Presentation is loading. Please wait.

Presentation is loading. Please wait.

Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,

Similar presentations


Presentation on theme: "Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,"— Presentation transcript:

1 Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property, Viruses, Worms, Adware, Spyware, Privacy Issues, Spamming, Computer Monitoring

2 What is Ethics?  Ethics, also known as moral philosophy, is a branch of philosophy that addresses questions about morality—that is, concepts such as good and evil, right and wrong

3 Effect of IT on Ethics Society as a calm pond IT as rock dropped in pond, creating ripples of new situations not covered by old rules Social and political institutions cannot respond overnight to these ripples—it may take years to develop etiquette, expectations, laws ○ Requires understanding of ethics to make choices in legally gray areas

4 Ethical Responsibility  Business professionals have a responsibility to promote ethical uses of information technology in the workplace.

5 Principles of Technology Ethics  Proportionality – the good achieved by the technology must outweigh the harm or risk  Informed Consent – those affected by the technology should understand and accept the risks

6 Principles of Technology Ethics  Justice – the benefits and burdens of the technology should be distributed fairly  Minimized Risk – even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk

7 Freedoms vs. Censorship Issues  Spamming Indiscriminate sending of unsolicited e-mail messages to many Internet users (Junk mail)  Flaming Sending extremely critical, derogatory, and often vulgar e-mail messages or newsgroup postings to other users on the Internet or online services (Flame mail) Racist or defamatory messages or sexually explicit material have led to calls for censorship and laws for libel

8 Internet Abuses in the Workplace  General e-mail abuses

9 Internet Abuses in the Workplace  Leisure use of the Internet (time and resource theft)

10 Internet Abuses in the Workplace  Unauthorized usage and access

11 Internet Abuses in the Workplace  Copyright infringement/plagiarism  Newsgroup postings

12 Internet Abuses in the Workplace  Transmission of confidential data  Pornography – accessing sexually explicit sites

13 Internet Abuses in the Workplace  Hacking  Non-work related download or upload

14 Internet Abuses in the Workplace  Usage of external ISPs  Moonlighting

15  Software Piracy Unauthorized copying of computer programs  Licensing Purchase of software is really a payment for a license for fair use Site license allow a certain number of copies  A third of the software industry’s revenues are lost due to piracy

16 Theft of Intellectual Property  Intellectual property Copyrighted material Peer-to-peer networking techniques have made it easy to trade pirated intellectual property

17 CAN-SPAM Act  Controlling the Assault of Non-Solicited Pornography and Marketing Act.  signed into law by President George W. Bush on December 16, 2003  referred to as the "You-Can-Spam" Act

18 CAN-SPAM Act  permits e-mail marketers to send unsolicited commercial e-mail as long as it adheres to 3 basic types of compliance 1. Unsubscribe compliance (Visible Opt-out) 2. Content compliance – label if adult content, legitimate and visible address, relevant subject 3. Sending behavior compliance – can’t have a false header, can’t send on open relay (sending through a third-party)

19 Adware and Spyware  Adware Software that purports to serve a useful purpose but also allows Internet advertisers to display advertisements (pop-up and banner ads)

20 Adware and Spyware  Spyware Adware that employs the user’s Internet connection in the background without your permission or knowledge. It usually sends information to a third party for identity theft.

21 Cookies  Information about you can be captured legitimately and automatically each time you visit a website  This information is recorded as a “cookie” on your disk  Then the website owners may sell the information from cookies to third parties  Cookies can also be intercepted or retrieved form your hard disk by hackers

22 Cookies are written by a Web site on a visitor’s hard drive. When the visitor returns to that Web site, the Web server requests the ID number from the cookie and uses it to access the data stored by that server on that visitor. The Web site can then use these data to display personalized information. Figure 4-3 HOW COOKIES IDENTIFY WEB VISITORS

23 European Directive on Data Protection: Companies must inform people information is collected and disclose how it is stored and used. Requires informed consent of customer. EU member nations cannot transfer personal data to countries without similar privacy protection (e.g., the United States). U.S. businesses use safe harbor framework. ○ Self-regulating policy and enforcement that meets objectives of government legislation but does not involve government regulation or enforcement.

24 Privacy: Opt-in versus Opt-out  Opt-in You (the customer) explicitly consent to allow data to be compiled about you.

25 Privacy: Opt-in versus Opt-out  Opt-out Data can be compiled about you (the customer) unless you specifically request it not be

26 Privacy Issues  Violation of Privacy: Accessing individuals’ private e-mail conversations and computer records, Collecting and sharing information about individuals gained from their visits to Internet websites

27 Privacy Issues  Computer Monitoring: Always knowing where a person is, especially as mobile and paging services become more closely associated with people rather than places Computers used to monitor the productivity and behavior of employees as they work

28 Privacy Issues  Computer Matching Using customer information gained from many sources to market additional business services  Unauthorized Personal Files Collecting telephone numbers, e-mail addresses, credit card numbers, and other personal information to build individual customer profiles

29 Protecting your Privacy on the Internet  E-mail can be encrypted  ISP can be asked not to sell your name and personal information to mailing list providers and other marketers  Decline to reveal personal data and interests on online service and website user profiles

30 Encryption  Symmetric Key  Asymmetric Key  Three Pass Protocol Asymmetric Key

31 Advances in IT Advances in data analysis techniques ○ Profiling Combining data from multiple sources to create dossiers of detailed information on individuals ○ Nonobvious relationship awareness (NORA) Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists

32 Mobile device growth ○ Tracking of individual cell phones

33 Read the Interactive Session and discuss the following questions Interactive Session: Technology  Why do mobile phone manufacturers (Apple, Google, and BlackBerry) want to track where their customers go?  Do you think mobile phone customers should be able to turn tracking off? Should customers be informed when they are being tracked? Why or why not?  Do you think mobile phone tracking is a violation of a person’s privacy? Life on the Grid: iPhone becomes iTrack


Download ppt "Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,"

Similar presentations


Ads by Google