1 Networking Sevak Asadorian & James Brunelle. 2 Topics Introduction Introduction Email & Spam (how to fight spam) Email & Spam (how to fight spam) The.

Slides:



Advertisements
Similar presentations
Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
Advertisements

Dangers on the Internet
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Networked Communications (Quinn Chapter 3)
Breaking Trust On The Internet
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
William H. Bowers – Ethics for the Information Age Chapter 3 - Networking.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Spam We know that everyone hates spam. So the question is why does it still exist in our society? We know that everyone hates spam. So the question is.
Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3: Networking Ethics for the Information Age Third Edition by Michael.
Chapter 3 Networking. Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Chapter Overview (1/2) Introduction .
The Internet. What is the Internet? A community with about 100 million users Available in almost every country about 160,000 people are added each month.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Chapter 3 Networking. Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Chapter Overview (1/2) Introduction .
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
Responsible Targeting Chapter One. Content from The Essential Guide to Web Strategy for Entrepreneurs unless otherwise noted Chapter One Opt-in.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
THE INTERNET AND WORLD WIDE WEB: Chapter 2 by Silvia Pereira.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Ethics for the Information Age Fourth Edition by Michael J. Quinn Chapter.
Business Law Chapter 13: Business Law in the Internet Era.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
Dr. Omar Al Jadaan The Internet. Internet Service Provider (ISP) Content Providers: create and maintained material that can be accessed using the internet.
Discovering Computers 2010 Chapter 2 The Internet and World Wide Web.
Reliability & Desirability of Data
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Introduction to Internet
The Internet When was it created and why?. What Is the Internet? A network of computer networks. It connects networks all over the world through the use.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
Introduction To Internet
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Chapter 17 E-Commerce and Digital Law
Telecommunications Communication over a long distance; Distant communication.
The Internet The Kingsway School. Drawbacks of the Internet Undesirable Material Security Finding Information Filtering.
Moral, Social and Ethical issues associated with the Internet
Protecting Students on the School Computer Network Enfield High School.
Communication, Networks, The internet and the Worldwide Web.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Internet Architecture and Governance
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
Networking Basics Objectives: 1. Utilize appropriate vocabulary to communicate effectively in a technological society. 6. Describe uses of a networked.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
Topic 6, Lesson 3: The Internet Computer Communications and Networking.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
The Internet What is the Internet? The Internet is a lot of computers over the whole world connected together so that they can share information. It.
Electronic mail News File transfer protocol Chat Instant messaging Online services Online shopping.
A Parent’s Guide to Child Safety on the Internet.
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3: Networking Ethics for the Information Age Forth Edition by NYANZI A.
What is the Internet? © EIT, Author Gay Robertson, 2016.
CHAPTER 5 FREEDOM OF EXPRESSION.
CMPE 101 Introduction to Information Technologies
Objectives To understand the about types of computer network
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
Chapter 13 E-Commerce Contracts
EUT 122 Skills and Technology in Communication
Ethics Tutorial Assignment#1
The Internet and Electronic mail
A Gift of Fire Third edition Sara Baase
Presentation transcript:

1 Networking Sevak Asadorian & James Brunelle

2 Topics Introduction Introduction & Spam (how to fight spam) & Spam (how to fight spam) The World Wide Web The World Wide Web Ethical Perspectives on Pornography Ethical Perspectives on Pornography Censorship Censorship Freedom of Expression Freedom of Expression Children and the Web Children and the Web Internet Addiction Internet Addiction

3 Introduction Computer’s utility increases tremendously when it is connected to a network. Computer’s utility increases tremendously when it is connected to a network. Shared resources Shared resources Storage Storage Printers / Scanners Printers / Scanners Files Files

4 Introduction Internet Internet Connects millions of computers Connects millions of computers Surf the web Surf the web Information Information Products Products Services Services Send to anyone in the world Send to anyone in the world

5 10 Most Common Subject Lines We carry the most popular medications We carry the most popular medications You’ve been sent an Insta-Kiss! You’ve been sent an Insta-Kiss! You have 17 new pictures You have 17 new pictures STEAMY HOT LESBIAN ACTION LIVE ON CAMERA STEAMY HOT LESBIAN ACTION LIVE ON CAMERA All orders are shipped from authorized locations All orders are shipped from authorized locations 2005 Digital Cable Filters 2005 Digital Cable Filters F R E E * 30 second Pre-Qualification MORTGAGE Application F R E E * 30 second Pre-Qualification MORTGAGE Application HURRY HURRY Hot Stock on the RISE HURRY HURRY Hot Stock on the RISE Sale PRICES ARE BEST ONLINE! Sale PRICES ARE BEST ONLINE! Breaking news on the TOP Pick stock Breaking news on the TOP Pick stock Top 10 Spam Subject Lines with the last 24 hours!

6 & Spam Messages embedded in files transferred from on computer to another via a telecommunication system. Messages embedded in files transferred from on computer to another via a telecommunication system. Everyone has an address which is a unique mailbox in cyberspace Everyone has an address which is a unique mailbox in cyberspace address address 1 st part: Individual user name 1 st part: Individual user name 2 nd part: Domain name 2 nd part: Domain name

7 & Spam Billions of s are exchanged daily Billions of s are exchanged daily 2000 – 8% spam 2000 – 8% spam 2003 – 40% spam 2003 – 40% spam Spammers disguise themselves Spammers disguise themselves Change and IP addresses to disguise sending machine Change and IP addresses to disguise sending machine Use an innocent person’s computer as a launch pad for a spam attack Use an innocent person’s computer as a launch pad for a spam attack

8 & Spam How do they get your address? How do they get your address? Opt-In Lists Opt-In Lists Dictionary attacks Dictionary attacks Spammers buy spam-screening software to help themselves in improving their msg. quality. Spammers buy spam-screening software to help themselves in improving their msg. quality.

9 & Spam Spam costs companies $500 - $2000 to hire an Internet marketing firm to send an advertisement to millions Spam costs companies $500 - $2000 to hire an Internet marketing firm to send an advertisement to millions Using USPS to send out the same advertisement: Using USPS to send out the same advertisement: $40,000 – mailing list $40,000 – mailing list $190,000 – bulk-rate postage $190,000 – bulk-rate postage Not including the brochures Not including the brochures ad is 100 times cheaper than traditional flyer sent out in the mail ad is 100 times cheaper than traditional flyer sent out in the mail

10 & Spam Is spamming wrong? Is spamming wrong? Kantian Evaluation……………………………..Yes Kantian Evaluation……………………………..Yes Act Utilitarian Evaluation………………………Yes Act Utilitarian Evaluation………………………Yes Rule Utilitarian Evaluation……………………...Yes Rule Utilitarian Evaluation……………………...Yes Social Contract Theory Evaluation……………...Yes Social Contract Theory Evaluation……………...Yes Conclusion: Sending spam is wrong & immoral. Conclusion: Sending spam is wrong & immoral. address of marketers sending the spam is not correct, and subject lines of the messages are misleading. address of marketers sending the spam is not correct, and subject lines of the messages are misleading.

11 & Spam How should we fight spam? How should we fight spam? Subscribers need to be on a lists to receive ads Subscribers need to be on a lists to receive ads Require labeling of advertising (“ADV”) Require labeling of advertising (“ADV”) Add cost to every that is sent Add cost to every that is sent Ban unsolicited completely Ban unsolicited completely

12 & Spam M.A.P.S. (Mail Abuse Prevention System) M.A.P.S. (Mail Abuse Prevention System) RBL (Realtime Blackhole List) RBL (Realtime Blackhole List) Set of Guidelines (have to comply) Set of Guidelines (have to comply) Company must prove recipient is on their list Company must prove recipient is on their list They must provide subscribers with simple ways to terminate their subscription They must provide subscribers with simple ways to terminate their subscription Must remove invalid addresses in a timely manner Must remove invalid addresses in a timely manner Must take care not to overwhelm individual hosts or LANs Must take care not to overwhelm individual hosts or LANs Must disclose subscribers how their addresses will be used Must disclose subscribers how their addresses will be used

13 & Spam M.A.P.S. – Is It Ethical? M.A.P.S. – Is It Ethical? Social Contract Theory Evaluation – YES Social Contract Theory Evaluation – YES Kantian Evaluation -- NO Kantian Evaluation -- NO

14 The World Wide Web How do we use the web? How do we use the web? Shopping Shopping Business Business Information Information Explore our roots Explore our roots Games Games Virtual Worlds Virtual Worlds Taxes Taxes Gamble Gamble Blog Blog

15 The World Wide Web Internet access is limited in some countries Internet access is limited in some countries Saudi Arabia – no access to pornography, gambling sites, and pages that are deemed to be offensive to Islam Saudi Arabia – no access to pornography, gambling sites, and pages that are deemed to be offensive to Islam Germany – forbids access to any neo-Nazi Websites Germany – forbids access to any neo-Nazi Websites United States – FULL ACCESS United States – FULL ACCESS

16 The World Wide Web Types of Censorship Types of Censorship Direct Censorship Direct Censorship Government Monopolization Government Monopolization Prepublication Review Prepublication Review Licensing and Registration Licensing and Registration Self Censorship Self Censorship A group deciding for itself not to publish material A group deciding for itself not to publish material

17 The World Wide Web Problems the Internet poses for Censorship Problems the Internet poses for Censorship Many to many vs. 1 to many Many to many vs. 1 to many The internet is dynamic The internet is dynamic The internet is huge The internet is huge The internet is global The internet is global No age verification No age verification

18 The World Wide Web Freedom of Expression Freedom of Expression First Amendment to the U.S. Constitution First Amendment to the U.S. Constitution Freedom of Expression is not an absolute right Freedom of Expression is not an absolute right U.S. law prohibits advertising cigarettes on T.V. U.S. law prohibits advertising cigarettes on T.V. FCC vs. Pacifica Foundation et al FCC vs. Pacifica Foundation et al George Carlin’s “Filthy Words” George Carlin’s “Filthy Words”

19 Ethical Perspectives on Pornography According to Dictionary.com, According to Dictionary.com, “Pornography is sexually explicit pictures, writings, or other material whose primary purpose is to cause sexual arousal.”

20 Ethical Perspectives on Pornography Some Utilitarians conclude that pornography is wrong based on five harmful consequences it has on society: Some Utilitarians conclude that pornography is wrong based on five harmful consequences it has on society: 1.) Pornography reduces the dignity of human life. 1.) Pornography reduces the dignity of human life. 2.) Creates an environment where true victims of sexual abuse are less likely to be dealt with sympathetically by the justice system. 2.) Creates an environment where true victims of sexual abuse are less likely to be dealt with sympathetically by the justice system. 3.) People imitate crimes that they have seen portrayed in pornography. 3.) People imitate crimes that they have seen portrayed in pornography. 4.) Offends most people. 4.) Offends most people. 5.) Existence of the pornography industry diverts resources from activities that would have more redeeming social value. 5.) Existence of the pornography industry diverts resources from activities that would have more redeeming social value.

21 Ethical Perspectives on Pornography Some say adult pornography is moral Some say adult pornography is moral Some Utilitarians conclude it is moral for adults to view pornography Some Utilitarians conclude it is moral for adults to view pornography Three beneficial consequences of pornography: Three beneficial consequences of pornography: 1.) Make money 1.) Make money 2.) Physical pleasure 2.) Physical pleasure 3.) provides the costumer with harmless outlet for exploring sexual fantasies 3.) provides the costumer with harmless outlet for exploring sexual fantasies

22 Children and the Web Many parents want what's best for their children. Many parents want what's best for their children. Many parents believe they ought to protect their children from exposure to pornography and violent material on the web. Many parents believe they ought to protect their children from exposure to pornography and violent material on the web. Using Web Filters can help prevent certain web pages from being displayed in your browser. Using Web Filters can help prevent certain web pages from being displayed in your browser.

23 Internet Addiction According to Joseph Weizenbaum the reason why programmers are attracted to their machines is the feeling of freedom and power. According to Joseph Weizenbaum the reason why programmers are attracted to their machines is the feeling of freedom and power. Computer program whatever your heart desires. Computer program whatever your heart desires. The resulting thrill causes programmers to have a “compulsion to program.” The resulting thrill causes programmers to have a “compulsion to program.”

24 Q & A