Presentation is loading. Please wait.

Presentation is loading. Please wait.

CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net.

Similar presentations


Presentation on theme: "CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net."— Presentation transcript:

1 CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

2 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 2 12/8/2015 Overview 1. Assignment and Paper Example 2. Finishing Professional Ethics Student Slides 3. Judging Ethics Continued 4. Crime 5. Assignment

3 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 3 12/8/2015 Assignment Search online for information about yourself and post on myWPI.  Create your own thread on the discussion board and list what you found… or a brief description if you’d rather not share details.  Can any of this data be used to cause harm?  Specify if you authorized use of the data?  If not, request its use be discontinued and post the correspondence, minus any personal information you wish to exclude.  Try digging deeper than a search engine’s (Google, etc.) results.  Cite where Chapter 2 describes your experiences.  Try finding stuff out about your classmates and post what you find and where to their threads.

4 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 4 12/8/2015 Example Paper - Christopher Ramsley The Point: “ On page 46 of A Gift of Fire, the author explains that in 1996, it was found that the White House maintained a database of 200,000 people, listing over a hundred fields of information. This violates a few key principles found in Appendix A of the same book, and the programmers responsible did not act ethically according to this ethical code.”

5 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 5 12/8/2015 Example Paper - Christopher Ramsley Justify Point: “ In the public principle, the people involved did not act with the public interest, even if they thought they did it to protect the country. They instead violated laws that protect the privacy and individuality of citizens. They participated in the collection and storage of information that was obtained without consent, which was illegal under the Privacy Act of 1974. In the area of the profession principle, the programmers responsible for the database did not promote an environment favorable to acting ethically, nor did they promote any positive public knowledge about their profession. Instead their actions encourages unethical behavior and demonstrated a lack of ethics within their profession to the general public. Likewise, in the area of the principle of the self, the programmers did not promote an ethical approach to software development, nor did they find that acting unethically was inconsistent with the correct development of software.”

6 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 6 12/8/2015 Example Paper - Christopher Ramsley Defend Against Counterpoint: “ It is possible that the programmers acted in the interest of public safety, and that they are justified because they were trying to protect citizens, but in doing so, they violated personal freedoms that all citizens are promised. This is a breaking of an agreement without notification at the very least, and a violation of the inherent rights of human beings at the worst.”

7 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 7 12/8/2015 Overview 1. Assignment and Paper Example 2. Finishing Professional Ethics Student Slides 3. Judging Ethics Continued 4. Crime 5. Assignment

8 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 8 12/8/2015 Codes of Computer Ethics ACM/IEEE-CS  Principles Public Client And Employer Product Judgment Management Profession Colleagues Self

9 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 9 12/8/2015 Galia Traub - Barbers True because Wikipedia says so

10 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 10 12/8/2015 Management - Galia Traub Organizational Leadership Imperatives or “Management” Be a good leader and make sure your organization upholds the code of ethics Example of the code not upheld: Sony Rootkits “Most people don't even know what a rootkit is, so why should they care about it?” ~ Thomas Hesse, Sony BMG's president of global digital business

11 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 11 12/8/2015 Codes of Computer Ethics ACM  General Moral Imperatives Contribute to society and human well being Avoid harm to others Be honest and trustworthy Be fair and take action not to discriminate Honor property rights including copyrights and patent Give proper credit for intellectual property Respect the privacy of others Honor Confidentiality

12 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 12 12/8/2015 Joe - Contribute to Society and Human Well Being I choose to use as an example the owners of BONZI Software, Joe and Jay Bonzi. BONZI Software was responible for distrubuting the software BonziBUDDY, which was an "intelligent software agent" that would communicate to the user by using Microsoft Agent. When BonziBUDDY was running, it would record information about the user, alter their homepage without their permission, and generally just annoy the user. This example shows Joe and Jay violating this part of the code of ethics by releasing a piece of software that violated a persons' fundamental human right, the right to privacy. The result, they where ordered to pay $75,000 in fees and required to change several aspects of their software.

13 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 13 12/8/2015 Be Honest and Trustworthy - Ekaterina Ratcheva Honest vs. Trust  What is honest?  The importance of honest in a computer company Examples  http://www.pcworld.com/article/id,124508-page,1/article.html http://www.pcworld.com/article/id,124508-page,1/article.html Antispyware Company Sued Under Spyware Law  http://www.ripoffreport.com/reports/0/240/RipOff0240304.htm http://www.ripoffreport.com/reports/0/240/RipOff0240304.htm Hewlett Packard Violation of warranty terms - Lack of customer service Ripoff Palo Alto California  http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection _scandal http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection _scandal 2005 Sony BMG CD copy prevention scandal

14 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 14 12/8/2015 Mandela - Honor Property Rights Including Copyrights and Patent Don Perreira, a twenty seven year old was sentenced for four months of imprisonment followed by home confinement and three years of supervised release because he was found twice guilty of copyright infringement. He used to distribute modified Microsoft X-Box game consoles with preinstalled copyright video game software. These consoles that he distributed came preloaded with hundreds of video games, movies, music videos and pictures unlike the ones that one gets from Best Buy or Circuit City. This case was investigated by the FBI Cyber Crimes Squad, and Perreira was prosecuted by the Assistant U.S. Attorney Tracy Hino.

15 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 15 12/8/2015 Codes of Computer Ethics ACM  Professional Responsibilities  Organizational Leadership Imperatives  Compliance With The Code Why have these things? Give examples when these should have been followed  Why?

16 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 16 12/8/2015 Overview 1. Assignment and Paper Example 2. Finishing Professional Ethics Student Slides 3. Judging Ethics Continued 4. Crime 5. Assignment

17 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 17 12/8/2015 Judgment I (pp. 418-419) Brainstorming  Identify risks, issues, problems, consequences.  List stakeholders.  List possible actions.

18 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 18 12/8/2015 Judgment II Analysis  Identify responsibilities of decision maker.  Identify rights of stakeholders Positive and negative  Consider consequences  Check codes and ethics principles.  Analyze each option.  Choose

19 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 19 12/8/2015 Cases From Book  Copying employee’s files  Privacy protection  Risky systems  Whistle-blowing  Release of personal information  Conflict of interest  Test plan  Copyright violation  Foreign programmers Other Cases?

20 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 20 12/8/2015 Overview 1. Assignment and Paper Example 2. Finishing Professional Ethics Student Slides 3. Judging Ethics Continued 4. Crime 5. Assignment

21 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 21 12/8/2015 Crime Why Why? Some abstract thoughts.  Why do people do things which some people say they shouldn’t?

22 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 22 12/8/2015 Crime Time What is different now compared to:  10 years ago?  20 years ago?  30 years ago?

23 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 23 12/8/2015 Crime Doers Hacker or Cracker  Pre-1980 - Golden Age ?  Eighties  Nineties  Naughts Criminal Hacking == Cracking?

24 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 24 12/8/2015 Crime Or Not To Crime Justifications for (Cr/H)acking? What can be done by (Cr/H)acker after access is gained?  What resources are available?

25 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 25 12/8/2015 Crime How Technical and Non-Technical  Break into computer.  Prevent access to computer. What things make crime easy?

26 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 26 12/8/2015 Crime Gain How valuable?  Equipment  Processor Time  Disk space  Printer time / paper  Bandwidth

27 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 27 12/8/2015 Crime Bane How harmful?  Viruses  Spam

28 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 28 12/8/2015 Overview 1. Assignment and Paper Example 2. Finishing Professional Ethics Student Slides 3. Judging Ethics Continued 4. Crime 5. Assignment

29 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 29 12/8/2015 Assignment Encryption  Read Chapter 3. Short paper: State a point for or against the National ID System, or a facet thereof, as talked about in the text. Please include references in addition to the book. The text book was published a few years ago so there should be some interesting developments since then. Answer short individual questions assigned during class.

30 CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 30 12/8/2015 Assignment - Self Search Post all the ways you searched for information, 1 post per way. There will be a special thread for this. Do not repeat an entry made. Use all the methods posted in the thread mentioned above and post each result in your own thread. Search for information on your classmates and post each source to their threads. Do not repeat information already in the thread. Say which method from the thread mentioned above was used. For each source of data posted on your thread answer:  Exactly how did the data get there?  Can any of this data be used to cause harm?  Can any of this data be used for profit? Will you profit?  Did you authorized use of the data?  If not, request its use be discontinued and post the correspondence.  Maybe you’d rather share in the profit, if any. Post that kind correspondence as well.  Cite where Chapter 2 describes your experiences.

31 CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 31 Class 6 The End Keith A. Pray Instructor socialimps.keithpray.net


Download ppt "CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net."

Similar presentations


Ads by Google