personal safety, ethics, legal & social implications csc1720 – introduction to internet...
TRANSCRIPT
Personal Safety, Ethics, Personal Safety, Ethics, Legal & Social Legal & Social ImplicationsImplications
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
Essential MaterialsEssential Materials
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
22
OutlineOutline
Personal SafetyPersonal Safety– AUP, Password, Virus, Fraud, ThreatAUP, Password, Virus, Fraud, Threat– Software PiracySoftware Piracy– Hoaxes, LegendsHoaxes, Legends
What is Computer Ethics?What is Computer Ethics? Many-to-Many, Anonymity, Many-to-Many, Anonymity,
reproducibilityreproducibility Ethical Significance Ethical Significance Legal and Social ImplicationsLegal and Social Implications Final Exam Tips, StatisticsFinal Exam Tips, Statistics
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
33
Personal SafetyPersonal Safety
Understand the importance of Understand the importance of Acceptable Use Policies (AUP), Acceptable Use Policies (AUP), passwords and vigilance online.passwords and vigilance online.
Know what kind of online activities Know what kind of online activities violate copyright, software piracy laws.violate copyright, software piracy laws.
Learn how to protect your personal Learn how to protect your personal privacy.privacy.
Discuss how to separate fact and fiction Discuss how to separate fact and fiction when you see warnings and advice on when you see warnings and advice on the Net.the Net.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
44
Acceptable Use Acceptable Use PoliciesPolicies(AUP)(AUP) AUP is a policy that shows the AUP is a policy that shows the
appropriate us of the Internet.appropriate us of the Internet. Your Internet Access privileges will be Your Internet Access privileges will be
cancelled if you violate the rules.cancelled if you violate the rules.– Illegal use, HarassmentIllegal use, Harassment– SPAM, E-mail/News BombingSPAM, E-mail/News Bombing– E-mail/News Forging, impersonationE-mail/News Forging, impersonation– Copyright, trademark infringementCopyright, trademark infringement– Network disruptions, unfriendly activityNetwork disruptions, unfriendly activity– Distribution of viruses, Inappropriate use of Distribution of viruses, Inappropriate use of
software (e.g. continuous pinging, … )software (e.g. continuous pinging, … )
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
55
AUP Example – i-cableAUP Example – i-cable
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
66
Password SecurityPassword Security
Someone will break into your Someone will break into your university or ISP account, then university or ISP account, then acquire the system administrator’s acquire the system administrator’s privileges to destroy the whole privileges to destroy the whole system.system.
A safe password always contains:A safe password always contains:– At least six characters (8 preferable)At least six characters (8 preferable)– Both lowercase and uppercase lettersBoth lowercase and uppercase letters– At least one numerical characterAt least one numerical character– At least one “!#$%^&*…”At least one “!#$%^&*…”
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
77
Password TipsPassword Tips
Never tell anyone your password. Never tell anyone your password. Ever, even the system Ever, even the system administrator.administrator.
Don’t write down your password Don’t write down your password where someone else can find it.where someone else can find it.
Change your password about 1 or 2 Change your password about 1 or 2 months.months.
Don’t use the same password in Don’t use the same password in many different places.many different places.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
88
Viruses, Trojans, Viruses, Trojans, WormsWorms AA virus virus is an executable program that is an executable program that
sticks to another host program. This virus sticks to another host program. This virus can replicate itself via files and propagate can replicate itself via files and propagate via shared floppies or disks.via shared floppies or disks.
A A Trojan HorseTrojan Horse is an executable program is an executable program that slips into a system under the guise of that slips into a system under the guise of other program. Deception is a key other program. Deception is a key characteristic of all Trojan horses.characteristic of all Trojan horses.
A A wormworm is very similar to a virus, but virus is very similar to a virus, but virus propagate via floppies or other media, a propagate via floppies or other media, a worm needs an active network connection.worm needs an active network connection.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
99
Anti-virus tipsAnti-virus tips Use antivirus software and update regularlyUse antivirus software and update regularly Keep floppy disk out of the drive, unless it Keep floppy disk out of the drive, unless it
is actively working onis actively working on Disable the Java/JavaScript in the browser Disable the Java/JavaScript in the browser
– prevent the attack from malicious applets or prevent the attack from malicious applets or scriptsscripts
Encrypt all files that contain sensitive Encrypt all files that contain sensitive information, store them on disk or other information, store them on disk or other removable media (e.g. ZIP, Tape drive)removable media (e.g. ZIP, Tape drive)
Don’t connect your computer to the Don’t connect your computer to the Internet longer than necessaryInternet longer than necessary
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
1010
E-mail VirusesE-mail Viruses
Macros VirusesMacros Viruses– Melissa VirusMelissa Virus– Avoiding Macros by using RTFAvoiding Macros by using RTF
Script AttacksScript Attacks– In 2000, two e-mail attachment In 2000, two e-mail attachment
attacks Outlook and Outlook Express attacks Outlook and Outlook Express users – The LoveLetter, NewLove users – The LoveLetter, NewLove viruses viruses
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
1111
Shopping OnlineShopping Online
Offer lots of benefits that you Offer lots of benefits that you cannot find shopping in a store.cannot find shopping in a store.– The shop is always open, 24/7The shop is always open, 24/7– Numerous bargains onlineNumerous bargains online– Return policiesReturn policies
Online shopping does pose some Online shopping does pose some risks, but you can take precautions risks, but you can take precautions to protect yourself against them.to protect yourself against them.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
1212
Shopping Online TipsShopping Online Tips
Use credit cards, but not checks, money Use credit cards, but not checks, money orders, debit cards.orders, debit cards.
Examine the URL starts with “https://”.Examine the URL starts with “https://”. Check for a locked padlock or unbroken Check for a locked padlock or unbroken
key icon before entering any credit card key icon before entering any credit card information.information.
Don’t use same password in all your e-Don’t use same password in all your e-commerce accounts.commerce accounts.
Save a copy of all purchase orders and Save a copy of all purchase orders and the confirmation numbers of the the confirmation numbers of the records.records.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
1313
Protect Your PrivacyProtect Your Privacy
Invasion of privacyInvasion of privacy– Imagine a man following you all day, Imagine a man following you all day,
taking notes, jotting down how much time taking notes, jotting down how much time you spend on the phone and to whom you you spend on the phone and to whom you talk, recording which stores you visit and talk, recording which stores you visit and which items you purchase, then he sells which items you purchase, then he sells these information to anyone wants it.these information to anyone wants it.
– It can happen if the web page is It can happen if the web page is programmed to collect information.programmed to collect information.
When you visit the page, which link you click, When you visit the page, which link you click, how long you spend on the web page, etc…how long you spend on the web page, etc…
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
1414
Protect Your PrivacyProtect Your Privacy
What kind of What kind of information information can be can be collected? Try collected? Try thisthis
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
1515
Internet SCAMsInternet SCAMs
A trick or a deception deliberately A trick or a deception deliberately practiced to get unlawful gain.practiced to get unlawful gain.– Loss moneyLoss money
National Fraud Information CenterNational Fraud Information Center– Help consumers distinguish between Help consumers distinguish between
legitimate and fraudulent legitimate and fraudulent promotions in the Internetpromotions in the Internet
– Report the suspected fraud on the Report the suspected fraud on the Net.Net.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
1616
National Fraud National Fraud Information CenterInformation Center
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
1717
Libel and LawsuitsLibel and Lawsuits
Libel is any written or pictorial statement Libel is any written or pictorial statement that damages a person or organization.that damages a person or organization.
A person who disseminates information A person who disseminates information that is deemed harmful to a company can that is deemed harmful to a company can be target of a lawsuit even that be target of a lawsuit even that information is accurate.information is accurate.
All digital information can be reproduced All digital information can be reproduced and distributed easily on the Net.and distributed easily on the Net.– You can’t be sure that your private email You can’t be sure that your private email
remains private – think twice before send out.remains private – think twice before send out.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
1818
Defamation case Defamation case study:study:Yahoo!Yahoo! In the summer of 2000, the union In the summer of 2000, the union
of Jewish students and the of Jewish students and the International League Against International League Against Racism and Anti-Semitism filed a Racism and Anti-Semitism filed a suit against Yahoo! In the French suit against Yahoo! In the French courts: Buy and Sell Nazi courts: Buy and Sell Nazi memorabilia on its auction sites.memorabilia on its auction sites.– The sale of such items is not illegal The sale of such items is not illegal
in the US, but not in EU states.in the US, but not in EU states.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
1919
ThreatsThreats
In April 1999, they killed12 fellow students andTeacher.
There is no evidence thatthey intended to carry outtheir threats in the chatRoom.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
2020
Information War &Information War &Digital CrimeDigital Crime In 1989, Kevin Mitnick, who was convicted In 1989, Kevin Mitnick, who was convicted
of stealing software from Digital of stealing software from Digital Equipment Corp. (DEC).Equipment Corp. (DEC).
Information warfare may take the form of Information warfare may take the form of propaganda, espionage (commercial or propaganda, espionage (commercial or political), or even target n websites political), or even target n websites – such as DDoS, happened with Yahoo! And such as DDoS, happened with Yahoo! And
Amazon in 2000Amazon in 2000 Digital crime is often associated with Digital crime is often associated with
viruses. (still remember Robert Morris viruses. (still remember Robert Morris (Worm)?(Worm)?
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
2121
Surveillance?Surveillance?
““Computerization has a tremendous Computerization has a tremendous potential for destructive invasion of potential for destructive invasion of privacy …”privacy …” – Marry Williams. – Marry Williams.– Most people using any form of Most people using any form of
communication will assume that communication will assume that anything they transmit will remain anything they transmit will remain confidential.confidential.
– Phone taps may be established to Phone taps may be established to locate criminals.locate criminals.
– What will happen in the Internet?What will happen in the Internet?
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
2222
HarassmentHarassment
Another potential problem for Another potential problem for Internet Users.Internet Users.
Offensive materials on the Web Offensive materials on the Web should not bring to workplace.should not bring to workplace.
An employee who receives an An employee who receives an email that contains email that contains religiouslyreligiously, or , or sexuallysexually, or , or racially racially offensive jokes, offensive jokes, should not forwards this email to should not forwards this email to the coworkers.the coworkers.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
2323
Software PiracySoftware Piracy
Piracy – Not Privacy!Piracy – Not Privacy! Public Domain – no copyright, can be freely copied, Public Domain – no copyright, can be freely copied,
distributed.distributed. Freeware – has copyright, can be copied and Freeware – has copyright, can be copied and
distributed without payment, but donation may be distributed without payment, but donation may be needed.needed.
Shareware – copyrighted, can be distributed without Shareware – copyrighted, can be distributed without payment, but payment is expected in use.payment, but payment is expected in use.
Licensed software – copyrighted, payment is prior to Licensed software – copyrighted, payment is prior to use.use.
If the software costs money, but you are using it in If the software costs money, but you are using it in violation of the user agreement violation of the user agreement stolen the software stolen the software
Criminal and civil law violation.Criminal and civil law violation.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
2424
Copyright Copyright InfringementsInfringements Duplication or distribution of Duplication or distribution of
commercial software.commercial software. Unauthorized use of people’s Unauthorized use of people’s
inventioninvention Owner has the right to exclude Owner has the right to exclude
people from using, making, people from using, making, selling, importing his selling, importing his products/software.products/software.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
2525
Hoaxes and LegendsHoaxes and Legends
Don’t be NaïveDon’t be Naïve– You cannot believe everything you You cannot believe everything you
read, especially on the Internet.read, especially on the Internet. Internet is very effective to Internet is very effective to
propagate misinformation that propagate misinformation that alarm people and generate panic.alarm people and generate panic.
You can visit “Urban Legends” if You can visit “Urban Legends” if you are not sure something on you are not sure something on the Net is right or not.the Net is right or not.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
2626
10 worst Hoaxes - CNN10 worst Hoaxes - CNN
10. Let the Good Times Roll 10. Let the Good Times Roll 9. Help a Sick Child 9. Help a Sick Child 8. Bill Gates Reaches Out to You 8. Bill Gates Reaches Out to You 7. Dial 809 for Trouble 7. Dial 809 for Trouble 6. Money Nonsense in Nigeria 6. Money Nonsense in Nigeria 5. Save Big Bird 5. Save Big Bird 4. The $250 Cookie Recipe 4. The $250 Cookie Recipe 3. Deodorant Endangers Your Health?3. Deodorant Endangers Your Health? 2. Last Photo From the World Trade Center Deck? 2. Last Photo From the World Trade Center Deck? 1. Next Time, Just Say "I Don't Know"1. Next Time, Just Say "I Don't Know"
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
2727
Internet EthicsInternet Ethics
The Robert Morris CaseThe Robert Morris Case– Release the “worm” in 1988.Release the “worm” in 1988.– The whole network was clogged with the The whole network was clogged with the
worm.worm.– 3 years’ probation, fined $10,000, 400 hours 3 years’ probation, fined $10,000, 400 hours
of community service.of community service.– Someone said that the worm has alerted the Someone said that the worm has alerted the
vulnerability of the systems.vulnerability of the systems.– Different opinions said he should/shouldn’t Different opinions said he should/shouldn’t
go to jail.go to jail.– What is your opinion?What is your opinion?
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
2828
Case 2: The Melissa Case 2: The Melissa VirusVirus In 1999, David Smith created the In 1999, David Smith created the
Melissa virus.Melissa virus. Post on the newsgroup “Alt.Sex” and Post on the newsgroup “Alt.Sex” and
said the attachment contained a list said the attachment contained a list of pass codes of Pornographic of pass codes of Pornographic website.website.
Infected million of computers and Infected million of computers and caused over $80 million damages.caused over $80 million damages.
What is your opinion for his act?What is your opinion for his act?
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
2929
Case 3: Credit Card Case 3: Credit Card ExtortionExtortion A 19-year-old Russian involved in the A 19-year-old Russian involved in the
illegal use of credit cards in 1997.illegal use of credit cards in 1997. Steal 300,000 credit card numbers from Steal 300,000 credit card numbers from
an online music store.an online music store. Extort $100,000 for the stolen Extort $100,000 for the stolen
information.information. Several thousand visitors had Several thousand visitors had
downloaded over 25,000 credit card downloaded over 25,000 credit card numbers.numbers.
What is your opinion for this act?What is your opinion for this act?
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
3030
Three morally Three morally significantsignificant When compared to face-to-face When compared to face-to-face
communication, Internet providescommunication, Internet provides– Global, Many-to-Many communicationGlobal, Many-to-Many communication
Interactive comm. with speed and ease.Interactive comm. with speed and ease.
– Facilitates anonymityFacilitates anonymity No one knows your name, how you feel…No one knows your name, how you feel…
– Provides reproducibilityProvides reproducibility Electronic information can be easily copied Electronic information can be easily copied
and there is no loss of value in and there is no loss of value in reproduction.reproduction.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
3131
Ethical SignificanceEthical Significance
Many-to-Many scopeMany-to-Many scope– That means the individuals can use That means the individuals can use
very little effort tovery little effort to Disrupt, steal,Disrupt, steal, Cause property damage, snoop,Cause property damage, snoop, Harass, stalk, extort, defame, …Harass, stalk, extort, defame, …
– Its enormous benefits brings people Its enormous benefits brings people together and shorten the geographic together and shorten the geographic space and distance.space and distance.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
3232
Ethical SignificanceEthical Significance
AnonymityAnonymity– Individuals do not have to take risks for Individuals do not have to take risks for
being seen as they act and interact.being seen as they act and interact. Difficult to catch criminals who act anonymity.Difficult to catch criminals who act anonymity. You don’t know the source of the information.You don’t know the source of the information. It is difficult to gage the trustworthiness of the It is difficult to gage the trustworthiness of the
information.information.
– On the other hand, consider the race, On the other hand, consider the race, gender and physical appearance are gender and physical appearance are removed for an online courseremoved for an online course
Would it be more fair for the teacher to evaluate Would it be more fair for the teacher to evaluate student’s performance?student’s performance?
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
3333
Ethical SignificanceEthical Significance
ReproducibilityReproducibility– Privacy and property rights issues Privacy and property rights issues
arise.arise.– Facilitates the words and documents Facilitates the words and documents
to be forwarded to infinite number of to be forwarded to infinite number of people or sites.people or sites.
– If you receive a document from If you receive a document from someone via the Net, can you be sure someone via the Net, can you be sure the document is sent/written by its the document is sent/written by its claimed sender?claimed sender?
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
3434
Legal and Social Legal and Social ImplicationsImplications Internet offers great riches, but also Internet offers great riches, but also
pose threats.pose threats. Remember the right between legal Remember the right between legal
(created by law) and human rights.(created by law) and human rights. Facilitates unmediated many-to-many Facilitates unmediated many-to-many
communication, and access to a communication, and access to a diversity of online resources.diversity of online resources.
Facilitates the formation of new Facilitates the formation of new associations across the geographical associations across the geographical limitation.limitation.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
3535
Cyber-FeminismCyber-Feminism
The relationship of women with The relationship of women with technology has often been perceived as technology has often been perceived as a problematic one?a problematic one?
Although most inventors and engineers Although most inventors and engineers associated with the computer revolution associated with the computer revolution has been men, women have been also has been men, women have been also involved with computers since their involved with computers since their inception. inception.
Reference: http://www.wise-women.org/Reference: http://www.wise-women.org/– Many good online tutorials from a group of Many good online tutorials from a group of
women.women.
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
3636
Cyber-Space: Virtual Cyber-Space: Virtual Reality (VR)Reality (VR)
Ref: http://sulu.npl.co.uk/netshare/guest/recursive/demo.html
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
3737
Final ExamFinal Exam
Date:Date: TBATBA Time:Time: TBATBA Venue:Venue: TBATBA Coverage:Coverage:
– Lecture 1 – 15,Lecture 1 – 15,– Lab and tutorial exercises,Lab and tutorial exercises,– NewsgroupNewsgroup– Open notes (but not open book!!!)Open notes (but not open book!!!)
CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet
All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.
3838
ReferencesReferences
Yahoo!Yahoo! DukeDuke Safe Shopping Online TipsSafe Shopping Online Tips ScamBusterScamBuster Online HarassmentOnline Harassment Computer EthicsComputer Ethics Computer Ethics – D. G. Johnson Computer Ethics – D. G. Johnson The End.The End. Thank you for taking CSC1720!Thank you for taking CSC1720!