Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.

Slides:



Advertisements
Similar presentations
Delivery notes In the notes section at the bottom of these slides there are some additional notes to aid delivery. You can view these in full by going.
Advertisements

By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
Role of and Duties of Plan Commission Members Ralph E. Booker.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
ICT Ethics 2 ICT 139.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
A Dip in Silicon Valley April 20 th, 2001 R.J. Brown April 20, 2011 CSCE 390
Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:
The Threat of Cyber War The Issue of Cyber Security.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
U.S. federal judge rejects $125 million legal settlement between Google and groups representing authors and publishers. The settlement would have given.
Colin Stewart.  Darpa announced it’s new project BOLT, Broad Operational Language Translation.  Given that the US fights a lot of wars in places where.
By: Amanda Stephenson. RFID RFID – Radio Frequency Identification tags Hold 128 characters Normally placed in livestock and pets for identification Chips.
China’s attempt to tighten communication Byron Alleman CSCE390 – Computer Ethics April 2011.
IBM Traffic Prediction Breland Miley cfm?fo= apr/apr html#
“Scientists Work to Keep Hackers Out of Implanted Medical Devices” Justin Fisher.
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.6: The.
How Egypt Shutdown the Internet Drew Steptoe April 18th, 2011 CSCE 390 Professor Valtorta References: - JAMES GLANZ. “Egypt Leaders Found ‘Off’ Switch.
Driver Education Policies An educational policy is a statement of specific procedure(s) to be followed in handling a controversial problem where two or.
Schermerhorn - Chapter 62 Ethics –code of moral principles –sets standards of good & bad and right & wrong Ethical behavior –what is accepted as “good”
Business Ethics BY: Joshua m. Standifer.
Aims and Objectives.
Health Chapter 2.
IIA Fraud Presentation (Press Space Bar to Continue)
Professional Ethics: Should Software Engineers Adhere to a Professional Code of Conduct? Jonathan Schiff CS 301.
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Autonomous Cars Use laser, radar, lidar, GPS, cameras and other sensors to drive autonomously (1) Significant, but diminishing legal hurdles (2) Major.
The Sheriff’s Dilemma How to structure your answer.
General Moral imperatives
Teigh Berg ACM tech news: 12/30/11 Source: Reuters (12/28/11) URL: trains-security-idUSTRE7BR0C
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
© Dr Adnan Gutub Ethics Dr Adnan Gutub. © Dr Adnan Gutub Outline What are Ethics? Protection of Rights Professional Ethics & Computer Ethics Moral & Ethical.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2004 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.
Ethics.
Decision Making & Goal Setting Chapter 2 Pgs Objectives: 1. Students will know and practice the steps in decision making. 2. Students will make.
NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved.
Professional Ethics & Codes of Conduct Lecture 3.
September 2015 Minneapolis Works The Feldman Group, Inc.
Nursing Assistant Monthly Copyright © 2012 Delmar, Cengage Learning. All rights reserved. January 2012 Residents’ rights.
The Moral Philosophy of Immanuel Kant The Ethics of Duty and Reason
1 Computational Medicine An Ethical View Maliek Mcknight CSCE 390 April 23, 2010.
System Monitoring of Federal Agents Stephen Cevallos.
BRITISH PROPOSAL TO EXPAND DIGITAL SURVEILLANCE CSCE390 Computer Ethics Presentation.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
© 2015 Cengage Learning Chapter 6 Challenges to Effective Policing Chapter 6 Challenges to Effective Policing © 2015 Cengage Learning.

UN vs the Internet Summary
Professional Engineering Practice
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
The Ethics of Implementing Watson-like Algorithms in Neonatal Care
Professional Codes of Ethics
Taking Charge of Your Health Chapter 2, pages 32-61
Chapter 2 Lesson 1 Taking Charge of Your Life!
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Vision / Mission / Values
WikiLeaks avoids shutdown as supporters go on the offensive
Building Health Skills
Decision Making, Character and Other Health Related Skills
CHAPTER 3: ETHICS AND CORPORATE SOCIAL RESPONSIBILITY
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CS-480b Network Security Dick Steflik
Presentation transcript:

Matt Carrow ACM TechNews 4/4/2012

 The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government officials claim this plan is essential to the deterrence of terrorism and other threats. Source: Washington Post (4/2/2012) Anthony Faiola, Ellen Nakashima

1. Describe the ethical issue. Should an individual’s right to privacy be infringed? 2. Identify the stakeholders and tell the outcome they would like to see. Citizens would like to uphold their privacy while still being protected Government wants to offer its protection at the cost of rights 3. Propose 3 solutions. 1. Allow security agencies full discretion at any cost. 2. Uphold individual rights at all costs. 3. Allow security agencies discretion in specific situations. i.e. on specific individuals who are reasonably suspected My choice

4. Would I be willing to allow everyone to use my solution? Yes. There would be no reason not to allow my solution to be used. 5. Is the solution in accord with human nature? 4. Yes. It is human nature to want the best of both worlds, and while that is not always possible, I believe this solution is a worthy compromise. 6. Would there be majority agreement that this solution presents the most efficient means to the end? 4. I believe so. People will of course prefer to leave their rights uninfringed upon, but the only realistic way to achieve the protection they desire is for them to give the government some leeway. 7. Is this the solution I feel most committed to in my own conscience? 4. Yes. 8. Which philosophy do you feel was most influential? 5. Realism. You can’t have your cake and eat it too.

Snooping Plan Violates  1.2 Avoid harm to others  1.3 Be honest and trustworthy  1.7 Respect the privacy of others  1.8 Honor confidentiality  2.3 Know/respect existing laws Possibly, I’m no expert on UK laws