1 Ethics of Computing MONT 113G, Spring 2012 Session 37 Digital Order.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Digital Citizenship in the Classroom
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Computer Crimes and Security Professor Matt Thatcher.
Types of Laws video video CRIMINAL LAW CIVIL LAW.
CyberEthics Essay Outline
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
Don’t Hack. Hacking is bad.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
CptS 401 Adam Carter Section 5.1 & 5.2.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.
CYBER CRIME AND SECURITY TRENDS
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Computer Crime and CyberCrime Why we need Computer Forensics.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Question: Future Sessions AI and Military (UAS) Virtual Worlds Privacy and NSA Free Software Movement.
Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
 In most countries of the world, the “information revolution” has altered many aspects of life significantly: commerce, employment, medicine, security,
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
By Taylor Ivy, Mark Sarosky, Elliott Bays, Ovidiu Ravasan, and Dave Martin SOCIAL IMPLICATIONS AND ETHICS OF THE INTERNET.
Information Warfare Playgrounds to Battlegrounds.
Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
Digital Citizenship: Active Participants in a Digital World.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
Information Warfare Playgrounds to Battlegrounds.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 7 Ethics in IT Societies.
CONTROLLING INFORMATION SYSTEMS
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 21 Intellectual Property III.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Communication Technology and Society STS 322 Lecture 5 Cyberactivisim Huriye Aygören.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Securing Information Systems
Securing Information Systems
What is ‘Crime’?.
A Project on CYBER SECURITY
Seminar On Cyber Crime Submitted To: Submitted By:
Challenges We Face On the Internet
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Securing Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Learning Area 1 Information And Communication Technology and Society
Chapter 13 Security and Ethical Challenges.
SECURITY POLICIES, LAWS AND COMPUTER CRIMES (CCI410) PERTEMUAN 12
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Privacy, Security, and Ethics
Presentation transcript:

1 Ethics of Computing MONT 113G, Spring 2012 Session 37 Digital Order

2 Issues of Law and Order in IT We have already seen some areas in which IT introduces some complexities into creating and enforcing laws. Some of these areas are: Property rights Privacy rights Crime and security The above areas need laws to establish order. Issues related to IT: Current laws are not necessarily the final word. Enforcement of laws can be complicated. Design of IT systems can help prevent crimes. Interests of individuals and nation states may conflict (e.g. censorship.)

3 Types of Online crime 1.New versions of old crimes (committing old crimes using computers). Examples: 2. Crimes that could not exist without computers. Examples:

4 Morality of Computer Crimes 1. Are crimes committed by computer morally equivalent to the same type of crime committed without computers? Example: Bank robbery What differences might make the two versions morally different?

5 Morality of New Types of Crime How do we evaluate new crimes in terms of their morality? 1. Conceptual muddle 2. Analogical reasoning may help. Example: Phishing Analogy: What analogy can help establish the appropriate sanction? Does instrumentation make a difference? Another example: Botnets Analogy:

6 Features of Internet Crime The same features apply to internet crime as to internet societies in general: 1.Global, many-to-many scope May make enforcement challenging. 2.Special Identity conditions Used by stalkers. 3.Reproducibility Makes copying credit card information easy. May help enforcement.

7 Hackers Original Definition: Computer enthusiasts who spent hours figuring out how to do clever things with new technology. FOSS movement may have evolved from this community. Current usage: Those who gain unauthorized access to computer systems and engage in disruptive, illegal activities.

8 Arguments in defense of hacking 1.Information should be free. 2. Hacker break-ins illustrate security problems. 3. Gaining unauthorized access does no harm, and we can learn from it. 4. Hackers keep "Big Brother" at bay.

9 Hacktivism Definition of Hacktivism (from Manion and Goodrum): Example: Denial of Service attacks on Yahoo, Amazon, CNN, ebay and buy.com in Feb, 2000 Letter criticizing "capitalization of the internet." Are perpetrators vandals or terrorists, or are they political activists? Who is subject to attack by hacktivists?

10 The Internet and Political Activism How can the internet by used for political activism? Examples?

11 Penalties for Hacktivism Currently hacktivist attacks treated like any other hacking: Felony penalties in the U.S. (Non electronic civil disobedience gets much milder sentences). What should be the penalties for hacktivism? Are hacktivist attacks on government sites equivalent to cyber- warfare or cyberterrorism? How should we distinguish between hacktivism and cyberterrorism?