Академический Документы
Профессиональный Документы
Культура Документы
SOCIAL ISSUES
The ATM
Convenience
Unemployment Alienation and Customer Service Crime Loss of Privacy Errors
Philosophical Issues
Do we have a right to Privacy?
Is it in the Constitution?
Consumer Information
Data mining (How is the data gathered?)
Junk Mail Credit Bureaus Medical Information
Government Files
Computer Matching
Computer Profiling IRS National Crime Information Center US Census SSN
Questions
1) Should the United States create a system with a National Health Card? 2) Should all the public records in the court system be placed on the internet for easy retrieval?
Uses of Encryption
Electronic transfer
Personal information Financial data Medical records Trade secrets Cable TV signals Others
Is it Needed?
Protection from Terrorists and Criminals
300-500 legal wiretaps per year in 80s and
90s
Cost?
Necessity?
Global Competition
Key Escrow
Government Key Escrow
Clipper Chip
Computer Crime
Fraud
Theft Hacking
Customer Fraud
Common scams
Fraudulent internet sites Incorrect bar code scanning
Photos
One-time-only cards
internet?
Common Fraud
Credit Cards
ATMs Telecommunications
Satellite/Cable TV
Outside attacks
Competitors Hackers
Hacking
The meaning of the word has changed
Traditional hacking Stolen disk space Rerouting and stealing phone service
Captain Crunch
Internet hacking Denial of service attacks Web site defacing Theft of information
Security Weakness
Why is security so weak?
Poor network administration Operating System design
New issues
Broadband to the home
with technology Laws tend to punish crimes against the state at a higher level Where to prosecute?
Ethical Issues
Is hacking good?
Exposes security flaws Information should be free
Intellectual Property
How valuable are ideas?
DMCA
Copyright
Gives copyright holder exclusive rights to:
Make copies Produce derivative works such as translations or
movies based on books Distribute copies Perform work in public Display work in public
profit
Multiple computers
Patents
Reward the inventor with exclusivity
Protects things and processes
Not individual expressions
Software Piracy
Protecting software copyright
Cyber Gap
Future jobs
White Collar vs. Blue Collar Service Industry Computers taking skilled jobs
Drafting Programming
Education
Information Access
Universal Access
Is it necessary? A place to go
Political Issues
Information is a force for freedom Freedom of the press Curtailing information flow
China Vietnam Singapore US Iran