/17/2011 CSCE 390 Professional Issues in Computer Science and Engineering.
China’s attempt to tighten communication Byron Alleman CSCE390 – Computer Ethics April 2011.
“Female Teachers Transfer Fear of Math” Quentin McCall April 21, 2011 CSCE
Internet probe can track you down to within 690 meters.
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
“Real ID, Real Debate” Alice Lipowicz May 25, 2007 Colin Griffin Article Analysis:
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.6: The.
How Egypt Shutdown the Internet Drew Steptoe April 18th, 2011 CSCE 390 Professor Valtorta References: - JAMES GLANZ. “Egypt Leaders Found ‘Off’ Switch.
1 Software Testing and Quality Assurance Lecture 35 – SWE 205 Course Objective: Basics of Programming Languages & Software Construction Techniques.
Schermerhorn - Chapter 62 Ethics –code of moral principles –sets standards of good & bad and right & wrong Ethical behavior –what is accepted as “good”
10/23/06 Bell Work Reading/Writing What are RFIDsWhat are RFIDs Mathematics If a RFID receivers can read tags every second. How many tags can you.
RFID passports How does is work? Step by step By: Einav Mimram.
MICROCHIP IMPLANT NEGATIVE SIDES OF RADIO FREQUENCY IDENTIFICATION CHIPS.
What is Ethics? Ethics is concerned with: n The values and guidelines by which we live, and how they are justified n Standards of right and wrong n Identification.
Conjoined Twins Alyssa Priem, Alyson Robertson, Ashley Stewart, Lauren Highum.
4-H/FFA Livestock Projects What is their purpose?
Radio Frequency Identification (RFID) Be Safe Security Solutions.
Professional Ethics in Computing Dr. David Sinclair L253
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
 A -  B -  C -  D - Yes No Not sure.  A -  B -  C -  D - Yes No Not sure.
Autonomous Cars Use laser, radar, lidar, GPS, cameras and other sensors to drive autonomously (1) Significant, but diminishing legal hurdles (2) Major.
Schermerhorn - Chapter 41 Chapter 4 Ethical Behavior and Social Responsibility 4 Planning Ahead –What is ethical behavior? –How do ethical dilemmas complicate.
Teigh Berg ACM tech news: 12/30/11 Source: Reuters (12/28/11) URL: trains-security-idUSTRE7BR0C
Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.
Ethics.
NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved.
Ethics Wednesday, 10th Week. Technology  Technology is not an immutable force – people make decisions about what technologies and products to develop.
Professional Ethics & Codes of Conduct Lecture 3.
Vitor Giesteira, 9E. The Nine Elements of Digital Citizenship 1. Access 2. Communication 3. Literacy 4. Security and Safety 5. Etiquette 6. Rights and.
CSE 1111 Week 3 Ethical Relativism Basically asserts that there are no standards or rules of behavior that can reasonably be applied at all times and in.
Radio Frequency Identification (RFID)
Don’t let them catch your computer!!!!!
1 Computational Medicine An Ethical View Maliek Mcknight CSCE 390 April 23, 2010.
System Monitoring of Federal Agents Stephen Cevallos.
BRITISH PROPOSAL TO EXPAND DIGITAL SURVEILLANCE CSCE390 Computer Ethics Presentation.
Radio Frequency Tags Chandler Allen. The use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
C.C.C.P Caribbean Coaching Certification Program.
Guardians and Warriors: HR’s Role in Company Culture.
CSCI 392 Review of Computing and Society
Solutions of Case Study 4 & 6
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Describe direct data entry and associated devices, e. g
1st week – slides 1-4.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
The Ethics of Implementing Watson-like Algorithms in Neonatal Care
یا حقّ.
? ? ? ? ? 1. What is my problem? 1. What is my problem?
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Ubiquitous Computing Go to the O drive, ICT, BTEC, BTEC 2013, Unit 1, LA A, Ubiquitous Computing.
CHAPTER 3: ETHICS AND CORPORATE SOCIAL RESPONSIBILITY
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CS-480b Network Security Dick Steflik
Presentation transcript:

By: Amanda Stephenson

RFID RFID – Radio Frequency Identification tags Hold 128 characters Normally placed in livestock and pets for identification Chips can now spread viruses

Ethical Decision Making Process 1. The problem is that these RFID chips can potentially have viruses on them 2. People and the programmers who use and make the chips would like to make sure they’re safe. 3. a. Get rid of RFID chips. (Extreme) b. Kill the livestock and pets who have the chips. (Extreme) c. Make sure all chips don’t have viruses before use. (Best) 4. Yes this solution could be used by everyone. It treats peoples as means instead of means.

Ethical Decision Making Process 5. This solution is not really in accord with what is natural because you’re still inserting animals with chips. This solution is fair and not excessive on either end of the spectrum. 6. Yes there’d be majority agreement that it’s the most efficient and it’d produce the greatest good for the greatest number of people. 7. Yes I feel strongly about the solution to take precautions with these chips. 8. The Pragmatist philosophy was the most influential in this solution.

ACM Code By applying the ACM code the RFID chips should not harm others. With the RFID chips having computer viruses they could possibly harm the pets and livestock. Also by making sure that the chips don’t have viruses before use, members are striving to achieve the highest quality, effectiveness and dignity in both the process and products of professional work.