gordana dodig-crnkovic department of computer science and engineering mälardalen university 2003

34
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590 LECTURE 10

Upload: tamra

Post on 11-Feb-2016

17 views

Category:

Documents


3 download

DESCRIPTION

PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590 LECTURE 10. Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003. Ethics, Privacy and Civil Liberties. Some common uses of data about people. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

1

Gordana Dodig-Crnkovic

Department of Computer Science and Engineering

Mälardalen University2003

PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING

CD5590 LECTURE 10

Page 2: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

2

Ethics, Privacy and Civil Liberties

Page 3: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

3

Some common uses of data about people

Public Information Business Transactions

Birth Certificates Mail OrdersDriver Licenses Telephone OrdersCar Registrations SubscriptionsProperty Records DonationsMarriage License Credit CardsCensus Records Warranty CardsTelephone Directories Tattslotto, ...Consumer Surveys Accounts Payments PassportsVisas

Page 4: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

4

which can lead to.. Multiple Mailing Lists

SubscriptionsEntertainment SpecialsDonationsMembershipsCataloguesSocial ClubsProfessional Development

Some common uses of data about people

Page 5: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

5

Public Information Business Transactions

Birth Certificates Mail OrdersDriver Licenses Telephone OrdersCar Registrations SubscriptionsProperty Records DonationsMarriage License Credit CardsCensus Records Warranty CardsTelephone Directories Tattslotto, ...Consumer Surveys Accounts Payments PassportsVisas

Ethics, Privacy and Security Some common uses of data about people

Page 6: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

6

Multiple Mailing Lists

SubscriptionsEntertainment SpecialsDonationsMembershipsCataloguesSocial ClubsProfessional Development

Ethics, Privacy and Security

Page 7: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

7

Privacy: The right of people not to reveal information about themselves, the right to keep personal information from being misused

Electronic invasion of personal data has become a serious ethical issue

Ethics, Privacy and Security

Page 8: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

8

Invasion of Privacy. Would you agree to: Your shopping habits, your income, to be

available to any number of businesses ? Your medical records being used by your

employer as one of the means of making decision regarding promotions, hiring, redundancy ?

Ethics, Privacy and Security

Page 9: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

9

Ethics, Privacy and SecurityUS

The rapid expansion of use of the Internet and E-Commerce has raised many problems with privacy aspects.

In America there exists the ‘Association of Corporate Privacy Officers’ which would indicate that there is much interest and concern regarding privacy of data.

Page 10: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

10

Ethics, Privacy and SecurityUS

Privacy Officers :- train employees about privacy- examine a company’s policies for potential risks- manage customer-privacy disputes- inform senior executives on how the company deals with privacy issues

Page 11: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

11

Database Security: is the protection of a database from– unauthorised access– unauthorised modification– destruction

PRIVACY is the right of individuals to have some control over information about themselves

INTEGRITY refers to the correctness, completeness and consistency of data

Security

Page 12: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

12

AIM PREVENTS- Confidentiality - Unauthorised disclosure- Integrity - Unauthorised Amendment- Availability - Unauthorised Withholding

Security Systems:1. Computer Security2. Communications Security

- transmission- encryption

3. Procedural security4. Physical security

http://www.csse.monash.edu.au/courseware/cse1720/Week12.ppt

Security

Page 13: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

13

Civil Rights and Civil Liberties

Page 14: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

14

What are civil rights and what are civil liberties?

Civil Rights = The right of every person to equal protection under the law and equal access to society’s opportunities and public facilities.

Civil Liberties = Individual rights that are protected from infringement by government.

Page 15: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

15

CIVIL LIBERTIES1. The Bill of Rights2. First Amendment: Freedom of

Religion3. First Amendment: Freedom of

Speech and Press4. The Right to Keep and Bear Arms5. The Rights of Criminal Defendants6. The Right to Privacy

Page 16: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

16

Civil liberties are the personal rights and freedoms that the federal government cannot abridge, either by law, constitution, or judicial interpretation.

These are limitations on the power of government to restrain or dictate how individuals act.

CIVIL LIBERTIES

Page 17: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

17

The Right to Privacy

Privacy is not specifically mentioned in the Constitution, nevertheless some areas are to be off-limits to government interference.

Examples:

– The right to Abortion– The right to Homosexuality– The Right to Die

Page 18: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

18

Civil Liberties after Sept 11

Page 19: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

19

Privacy before Sept. 11th

Tradeoff between security and privacy has always been a major issue for most Americans

Most sided with privacy at the expense of security

84% of Americans were concerned about the government, businesses, or individuals collecting information on them

Page 20: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

20

Privacy Before Sept 11th, cont.

54% were “very concerned” Only a minor portion of America (13%)

supported FBI internet surveillance to catch criminals

62% of Americans thought that new laws should be created to guarantee that privacy would be protected from government agencies

Page 21: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

21

9.11.2001

On September 11, 2001, terrorists attacked the World Trade Center in New York City and the Pentagon just outside Washington, D.C.

Page 22: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

22

NYTimes Poll 4/23/97

NYTimes Poll 9/27/01

29% wanted stronger laws at cost of civil liberties

55% want stronger laws at cost of civil liberties

62% did not want new laws

35% do not want new laws

Majority wanted protection from government

72% think antiencryption laws would prevent another attack

Shift in Public Opinion

Page 23: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

23

Government Reaction

The government is reacting to public opinion polls and are passing new controversial laws that expand government power

Have already passed many ‘anti-terrorism’ bills that cover matters such as wiretaps, electronic surveillance, regulation of airports, etc.

Page 24: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

24

Internet wiretapping scheme Installed at ISPs (Internet Service

Providers) Maintained and operated by FBI Monitors all email, both incoming and

outgoing

Page 25: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

25

Cryptography

Evidence produced from the Libyan bombings that Osama bin Laden, the suspected mastermind behind the 9/11 attacks, used phones scrambled by strong cryptography to hide the planning of the Libyan bombings

Evidence produced by the US government suggests that similar methods were used by the terrorist network for 9/11 attacks as well

Page 26: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

26

Cryptography

The US government has charged that such cryptography aids terrorism more than it protects privacy and therefore should be banned

Page 27: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

27

Conclusions

Public opinion will most likely remain concerned with security for months and years to come

Government expanding law enforcement powers

Privacy subordinated public safety

http://www.cs.dartmouth.edu/~cs7/papers/zachary-pr.ppt

Page 28: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

28

Ethical Challenges in a Public Health Crisis –

SARS Epidemic

Page 29: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

29

Page 30: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

30

Page 31: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

31

Page 32: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

32

Page 33: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

33

Page 34: Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003

34Reference: Ross Upshur, University of Torontohttp://phs.med.utoronto.ca/sars2003/Upshur%20SARS.pdf