Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

Similar presentations


Presentation on theme: "The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity."— Presentation transcript:

1 The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

2 2 of 28 Quiz  What is the difference between the internet and the world wide web?

3 3 of 28 Quiz (2)  Why do we need protocols for communication between computers?

4 4 of 28 Quiz (3)  Name the protocol on which all internet traffic is based.

5 5 of 28 Quiz(4)  Name the protocol that WWW clients and servers use.

6 6 of 28 Quiz (5)  What does the DNS keep a list of mappings of?

7 7 of 28 Quiz (6)  What is encryption, and why do we need it?

8 8 of 28 Ethics  What is morality? Informal rules for public interaction What conduct is “good” or “bad”  What is Ethics? Study of moral, social and legal issues Moral rules  Social guidelines  Law Cyber-ethics: relates to Internet Computer Ethics: general computer use

9 9 of 28 Privacy versus Public Protection  People's privacy should be protected: Communications, emails Web sites visited Physical location  But what about: Terrorism and crime Paedophilia Employees misusing facilities Government special powers?

10 10 of 28 Censorship  Censorship and the Internet Pornography Protection of children Filtering of inappropriate Internet traffic - how? Freedom of speech/expression Defamation Criminal activity Internet crosses borders Who is responsible?

11 11 of 28 Responsible Use of Information  Business may keep information but only use for intended purpose Use personal information to deliver product? Yes Use personal information to advertise other products? Maybe Sell personal information to another business without permission? No

12 12 of 28 Safety  Software and hardware creators responsible for safety: Medical equipment Robots  Should they be liable for damages: Pentium Processor Therac-25 Machine Operating system crashes, vulnerabilities

13 13 of 28 Computer Security & Privacy Laws  Privacy Act 1988 regulates: Collection Retention Use Disclosure  Government Data-matching Sharing information between departments Use Tax File Number as key To prevent fraud

14 14 of 28 Your Rights?  Under the Freedom of Information Act 1982 people have rights to: View information about themselves Consent to information use for other purposes Correct erroneous information about themselves  Secret databases not permitted

15 15 of 28 Spam  Spam (Unsolicited communications) Sell (often illegal) items without permission Try to trick you into providing some personal details, like banking information Deliver damaging software SPAM Filtering can help, but the problem remains. Spam examples

16 16 of 28

17 17 of 28

18 18 of 28

19 19 of 28

20 20 of 28

21 21 of 28

22 22 of 28 Spam (2)  Spam Act of 2003 Unsolicited email must not be sent Commercial emails must include who sent them Ability to unsubscribe Address harvesting illegal

23 23 of 28 Electronic Transactions  Electronic Transactions Act 1999: Electronic transactions are legal Not allowed to impersonate Not responsible if someone impersonates you  Reality: Reasonably good privacy Slow uptake of authentication technologies There have been cases of identity theft…

24 24 of 28 Copyright  Why have copyright? Financial rewards Protecting copyright owners Allowing sales  Illegal to copy information that carries a copyright, including: Software Music & Video Others (e-books, photos, web pages etc.) C

25 25 of 28 Copyright (2)  Music Some say yes, others say it increases sales. Does illegal sharing damage music industry? No. Copy music from CD I own? Maybe. Copy legal music to CD? Yes. Copy legal music to portable player? No. Share music? If authorised, Yes. Buy and download music?

26 26 of 28 Copyright Owners & Vendors  Copyright owners are the creators such as musicians, artists and authors  For software companies, programmers usually cede ownership to their employer  Copyright vendors such as book publishers, recording companies, etc. make most of the money!

27 27 of 28 Intellectual Property  Patents are like copyright, protect rights of creators, but managed differently  Patents only apply to innovations, copyright applies to any written document, even a compilation  Patents retire after 10-20 years, depending on the type, & the national law

28 28 of 28 Conclusions  Rapid technological change has transformed business and many other aspects of our lives  Rapid change challenges ethical, privacy and legal issues  Laws will probably continue to trail behind the latest technological advances


Download ppt "The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity."

Similar presentations


Ads by Google