Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011

Slides:



Advertisements
Similar presentations
Driverless Cars By: Chris Broom. Summary The dream of a car that can drive itself has grown over the last decade as the necessary technologies have gradually.
Advertisements

Professional Ethics Social Implications of Computers.
Module 16: Professional Ethics
By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
ICT Ethics 2 ICT 139.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
A Dip in Silicon Valley April 20 th, 2001 R.J. Brown April 20, 2011 CSCE 390
Vote Hacking Kenny Denmark - October For an upcoming election, Washington D.C. was preparing a system to allow some voters to send in their ballots.
BY: WILL READE Cyber and Drone Warfare. Overview Cyber attacks & Drones leave the human out of the battlefield Makes waging war “easier” when the technology.
Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:
The Threat of Cyber War The Issue of Cyber Security.
Judge Rejects Google’s Deal to Digitize Books Rhea McCaslin CSCE390 – Spring 2011.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
U.S. federal judge rejects $125 million legal settlement between Google and groups representing authors and publishers. The settlement would have given.
Computational Thinking William C. Ridgeway 4/17/2011 CSCE 390 Professional Issues in Computer Science and Engineering.
Colin Stewart.  Darpa announced it’s new project BOLT, Broad Operational Language Translation.  Given that the US fights a lot of wars in places where.
By: Amanda Stephenson. RFID RFID – Radio Frequency Identification tags Hold 128 characters Normally placed in livestock and pets for identification Chips.
China’s attempt to tighten communication Byron Alleman CSCE390 – Computer Ethics April 2011.
Internet probe can track you down to within 690 meters.
“Scientists Work to Keep Hackers Out of Implanted Medical Devices” Justin Fisher.
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
Business, Accounting and Personal Ethics. Sources Used Trevino, Linda, Gary Weaver, David Gibson, and Barbara Ley Toffler, “Managing Ethics and Legal.
Computer Ethics in Information Technology
The Fight Against Terrorism
Business Ethics BY: Joshua m. Standifer.
An Engineer’s Rights & Responsibilities. What is Professionalism?  Highest standards of honesty and integrity  Competence  Exemplary conduct and commitment.
Objective 5.02 Understand ethics and ethical decision-making.
Professional Ethics in Computing Dr. David Sinclair L253
Chapter 4 Ethics, Law, Business. I. Ethics and Values Why Study Ethics? What is Ethics? Value Systems and Moral Beliefs 6 Influences That Shape Value.
“Building a Smarter Forest” -Joe Otis. Summary Several computer scientists are testing a thesis involving the use of robots in forests in order to help.
MEDICAL ETHICS. What do you think? What qualities do you “expect” a health care professional to have How do you want to be treated?
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr
Engineering Ethics ENGR 300 Dept. of Computer Science and Engineering
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Chapter 21 Practicing and Promoting Ethical Conduct
By Joe Breen.  The self regulation of ethics relies on ways to deter unethical behavior of the members.  The AMC’s first code was enacted in 1972 and.
Autonomous Cars Use laser, radar, lidar, GPS, cameras and other sensors to drive autonomously (1) Significant, but diminishing legal hurdles (2) Major.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 3 Business Ethics, Social Forces, and the Law Twomey Jennings.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
Teigh Berg ACM tech news: 12/30/11 Source: Reuters (12/28/11) URL: trains-security-idUSTRE7BR0C
Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
Ethics in Business Intelligence An Ferris State MISM-740 Student Presentation By: Adam M. Erickson 4/16/2011 What is Ethics? Does IT have to consider ethics.
Ethics.
Ethical Issues in Clinical Psychology
HOSPITALITY & TOURISM 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
Ethics and Privacy. 3.1 Ethical Issues 3.2 Privacy.
1 Computational Medicine An Ethical View Maliek Mcknight CSCE 390 April 23, 2010.
System Monitoring of Federal Agents Stephen Cevallos.
BRITISH PROPOSAL TO EXPAND DIGITAL SURVEILLANCE CSCE390 Computer Ethics Presentation.
Toyota Accelerator Pedal Recall Tyler Knott Alan Sana George Cornwell.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Moral Beliefs Questions
Please use this slide show while you read the Book to understand the issues:  What is Professional Ethics?  Ethical Guidelines for Computer Professionals.
CSCI 392 Review of Computing and Society
UN vs the Internet Summary
Hospitality & Tourism 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
Terrorism Strikes the United States
The Ethics of Implementing Watson-like Algorithms in Neonatal Care
ETHICS Ethics is a set of principles dealing with what is morally right or wrong. provide a standard of conduct representing ideal behavior for a group.
فلوشیپ اخلاق زیست پزشکی استادیار دانشگاه علوم پزشکی ایران
THE IMPORTANCE OF ETHICS IN FUNERAL SERVICE Presented by: Ken Whittaker Whittaker Funeral Support Services.
Computer Ethics: Men & Women
Business Ethics.
WikiLeaks avoids shutdown as supporters go on the offensive
Computer Ethics.
CS-480b Network Security Dick Steflik
Presentation transcript:

Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28,

Summary When a recent security hole in a large Southern California water system was discovered, the government was in panic. If this information got into the hands of terrorists, then many Americans could die in a cyber war. Everything is automated from putting chemicals into water to flying airplanes. Terrorists would be able to hack in to the systems and change the information contaminating the water and crashing the planes. Luckily terrorist groups like Al-Qaeda do not have the resources to conduct a large scale cyber attack, but larger forces like China and Russia do.

Ethical Decision Step 1) The ethical issue is that with a security hole, anyone including terrorist groups can hack into water supplies and airplanes and kill many civilians. Step 2) Companies with security hole - They would like to see these holes fixed. If they get hacked, civilians could die. Civilians - Same as above. Terrorist groups - They would like for everything to stay the way it is. Step 3) A) Fix the holes. B) Keep the holes. I would fix the holes, mainly because I enjoy living. Step 4) I would be willing for everyone to use this solution because if they don't and terrorists do hack the systems, many civilians could die.

Ethical Decision cont. Step 5) This solution is not balanced between both parties, but I believe that this solution is the most ethical one. It hurts the terrorists but they were going to use it for unethical purposes anyways. Step 6) This solution will produce the greatest good for the greatest number of people. Step 7) This solution is the one I feel most committed to. If it saves the life of people, it peeks my interest. Step 8) The philosophy that helped me with this decision is idealism because the "goodness is found in the ideal."

Applying the ACM Code This solution follows the ACM code because: It contributes to society and human well being It avoids harm to others It honors property rights It respects the privacy of others It honors confidentiality It does not break any laws It maintains professional competence