Social, Security, and Privacy Implications of Computing



Similar documents
Social Networking Sites A Predator s Playground?

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Affirmative Action Presentation

The webcast will begin shortly. Please stand by.

Back Cover. Copyright 2006, 2009, and 2011 National Center for Missing & Exploited Children. All rights reserved.

A U.S. Postal Inspector s Guide to Internet Safety for Children

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

National Cybersecurity Awareness Campaign Families Presentation

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Online Safety for Middle and High School

Back Cover. Copyright 2006 and 2009 National Center for Missing & Exploited Children. All rights reserved.

Summer Safety Tips for Kids

Table of Contents. 1. Basic Netiquette Pg Copyright Pg Plagiarism Pg Privacy Pg. 6

Cyber Safety For Parents

i-safe America Internet Safety Tips for Parents

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

TOWARD A SAFER INTERNET ENVIRONMENT FOR CHILDREN

E-Safety Issues and Online Safety

(Internet) for students, staff and, if requested, members of the Board of Education. All computer

Outsmarting On-line Predators. Christina Kilbourne

Adam Walsh Child Protection and Safety Act. Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender

MEA-MFT Teachers Conference

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life.

Staying Safe Online. A Practical Guide for Parents and Children.

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

Instant Messaging and Chat Rooms Play It Safe!

Online Safety How to Protect Yourself and Your Family

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices

Understanding Consent to Sexual Activity. Public Legal Education and Information Service of New Brunswick

safety and the internet

Keeping Safe Online. Program Support Notes. Junior - Senior Secondary. 24 mins. Health and Welfare. VEA Bringing Learning to Life

E-Safety Issues and Online Safety

Parenting & Technology: The Internet, Texting & Social Networks

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Technology Department 1350 Main Street Cambria, CA 93428

Cyberbullying. Welcome!

Youth Protection Training

Current Internet Facts

Internet Safety/CIPA Lesson Plan

Bill C-20 An act to amend the Criminal Code (Protection of children and other vulnerable persons) and the Canada Evidence Act

What do you. you know about. Online Predators?

Who's chatting to your kids?

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

ONLINE PREDATORS & PREDATORS

E-Safety Issues and Online Safety. Parents Evening

FORMAL MEMORANDUM ENQUIRIES AS TO WITNESS CREDIBILITY. Table of Contents

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus

PROGRAM 2361/Page 1 of 5 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO

E-safety: Protecting your child online. Information for parents

Ocean County Library policies concerning Computer and Internet Use and Rules of Conduct apply to guest users as well as library card holders.

Today s teens use technology more than ever. Most have

Internet Safety Fact Sheet Facts about Social Networking:

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

COMPUTER NETWORK AND INTERNET ACCEPTABLE USE FOR STUDENTS AND STAFF

Code of Virginia, 1950, as amended, Sections , :1, , , and

TESTIMONY OF DAN JUDE PRESIDENT SECURITY SOFTWARE SYSTEMS INC. Before the COPA COMMISSION AUGUST 04,2000 SAN JOSE, CA.

Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3)

Cyber safety Parent Easy Guide 63

9. Children, Technology and Gambling

TEENS. talking to. about GAMBLING. Our YOUTH ENGAGEMENT. Strategy

Digital Citizenship Lesson Plan

Lessons for Teens: Risky Internet and Social Networking

Safety Tips for Social Networking

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

Victim/Witness Security and Protection

Glossary: Cybersafety and Technology

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

How To Deal With Social Media At Larks Hill J & I School

Cyber-Safe Kids Cyber-Savvy Teens

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Helping to keep your children safe online

HOW TO OBTAIN AND POST AN IMMIGRATION BOND: A Guide for Non-Citizens in Detention

INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT

RHODE ISLAND SEX-OFFENDER REGISTRATION AND NOTIFICATION

How To Get A Teaching Certificate In Michigan

Online grooming: What changes with the new legislation?

NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS

Chapter 15 Criminal Law and Procedures

YOUR AGENCY EMS Computer, Software, Network, and Internet Policy with Appropriateness of Use Guidelines

SOCIAL MEDIA IN SCHOOLS. Guidelines for school staff using social media and other technologies. Licenced for NEALS

So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step # Name: Hour:

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

THE CHILD ABUSE ASSESSMENT:

C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY

Cyber Security Awareness. Internet Safety Intro.

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

section 15 Computers, , Internet, and Communications

Pride Academy Charter School

The support you should get if you are a victim of crime

GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut

Transcription:

Social, Security, and Privacy Implications of Computing February 17, 2006 Damira Pon University at Albany, SUNY 1

Cyber Ethics 2

Relativity applies to physics, not ethics - Albert Einstein 3

Cyber Ethics Definition Work Ethics Define the principles of an organization Tries to promote integrity and transactional transparency Need for Cyber Ethics Cyber Ethics can be defined as the field of inquiry dealing with ethical problems aggravated, transformed or created by computer and network technology. Definition from Maner, W. (1978). Starter Kit in Computer Ethics. 4

Cyber Ethics Technology Benefits Increased productivity Communication speed Automated tasks Widespread information dissemination Information processing 5

Cyber Ethics Technology Limitations Health impacts e.g. Carpal Tunnel Social impacts Adjustment Anonymity Ease of performing illegal activities 6

Cyber Ethics Ten Commandments 1. Thou shalt not use a computer to harm others. 2. Thou shalt not interfere with others computer work. 3. Thou shalt not snoop around in others computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software you have not paid for. 7. Thou shalt not use other s computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people s intellectual property. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt use a computer in ways that ensure consideration and respect for your fellow humans. Adapted from: Barquin, R.C. (1992). In Pursuit of a Ten Commandments' for Computer Ethics. Computer Ethics Institute. 7

Cyber Ethics CyberEthical Surfivor Scenario #1 You have just realized that your next-door neighbor has an insecure wireless access point and your computer connects automatically to it. Should you use this wireless access point? 8

Cyber Ethics CyberEthical Surfivor Question Just because you CAN does it mean that you SHOULD? 9

Cyber Ethics CyberEthical Surfivor Scenario #2 You have just gotten robbed and your entire CD collection has been stolen. You know that there are programs that you can download music for free. Should you be able to download the music from your original CD s? 10

Cyber Ethics CyberEthical Surfivor Notes Something that is ILLEGAL may be different than something that is UNETHICAL. 11

Cyber Ethics CyberEthical Surfivor Scenario #3 You have a 9-5 job and your company provides you with a blackberry and cell phone so that you will be accessible 24 hours a day with no overtime pay. Considering this, you are very busy with a spouse and three kids. Should you be able to use company time for personal activities? 12

Cyber Ethics CyberEthical Surfivor Scenario #3, Cont d. What about Paying bills? Online gambling? Setting up day care arrangements? Music file-sharing? Pornography? Looking at the summary for the last episode of Lost, Desperate Housewives, or CSI? 13

Cyber Ethics CyberEthical Surfivor Scenario #4 You will be split into two groups to come up with a conclusion based on the upcoming scenario. After about 5 minutes you will be asked to reconvene and discuss what you would choose. 14

Cyber Ethics CyberEthical Surfivor Scenario #4 You receive an anonymous email which includes all technical and business details of a key competitor s project. Your company is behind and if you use the information, you will likely beat your competitor- and be a hero. If you don t use the information, your company will lose a great deal of money and you will likely be the scapegoat. If you use the information, no one except you will ever know. What do you do? 15

Cyber Ethics CyberEthical Surfivor Scenario #4 in Defcon Situation Two separate groups Unanimous decisions in both groups Business is War Immoral and even Illegal Split judging among peers Results Leadership is important 16

Ethics is not definable, is not implementable, because it is not conscious; it involves not only our thinking, but also our feeling. -Valdemar W. Setzer 17

Cyber Ethics Six Steps Towards Making Ethical Decisions 1. Identify the ethical issue or problem. 2. List the facts that have the most bearing on the decision. 3. Identify anyone who might be affected by your decision and how. 4. Explain what each affected person would want you to do about the issue. 5. List three alternative actions and identify the best and worst case scenario for each alternative, anyone who would be harmed by this choice (and how), any values that would be compromised by selecting this alternative, and any automatic reasons why this alternative should not be selected (legal issues, rules, etc.). 6. Determine a course of action. Source: http://lessonplans.btskinner.com/ethics1.html 18

Cyber Ethics Final Thoughts How do you know what the right thing to do is? Enron and your mom 19

20

Cyber Safety against Online Predators 21

As the father of four young adult children, I know that kids know much more than their parents about the Internet. -Mark Kennedy 22

Pop Quiz: Name three websites that your child (or any child you know) visits regularly on the Internet. 23

Cyber Safety Online Environment New virtual playground, e.g. Instant Messengers Chat rooms Discussion Boards and Forums Social Networks Blogs Online RPG Games 24

Cyber Safety Technophilia Detective James McLaughlin, Keene County Police Department states that technophilia is: Persons using the computer to engage in sexual deviance. 25

Cyber Safety Statistics 1 in 5 children are sexually solicited online in a year 2000 Report from the National Center for Missing and Exploited Children 20% of violent offenders serving time in state prisons reported to having victimized a child U.S. Department of Justice 26

Cyber Safety CyberTipline: Annual Report Totals The incidents being calculated include: Child pornography, child prostitution, child sex tourism, child sexual molestation, online enticement of children for sexual acts, unsolicited obscene material sent to a child. 27

Cyber Safety Not everything is what it seems Predators are able to pretend to be someone who would appeal to a victim Untrue statements regarding age or body type Photo editing 28

Cyber Safety Who s NOT the Cyber Predator? This guy should be familiar He s NOT a cyber predator! Cyber predators come from all walks of life In To Catch A Predator III on Dateline NBC, a team managed to lure about 50 predators The age range was 19-65 yrs. old. Jobs held included a high school teacher and a Department of Homeland Security employee. 29

Cyber Safety Near Albany, NY Kevin Gilman a Wyantskill resident was sentenced to 10 years in prison for possession and trading of over 1,000 child pornography images on the Internet through a Yahoo! group. He was also arrested in August on felony charges for allegedly molesting a 6-year-old Albany boy two months earlier. Source: Cristo, R. (January 20, 2006). Child pornography possession land man in jail. The Record. 30

Cyber Safety Real Sample IM Conversation A/L/S Pictures Experience Home Life Source: Internet Safety for Kids 31

Cyber Safety Warning Signs that Something is Wrong If your child is: Online late at night Spending a lot of time online (not school or homeworkrelated time) Left alone during most of his/her online sessions Spending most of their online time in chat rooms Reluctant to talk about or evasive in describing his/her online experiences Minimizing the screen when you walk by Hiding programs in the task bar when you go past 32

Cyber Safety What to Do Try to find your child s information online (http://www.htcia.org) and teach them not to release personal information Learn about your child s online activities and friends Put child s computer in public room Create home policies and restrictions Understand the policies in other Internet-enabled areas (schools and libraries) Let children know that there are no repercussions for telling you about online solicitations. 33

Cyber Safety Filters Use filters, but don t only rely on them Content Protect (www.contentwatch.com) NetNanny (www.netnanny.com) CYBERsitter (www.cybersitter.com) CyberPatrol (www.cyberpatrol.com) Cyber Sentinel (www.securitysoft.com) FilterPak (www.surfguardian.com) Cyber Snoop (www.perlsw.com) 34

Cyber Safety Online Resources NetSmartz Workshop http://www.netsmartz.org National Center for Missing and Exploited Children http://www.missingkids.com Perverted Justice http://www.perverted-justice.com NYS Sex Offender Registry http://criminaljustice.state.ny.us/nsor/ 35