personal safety, ethics, legal & social implications csc1720 – introduction to internet...

38
Personal Safety, Personal Safety, Ethics, Legal & Social Ethics, Legal & Social Implications Implications CSC1720 – Introduction to CSC1720 – Introduction to Internet Internet Essential Materials Essential Materials

Upload: dallin-greaver

Post on 01-Apr-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

Personal Safety, Ethics, Personal Safety, Ethics, Legal & Social Legal & Social ImplicationsImplications

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

Essential MaterialsEssential Materials

Page 2: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

22

OutlineOutline

Personal SafetyPersonal Safety– AUP, Password, Virus, Fraud, ThreatAUP, Password, Virus, Fraud, Threat– Software PiracySoftware Piracy– Hoaxes, LegendsHoaxes, Legends

What is Computer Ethics?What is Computer Ethics? Many-to-Many, Anonymity, Many-to-Many, Anonymity,

reproducibilityreproducibility Ethical Significance Ethical Significance Legal and Social ImplicationsLegal and Social Implications Final Exam Tips, StatisticsFinal Exam Tips, Statistics

Page 3: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

33

Personal SafetyPersonal Safety

Understand the importance of Understand the importance of Acceptable Use Policies (AUP), Acceptable Use Policies (AUP), passwords and vigilance online.passwords and vigilance online.

Know what kind of online activities Know what kind of online activities violate copyright, software piracy laws.violate copyright, software piracy laws.

Learn how to protect your personal Learn how to protect your personal privacy.privacy.

Discuss how to separate fact and fiction Discuss how to separate fact and fiction when you see warnings and advice on when you see warnings and advice on the Net.the Net.

Page 4: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

44

Acceptable Use Acceptable Use PoliciesPolicies(AUP)(AUP) AUP is a policy that shows the AUP is a policy that shows the

appropriate us of the Internet.appropriate us of the Internet. Your Internet Access privileges will be Your Internet Access privileges will be

cancelled if you violate the rules.cancelled if you violate the rules.– Illegal use, HarassmentIllegal use, Harassment– SPAM, E-mail/News BombingSPAM, E-mail/News Bombing– E-mail/News Forging, impersonationE-mail/News Forging, impersonation– Copyright, trademark infringementCopyright, trademark infringement– Network disruptions, unfriendly activityNetwork disruptions, unfriendly activity– Distribution of viruses, Inappropriate use of Distribution of viruses, Inappropriate use of

software (e.g. continuous pinging, … )software (e.g. continuous pinging, … )

Page 5: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

55

AUP Example – i-cableAUP Example – i-cable

Page 6: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

66

Password SecurityPassword Security

Someone will break into your Someone will break into your university or ISP account, then university or ISP account, then acquire the system administrator’s acquire the system administrator’s privileges to destroy the whole privileges to destroy the whole system.system.

A safe password always contains:A safe password always contains:– At least six characters (8 preferable)At least six characters (8 preferable)– Both lowercase and uppercase lettersBoth lowercase and uppercase letters– At least one numerical characterAt least one numerical character– At least one “!#$%^&*…”At least one “!#$%^&*…”

Page 7: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

77

Password TipsPassword Tips

Never tell anyone your password. Never tell anyone your password. Ever, even the system Ever, even the system administrator.administrator.

Don’t write down your password Don’t write down your password where someone else can find it.where someone else can find it.

Change your password about 1 or 2 Change your password about 1 or 2 months.months.

Don’t use the same password in Don’t use the same password in many different places.many different places.

Page 8: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

88

Viruses, Trojans, Viruses, Trojans, WormsWorms AA virus virus is an executable program that is an executable program that

sticks to another host program. This virus sticks to another host program. This virus can replicate itself via files and propagate can replicate itself via files and propagate via shared floppies or disks.via shared floppies or disks.

A A Trojan HorseTrojan Horse is an executable program is an executable program that slips into a system under the guise of that slips into a system under the guise of other program. Deception is a key other program. Deception is a key characteristic of all Trojan horses.characteristic of all Trojan horses.

A A wormworm is very similar to a virus, but virus is very similar to a virus, but virus propagate via floppies or other media, a propagate via floppies or other media, a worm needs an active network connection.worm needs an active network connection.

Page 9: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

99

Anti-virus tipsAnti-virus tips Use antivirus software and update regularlyUse antivirus software and update regularly Keep floppy disk out of the drive, unless it Keep floppy disk out of the drive, unless it

is actively working onis actively working on Disable the Java/JavaScript in the browser Disable the Java/JavaScript in the browser

– prevent the attack from malicious applets or prevent the attack from malicious applets or scriptsscripts

Encrypt all files that contain sensitive Encrypt all files that contain sensitive information, store them on disk or other information, store them on disk or other removable media (e.g. ZIP, Tape drive)removable media (e.g. ZIP, Tape drive)

Don’t connect your computer to the Don’t connect your computer to the Internet longer than necessaryInternet longer than necessary

Page 10: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

1010

E-mail VirusesE-mail Viruses

Macros VirusesMacros Viruses– Melissa VirusMelissa Virus– Avoiding Macros by using RTFAvoiding Macros by using RTF

Script AttacksScript Attacks– In 2000, two e-mail attachment In 2000, two e-mail attachment

attacks Outlook and Outlook Express attacks Outlook and Outlook Express users – The LoveLetter, NewLove users – The LoveLetter, NewLove viruses viruses

Page 11: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

1111

Shopping OnlineShopping Online

Offer lots of benefits that you Offer lots of benefits that you cannot find shopping in a store.cannot find shopping in a store.– The shop is always open, 24/7The shop is always open, 24/7– Numerous bargains onlineNumerous bargains online– Return policiesReturn policies

Online shopping does pose some Online shopping does pose some risks, but you can take precautions risks, but you can take precautions to protect yourself against them.to protect yourself against them.

Page 12: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

1212

Shopping Online TipsShopping Online Tips

Use credit cards, but not checks, money Use credit cards, but not checks, money orders, debit cards.orders, debit cards.

Examine the URL starts with “https://”.Examine the URL starts with “https://”. Check for a locked padlock or unbroken Check for a locked padlock or unbroken

key icon before entering any credit card key icon before entering any credit card information.information.

Don’t use same password in all your e-Don’t use same password in all your e-commerce accounts.commerce accounts.

Save a copy of all purchase orders and Save a copy of all purchase orders and the confirmation numbers of the the confirmation numbers of the records.records.

Page 13: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

1313

Protect Your PrivacyProtect Your Privacy

Invasion of privacyInvasion of privacy– Imagine a man following you all day, Imagine a man following you all day,

taking notes, jotting down how much time taking notes, jotting down how much time you spend on the phone and to whom you you spend on the phone and to whom you talk, recording which stores you visit and talk, recording which stores you visit and which items you purchase, then he sells which items you purchase, then he sells these information to anyone wants it.these information to anyone wants it.

– It can happen if the web page is It can happen if the web page is programmed to collect information.programmed to collect information.

When you visit the page, which link you click, When you visit the page, which link you click, how long you spend on the web page, etc…how long you spend on the web page, etc…

Page 14: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

1414

Protect Your PrivacyProtect Your Privacy

What kind of What kind of information information can be can be collected? Try collected? Try thisthis

Page 15: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

1515

Internet SCAMsInternet SCAMs

A trick or a deception deliberately A trick or a deception deliberately practiced to get unlawful gain.practiced to get unlawful gain.– Loss moneyLoss money

National Fraud Information CenterNational Fraud Information Center– Help consumers distinguish between Help consumers distinguish between

legitimate and fraudulent legitimate and fraudulent promotions in the Internetpromotions in the Internet

– Report the suspected fraud on the Report the suspected fraud on the Net.Net.

Page 16: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

1616

National Fraud National Fraud Information CenterInformation Center

Page 17: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

1717

Libel and LawsuitsLibel and Lawsuits

Libel is any written or pictorial statement Libel is any written or pictorial statement that damages a person or organization.that damages a person or organization.

A person who disseminates information A person who disseminates information that is deemed harmful to a company can that is deemed harmful to a company can be target of a lawsuit even that be target of a lawsuit even that information is accurate.information is accurate.

All digital information can be reproduced All digital information can be reproduced and distributed easily on the Net.and distributed easily on the Net.– You can’t be sure that your private email You can’t be sure that your private email

remains private – think twice before send out.remains private – think twice before send out.

Page 18: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

1818

Defamation case Defamation case study:study:Yahoo!Yahoo! In the summer of 2000, the union In the summer of 2000, the union

of Jewish students and the of Jewish students and the International League Against International League Against Racism and Anti-Semitism filed a Racism and Anti-Semitism filed a suit against Yahoo! In the French suit against Yahoo! In the French courts: Buy and Sell Nazi courts: Buy and Sell Nazi memorabilia on its auction sites.memorabilia on its auction sites.– The sale of such items is not illegal The sale of such items is not illegal

in the US, but not in EU states.in the US, but not in EU states.

Page 19: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

1919

ThreatsThreats

In April 1999, they killed12 fellow students andTeacher.

There is no evidence thatthey intended to carry outtheir threats in the chatRoom.

Page 20: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

2020

Information War &Information War &Digital CrimeDigital Crime In 1989, Kevin Mitnick, who was convicted In 1989, Kevin Mitnick, who was convicted

of stealing software from Digital of stealing software from Digital Equipment Corp. (DEC).Equipment Corp. (DEC).

Information warfare may take the form of Information warfare may take the form of propaganda, espionage (commercial or propaganda, espionage (commercial or political), or even target n websites political), or even target n websites – such as DDoS, happened with Yahoo! And such as DDoS, happened with Yahoo! And

Amazon in 2000Amazon in 2000 Digital crime is often associated with Digital crime is often associated with

viruses. (still remember Robert Morris viruses. (still remember Robert Morris (Worm)?(Worm)?

Page 21: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

2121

Surveillance?Surveillance?

““Computerization has a tremendous Computerization has a tremendous potential for destructive invasion of potential for destructive invasion of privacy …”privacy …” – Marry Williams. – Marry Williams.– Most people using any form of Most people using any form of

communication will assume that communication will assume that anything they transmit will remain anything they transmit will remain confidential.confidential.

– Phone taps may be established to Phone taps may be established to locate criminals.locate criminals.

– What will happen in the Internet?What will happen in the Internet?

Page 22: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

2222

HarassmentHarassment

Another potential problem for Another potential problem for Internet Users.Internet Users.

Offensive materials on the Web Offensive materials on the Web should not bring to workplace.should not bring to workplace.

An employee who receives an An employee who receives an email that contains email that contains religiouslyreligiously, or , or sexuallysexually, or , or racially racially offensive jokes, offensive jokes, should not forwards this email to should not forwards this email to the coworkers.the coworkers.

Page 23: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

2323

Software PiracySoftware Piracy

Piracy – Not Privacy!Piracy – Not Privacy! Public Domain – no copyright, can be freely copied, Public Domain – no copyright, can be freely copied,

distributed.distributed. Freeware – has copyright, can be copied and Freeware – has copyright, can be copied and

distributed without payment, but donation may be distributed without payment, but donation may be needed.needed.

Shareware – copyrighted, can be distributed without Shareware – copyrighted, can be distributed without payment, but payment is expected in use.payment, but payment is expected in use.

Licensed software – copyrighted, payment is prior to Licensed software – copyrighted, payment is prior to use.use.

If the software costs money, but you are using it in If the software costs money, but you are using it in violation of the user agreement violation of the user agreement stolen the software stolen the software

Criminal and civil law violation.Criminal and civil law violation.

Page 24: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

2424

Copyright Copyright InfringementsInfringements Duplication or distribution of Duplication or distribution of

commercial software.commercial software. Unauthorized use of people’s Unauthorized use of people’s

inventioninvention Owner has the right to exclude Owner has the right to exclude

people from using, making, people from using, making, selling, importing his selling, importing his products/software.products/software.

Page 25: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

2525

Hoaxes and LegendsHoaxes and Legends

Don’t be NaïveDon’t be Naïve– You cannot believe everything you You cannot believe everything you

read, especially on the Internet.read, especially on the Internet. Internet is very effective to Internet is very effective to

propagate misinformation that propagate misinformation that alarm people and generate panic.alarm people and generate panic.

You can visit “Urban Legends” if You can visit “Urban Legends” if you are not sure something on you are not sure something on the Net is right or not.the Net is right or not.

Page 26: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

2626

10 worst Hoaxes - CNN10 worst Hoaxes - CNN

10. Let the Good Times Roll 10. Let the Good Times Roll 9. Help a Sick Child 9. Help a Sick Child 8. Bill Gates Reaches Out to You 8. Bill Gates Reaches Out to You 7. Dial 809 for Trouble 7. Dial 809 for Trouble 6. Money Nonsense in Nigeria 6. Money Nonsense in Nigeria 5. Save Big Bird 5. Save Big Bird 4. The $250 Cookie Recipe 4. The $250 Cookie Recipe 3. Deodorant Endangers Your Health?3. Deodorant Endangers Your Health? 2. Last Photo From the World Trade Center Deck? 2. Last Photo From the World Trade Center Deck? 1. Next Time, Just Say "I Don't Know"1. Next Time, Just Say "I Don't Know"

Page 27: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

2727

Internet EthicsInternet Ethics

The Robert Morris CaseThe Robert Morris Case– Release the “worm” in 1988.Release the “worm” in 1988.– The whole network was clogged with the The whole network was clogged with the

worm.worm.– 3 years’ probation, fined $10,000, 400 hours 3 years’ probation, fined $10,000, 400 hours

of community service.of community service.– Someone said that the worm has alerted the Someone said that the worm has alerted the

vulnerability of the systems.vulnerability of the systems.– Different opinions said he should/shouldn’t Different opinions said he should/shouldn’t

go to jail.go to jail.– What is your opinion?What is your opinion?

Page 28: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

2828

Case 2: The Melissa Case 2: The Melissa VirusVirus In 1999, David Smith created the In 1999, David Smith created the

Melissa virus.Melissa virus. Post on the newsgroup “Alt.Sex” and Post on the newsgroup “Alt.Sex” and

said the attachment contained a list said the attachment contained a list of pass codes of Pornographic of pass codes of Pornographic website.website.

Infected million of computers and Infected million of computers and caused over $80 million damages.caused over $80 million damages.

What is your opinion for his act?What is your opinion for his act?

Page 29: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

2929

Case 3: Credit Card Case 3: Credit Card ExtortionExtortion A 19-year-old Russian involved in the A 19-year-old Russian involved in the

illegal use of credit cards in 1997.illegal use of credit cards in 1997. Steal 300,000 credit card numbers from Steal 300,000 credit card numbers from

an online music store.an online music store. Extort $100,000 for the stolen Extort $100,000 for the stolen

information.information. Several thousand visitors had Several thousand visitors had

downloaded over 25,000 credit card downloaded over 25,000 credit card numbers.numbers.

What is your opinion for this act?What is your opinion for this act?

Page 30: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

3030

Three morally Three morally significantsignificant When compared to face-to-face When compared to face-to-face

communication, Internet providescommunication, Internet provides– Global, Many-to-Many communicationGlobal, Many-to-Many communication

Interactive comm. with speed and ease.Interactive comm. with speed and ease.

– Facilitates anonymityFacilitates anonymity No one knows your name, how you feel…No one knows your name, how you feel…

– Provides reproducibilityProvides reproducibility Electronic information can be easily copied Electronic information can be easily copied

and there is no loss of value in and there is no loss of value in reproduction.reproduction.

Page 31: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

3131

Ethical SignificanceEthical Significance

Many-to-Many scopeMany-to-Many scope– That means the individuals can use That means the individuals can use

very little effort tovery little effort to Disrupt, steal,Disrupt, steal, Cause property damage, snoop,Cause property damage, snoop, Harass, stalk, extort, defame, …Harass, stalk, extort, defame, …

– Its enormous benefits brings people Its enormous benefits brings people together and shorten the geographic together and shorten the geographic space and distance.space and distance.

Page 32: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

3232

Ethical SignificanceEthical Significance

AnonymityAnonymity– Individuals do not have to take risks for Individuals do not have to take risks for

being seen as they act and interact.being seen as they act and interact. Difficult to catch criminals who act anonymity.Difficult to catch criminals who act anonymity. You don’t know the source of the information.You don’t know the source of the information. It is difficult to gage the trustworthiness of the It is difficult to gage the trustworthiness of the

information.information.

– On the other hand, consider the race, On the other hand, consider the race, gender and physical appearance are gender and physical appearance are removed for an online courseremoved for an online course

Would it be more fair for the teacher to evaluate Would it be more fair for the teacher to evaluate student’s performance?student’s performance?

Page 33: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

3333

Ethical SignificanceEthical Significance

ReproducibilityReproducibility– Privacy and property rights issues Privacy and property rights issues

arise.arise.– Facilitates the words and documents Facilitates the words and documents

to be forwarded to infinite number of to be forwarded to infinite number of people or sites.people or sites.

– If you receive a document from If you receive a document from someone via the Net, can you be sure someone via the Net, can you be sure the document is sent/written by its the document is sent/written by its claimed sender?claimed sender?

Page 34: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

3434

Legal and Social Legal and Social ImplicationsImplications Internet offers great riches, but also Internet offers great riches, but also

pose threats.pose threats. Remember the right between legal Remember the right between legal

(created by law) and human rights.(created by law) and human rights. Facilitates unmediated many-to-many Facilitates unmediated many-to-many

communication, and access to a communication, and access to a diversity of online resources.diversity of online resources.

Facilitates the formation of new Facilitates the formation of new associations across the geographical associations across the geographical limitation.limitation.

Page 35: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

3535

Cyber-FeminismCyber-Feminism

The relationship of women with The relationship of women with technology has often been perceived as technology has often been perceived as a problematic one?a problematic one?

Although most inventors and engineers Although most inventors and engineers associated with the computer revolution associated with the computer revolution has been men, women have been also has been men, women have been also involved with computers since their involved with computers since their inception. inception.

Reference: http://www.wise-women.org/Reference: http://www.wise-women.org/– Many good online tutorials from a group of Many good online tutorials from a group of

women.women.

Page 36: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

3636

Cyber-Space: Virtual Cyber-Space: Virtual Reality (VR)Reality (VR)

Ref: http://sulu.npl.co.uk/netshare/guest/recursive/demo.html

Page 37: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

3737

Final ExamFinal Exam

Date:Date: TBATBA Time:Time: TBATBA Venue:Venue: TBATBA Coverage:Coverage:

– Lecture 1 – 15,Lecture 1 – 15,– Lab and tutorial exercises,Lab and tutorial exercises,– NewsgroupNewsgroup– Open notes (but not open book!!!)Open notes (but not open book!!!)

Page 38: Personal Safety, Ethics, Legal & Social Implications CSC1720 – Introduction to Internet Essential Materials

CSC1720 – Introduction to CSC1720 – Introduction to InternetInternet

All copyrights reserved by C.C. Cheung All copyrights reserved by C.C. Cheung 2003.2003.

3838

ReferencesReferences

Yahoo!Yahoo! DukeDuke Safe Shopping Online TipsSafe Shopping Online Tips ScamBusterScamBuster Online HarassmentOnline Harassment Computer EthicsComputer Ethics Computer Ethics – D. G. Johnson Computer Ethics – D. G. Johnson The End.The End. Thank you for taking CSC1720!Thank you for taking CSC1720!