Date post: | 02-Jan-2016 |
Category: |
Documents |
Upload: | kelsey-long |
View: | 30 times |
Download: | 1 times |
Ethics In ComputingEthics In Computing
Aimee ShirreffsAimee Shirreffs
Kevin SilverKevin Silver
Jin ZhangJin Zhang
IntroductionIntroduction
Ethics: The branch of philosophy Ethics: The branch of philosophy dealing with morality, distinguishing dealing with morality, distinguishing between right & wrong.between right & wrong.
Derived from: Derived from: • ““Ethos”-Ethos”-character in Greekcharacter in Greek• ““mores”-mores”-customs in Latincustoms in Latin
TopicsTopics
Aimee: Electronic Medical RecordsAimee: Electronic Medical Records
Unsecured Wireless NetworksUnsecured Wireless Networks
Kevin: SpywareKevin: Spyware Sony Rootkit Sony Rootkit
Jin: International EthicsJin: International Ethics Hacking Hacking
Electronic Medical RecordsElectronic Medical Records
EMR: A medical record stored and EMR: A medical record stored and accessed in digital formataccessed in digital format
Past, Present & Future EMR’sPast, Present & Future EMR’s Failed Icelandic projectFailed Icelandic project Alberta Netcare, CanadaAlberta Netcare, Canada The NHS centralised EMR begins The NHS centralised EMR begins
uploading data in 2007uploading data in 2007
Electronic Medical RecordsElectronic Medical Records
Ethical Issues arise due to:Ethical Issues arise due to:• Conflicting opinions between individuals Conflicting opinions between individuals
and groups in societyand groups in society• Concern over who can and who will have Concern over who can and who will have
access to an EMRaccess to an EMR• Patient consent and the apparent lack of Patient consent and the apparent lack of
empowerment it offers empowerment it offers
Sources include The Guardian, Journal of Sources include The Guardian, Journal of Medical Research, Financial TimesMedical Research, Financial Times
Unsecured Wireless NetworksUnsecured Wireless Networks
The advent of Wi-Fi technology has The advent of Wi-Fi technology has created new opportunities created new opportunities andand new new concernsconcerns
Alarmingly, approximately 80% of US Alarmingly, approximately 80% of US residential Wireless Networks will be residential Wireless Networks will be classified as “unsecure” in 2007classified as “unsecure” in 2007
Current laws are not in place, so we Current laws are not in place, so we must be guided by ethics…must be guided by ethics…
Unsecured Wireless NetworksUnsecured Wireless Networks
Ethical dilemmas relate to:Ethical dilemmas relate to:• Wardrivers & wardrivingWardrivers & wardriving• Wireless “piggybackers” Wireless “piggybackers” • The differing opinions between The differing opinions between
individuals and these groups of their individuals and these groups of their conductsconducts
• The difficulty of defining where the The difficulty of defining where the boundary lies between ethics and the boundary lies between ethics and the law in new technologieslaw in new technologies
Sources include zdnet.com, NY Times, Sources include zdnet.com, NY Times, online news articles & blogsonline news articles & blogs
HackingHacking
What is Hacking?What is Hacking?
Why Hack?Why Hack?1)1) ChallengeChallenge
2)2) Desire MoneyDesire Money
3)3) Steal InformationSteal Information
4)4) Destroy SystemsDestroy Systems
HackingHacking
Hacker TypesHacker Types1)1) White HatsWhite Hats
Ethical HackersEthical Hackers Opposed to abuse of Computer SystemsOpposed to abuse of Computer Systems Hack Systems to illuminate flawsHack Systems to illuminate flaws
2)2) Black HatsBlack Hats Criminal HackersCriminal Hackers Promote freedom and accesibilityPromote freedom and accesibility
3)3) Grey HatsGrey Hats Release information about security holes to publicRelease information about security holes to public Do so indiscriminately and without regard to Do so indiscriminately and without regard to
consequencesconsequences Ethically between Black and WhiteEthically between Black and White
International EthicsInternational Ethics
America vs ChinaAmerica vs China
Similarities:Similarities: Chat Room ContentChat Room Content TheftTheft PiracyPiracy
DifferencesDifferences PornographyPornography
Legitimate Market in AmericaLegitimate Market in America Completely illegal in ChinaCompletely illegal in China
Internet CaféInternet Café No under 18’s in chinaNo under 18’s in china
Online GamblingOnline Gambling Illegal in ChinaIllegal in China
Spyware/AdwareSpyware/Adware
Spyware: Spyware: Computer software that collects personal information about Computer software that collects personal information about
a user without their informed consent. a user without their informed consent.
Term is used interchangably with malwareTerm is used interchangably with malware
Adware:Adware: any software package which automatically plays, displays, any software package which automatically plays, displays,
or downloads advertising material to a computer after the or downloads advertising material to a computer after the software is installed on it or while the application is being software is installed on it or while the application is being used. used.
Spyware/AdwareSpyware/Adware
Ethical issuesEthical issues Adware Adware
• Not necessarily considered malwareNot necessarily considered malware• Should companies be allowed to advertise in this Should companies be allowed to advertise in this
way?way?• Inconvenience for usersInconvenience for users
SpywareSpyware• Commonly considered malwareCommonly considered malware• Businesses use hidden spyware in their products Businesses use hidden spyware in their products
for advertising – Right or wrong?for advertising – Right or wrong?
Sony RootkitSony Rootkit
Rootkit:Rootkit:• A rootkit is a set of software tools used by a third party A rootkit is a set of software tools used by a third party
after gaining access to a computer system. These tools after gaining access to a computer system. These tools conceal running processes, files or system data, which conceal running processes, files or system data, which helps maintain access to a system without the user’s helps maintain access to a system without the user’s knowledge. knowledge.
Serves to conceal malicious software such as Serves to conceal malicious software such as
spyware spyware
Sony RootkitSony Rootkit
2005 Sony BMG CD copy protection scandal2005 Sony BMG CD copy protection scandal
““We will develop technology that transcends the individual user. We We will develop technology that transcends the individual user. We will firewall Napster at source - we will block it at your cable will firewall Napster at source - we will block it at your cable company, we will block it at your phone company, we will block it company, we will block it at your phone company, we will block it at your [ISP]. We will firewall it at your PC...These strategies are at your [ISP]. We will firewall it at your PC...These strategies are being aggressively pursued because there is simply too much at being aggressively pursued because there is simply too much at stake.”stake.”
Sony Pictures Entertainment US senior VPSony Pictures Entertainment US senior VP
Steve Heckler Steve Heckler
Sony installed software as a Copy Protection measureSony installed software as a Copy Protection measure
Left computers vulnerable to virus/hacker attackLeft computers vulnerable to virus/hacker attack