+ All Categories
Home > Documents > Ethics In Computing

Ethics In Computing

Date post: 02-Jan-2016
Category:
Upload: kelsey-long
View: 30 times
Download: 1 times
Share this document with a friend
Description:
Ethics In Computing. Aimee Shirreffs Kevin Silver Jin Zhang. Introduction. Ethics: The branch of philosophy dealing with morality, distinguishing between right & wrong. Derived from: “Ethos”- character in Greek “mores”- customs in Latin. Topics. Aimee: Electronic Medical Records - PowerPoint PPT Presentation
Popular Tags:
14
Ethics In Ethics In Computing Computing Aimee Shirreffs Aimee Shirreffs Kevin Silver Kevin Silver Jin Zhang Jin Zhang
Transcript
Page 1: Ethics In Computing

Ethics In ComputingEthics In Computing

Aimee ShirreffsAimee Shirreffs

Kevin SilverKevin Silver

Jin ZhangJin Zhang

Page 2: Ethics In Computing

IntroductionIntroduction

Ethics: The branch of philosophy Ethics: The branch of philosophy dealing with morality, distinguishing dealing with morality, distinguishing between right & wrong.between right & wrong.

Derived from: Derived from: • ““Ethos”-Ethos”-character in Greekcharacter in Greek• ““mores”-mores”-customs in Latincustoms in Latin

Page 3: Ethics In Computing

TopicsTopics

Aimee: Electronic Medical RecordsAimee: Electronic Medical Records

Unsecured Wireless NetworksUnsecured Wireless Networks

Kevin: SpywareKevin: Spyware Sony Rootkit Sony Rootkit

Jin: International EthicsJin: International Ethics Hacking Hacking

Page 4: Ethics In Computing

Electronic Medical RecordsElectronic Medical Records

EMR: A medical record stored and EMR: A medical record stored and accessed in digital formataccessed in digital format

Past, Present & Future EMR’sPast, Present & Future EMR’s Failed Icelandic projectFailed Icelandic project Alberta Netcare, CanadaAlberta Netcare, Canada The NHS centralised EMR begins The NHS centralised EMR begins

uploading data in 2007uploading data in 2007

Page 5: Ethics In Computing

Electronic Medical RecordsElectronic Medical Records

Ethical Issues arise due to:Ethical Issues arise due to:• Conflicting opinions between individuals Conflicting opinions between individuals

and groups in societyand groups in society• Concern over who can and who will have Concern over who can and who will have

access to an EMRaccess to an EMR• Patient consent and the apparent lack of Patient consent and the apparent lack of

empowerment it offers empowerment it offers

Sources include The Guardian, Journal of Sources include The Guardian, Journal of Medical Research, Financial TimesMedical Research, Financial Times

Page 6: Ethics In Computing

Unsecured Wireless NetworksUnsecured Wireless Networks

The advent of Wi-Fi technology has The advent of Wi-Fi technology has created new opportunities created new opportunities andand new new concernsconcerns

Alarmingly, approximately 80% of US Alarmingly, approximately 80% of US residential Wireless Networks will be residential Wireless Networks will be classified as “unsecure” in 2007classified as “unsecure” in 2007

Current laws are not in place, so we Current laws are not in place, so we must be guided by ethics…must be guided by ethics…

Page 7: Ethics In Computing

Unsecured Wireless NetworksUnsecured Wireless Networks

Ethical dilemmas relate to:Ethical dilemmas relate to:• Wardrivers & wardrivingWardrivers & wardriving• Wireless “piggybackers” Wireless “piggybackers” • The differing opinions between The differing opinions between

individuals and these groups of their individuals and these groups of their conductsconducts

• The difficulty of defining where the The difficulty of defining where the boundary lies between ethics and the boundary lies between ethics and the law in new technologieslaw in new technologies

Sources include zdnet.com, NY Times, Sources include zdnet.com, NY Times, online news articles & blogsonline news articles & blogs

Page 8: Ethics In Computing

HackingHacking

What is Hacking?What is Hacking?

Why Hack?Why Hack?1)1) ChallengeChallenge

2)2) Desire MoneyDesire Money

3)3) Steal InformationSteal Information

4)4) Destroy SystemsDestroy Systems

Page 9: Ethics In Computing

HackingHacking

Hacker TypesHacker Types1)1) White HatsWhite Hats

Ethical HackersEthical Hackers Opposed to abuse of Computer SystemsOpposed to abuse of Computer Systems Hack Systems to illuminate flawsHack Systems to illuminate flaws

2)2) Black HatsBlack Hats Criminal HackersCriminal Hackers Promote freedom and accesibilityPromote freedom and accesibility

3)3) Grey HatsGrey Hats Release information about security holes to publicRelease information about security holes to public Do so indiscriminately and without regard to Do so indiscriminately and without regard to

consequencesconsequences Ethically between Black and WhiteEthically between Black and White

Page 10: Ethics In Computing

International EthicsInternational Ethics

America vs ChinaAmerica vs China

Similarities:Similarities: Chat Room ContentChat Room Content TheftTheft PiracyPiracy

DifferencesDifferences PornographyPornography

Legitimate Market in AmericaLegitimate Market in America Completely illegal in ChinaCompletely illegal in China

Internet CaféInternet Café No under 18’s in chinaNo under 18’s in china

Online GamblingOnline Gambling Illegal in ChinaIllegal in China

Page 11: Ethics In Computing

Spyware/AdwareSpyware/Adware

Spyware: Spyware: Computer software that collects personal information about Computer software that collects personal information about

a user without their informed consent. a user without their informed consent.

Term is used interchangably with malwareTerm is used interchangably with malware

Adware:Adware: any software package which automatically plays, displays, any software package which automatically plays, displays,

or downloads advertising material to a computer after the or downloads advertising material to a computer after the software is installed on it or while the application is being software is installed on it or while the application is being used. used.

Page 12: Ethics In Computing

Spyware/AdwareSpyware/Adware

Ethical issuesEthical issues Adware Adware

• Not necessarily considered malwareNot necessarily considered malware• Should companies be allowed to advertise in this Should companies be allowed to advertise in this

way?way?• Inconvenience for usersInconvenience for users

SpywareSpyware• Commonly considered malwareCommonly considered malware• Businesses use hidden spyware in their products Businesses use hidden spyware in their products

for advertising – Right or wrong?for advertising – Right or wrong?

Page 13: Ethics In Computing

Sony RootkitSony Rootkit

Rootkit:Rootkit:• A rootkit is a set of software tools used by a third party A rootkit is a set of software tools used by a third party

after gaining access to a computer system. These tools after gaining access to a computer system. These tools conceal running processes, files or system data, which conceal running processes, files or system data, which helps maintain access to a system without the user’s helps maintain access to a system without the user’s knowledge. knowledge.

Serves to conceal malicious software such as Serves to conceal malicious software such as

spyware spyware

Page 14: Ethics In Computing

Sony RootkitSony Rootkit

2005 Sony BMG CD copy protection scandal2005 Sony BMG CD copy protection scandal

““We will develop technology that transcends the individual user. We We will develop technology that transcends the individual user. We will firewall Napster at source - we will block it at your cable will firewall Napster at source - we will block it at your cable company, we will block it at your phone company, we will block it company, we will block it at your phone company, we will block it at your [ISP]. We will firewall it at your PC...These strategies are at your [ISP]. We will firewall it at your PC...These strategies are being aggressively pursued because there is simply too much at being aggressively pursued because there is simply too much at stake.”stake.”

Sony Pictures Entertainment US senior VPSony Pictures Entertainment US senior VP

Steve Heckler Steve Heckler

Sony installed software as a Copy Protection measureSony installed software as a Copy Protection measure

Left computers vulnerable to virus/hacker attackLeft computers vulnerable to virus/hacker attack


Recommended