Computer Ethics.

Slides:



Advertisements
Similar presentations
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Advertisements

Information Systems Unit 3 – Outcome 3 Legal Obligations of Programmers Student Lecture.
Netiquette Rules.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Anonymity and SPAM The Good, the Bad and the Ugly!
 IT pro’s work raises ethical issues involves privacy. Ex: Should company have right to monitoring employees’ ? Should company have right to log.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
E-Commerce: Regulatory, Ethical, and Social Environments
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Nine Elements of Digital Citizenship BH. Nine elements is identified to create a digital citizenship. Digital Access: full electronic participation in.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computers and the Internet. Key Information: Key Information: Even if you delete your mail, messages may remain on servers or backup devices for.
Staying Safe Online Keep your Information Secure.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
COMPUTER ETHICS Do you know the difference between right and wrong?
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Copyright ©2006 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Cyber Law Its Legal, Ethical, and Global Environment MARIANNE.
Ethical Issues in Computer Science (slides modified by Erin Chambers)
Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Computers in Society Electronic Voting. Team Projects What is your name? Application? Presentation? Copyright The software industry The open source business.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
The Ethics of Electronic Marketing. “ Marketers must accept responsibility for the consequences of their activities and make every effort to ensure that.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Digital Millennium Copyright Act (DMCA) The Digital Millennium Copyright Act is a United States copyright law that was signed into law by Bill Clinton.
Does It Matter Who Has Your Data? 1.Intro 2.Teach 1: Travel Safety Rules 3.Teach 2: How to Protect Your Data 4.Wrap-Up 5.Assessment 6.Extension Activity.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Self Defense Weapons. About Us Worldclass Security Solutions LLC is an online store for Surveillance and Self Defense Products and offers many more kind.
ETHICS Internet And Online Community Week 10.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Computer Security Fundamentals
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Computer Literacy – Grade 8
Freedom Independence Transition
Internet And Online Community Week 10
PART III Ethical Issues in Business
Video: Digital citizenship is defined as the norms of appropriate,
E-Commerce: Regulatory, Ethical, and Social Environments
Computer Literacy – Grade 8
Social Issues in Computing
Social Issues in Computing
Communication Technology in a Changing World
Does It Matter Who Has Your Data?
Presentation transcript:

Computer Ethics

Case Study #1 Verizon and the RIAA: Jan. 2003: The RIAA won a lawsuit against Verizon which forced Verizon to hand over information about which subscribers were sharing much illegally. Verizon had refused since they felt complying would violate their customers’ privacy.

Ethical Issues Can a private company monitor users’ internet behaviors? Should exchanging copyright music be illegal? Does Verizon have an obligation to hand over or protect that data?

Case Study #2: In 1999, Amy Boyer was murdered by a man who had stalked her on the internet. Used online search engines plus docusearch.com to get all necessary information. Also maintained two websites: one giving her personal info and the other described his plans to murder her.

Ethical issues Was her privacy violated because of how easy it was to get her personal info? Did he have a right to set up such a website about her? Did the ISPs have a responsibility to monitor the websites that he created? Did web searchers have a moral responsibility to report the websites?

Cyber ethics Not necessarily all new arguments, but the rise of technology has certainly highlighted new issues. The news has hundreds of examples of new legal and ethical issues with regard to computers. We’ll examine some examples today.

Facebook and privacy Many articles focus on facebook and how much it should respect privacy. Issues: Should facebook be allowed to use cookies to track web browsing? Should facebook have an obligation to track it’s users’ behavior? Should employers be checking facebook to get information on potential employees? Should users have the right to expect their facebook information to stay private?

Encryption Who here has ever depending on encryption? Who did it protect you from? Who should be able to decrypt your message? What about government oversight, or company oversight? Should a protester have the same rights? A criminal? A terrorist?

Privacy and the law What is the Patriot Act, and what did it change? Anyone ever heard of Carnivore, or know what kind of digital tracking is allowed by law?

Wifi access Anyone ever used the wifi at a restaurant or coffee shop without buying an item? Is this legal or ethical? What about if the agreement you click on specifically says you must purchase something?

DRM Digital Rights Management is software used to “control access to to data and hardware”. Sony used XCP, but flaws in the code allowed hackers to break into computers with XCP installed. Should companies be allowed to protect their copyrighted data? Does it matter if it is digital or physical? Current status: do companies use DRM?

SPAM How much of email is spam? Does spam get the same free speech rights as anything else? Is it different from junk mail? Spam costs companies more than $22 billion a year. Why?

CAN-SPAM act In 2004, Congress took action. All email must have: Accurate routing information Subject line that reflects content of message Opt-out option Include postal address and advertisement info Why could this be a free speech problem?

SONY and digital rights Next class, we’ll do a case study discussion. Topic: SONY and jailbreaking the PS3 Please find at least 2 articles (NOT from Wikipedia), and write a short 1 paragraph summary of the case/issue and bring it to class on Friday. (This will count as a quiz grade.)

Questions Is it permissible for people to jailbreak the PS3? Is SONY allowed to prevent it? What about so-called “hacktivist” groups like Anonymous, who perform illegal attacks as a social protest? Individuals: Did the figurehead of this issue have an obligation, once he accepted money, to continue the fight against SONY?