CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.

Slides:



Advertisements
Similar presentations
SEARCH AND SEIZURE A REASONABLE TEST Created by the Ohio State Bar Foundation.
Advertisements

Terry v. Ohio and NY City Stop and Frisk Policy
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Suspects Rights Amendments 4, 5 and 6. 4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable.
Internet Privacy & Security A Presentation to WPI Student Pugwash Michael J. Ciaraldi Professor of Practice, WPI Computer Science 2003/10/02.
Computer Encryption Cheryl Dong Naima Ritter Hayden Bottoms Jennifer Kozin Brittany James.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
CS 305 Topics Covered. Chapter 1: Overview of Ethics What is ethics? Ethics is a set of beliefs about right and wrong behavior. These beliefs are guided.
Privacy & Personal Information -- Why do we care or do we?
4th Amendment.
Drug Testing In Selection: Legal, Ethical and Privacy Issues Joanna Bonilla, Anthony Bordogna, Danielle Dow, Antoine Woods, Stephanie Brawley.
CS 3043 Social Implications Of Computing 8/29/2015© 2009 Keith A. Pray 1 Class 5 Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Lisa Morales CIS * Online and offline purchase data * Supermarket savings cards * White pages * Surveys * Sweepstakes and contest entries *
Ethics Applied to Computerized World “Privacy” (Morality and Machines S. L. Edgar) **** CS575 *** Jules R. NYA BAWEU.
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Analyzing a Court Decision An overview of Student Searches presented by Bart Fennemore.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Call to Order These three officers were accused of taking two Baltimore teens out to the county, taking their shoes and cellphone batteries, and leaving.
The Investigation Process.  Remember that there is a lot of “stuff” that happens before a person is charged or even a trial thought of  Figure 12.1.
CS 3043 Social Implications Of Computing Keith A. Pray Instructor socialimps.keithpray.net CLASS 5 INTELLECTUAL PROPERTY.
CS 3043 Social Implications Of Computing © 2010 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
2.6 Protecting Individual Citizens 1 st & 4 th Amendments In Depth Government & Citizenship Timpanogos High School.
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
CS 3043 Social Implications Of Computing 10/28/2015© 2004 Keith A. Pray 1 Class 11 Freedom Of Speech Keith A. Pray Instructor socialimps.keithpray.net.
Chapter 5 – The Constitution and the Regulation of Business Copyright © 2011 by Jeffrey Pittman.
The Bill of Rights The First Fundamental Changes of the Constitution.
Legal Stumbling Blocks When Rescue and Law Enforcement Collide Gillian Deegan Assistant Commonwealth’s Attorney Botetourt County VA.
CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net.
Should Welfare Recipients be drug tested? BY: TAMMY GRUNERT.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
The Fourth Amendment, Technology, and a Right to Privacy
RIGHT TO PRIVACY A presentation by: Stacy Leatherberry Kristyn Bryson Mandy Timms Lisa Wheeler Jacob Sabins.
According to the Bill of Rights, you have the freedom of speech which means that you have the right to practice your religion › The rules are a little.
4 th Amendment: Search and Seizure. The Fourth Amendment to the U.S. Constitution protects personal privacy, and every citizen's right to be free from.
4 th Amendment  “The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall.
Due Process Amendments What is due process? Due process, for the people of the United States, refers to how laws are enforced why laws are.
STOP AND FRISK Terry v. Ohio and NY City Stop and Frisk Policy.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
CS154 Formal Languages and Computability Thaddeus Aid Department of Computer Science San Jose State University Spring 2016 Creative Commons Attribution-ShareAlike.
HW due today- Finish researching a second case Agenda NVCs Warm-up Establishment clause and balancing test Crime and amendments Rights of the accused Objectives.
LISTENING IN… Debating the Legitimacy of Eavesdropping on American Citizens With or Without Just Cause.
Understanding the Constitution
Privacy and the Law.
WHO WANTS THE LIVE IN A GLASS HOUSE?
Limiting the Right of Search
Evidence Collection at the Crime Scene and Constitutional Law
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
PRIVACY AND TECHNOLOGY
PRIVACY AND TECHNOLOGY
Forensics Week 7.
Chapter 14 Searches and Seizures
Understanding Law: Mr Thompson, APT Academy
Fourth Amendment.
Fourth Amendment And Probable Cause.
CHAPTER 1 1/15/2019 BHS Law Related Education Program Criminal Justice
Bill of Rights Do Now: Paraphrase the Fourth Amendment to the Constitution. Rewrite it into your own words without leaving out any information. You can.
The Surveillance State
Authority to Detain and Arrest; Use of Force
IA455 Chris Danieli and Zachary gibson
Search & Seizure The act of taking possession of this property.
Warm Up – February 11 Grab the handouts from the front table
Terry v. Ohio and NY City Stop and Frisk Policy
How does this Constitutional amendment protect Americans?
Arrest.
Ch. 3-1 Criminal Procedure and the Constitution
Judicial Restraint vs. Judicial Activism
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Presentation transcript:

CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 2 10/21/2015 Overview 1. Logistics 2. Students Present 3. Finishing Crime 4. Privacy 5. Assignment

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 3 10/21/2015 Logistics Put your name on each slide.  This is the last time I will accept slides without. Remember to include speaker notes for your slides.

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 4 10/21/2015 Overview 1. Logistics 2. Students Present 3. Finishing Crime 4. Privacy 5. Assignment

CS 3043 Social Implications Of Computing 5 9/15/08 BMES Code of Ethics vs. ACM & IEEE Code of Ethics Sahil Bhagat ACM & IEEEBMES  Very thorough & detailed □ Short and broad  Tailored for IT people □ Very general  Specifically talk about: □ More focus on public and patients Treatment of physically disabled Volunteering Professional skills Coercing others to do something Encouraging and assisting colleagues

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 6 09/14/08 Sysadmin Holds SF Network Hostage Graham Pentheny San Francisco FiberWAN system  Government s  Payroll  Police Documents Locked out other sysadmins  Recorded their conversations about him  Feared to have remote control over system via phone, etc... Total D.O.S. Estimated at $500,000  Really?  Lots of skepticism on actual damage done. Remember, everything is still working.

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 7 10/21/2015 Overview 1. Logistics 2. Students Present 3. Finishing Crime 4. Privacy 5. Assignment

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 8 10/21/2015 Crime Stop Technical  Protect Data  Protect Machine  Protect Access Non-technical?  Social?  Legal?

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 9 10/21/2015 Overview 1. Logistics 2. Students Present 3. Finishing Crime 4. Privacy 5. Assignment

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 10 10/21/2015 A Privacy Quote “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”  -- Fourth Amendment to the US Constitution

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 11 10/21/2015 Privacy Why do people want it? Keep private from whom? Is there any benefit in not having this stuff private? Who wants to know?

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 12 10/21/2015 Privacy Lots of things people would like to keep secret. Lots of people and organizations who would like to find out. Lots of things that could be done with the information. Correlations can be important.  Beyond secrecy.

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 13 10/21/2015 Privacy Expectations of privacy are:  Cultural  Philosophical  Political  Personal Who has the right to know?

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 14 10/21/2015 Government What kinds of info should a government legitimately have about its citizens or others? What kinds of info should a government not have? What good things (for society) could a government do with info? What bad things could a government do?

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 15 10/21/2015 What Safeguards Are There? In US:  Census  Taxes Federal Local  Search warrants  Wiretaps  Inter-agency sharing

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 16 10/21/2015 Other Factors Police: outstanding warrants Combos: child support /driver’s license Immigration Public health Security of Information

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 17 10/21/2015 Other Factors II Surveillance Freedom of association Anonymity? Newsgroups, , snail mail, posters & flyers, ads. Criminal background Sexual harassment Discrimination Gun registration

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 18 10/21/2015 Companies What kinds of info should a company legitimately have about its customers, employees, or others? What kinds of info should a company not have? What good things (for society) could a company do with info? What bad things could a company do?

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 19 10/21/2015 Safeguards Privacy policies  Special for children Sharing within / between companies Right to correct / comment Privacy in the workplace Surveillance of employees & customers

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 20 10/21/2015 Other Business Things Bankruptcy Fraud

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 21 10/21/2015 Technology Overall computer security Encryption

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 22 10/21/2015 Overview 1. Logistics 2. Students Present 3. Finishing Crime 4. Privacy 5. Assignment

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 23 10/21/2015 Assignment Read second half of Chapter 2. Self Search Answer short individual questions assigned during class.

CS 3043 Social Implications Of Computing © 2008 Keith A. Pray 24 10/21/2015 Assignment - Self Search Post ways one can search for information, 1 post per way. There will be a special thread for this. Do not repeat an entry made. Use all the search methods listed on yourself and post each result in your own thread (Name the thread with your First and Last name) and which method was used. Provide a description if you’d rather not post the details. For each source of data posted on your thread answer:  Exactly how did the data get there?  Can any of this data be used to cause harm?  Can any of this data be used for profit? Will you profit?  Did you authorized use of the data?  If not, request its use be discontinued and post the correspondence.  Maybe you’d rather share in the profit, if any. Post that kind correspondence as well.  Cite where Chapter 2 describes your experiences.  Dig deeper than a search engine’s (Google, etc.) results. This assignment requires you revisit the Discussion Forum frequently

CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 25 Class 5 The End Keith A. Pray Instructor socialimps.keithpray.net