Module 2 - Ethics in Information and Society
Module 2 - Ethics in Information and Society
Module 2 - Ethics in Information and Society
MODULE 2
Module Overview:
In this Module
Module Outcomes:
o Discuss the key trade-offs and ethical issues associated with safeguarding
the data and information system.
o Identify the different types of computer security attacks, perpetrators of
computer crimes
o Understand the right of privacy, privacy law, and the associated ethical
issues.
o Explore the protection of freedom of expression and the importance of
freedom of expression issues related to the use of information technology
49 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Introduction
This lesson will introduce you to the ethical issues that are associated
with the safeguarding of data and information systems. Also, introduce to you
the type of computer security attacks as well as the perpetration of computer
crime and computer forensics and what role it plays in responding to a
computer incident.
Objectives:
o Explain and understand why business ethics is becoming
increasingly important.
o Discuss why corporations are interested in fostering good
business ethics and why is it important to act according to a code
of principles.
o Write insights and updates on what corporations are doing to
improve business ethics and give an example of approaches one
can take to ensure ethical decision making.
o Discuss why trends have increased the risk of using information
technology unethically.
Down:
1. person who always using and constantly online
3. a place on the internet with an address
4. on the internet
6. the imaginary place where electronic messages, etc. are being sent
between computers.
11. an area on the Internet where people can communicate with each other.
12. A person who secretly finds a way of looking at and/or changing the
information on somebody else’s computer without permission
13. Instructions for a computer to follow
50 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
4. Do you have an idea now what our topic is all about? Are you excited
to discuss the word that you’ve answered in the puzzle?
_______________________________________________________
_______________________________________________________
_______________________________________________________
51 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Let’s Explore!
52 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Types of Exploits
– Computers, as well as smartphones, can be the target
• Types of attacks
– Virus
– Worm
– Trojan horse
– Distributed denial of service
– Rootkit
– Spam
– Phishing (spear-phishing, smishing, and vishing)
Viruses
– Pieces of programming code
– Usually disguised as something else
– Cause unexpected and undesirable behavior
– Often attached to files
– Deliver a “payload”
– Spread by actions of the “infected” computer user
• Infected email document attachments
• Downloads of infected programs
• Visits to infected Websites
Worms
– Harmful programs
• Reside in the active memory of a computer
• Duplicate themselves
– Can propagate without human intervention
– The negative impact of a worm attack
• Lost data and programs
• Lost productivity
• Additional effort for IT workers
Trojan Horses
• Malicious code hidden inside seemingly harmless programs
• Users are tricked into installing them
53 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
54 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Types of Perpetrators
• Perpetrators include:
– Thrill-seekers wanting a challenge
– Common criminals looking for financial gain
– Industrial spies trying to gain an advantage
– Terrorists seeking to cause destruction
• Different objectives and access to varying resources
• Willing to take different levels of risk to accomplish an objective
55 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Cybercriminals
– Hack into corporate computers to steal
• Engage in all forms of computer fraud
– Chargebacks are disputed transactions
– Loss of customer trust has more impact than fraud
– To reduce the potential for online credit card fraud:
• Use encryption technology
• Verify the address submitted online against the issuing
bank
• Request a card verification value (CVV)
• Use transaction-risk scoring software
– Smart cards
• Contain a memory chip
• Updated with encrypted data each time card is used
• Used widely in Europe
• Not widely used in the U.S.
56 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
– Cyberterrorist
• Attacks computers or networks in an attempt to intimidate
or coerce a government to advance certain political or
social objectives
• Seeks to cause harm rather than gather information
• Uses techniques that destroy or disrupt services
Implementing Trustworthy
Computing
– Trustworthy computing
• Delivers secure, private, and reliable computing
• Based on sound business practices
57 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
58 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
• Trade-off between:
• Ease of use
• Increased security
– Areas of concern
• Email attachments
• Wireless devices
– VPN uses the Internet to relay communications but maintains
privacy through security features
– Additional security includes encrypting originating and receiving
network addresses
59 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
60 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
61 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Let’s Do It!
Self- Assessment Questions (AA2) : Answer the following:
1. Which of the following techniques do not help prevent computer crimes?
A. Backups
B. Digital forensic analysis
C. Firewalls
D. Encryption
4. What is “Hacktivist”?
A. Politically motivated hacker // these on-line vandals typically attack
corporation and ISP’s
B. Denial of service attacker
C. A proponent of Napster
D. A person engaging in an intentional act involving a computer in which
the person may have gained at the victim’s expenses
62 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Closure
Wow!!! Well-done my dear student! You probably did great for this
lesson. You have got lots of things about computer and internet crimes. Now,
you’re able to proceed to the next lesson.
63 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Privacy
Introduction
This lesson will introduce you to the right to privacy and the basis for
protecting personal privacy. Also, explore the laws that protect the privacy of
personal data and associated ethical issues. Furthermore, discuss the
capabilities of advanced surveillance technologies.
Objectives:
o Explain the right of privacy, and what is the basis for protecting
personal privacy under the law
o Discuss the laws that authorize electronic surveillance by the
government, and the associated ethical issues.
o Understand the two fundamental forms of data encryption, and how
each work.
o Articulate the various strategies for consumer profiling and the
associated ethical issues.
64 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Let’s Explore!
PRIVACY PROTECTION AND THE LAW
• Systems collect and store key data from every interaction with customers
to make better decisions
• Many objects to data collection policies of government and business
• Privacy
– A key concern of Internet users
– The top reason why non-users still avoid the Internet
• Reasonable limits must be set
• Historical perspective on the right to privacy
– Fourth Amendment reasonable expectation of privacy
Information Privacy
• Definition of privacy
– “The right to be left alone—the most comprehensive of rights, and the
right most valued by a free people”
• Information privacy is a combination of:
– Communications privacy
• Ability to communicate with others without being monitored by other
persons or organizations
– Data privacy
• Ability to limit access to one’s data by other individuals and organizations
to exercise a substantial degree of control over that data and its use
65 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
• Safeguards Rule
• Pretexting Rule
– Opt-out policy
• Assumes that consumers approve of companies collecting
and storing their personal information
• Requires consumers to actively opt-out
• Favored by data collectors
– Opt-in policy
• Must obtain specific permission from consumers before
collecting any data
• Favored by consumers
– Health information
• Health Insurance Portability and Accountability Act (1996)
• Improves the portability and continuity of health
insurance coverage
• Reduces fraud, waste, and abuse
• Simplifies the administration of health insurance
• American Recovery and Reinvestment Act (2009)
• Included strong privacy provisions for electronic
health records
• Offers protection for victims of data breaches
– State laws related to security breach notification
• Over 40 states have enacted legislation requiring
organizations to disclose security breaches
• For some states, these laws are quite stringent
– Children’s data
• Children’s Online Privacy Protection Act (1998)
• Web sites catering to children must offer
comprehensive privacy policies, notify parents or
guardians about its data-collection practices, and
receive parental consent before collecting personal
information from children under 13
• Family Education Rights and Privacy Act (1974)
• Assigns rights to parents regarding their children’s
education records
• Rights transfer to student once the student becomes
18
– Electronic surveillance
• Communications Act of 1934
• Established the Federal Communications
Commission
• Regulates all non-federal-government use of radio
and television plus all interstate communications
• Title III of the Omnibus Crime Control and Safe Streets
Act (Wiretap Act)
• Regulates interception of telephone and oral
communications
• Has been amended by new laws
• Foreign Intelligence Surveillance Act (FISA) of 1978
• Describes procedures for electronic surveillance
and collection of foreign intelligence information in
66 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
67 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
• Identity theft
• Electronic discovery
• Consumer profiling
68 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Identity Theft
• Theft of key pieces of personal information to impersonate a person,
including:
– Name
– Address
– Date of birth
– Social Security number
– Passport number
– Driver’s license number
– Mother’s maiden name
• Fastest-growing form of fraud in the United States
• Consumers and organizations are becoming more vigilant and proactive in
fighting identity theft
• Four approaches used by identity thieves
• Create a data breach
• Purchase personal data
• Use phishing to entice users to give up data
• Install spyware to capture keystrokes of victims
– Data breaches of large databases
• To gain personal identity information
• May be caused by:
• Hackers
• Failure to follow proper security procedures
– Purchase of personal data
• Black market for:
• Credit card numbers in bulk—$.40 each
• Logon name and PIN for a bank account—$10
• Identity information—including DOB, address,
SSN, and telephone number—$1 to $15
– Phishing
• Stealing personal identity data by tricking users into
entering information on a counterfeit Website
– Spyware
• Keystroke-logging software
• Enables the capture of:
• Account usernames
• Passwords
• Credit card numbers
• Other sensitive information
• Operates even if infected computer is not online
– Identity Theft and Assumption Deterrence Act of 1998 was
passed to fight fraud
– Identity Theft Monitoring Services
• Monitor the three major credit reporting agencies
(TransUnion, Equifax, and Experian)
• Monitor additional databases (financial institutions,
utilities, and DMV)
69 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Electronic Discovery
70 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Workplace Monitoring
71 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Camera surveillance
o Many cities plan to expand surveillance systems
o Advocates argue people have no expectation of privacy in a public
place
o Critics concerned about potential for abuse
Global positioning system (GPS) chips
o Placed in many devices
o Precisely locate users
o Banks, retailers, airlines eager to launch new services based on
knowledge of consumer location
Let’s Do It!
Self- Assessment Questions (AA2) : Answer the following questions:
1. Which of the following describe the Information privacy?
A. The combination of communications privacy and data privacy
B. The ability to communicate with others without those communications
being monitored by another person or organization.
C. The ability to limit access to one’s personal data by other individuals
and organizations in order to exercise a substantial degree of control
over that data and its use
D. None of the above
A. Electronic discovery
B. Electronic Health Record
C. Education Rate Program
D. Electronically Stored Information (ESI)
5. An electronic text file that a Web site downloads to visitors’ hard drives so it
can identify them on subsequent visits.
72 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
A. Electronic Discovery
B. Communication Assistance for Law Enforcement Act
C. Cookies
D. Downloads
6. Which of the following names of the software used by U.S. Food and Drug
Administration(FDA) captured some 80,000 pages of email including users’
email passwords and bank account information.?
A. Mkeystroke Monitoring
B. Ukeystroke monitoring
C. Keystroke monitoring
D. Xkeystroke monitoring
9. A device that records vehicle and occupant data for a few seconds before,
during, and after any vehicle crash that is severe enough to deploy the
vehicle’s air bags.
A. Vehicle event data recorder
B. Block box
C. Virtualization software
D. Vehicle event software
Closure
Wow!!! Well-done my dear student! You probably did great for this
lesson. You have got lots of things about Privacy. Now, you’re able to
proceed to the next lesson.
73 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Freedom of Expression
Introduction
This lesson will introduce you to the protection of freedom of
expression and what type of expression is not protected under the law. Also,
introduce to you some of the key federal laws that affect online freedom of
expression and freedom of expression issues related to the use of
information technology.
Objectives:
o Articulate the legal basis for the protection of freedom of speech, and
what types of are not protected under the laws
o Explain the ways that the Internet presents new challenges in the
area of freedom of expression.
o Explain the key free-speech issues relate to the use of information
technology
74 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
2. Based on the three (3) pictures, what are the human rights that we have?
____________________________________________________________
____________________________________________________________
____________________________________________________________
3. Who do you think should be responsible for upholding the rights? Are you
sure that the right is protected and respected?
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
75 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Let’s Explore!
First Amendment Rights
76 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
77 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
URL filtering
o Blocks objectionable URLs or domain names
Keyword filtering
o Blocks keywords or phrases
Dynamic content filtering
o Web site’s content is evaluated immediately before being
displayed
o Uses
Object analysis
Image recognition
Top-rated Internet filters for home users
o NetNanny Parental Controls
o PureSight PC
o CYBERsitter
o SafeEyes
o CyberPatrol
ICRA rating system
o Questionnaire for Web authors
o Generates a content label
Platform for Internet Content Selection (PICS)
o Users configure browsers to read the label
o Relies on Web authors to rate their site
o Complement to other filtering techniques
ISP blocking
o Blocking is performed on the ISP server
o ClearSail/Family.NET prevents access to certain Websites
Children’s Internet Protection Act (CIPA)
Federally financed schools and libraries must block computer access to:
o Obscene material
o Pornography
o Anything considered harmful to minors
78 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
79 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
80 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Corporate Blogging
81 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
Let’s Do It!
Self- Assessment Questions (AA2) : Answer the following questions.
1. The following key issues related to freedom of expression except ____.
A. Controlling access to information on the internet
B. Anonymity on the internet
C. Defamation and hate speech
D. Social Media Bullying
82 | P a g e
IC 112 – PROFESSINAL ETHICS IN COMPUTING
6. Base June 30, 2012 on the Top five countries with the highest number of
internet users. Which of the following countries rank the highest percentage
result of internet users.
A. China
B. United States
C. India
D. Japan (79.5%)
7. What country that their government demands have closed more Google
Gmail accounts and more blogger sites than in any other country.
A. Brazil
B. China
C. Cuba
D. Egypt
8. Despite the importance of anonymity in early America, it took nearly
______ years for the Supreme Court to render rulings that addressed
anonymity as an aspect of the Bill of Rights.
A. 50 years
B. 100 years
C. 150 years
D. 200 years
9. It involves the examination of Internet records in an attempt to reveal the
identity of an anonymous poster is called ____.
A. Transparency
B. Internet censorship
C. Doxing
D. Anonymous remailer service
10. A lawsuit in which the identity of the defendant is temporarily unknown,
typically because the defendant is communicating anonymously or using a
pseudonym.
A. John Doe Lawsuit
B. Jacob Watterling Lawsuit
C. Miller v. California
D. Intrusion Detection Lawsuit
Closure
Wow!!! Well-done my dear student! You probably did great for this
lesson. You have got lots of things about freedom of expression. Now, you’re
able to proceed to the next lesson.
83 | P a g e