“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.

Slides:



Advertisements
Similar presentations
The right to privacy: should people have complete privacy, or should the state be able to investigate their private communication, or their employers?
Advertisements

Driverless Cars By: Chris Broom. Summary The dream of a car that can drive itself has grown over the last decade as the necessary technologies have gradually.
Ethics for the Information Age
Social and Ethical Implications CMSC 101 November 21, 2013 Bhuvana Bellala and Marie desJardins.
ICT Ethics 2 ICT 139.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Chapter 3: American Free Enterprise Section 1
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:
The Threat of Cyber War The Issue of Cyber Security.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
Computational Thinking William C. Ridgeway 4/17/2011 CSCE 390 Professional Issues in Computer Science and Engineering.
China’s attempt to tighten communication Byron Alleman CSCE390 – Computer Ethics April 2011.
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Ethical Decision Making Process. How to Resolve Ethical Dilemmas in Business Identify relevant facts Identify relevant issue(s) Identify primary stakeholders.
Internet probe can track you down to within 690 meters.
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.6: The.
How Egypt Shutdown the Internet Drew Steptoe April 18th, 2011 CSCE 390 Professor Valtorta References: - JAMES GLANZ. “Egypt Leaders Found ‘Off’ Switch.
Ethics in Information Technology, Second Edition 1 Chapter 1 An Overview of Ethics.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Chapter 2. What will we be discussing? P. 56  How fair and equitable is Canada’s justice system?  How effectively does it protect society, the innocent,
Principles of Management Core Principles
Ethics of Administration Chapter 1. Imposing your values? Values are more than personal preferences Values are more than personal preferences Human beings.
Agenda Welcome – Don Welch Introduction to CALEA – Mary McLaughlin Non-CALEA Assistance Obligations – Beth Cate CALEA Update – Matt Brill Making the Compliance.
LATIN AMERICAN CHILDREN´S VOICES Reccomendations for States, Schools, Families and Commitments as Digital Citizens.
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr
ETHICS and COMPUTERS An Overview 23/04/2017.
Autonomous Cars Use laser, radar, lidar, GPS, cameras and other sensors to drive autonomously (1) Significant, but diminishing legal hurdles (2) Major.
Crime and Deviance I will: Understand what laws are and how they are made. Discuss why laws are an important aspect of society. Examine crime and deviance.
Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.
Cassidy Culligan Digital Citizenship Project ED 505.
The United States Constitution. The United States Constitution Targets I can explain how the United States Constitution is structured and what it entails.
Ethics.
Business Ethics & Social Responsibility
Internet Safety Presentation by Diahn Hess. Overview Internet Safety Private and personal information Meeting people online Safe interactions Cyberbullying.
Making Decisions About Your Health Mr. Royer. Definitions Risk Behavior – Possibility that an action may cause injury or harm to you or others. Decision.
Vitor Giesteira, 9E. The Nine Elements of Digital Citizenship 1. Access 2. Communication 3. Literacy 4. Security and Safety 5. Etiquette 6. Rights and.
Ancient Greece made up of city-states ( the most influential and largest city was Athens) Objective Questions- 1) Define- Direct Democracy, Aristocracy,
Without knowing Digital Citizenship, your computer can be more dangerous than you ever imagined.
Canada’s Democracy. What does democracy mean to you? Democracy.
The Patriot Act Is Spying on US citizens Ethical?
System Monitoring of Federal Agents Stephen Cevallos.
BRITISH PROPOSAL TO EXPAND DIGITAL SURVEILLANCE CSCE390 Computer Ethics Presentation.
D IGITAL C ITIZENSHIP By Raquel Laliberty. Digital access is the equal ability for people in different countries and societies to access digital technology.
Smart PWNs: An Ethical Analysis of Smart Phone Technology Colin O'Hanlon Josh Schwartz Norman Littlejohn.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
Chapter 1 The Study of the American Government The Study of the American Government.
National Security Agency (NSA) Surveillance Christopher Boyd.
ETHICAL ISSUES IN HEALTH AND NURSING PRACTICE CODE OF ETHICS, STANDARDS OF CONDUCT, PERFORMANCE AND ETHICS FOR NURSES AND MIDWIVES.
Jim Loter Director of Information Technology
Bellwork Think about this…. Historical Event
The United States Constitution
PHI 208 Course Extraordinary Success tutorialrank.com
UN vs the Internet Summary
AP Government & Politics
Saman Elyahoodayan Wire Taping
The United States Constitution
WHAT ARE CIVIC LIFE, POLITICS, AND GOVERNMENT?
WikiLeaks avoids shutdown as supporters go on the offensive
CS-480b Network Security Dick Steflik
Presentation transcript:

“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest

Summary  British government is considering a proposal to allow the government to examine the text messages, phone calls, s and Web browsing habits of every person in the country  This proposal set to be presented in Parliament later this year is sparking an uproar over privacy in Britain, fueling a debate over the lengths to which intelligence agencies should go in monitoring citizens  Government officials say the new powers are critical to countering terrorism and other threats in an era of fast-changing social media

Ethical Decision-Making 1.Describe Ethical Issue Should British government be allowed to pas a law that would grant ability to examine the text messages, phone calls, s and Web browsing habits of every person in the country? 2.Who are the involved parties and what do you believe they want accomplished? Britain’s intelligence agencies want the passages of this new bill Government officials wants to continue to be able to keep British society safe and successful in the Internet age. Citizens of Britain do not want there rights and privacy to be infringed upon by the idea of this new law. 3.Different Solution The government passes the law despite citizens concerns of privacy The proposal is shut down with out government consideration. The proposal is restructured to both address the security concerns of the government and the privacy concerns of the public.  This is the solution that I feel is best.

Ethical Decision-Making Cont. 4.Solution Evaluation I think it is very important to have many different types of measures in place to protect the citizens against any possible security threats But on the other hand, free access to everyone’s private information like s, text messages, and phone records is a bit reckless. There is definitely middle ground that could be reached with regards to this proposal. For example, the information can be granted with probable cause and a warrant. 5.Nature of Solution This solution would still allow the government to some access to private information of the public. Private information would only be accessible if the security of the public is at risk. 6.Would this Solution be popular? This solution would be popular with some but not all. Some would be ok with the proposals as long as their security not threaten. Others would prefer privacy no matter the reason.

Ethical Decision-Making Cont. 7.Solution Commitment Regardless of whether it would benefit me personally, this solution is one that I feel most committed to because it would produce the greatest good for the greatest number of people 8.Philosophy of Decision The philosophical belief system that was most influential in my solution is Realism. Due to the tremendous rise in technology, I think it is important to realize that the security of a nation can be threaten by any means. Also, it is very imperative to the safety of many for the government to get any type of advantage.

ACM Code of Ethics The proposed solution of this ethical dilemma would upholding the following –1.1 Contribute to society and human well-being. –2.8 Access computing and communication resources only when authorized to do so. The proposed solution of this ethical dilemma could possibly undermined the following –1.7 Respect the privacy of others.