cs 3043 social implications of computing 12/8/2015© 2004 keith a. pray 1 class 6 crime keith a....

31
CS 3043 Social Implications Of Computing 07/04/22 © 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

Upload: ambrose-boyd

Post on 17-Jan-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

04/21/23 © 2004 Keith A. Pray 1

Class 6Crime

Keith A. Pray

Instructorsocialimps.keithpray.net

Page 2: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 204/21/23

Overview

1. Assignment and Paper Example

2. Finishing Professional Ethics Student Slides

3. Judging Ethics Continued

4. Crime

5. Assignment

Page 3: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 304/21/23

Assignment

Search online for information about yourself and post on myWPI. Create your own thread on the discussion board and list

what you found… or a brief description if you’d rather not share details.

Can any of this data be used to cause harm? Specify if you authorized use of the data? If not, request its use be discontinued and post the

correspondence, minus any personal information you wish to exclude.

Try digging deeper than a search engine’s (Google, etc.) results.

Cite where Chapter 2 describes your experiences. Try finding stuff out about your classmates and post what

you find and where to their threads.

Page 4: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 404/21/23

Example Paper - Christopher RamsleyThe Point:“On page 46 of A Gift of Fire, the author explains

that in 1996, it was found that the White House maintained a database of 200,000 people, listing over a hundred fields of information. This violates a few key principles found in Appendix A of the same book, and the programmers responsible did not act ethically according to this ethical code.”

Page 5: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 504/21/23

Example Paper - Christopher RamsleyJustify Point:“In the public principle, the people involved did not act with the public interest,

even if they thought they did it to protect the country. They instead violated laws that protect the privacy and individuality of citizens. They participated in the collection and storage of information that was obtained without consent, which was illegal under the Privacy Act of 1974. In the area of the profession principle, the programmers responsible for the database did not promote an environment favorable to acting ethically, nor did they promote any positive public knowledge about their profession. Instead their actions encourages unethical behavior and demonstrated a lack of ethics within their profession to the general public. Likewise, in the area of the principle of the self, the programmers did not promote an ethical approach to software development, nor did they find that acting unethically was inconsistent with the correct development of software.”

Page 6: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 604/21/23

Example Paper - Christopher RamsleyDefend Against Counterpoint:“It is possible that the programmers acted in the interest of

public safety, and that they are justified because they were trying to protect citizens, but in doing so, they violated personal freedoms that all citizens are promised. This is a breaking of an agreement without notification at the very least, and a violation of the inherent rights of human beings at the worst.”

Page 7: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 704/21/23

Overview

1. Assignment and Paper Example

2. Finishing Professional Ethics Student Slides

3. Judging Ethics Continued

4. Crime

5. Assignment

Page 8: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 804/21/23

Codes of Computer Ethics

ACM/IEEE-CS Principles

Public Client And Employer Product Judgment Management Profession Colleagues Self

Page 9: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 904/21/23

Galia Traub - Barbers

True because Wikipedia says so

Page 10: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 1004/21/23

Management - Galia Traub

Organizational Leadership Imperatives or “Management” Be a good leader and make sure your organization upholds the code

of ethics Example of the code not upheld: Sony Rootkits “Most people don't even know what a rootkit is, so why should they

care about it?” ~ Thomas Hesse, Sony BMG's president of global digital business

Page 11: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 1104/21/23

Codes of Computer Ethics

ACM General Moral Imperatives

Contribute to society and human well being Avoid harm to others Be honest and trustworthy Be fair and take action not to discriminate Honor property rights including copyrights and patent Give proper credit for intellectual property Respect the privacy of others Honor Confidentiality

Page 12: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 1204/21/23

Joe - Contribute to Society and Human Well Being I choose to use as an example the owners of BONZI Software, Joe and

Jay Bonzi. BONZI Software was responible for distrubuting the software BonziBUDDY, which was an "intelligent software agent" that would communicate to the user by using Microsoft Agent. When BonziBUDDY was running, it would record information about the user, alter their homepage without their permission, and generally just annoy the user. This example shows Joe and Jay violating this part of the code of ethics by releasing a piece of software that violated a persons' fundamental human right, the right to privacy. The result, they where ordered to pay $75,000 in fees and required to change several aspects of their software.

Page 13: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 1304/21/23

Be Honest and Trustworthy - Ekaterina Ratcheva Honest vs. Trust

What is honest? The importance of honest in a computer company

Examples http://www.pcworld.com/article/id,124508-page,1/article.ht

ml Antispyware Company Sued Under Spyware Law

http://www.ripoffreport.com/reports/0/240/RipOff0240304.htm

Hewlett Packard Violation of warranty terms - Lack of customer service Ripoff Palo Alto California

http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal

2005 Sony BMG CD copy prevention scandal

Page 14: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 1404/21/23

Mandela - Honor Property Rights Including Copyrights and Patent Don Perreira, a twenty seven year old was sentenced for four months of

imprisonment followed by home confinement and three years of supervised release because he was found twice guilty of copyright infringement. He used to distribute modified Microsoft X-Box game consoles with preinstalled copyright video game software. These consoles that he distributed came preloaded with hundreds of video games, movies, music videos and pictures unlike the ones that one gets from Best Buy or Circuit City. This case was investigated by the FBI Cyber Crimes Squad, and Perreira was prosecuted by the Assistant U.S. Attorney Tracy Hino.

Page 15: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 1504/21/23

Codes of Computer Ethics

ACM Professional Responsibilities Organizational Leadership Imperatives Compliance With The Code

Why have these things?

Give examples when these should have been followed Why?

Page 16: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 1604/21/23

Overview

1. Assignment and Paper Example

2. Finishing Professional Ethics Student Slides

3. Judging Ethics Continued

4. Crime

5. Assignment

Page 17: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 1704/21/23

Judgment I (pp. 418-419)

Brainstorming Identify risks, issues, problems, consequences. List stakeholders. List possible actions.

Page 18: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 1804/21/23

Judgment II

Analysis Identify responsibilities of decision maker. Identify rights of stakeholders

Positive and negative Consider consequences Check codes and ethics principles. Analyze each option. Choose

Page 19: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 1904/21/23

Cases From Book

Copying employee’s files Privacy protection Risky systems Whistle-blowing Release of personal information Conflict of interest Test plan Copyright violation Foreign programmers

Other Cases?

Page 20: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 2004/21/23

Overview

1. Assignment and Paper Example

2. Finishing Professional Ethics Student Slides

3. Judging Ethics Continued

4. Crime

5. Assignment

Page 21: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 2104/21/23

Crime Why

Why? Some abstract thoughts.

Why do people do things which some people say they shouldn’t?

Page 22: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 2204/21/23

Crime Time

What is different now compared to: 10 years ago? 20 years ago? 30 years ago?

Page 23: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 2304/21/23

Crime Doers

Hacker or Cracker Pre-1980 - Golden Age ? Eighties Nineties Naughts

Criminal Hacking == Cracking?

Page 24: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 2404/21/23

Crime Or Not To Crime

Justifications for (Cr/H)acking? What can be done by (Cr/H)acker after access is

gained? What resources are available?

Page 25: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 2504/21/23

Crime How

Technical and Non-Technical Break into computer. Prevent access to computer.

What things make crime easy?

Page 26: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 2604/21/23

Crime Gain

How valuable? Equipment Processor Time Disk space Printer time / paper Bandwidth

Page 27: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 2704/21/23

Crime Bane

How harmful? Viruses Spam

Page 28: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 2804/21/23

Overview

1. Assignment and Paper Example

2. Finishing Professional Ethics Student Slides

3. Judging Ethics Continued

4. Crime

5. Assignment

Page 29: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 2904/21/23

Assignment

Encryption Read Chapter 3.

Short paper: State a point for or against the National ID System, or a facet thereof, as talked about in the text. Please include references in addition to the book. The text book was published a few years ago so there should be some interesting developments since then.

Answer short individual questions assigned during class.

Page 30: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

© 2007 Keith A. Pray 3004/21/23

Assignment - Self Search Post all the ways you searched for information, 1 post per way. There will be a

special thread for this. Do not repeat an entry made. Use all the methods posted in the thread mentioned above and post each result in

your own thread. Search for information on your classmates and post each source to their threads. Do

not repeat information already in the thread. Say which method from the thread mentioned above was used.

For each source of data posted on your thread answer: Exactly how did the data get there? Can any of this data be used to cause harm? Can any of this data be used for profit? Will you profit? Did you authorized use of the data? If not, request its use be discontinued and post the correspondence. Maybe you’d rather share in the profit, if any. Post that kind

correspondence as well. Cite where Chapter 2 describes your experiences.

Page 31: CS 3043 Social Implications Of Computing 12/8/2015© 2004 Keith A. Pray 1 Class 6 Crime Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing

04/21/23 © 2004 Keith A. Pray 31

Class 6 The End

Keith A. Pray

Instructorsocialimps.keithpray.net