Social Issues

Download Report

Transcript Social Issues

Social Issues
CS 1308 Computer Literacy and the Internet
How do we look at Social Issues?
 Financial
 Moral
 Ethical
 Legal
The ATM
 Convenience
 Unemployment
 Alienation and Customer Service
 Crime
 Loss of Privacy
 Errors
Philosophical Issues
 Do we have a right to Privacy?
 Is it in the Constitution?
 Value of Privacy
 Right to Privacy?
 Warren and Brandeis
 People have the right to prohibit publication of facts and photographs
 JJ Thomson
 Depends on the kind of information, some is public
 Posner Economics of Privacy
 Information has inherent value
Consumer Information
 Data mining (How is the data gathered?)
 Junk Mail
 Credit Bureaus
 Medical Information
Government Files
 Computer Matching
 Computer Profiling
 IRS
 National Crime Information Center
 US Census
 SSN
Questions
1) Should the United States create a system with a National
Health Card?
2) Should all the public records in the court system be placed
on the internet for easy retrieval?
Uses of Encryption
 Electronic transfer
 Personal information
 Financial data
 Medical records
 Trade secrets
 Cable TV signals
 Others…
Is it Needed?
 Protection from Terrorists and Criminals
 300-500 legal wiretaps per year in ’80s and 90’s
 Cost?
 Necessity?
 Global Competition
Key Escrow
 Government Key Escrow
 Clipper Chip
 Commercial Key Escrow
 Employee not available
 Malicious actions
Computer Crime
 Fraud
 Theft
 Hacking
Customer Fraud
 Common scams
 Fraudulent internet sites
 Incorrect bar code scanning
 How do these compare to the “rigged gas station” or “coffee
can?”
Defending Against Fraud
 Credit Cards
 Authenticate first use
 Signatures
 Photos
 “One-time-only” cards
 Is the situation different because of the internet?
Fraud and Embezzlement
 “Insider” crimes
 Defending against insider crimes
 Common Fraud
 Credit Cards
 ATMs
 Telecommunications
 Satellite/Cable TV
Sabotage and Information Theft
 Insider attacks
 Logic Bombs
 Deleting or encrypting files
 Outside attacks
 Competitors
 “Hackers”
Hacking
 The meaning of the word has changed
 Traditional hacking
 Stolen disk space
 Rerouting and stealing phone service
 “Captain Crunch”
 Internet hacking
 Denial of service attacks
 Web site defacing
 Theft of information
Security Weakness
 Why is security so weak?
 Poor network administration
 Operating System design
 If they can’t find me…
 Security through secrecy
 New issues
 Broadband to the home
Computer Crime Law
 Old laws were not enough
 New laws difficult to write in time to keep up with
technology
 Laws tend to punish “crimes against the state” at a higher
level
 Where to prosecute?
Ethical Issues
 Is hacking good?
 Exposes security flaws
 Information should be free
 Phone companies are ripping us off anyway
Intellectual Property
 How valuable are ideas?
 DMCA
Copyright
 Gives copyright holder exclusive rights to:
 Make copies
 Produce derivative works such as translations or movies based
on books
 Distribute copies
 Perform work in public
 Display work in public
Fair Use Doctrine
 Uses the following factors:
 Purpose and nature of the use
 Nonprofit, educational
 Nature of the work
 Amount and significance of the work used
 The effect of the use on market value or potential profit
Fair Use Cases
 Videotaping
 Internet
 Posting copyrighted material
 Reusing copyrighted material
 Graphics
 CGI scripts
 Multiple computers
Patents
 Reward the inventor with exclusivity
 Protects “things” and processes
 Not individual expressions
 Patent Office not technical experts
Software Piracy
 Protecting software copyright




Laws
Hardware solutions
Software solutions
Contractual changes
 Software Publishers Association (SPA)
 Free Software?
 Richard Stallman
Cyber Gap
 Future jobs
 White Collar vs. Blue Collar
 Service Industry
 Computers taking “skilled” jobs
 Drafting
 Programming
 Education
Information Access
 Universal Access
 Is it necessary?
 A place to go
 Easy to use hardware and software
 ADA
 Training
 Affordability
 Subsidized?
Political Issues
 Information is a force for freedom
 Freedom of the press
 Curtailing information flow
 China
 Vietnam
 Singapore
 US
 Iran
 Internet developed to withstand failure
 Sees censorship as a system failure