ATS 8A - 1 The Art of Tech Support John Abbott College Ethical Issues in Cyberspace and in the Workplace M. E. Kabay, PhD, CISSP Director of Education,

Slides:



Advertisements
Similar presentations
1
Advertisements

Select from the most commonly used minutes below.
DC DATACOMM John Abbott College JPC Overview of Cyberspace M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright.
Instructions for Filling out the Reintegration Opportunity Report Savable PDF Training.
Setting up a Gmail Account & Safety
Local Customization Chapter 2. Local Customization 2-2 Objectives Customization Considerations Types of Data Elements Location for Locally Defined Data.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Wants.
Using Information at the University University Secretarys Office
1 Advanced Tools for Account Searches and Portfolios Dawn Gamache Cindy Bylander.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
How to protect yourself, your computer, and others on the internet
Chapter 8 Copyright © 2014 Pearson Education, Inc.Chapter Writing Negative Messages.
Impressive Star Softwares (P) Ltd. Presents Sent Item Box-Detail of Mails from Tally ( 1.0 )
Welcome. © 2008 ADP, Inc. 2 Overview A Look at the Web Site Question and Answer Session Agenda.
© SafeNet Confidential and Proprietary Administering SafeNet StorageSecure Smart Card Module 3: Lesson 5 SafeNet StorageSecure Storage Security Course.
Break Time Remaining 10:00.
Configuration management
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Cyber Safety Assessment Review
PP Test Review Sections 6-1 to 6-6
Pennsylvania Bureau of Workers’ Compensation Conference December 4, 2003 Beth L. Rubin  2003 Dechert LLP HIPAA Privacy Rule Basics.
Sample Service Screenshots Enterprise Cloud Service 11.3.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
 Copyright I/O International, 2013 Visit us at: A Feature Within from Item Class User Friendly Maintenance  Copyright.
Services Course Windows Live SkyDrive Participant Guide.
Welcome to Instructions and tips for the online application process 1 June 2012.
1 How Do I Order From.decimal? Rev 05/04/09 This instructional training document may be updated at anytime. Please visit and check the.
By CA. Pankaj Deshpande B.Com, FCA, D.I.S.A. (ICA) 1.
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
Clock will move after 1 minute
© Paradigm Publishing, Inc Excel 2013 Level 2 Unit 2Managing and Integrating Data and the Excel Environment Chapter 6Protecting and Sharing Workbooks.
1 DIGITAL INTERACTIVE MEDIA Wednesday, October 28, 2009.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
INTERNET and CODE OF CONDUCT
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Describe ethical considerations resulting from technological advances.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
Joseph Pettaway ED505. What is Digital Citizenship? Concepts that aids individuals in learning and understanding how to use technology appropriately.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Computer Ethics for Computer Users
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
COMPUTER ETHICS Do you know the difference between right and wrong?
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Computers Are Your Future
Internet Etiquette or Netiquette
Computers Are Your Future Twelfth Edition
Internet Etiquette or Netiquette
Unit 3- Introduction to Computer Ethics
Presentation transcript:

ATS 8A - 1 The Art of Tech Support John Abbott College Ethical Issues in Cyberspace and in the Workplace M. E. Kabay, PhD, CISSP Director of Education, NCSA President, JINBU Corp Copyright © 1997 JINBU Corp. All rights reserved

ATS 8A - 2 Ethics in Technical Support l Intellectual Property Rights l Privacy and Confidentiality l Free Speech in Cyberspace l Children in Cyberspace l Professionalism in Cyberspace l Criminal Hackers l Employee Rights in the Workplace l 10 Commandments of Computer Ethics

ATS 8A - 3 Intellectual Property Rights l Copyright law – Authors property by default – Employment implies ownership of work – Illegal copying is felony l Stealing copies of books and programs – deprives author/owner of return on effort – discourages intellectual effort – loss of control over property

ATS 8A - 4 VIDEO: Its Just Not Worth the Risk Software Publishers Association Washington, DC

ATS 8A - 5 Why Not Steal Software? Classic excuses l Everyones doing it. l We wont get caught. l Its the software companys fault: if they dont want theft, they should charge less. l If they dont want their software stolen, they should make it harder to copy. l But I need it and I dont want to pay for it. l It doesnt hurt anyone. l It only hurts a companyI wouldnt steal it from an individual. l No software should ever be copyrightedit should always be free.

ATS 8A - 6 Privacy and Confidentiality l Privacy – What can be known by whom l Confidentiality – What can properly be done with information about individuals and organizations l Control over personal information – How one can inspect and correct records about oneself

ATS 8A - 7 Privacy What can be known by whom l Medical records l Political, religious, family plans, sexual orientation l Social Security Number / Social Insurance Number l Financial affairs l Public record (property, education, criminal record

ATS 8A - 8 Confidentiality What can be done with information l Transfer to authorized users l Use for statistical analysis l Guard against unauthorized disclosure l Tech support must safeguard client confidentiality

ATS 8A - 9 Confidentiality (contd) Case studies of violation of confidentiality l Victoria, BC: police officer (1995) – used police computers to locate home addresses of abortion clinic workers – penalized l Miami, FL: public health worker (Nov 1996) – stole copies of disks with records of 4,000 HIV+ patients – used them in bars to give advice on whether to go out with affected people – fired

ATS 8A - 10 Control Over Personal Information l Credit and bank card leave trail in cyberspace l Credit bureaus keep records of questionable accuracy l Insurance bureaus share information l Right to see and comment on all records about yourself

ATS 8A - 11 Free Speech Issues in Cyberspace l US First Amendment Rights l Problems of Community l International Differences l Pornography l Bombs and Viruses

ATS 8A - 12 US First Amendment rights l In US, no pre-emptive limits on speech l Limitations on 1st-Amendment rights – definitions of speech – prima facie evidence of harmful effects – incitement to violence not tolerated

ATS 8A - 13 Problems of Community l In US., generally unrestricted access by adults to legal materials (not child porno, obscenity) l Community standards can limit display or sale l KEY: WHICH COMMUNITY DEFINES STANDARDS? l 1994: Nashville postal inspector & CA BBS – Knowingly downloaded well-marked porn – Filed federal complaint on wire-transfer of pornography – BBS operators convicted under Tennessee law -- while living in California – Operators lost their appeal

ATS 8A - 14 International Differences How to reconcile conflicts among national moral standards and legal systems in cyberspace? l Canada: limits on hate speech l UK: bans on public commentary about trials l China: national intranet bars access to Western news media l Indonesia: limitations on access to Internet sites discussing East Timor l Saudi Arabia: concern over sites dealing with womens liberation

ATS 8A - 15 Pornography l Newsgroups: alt.sex.__[anything at all]__ l WWW sites & BBSs l Lawrence Livermore National Laboratory – US. DOE computers – 10 Mb pornographic files – public access – employee fired l Gross exaggerations in popular press – Carnegie-Mellon scandal – relatively small % total information transfer

ATS 8A - 16 Bombs and Viruses l Libraries, Internet sites, publications & BBSs have dangerous info – instructions on how to make bombs, weapons – detailed instructions on making computer viruses, Trojans, logic bombs l Why would anyone post such information? – perceived as interesting, educational – fun, part of belonging to club – political ideology – belief that what is not illegal must be right – mindless opposition to authority l Why would anyone stop such postings?

ATS 8A - 17 Children in Cyberspace l Benefits l Dangers l Protection l Automated Net Filters

ATS 8A - 18 Children in Cyberspace: Benefits l Commercial on-line services – moderated childrens chat lines – childrens forums – educational services l Reference areas – encyclopaedias – on-line articles l Interaction with decent adults – moderated discussion groups – children get refs for homework – 13 yr-old sysop in anti-virus forum

ATS 8A - 19 Children in Cyberspace: Dangers l Access to newsgroups – neo-Nazi and other racists – outright lunatics – perverts of various descriptions l Naked ladies on-line – photographs freely accessible on Net – but also available at corner stores l seduction by paedophiles – 50 yr-old man tricked 14 yr-old girl into meeting – airplane tickets sent secretly to kids

ATS 8A - 20 Protecting Kids in Cyberspace Parental involvement! l Awareness of the issues l Education of their children l Integration of ethical issues in computer classes at school l Discussion among parents and children of activities on the Net

ATS 8A - 21 Automated Net Filters Prevent access to parentally-restricted areas l Techno-fix (sometimes viewed as challenge by kids) l SafeSurf(TM) ( l Microsystems Software--CyberPatrol ( l Trove Investments--Net Nanny ( l Solid Oak Software--CYBERsitter ( l SurfWatch (

ATS 8A - 22 Professionalism in Cyberspace l Selling on the Net l Netiquette l Public Relations Nightmares l Data Leakage l Encryption and the ITAR l Pornography l Firewalls l Denial of Service l Concluding Remarks

ATS 8A - 23 Selling Products and Services l Nothing inherently unethical Problems include: l Immortal messages (need expiration date) l Inaccurate messages (need digital signature) l Inauthentic messages (need non-repudiation) l Unwanted messages (need good judgement)

ATS 8A - 24 Netiquette for Beginners l World-wide web--Marketing the right way l Legitimate mailing lists – by request – or by permission (May I send you...) l Junk – unsolicited – who pays? – denial of service – outrage from many recipients – serious business consequences

ATS 8A - 25 Spamming the Net l Dropping Spam on moving fan blades l Sending large numbers of identical messages to many news groups or addresses l Many readers get several related news groups l Annoys members, uses bandwidth l Severe consequences – hate – mail bombing – removal of Internet access – deletion of all future messages – expulsion from new groups

ATS 8A - 26 Spamming the Net: Case Studies l Canter and Siegel (1993) – Green Card Lottery legal advice – 2,000 news groups and 200,000--2,000,000 recipients – many received multiple copies – violated rules of the news groups l Responses – complaints to C&Ss service provider – mail bombing of C&S mailbox – crashed their service provider – cancelbots

ATS 8A - 27 Spamming the Net: Case Studies Anonymous executive writing in Network World (1994) l Posted advertising to 20 news groups l Thought people would be interested l bombs l 800 number posted in alt.sex groups l Thousands of obscene phone calls l Receptionist quit l All 800 calls sent directly to his phone l Nearly destroyed his career

ATS 8A - 28 Market Data Collection: Ethical Issues l Point of sale data capture l Credit records l Medical records l Compilations of addresses l Net usage statistics l Snitchbots

ATS 8A - 29 Public Relations Nightmares l Identifying employees is easy from headers – corporate names in domain field – e.g., – can be forged l Lack of professionalism a killer – flaming people in professional news groups – spamming l Consequences can be severe – kill-files – hat – boycotts

ATS 8A - 30 Did I say that?? l Covert Ads l Flamewars l Shills l Spoofs

ATS 8A - 31 Covert Ads l Forums, newsgroups may have strict standards l Responses should be technical and helpful l Do not introduce company name and product without clear benefit to recipient l Repeated marketing hyperbole in technical forum repels potential customers l Beware of posting superficially-objective responses that are slanted: will be nailed

ATS 8A - 32 Flamewars l Technology insulates some people from empathy l Not everyone capable of writing with subtlety and sensitivity l Flamewars are written shouting matches l Avoid ad hominem remarks – comments on intelligence or competence – imputation of motives – statements claiming to know other peoples thoughts – outright verbal abuse

ATS 8A - 33 Shills l Employees who write as if they were customers l All employees should identify themselves as such if information bears on their credibility l Such tactics backfire – strong objections to dishonesty – perpetrators locked out of forums – great abuse heaped on individuals and employers – long term distrust

ATS 8A - 34 Spoofs l Impersonation of others l Writing bad things about competitors l Can be used as industrial sabotage l Possibly actionable

ATS 8A - 35 Spoofs: Case Study ReplyNet vs Promo: October 1995 l Promo Enterprises is mass – sent junk to 171,000 recipients – listed REPLY.NET as return address – Promo has recently announced competition with ReplyNet auto-reply service l ReplyNet Inc. provides non-objectionable advertising on Net – ReplyNet received 100s of complaints – sent apologies but largely rejected – damage to reputation as responsible service

ATS 8A - 36 Spoofs: Case Study (contd) ReplyNet initiated lawsuit: l Violations of US. federal law – Forgery – Trademark violation l Damages payable to ReplyNet – $5-$10 for each of 171,000 people l Refunds for on-line time to all unwilling recipients l May be a case of industrial sabotage (spamotage in John Schwartzs phrase-- Washington Post) l Settled out of court on generous terms

ATS 8A - 37 USENET Etiquette l Lurk before you leap: learn specific style l Stick to the forum/section subject area l Make messages concise l Quote only relevant text from previous message l Respect copyright laws l Dont flame people l Avoid profanity, ethnic/religious slurs, etc. l On USENET, everything you write may be archived and available forever

ATS 8A - 38 Cyberpaths l Virus Writers l Criminal Hackers l Theft of Services

ATS 8A - 39 Virus Writers l 13,000 virus variants (1997) l Most are trivial modifications of existing viruses – children – wannabees – fools l Some virus writers are sociopaths – Dark Avenger (Bulgaria) l Others are unaware of consequences

ATS 8A - 40 Criminal Hackers VIDEO: Unauthorized Access by Annaliza Savage

ATS 8A - 41 Criminal Hackers (contd) Hacker philosophy / cant l Information Wants to be Free l No limitations on posting information l No intellectual property rights – No limits on retrieving information – Software should be free

ATS 8A - 42 Criminal Hackers (contd) Moral relativists l Morality = preference l Everyones preference morally equivalent l Offended by criticism l Outraged by legal pursuit

ATS 8A - 43 Criminal Hackers (contd) Theft of Services l Many ways to steal services – Phone fraud – Voic invasion – System misappropriation l Genuine losses – Payments to foreign governments – Obligation to pay for stolen phone calls – Decreased access to resources – Expensive work to re-establish trusted computing base

ATS 8A - 44 Criminal Hackers (contd) Identity and Responsibility l Currently no non-repudiable I&A l No human society can function well without stable identity l Impossible to bring consequences to bear on malefactors l Disaster to depend on electronic messages as guide to popular will l Anonymous r ers circumvent I&A l Arguments about benefits / necessity of anonymity – totalitarian regimes – cases of abuse and probable pursuit

ATS 8A - 45 Employee Rights in the Workplace l Privacy Issues l Harassment l Fighting a Crooked Boss l Blowing the Whistle

ATS 8A - 46 Privacy Issues l Must answer employment application forms absolutely truthfully and completely l But interviewer has no right to ask personal questions unrelated to job – Political beliefs – Religious affiliation – Family plans (pregnancy, children) – Sexual orientation l Corporate phone calls usually viewed as private (check policy) l Corporate usually viewed as corporate property (check policy)

ATS 8A - 47 Harassment Unacceptable behaviour l Abusive language l Racial, sexual innuendos and behaviour l Demeaning behaviour (e.g., demanding services not part of job) l Hostile environment (e.g., pinups on wall, swastikas, KKK paraphernalia)

ATS 8A - 48 Harassment (contd) Taking charge of the problem yourself l Document problems in detail using diaries, notes, photographs l Contact lawyer specializing in civil rights cases l Use official organizational procedures for complaint l If no satisfaction, file grievance through union l File complaint with human rights commissions l File civil litigation

ATS 8A - 49 Fighting a Crooked Boss l Never a legal obligation to perform illegal act l Document situation in detail (as above) l Contact a lawyer l Verify that personal safety not in jeopardy l Ensure witnesses if possible l Inform superiors if reasonable expectation they are honest l Contact police or regulators if necessary

ATS 8A - 50 Blowing the Whistle l Identify appropriate authority l Document case l Obtain legal advice l Lay case before authorities l Lose job l Fight wrongful dismissal

ATS 8A Commandments of Computer Ethics l [1] Harm: Thou shalt not use a computer to harm other people. l [2] Interference: Thou shalt not interfere with other people's computer work. l [3] Snooping: Thou shalt not snoop around in other people's computer files. l [4] Theft: Thou shalt not use a computer to steal. l [5] Lying: Thou shalt not use a computer to bear false witness. l [6] Copyright violations: Thou shalt not copy or use proprietary software for which you have not paid.

ATS 8A Commandments of Computer Ethics l [7] Unauthorized use: Thou shalt not use other people's computer resources without authorization. l [8] Theft of intellectual property: Thou shalt not appropriate other people's intellectual output. l [9] Social consequences: Thou shalt think about the social consequences of the program you are writing or the system you are designing. l [10] Consideration and respect: Thou shalt always use a computer in ways that ensure consideration and respect for your fellow creatures.

ATS 8A - 53 InfoSec & Ethics Information l National Computer Security Association – – any to l NCSA Web Page links to – Computer Ethics Institute – Electronic Messaging Association – Books on computer ethics

ATS 8A - 54 Homework: l Read Ten Questions for Parents and Children – Discuss with your family or with friends – Write down your thoughtful comments on each question. l Read and summarize Totem and Taboo in Cyberspace and submit your notes for credit l Answer all the review questions from the instructor l Submit your review questions and comments no later than the date & time indicated by your instructor: 09:00 Tuesday 22 April at front desk. _____________________________