cs 1308 computer literacy and the internet. how do we look at social issues? financial moral ...
TRANSCRIPT
![Page 1: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/1.jpg)
CS 1308 Computer Literacy and the Internet
![Page 2: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/2.jpg)
How do we look at Social Issues? Financial Moral Ethical Legal
![Page 3: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/3.jpg)
The ATM
Convenience Unemployment Alienation and Customer Service Crime Loss of Privacy Errors
![Page 4: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/4.jpg)
Philosophical Issues
Do we have a right to Privacy? Is it in the Constitution?
Value of Privacy Right to Privacy?
Warren and Brandeis People have the right to prohibit publication of facts and
photographs JJ Thomson
Depends on the kind of information, some is public
Posner Economics of Privacy Information has inherent value
![Page 5: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/5.jpg)
Consumer Information
Data mining (How is the data gathered?)
Junk Mail Credit Bureaus Medical Information
![Page 6: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/6.jpg)
Government Files
Computer Matching Computer Profiling IRS National Crime Information Center US Census SSN
![Page 7: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/7.jpg)
Questions
1) Should the United States create a system with a National Health Card?
2) Should all the public records in the court system be placed on the internet for easy retrieval?
![Page 8: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/8.jpg)
Uses of Encryption
Electronic transfer Personal information Financial data Medical records Trade secrets Cable TV signals Others…
![Page 9: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/9.jpg)
Is it Needed?
Protection from Terrorists and Criminals
300-500 legal wiretaps per year in ’80s and 90’s Cost? Necessity?
Global Competition
![Page 10: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/10.jpg)
Key Escrow
Government Key Escrow Clipper Chip
Commercial Key Escrow Employee not available Malicious actions
![Page 11: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/11.jpg)
Computer Crime
Fraud Theft Hacking
![Page 12: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/12.jpg)
Customer Fraud
Common scams Fraudulent internet sites Incorrect bar code scanning
How do these compare to the “rigged gas station” or “coffee can?”
![Page 13: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/13.jpg)
Defending Against Fraud
Credit Cards Authenticate first use Signatures Photos “One-time-only” cards
Is the situation different because of the internet?
![Page 14: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/14.jpg)
Fraud and Embezzlement
“Insider” crimes Defending against insider crimes
Common Fraud Credit Cards ATMs Telecommunications Satellite/Cable TV
![Page 15: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/15.jpg)
Sabotage and Information Theft Insider attacks
Logic Bombs Deleting or encrypting files
Outside attacks Competitors “Hackers”
![Page 16: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/16.jpg)
Hacking
The meaning of the word has changed Traditional hacking
Stolen disk space Rerouting and stealing phone service
“Captain Crunch”
Internet hacking Denial of service attacks Web site defacing Theft of information
![Page 17: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/17.jpg)
Security Weakness
Why is security so weak? Poor network administration Operating System design
If they can’t find me… Security through secrecy
New issues Broadband to the home
![Page 18: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/18.jpg)
Computer Crime Law
Old laws were not enough New laws difficult to write in time to
keep up with technology Laws tend to punish “crimes against
the state” at a higher level Where to prosecute?
![Page 19: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/19.jpg)
Ethical Issues
Is hacking good? Exposes security flaws Information should be free Phone companies are ripping us off
anyway
![Page 20: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/20.jpg)
Intellectual Property
How valuable are ideas? DMCA
![Page 21: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/21.jpg)
Copyright
Gives copyright holder exclusive rights to: Make copies Produce derivative works such as
translations or movies based on books Distribute copies Perform work in public Display work in public
![Page 22: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/22.jpg)
Fair Use Doctrine
Uses the following factors: Purpose and nature of the use
Nonprofit, educational Nature of the work Amount and significance of the work
used The effect of the use on market value or
potential profit
![Page 23: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/23.jpg)
Fair Use Cases
Videotaping Internet
Posting copyrighted material Reusing copyrighted material
Graphics CGI scripts
Multiple computers
![Page 24: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/24.jpg)
Patents
Reward the inventor with exclusivity Protects “things” and processes
Not individual expressions Patent Office not technical experts
![Page 25: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/25.jpg)
Software Piracy
Protecting software copyright Laws Hardware solutions Software solutions Contractual changes
Software Publishers Association (SPA)
Free Software? Richard Stallman
![Page 26: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/26.jpg)
Cyber Gap
Future jobs White Collar vs. Blue Collar Service Industry Computers taking “skilled” jobs
Drafting Programming
Education
![Page 27: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/27.jpg)
Information Access
Universal Access Is it necessary? A place to go Easy to use hardware and software
ADA Training
Affordability Subsidized?
![Page 28: CS 1308 Computer Literacy and the Internet. How do we look at Social Issues? Financial Moral Ethical Legal](https://reader030.vdocuments.site/reader030/viewer/2022032707/56649e025503460f94aed2bc/html5/thumbnails/28.jpg)
Political Issues
Information is a force for freedom Freedom of the press Curtailing information flow
China Vietnam Singapore US Iran
Internet developed to withstand failure Sees censorship as a system failure