Cyber Ethics nU!. Words for the Day  Hegemony  Public Domain  Perpetuity.

Slides:



Advertisements
Similar presentations
1 drt 6455 eCommerce Law lesson 8 – IT and web 2.0 associate professor faculty of law university of montreal university of montreal chair in e-Security.
Advertisements

© 2006 Open Grid Forum JSDL 1.0: Parameter Sweeps: Examples OGF 22, February 2008, Cambridge, MA.
© 2008 Open Grid Forum Resource Selection Services OGF22 – Boston, Feb
Internet Basics and Information Literacy
The Two Faces of Facebook Marianne Hebert, College Libraries (In collaboration with Jenica Rogers) Alumni Weekend July 11, 2008 SUNY Potsdam Presentation.
Cyber Ethics nU!. What is Cyber Ethics?  (click me) 
Social Media & Cyber Liability Andrew C.S. Efaw Kara Rosenthal Ellen Herzog.
Legal and Ethical Issues. Overview Issues of responsibility for libel, obscenity and indecency Aspects of copyright Issues involved in user agreement.
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
Personal Integrity and Björn Nilson Personal Integrity  Integrity vs Personal Integrity  Definition(s)  Physical and mental.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CPSC 441 Tutorial - Network Tools 1 Network Tools CPSC 441 – Computer Communications Tutorial.
Facebook me! Online social networking as part of libraries’ web presence? This research is not affiliated with or sponsored by Facebook. Kim Holmberg Information.
ISTEP Sping 2009 Brent Howard ESD 101 Technology Integration Specialist
Harvard University CSCI E-2a Life, Liberty, and Happiness After the Digital Explosion 2: Privacy.
CS335 Networking & Network Administration Introductions History of Networks Simple Computer Networks.
Student Library Media Center Safety Guidelines Prepared by: Mrs. Fitzpatrick AHS Library Media Center
Ping and traceroute Lab/Homework exercise Assigned 9/12/2006 Due 9/19/2006 CSIT 220 Fall, 2006 Based on T. Blum Exercises.
CPSC 441 TUTORIAL – MARCH 7, 2012 TA: MARYAM ELAHI NETWORK TOOLS.
Legal NISHA Copyright and Licensing Issues Michael Sparenberg e Institute for Internet Security Gelsenkirchen.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Describe ethical considerations resulting from technological advances.
Traceroute Ping. Shows the path a packet of information takes from your computer to one you specify. Lists all the routers it passes through until it.
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
Fundamental of IP network ~ ping, traceroute ~ Practice 1 Information and Communications Technology Internet Engineering.
What if I told you that a random stranger has access to…
Safe and Responsible Social Networking Stephanie ListerBrent Howard Assistant U.S. Attorney, ED of WANorth East Washington ESD 101 Computer Crime & Intellectual.
Intellectual Property, Nondisclosure agreements, Electronically Monitored Workplaces, And high level thinking questions.
Internet Safety. The Now Generation! Cyber-bullying Why? “A day in the life of a student has changed”
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
(By posting) Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to (company.
1.8 vs. 5.3 Benefits and Risks of Social Media in Healthcare Andy Malinoski Director of Risk Management Andy Malinoski Director of Risk Management.
NETWORKING IN LINUX. WHAT IS LINUX..? Freely implemention of UNIX-like Kernel. Free & Open source Software. Developed by Linus Torvalds in 1991.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP: A helper protocol to IP The Internet Control Message Protocol (ICMP) is the protocol used for error.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 05 Network Protocols.
Mr. Fleming.  Law passed by Congress in  Right to Privacy ◦ Medical information of patient can only be shared with doctor and professionals administering.
Rethinking Copyright for the Digital World Panel Discussion: O’Reilly Tools of Change Conference New York February 23, 2010 Moderated By: Edward Colleran.
What is TCP/IP? TCP/IP is the communication protocol for communication between computers on the Internet. TCP/IP stands for Transmission Control Protocol.
Network Tools Vijay Vasudevan. Overview Network simulation through ns-2 Network tools: ping traceroute whois dig Scripting!
Privacy Issues on The Internet. Login if you want everyone to see your private life * * * * *
1.The Nature, Impact, and Issue of Information Technology 1.5Basic Legal Framework relating to the Use of IT.
Web Server.
Using Computers: Legal and Ethical Issues Objectives and Guidelines We Must Follow.
CS 101 – Nov. 23 Communication, continued LANs –Bus (ethernet) communication –Token ring communication How the Internet works: TCP/IP.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Traditional Distribution Electronic Distribution User Florida Entomologist Issues Reprints FTP.
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
Social Networking and College Classrooms Some Thoughts for Instructors Kem Saichaie & Leighton Christiansen Des Moines Area Community College 27 February.
1. What is Copyright? What is Copyright 2. What is Copyrighted? What is Copyrighted 3. How does it Work? How does it Work? 4. What are the Fair use Exceptions?Exceptions?
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Word 2007® Business and Personal Communication How can Microsoft Word 2007 help you work with others?
Open access. Author charges Reverse the business model, from output- paid, to input-paid Paid on acceptance/publication Reflect prestige of journals.
Computer Technology Timpview High School
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP The PING Tool Traceroute program IGMP.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Computer Networks 0111-ICMP Gergely Windisch
F-1 OPT Workshop 1. The Basics Optional Practical Training (OPT) is an employment option available to F-1 students for employment directly related to.
EULAs END USER LICENSE AGREEMENTS. What is a EULA?  a legal contract between a software application author or publisher and the user of that application.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Network Overview. Protocol Protocol (network protocols) - a special set of rules that define communication between two or more devices on a network.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Ping Hackathon 2018.
Activity Delegation Kick Off
Internet Control Message Protocol
Internet Basics and Information Literacy
Internet Control Message Protocol
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
Presentation transcript:

Cyber Ethics nU!

Words for the Day  Hegemony  Public Domain  Perpetuity

(By posting) Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to (company name) an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, perform, display, reformat, translate, excerpt (in whole or in part) and distribute such information and content and to prepare derivative works of, or incorporate into other works, such information and content, and to grant and authorize sublicenses of the foregoing. (By posting) Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to (company name) an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, perform, display, reformat, translate, excerpt (in whole or in part) and distribute such information and content and to prepare derivative works of, or incorporate into other works, such information and content, and to grant and authorize sublicenses of the foregoing.

“I like words – I lick them.” James Cavanaugh

Hegemony Leadership, predominance, preponderance; esp. the leadership or predominant authority of one state of a confederacy or union over the others: originally used in reference to the states of ancient Greece, whence transferred to the German states, and in other modern applications. -OED - the domination of one state over its allies or… Natives Immigrants Natives

 Who Owns the Internet  What is the Internet?  DARPA  Ma Bell  Circuit v Packet Technology

High Tech - Back in the day!

Packets in action  What is a packet and why should I care?

Ping  Packet Internet Groper. Send an Internet control message protocol (ICMP) echo request and waiting for a response. (Also called packet internet gopher). [ rwasher]$ ping PING ( ) 56(84) bytes of data. 64 bytes from : icmp_seq=0 ttl=241 time=298 ms 64 bytes from : icmp_seq=1 ttl=241 time=293 ms 64 bytes from : icmp_seq=2 ttl=241 time=285 ms 64 bytes from : icmp_seq=3 ttl=241 time=302 ms ping statistics packets transmitted, 4 received, 0% packet loss, time 4993ms rtt min/avg/max/mdev = / / /6.347 ms, pipe 2

Traceroute [ rwasher]$ traceroute traceroute: Warning: has multiple addresses; using traceroute to ( ), 30 hops max, 38 byte packets ( ) ms ms ms ( ) ms ms ms ( ) ms ms ms 4 sl-gw21-rly-3-0.sprintlink.net ( ) ms ms ms 5 sl-bb21-rly-3-0.sprintlink.net ( ) ms ms ms 6 sl-bb25-rly-11-0.sprintlink.net ( ) ms ms ms 7 sl-bb23-sj-9-0.sprintlink.net ( ) ms ms ms 8 sl-bb24-sj-14-0.sprintlink.net ( ) ms ms ms 9 sl-bb20-ana-1-0.sprintlink.net ( ) ms ms ms ( ) ms ms ms 11 sl-st20-la-13-0.sprintlink.net ( ) ms ms ms 12 sl-internap-95-0.sprintlink.net ( ) ms ms ms 13 border20.po2-bbnet2.lax.pnap.net ( ) ms ms ms 14 myspace-2.border20.lax.pnap.net ( ) ms ms ms

Who Makes the Laws?  Wild Wild West!  Evolution of law  Driver’s licensing

Timeline of catch up!  The Electronic Communications Privacy Act of 2000  The Electronic Communications Privacy Act of 1986  Wire Fraud Act 1952  Communications Act of 1934  Mail Fraud Act of 1872

What does this have to do with ME!

STUDENT RESPONSIBILITIES AND RIGHTS Students may also be disciplined for acts committed away from school property and outside school hours if the conduct is detrimental to the interest of the school or adversely affects school discipline or if the conduct results in a criminal charge or conviction. Regulation P, Page 12

 Smyth v. Pillsbury,

In the News The publication noted in a February 3, 2006 editorial that, "reporter Matt Donegan was fired this week for writing off-color and racially insensitive comments on his personal blog. He was off work at the time."

Right or Wrong? Other bloggers and defenders of free speech jumped to defend him. The American Civil Libertiesdeclined to do so because of Delaware's right-to-fire law.  Mr. Donegan worked for Mr. Flood (Editor), and part of his employment agreement is being an acceptable public representative of the Dover Post Co. Mr. Donegan violated that work agreement.

Paul Forbes from All Things Considered January 20, 2006 You know those classic words spoken by countless vice principals, I hope you know that this will go down on your permanent record, well our records, all of them are permanent now. Besides, it's just so easy and efficient to keep track of everyone using big databases. Databases want to be merged. They cry out to be mined and turned into money or knowledge.

Check out:  