Lecture 15

advertisement
Personal Safety, Ethics,
Legal & Social Implications
CSC1720 – Introduction to Internet
Essential Materials
Outline

Personal Safety
– AUP, Password, Virus, Fraud, Threat
– Software Piracy
– Hoaxes, Legends





What is Computer Ethics?
Many-to-Many, Anonymity, reproducibility
Ethical Significance
Legal and Social Implications
Final Exam Tips, Statistics
CSC1720 – Introduction to Internet
2
All copyrights reserved by C.C. Cheung 2003.
Personal Safety




Understand the importance of Acceptable
Use Policies (AUP), passwords and vigilance
online.
Know what kind of online activities violate
copyright, software piracy laws.
Learn how to protect your personal privacy.
Discuss how to separate fact and fiction
when you see warnings and advice on the
Net.
CSC1720 – Introduction to Internet
3
All copyrights reserved by C.C. Cheung 2003.
Acceptable Use Policies
(AUP)


AUP is a policy that shows the appropriate
us of the Internet.
Your Internet Access privileges will be
cancelled if you violate the rules.
–
–
–
–
–
–
Illegal use, Harassment
SPAM, E-mail/News Bombing
E-mail/News Forging, impersonation
Copyright, trademark infringement
Network disruptions, unfriendly activity
Distribution of viruses, Inappropriate use of
software (e.g. continuous pinging, … )
CSC1720 – Introduction to Internet
4
All copyrights reserved by C.C. Cheung 2003.
AUP Example – i-cable
CSC1720 – Introduction to Internet
5
All copyrights reserved by C.C. Cheung 2003.
Password Security


Someone will break into your
university or ISP account, then acquire
the system administrator’s privileges
to destroy the whole system.
A safe password always contains:
– At least six characters (8 preferable)
– Both lowercase and uppercase letters
– At least one numerical character
– At least one “!#$%^&*…”
CSC1720 – Introduction to Internet
6
All copyrights reserved by C.C. Cheung 2003.
Password Tips




Never tell anyone your password. Ever,
even the system administrator.
Don’t write down your password
where someone else can find it.
Change your password about 1 or 2
months.
Don’t use the same password in many
different places.
CSC1720 – Introduction to Internet
7
All copyrights reserved by C.C. Cheung 2003.
Viruses, Trojans, Worms



A virus is an executable program that sticks
to another host program. This virus can
replicate itself via files and propagate via
shared floppies or disks.
A Trojan Horse is an executable program
that slips into a system under the guise of
other program. Deception is a key
characteristic of all Trojan horses.
A worm is very similar to a virus, but virus
propagate via floppies or other media, a
worm needs an active network connection.
CSC1720 – Introduction to Internet
8
All copyrights reserved by C.C. Cheung 2003.
Anti-virus tips



Use antivirus software and update regularly
Keep floppy disk out of the drive, unless it is
actively working on
Disable the Java/JavaScript in the browser
– prevent the attack from malicious applets or
scripts


Encrypt all files that contain sensitive
information, store them on disk or other
removable media (e.g. ZIP, Tape drive)
Don’t connect your computer to the Internet
longer than necessary
CSC1720 – Introduction to Internet
9
All copyrights reserved by C.C. Cheung 2003.
E-mail Viruses

Macros Viruses
– Melissa Virus
– Avoiding Macros by using RTF

Script Attacks
– In 2000, two e-mail attachment attacks
Outlook and Outlook Express users – The
LoveLetter, NewLove viruses
CSC1720 – Introduction to Internet
10
All copyrights reserved by C.C. Cheung 2003.
Shopping Online

Offer lots of benefits that you cannot
find shopping in a store.
– The shop is always open, 24/7
– Numerous bargains online
– Return policies

Online shopping does pose some risks,
but you can take precautions to
protect yourself against them.
CSC1720 – Introduction to Internet
11
All copyrights reserved by C.C. Cheung 2003.
Shopping Online Tips





Use credit cards, but not checks, money
orders, debit cards.
Examine the URL starts with “https://”.
Check for a locked padlock or unbroken key
icon before entering any credit card
information.
Don’t use same password in all your ecommerce accounts.
Save a copy of all purchase orders and the
confirmation numbers of the records.
CSC1720 – Introduction to Internet
12
All copyrights reserved by C.C. Cheung 2003.
Protect Your Privacy

Invasion of privacy
– Imagine a man following you all day, taking
notes, jotting down how much time you spend
on the phone and to whom you talk, recording
which stores you visit and which items you
purchase, then he sells these information to
anyone wants it.
– It can happen if the web page is programmed to
collect information.

When you visit the page, which link you click, how long
you spend on the web page, etc…
CSC1720 – Introduction to Internet
13
All copyrights reserved by C.C. Cheung 2003.
Protect Your Privacy
What
kind of
information can
be collected? Try
this
CSC1720 – Introduction to Internet
14
All copyrights reserved by C.C. Cheung 2003.
Internet SCAMs

A trick or a deception deliberately
practiced to get unlawful gain.
– Loss money

National Fraud Information Center
– Help consumers distinguish between
legitimate and fraudulent promotions in
the Internet
– Report the suspected fraud on the Net.
CSC1720 – Introduction to Internet
15
All copyrights reserved by C.C. Cheung 2003.
National Fraud
Information Center
CSC1720 – Introduction to Internet
16
All copyrights reserved by C.C. Cheung 2003.
Libel and Lawsuits



Libel is any written or pictorial statement
that damages a person or organization.
A person who disseminates information that
is deemed harmful to a company can be
target of a lawsuit even that information is
accurate.
All digital information can be reproduced
and distributed easily on the Net.
– You can’t be sure that your private email
remains private – think twice before send out.
CSC1720 – Introduction to Internet
17
All copyrights reserved by C.C. Cheung 2003.
Defamation case study:
Yahoo!

In the summer of 2000, the union of
Jewish students and the International
League Against Racism and AntiSemitism filed a suit against Yahoo! In
the French courts: Buy and Sell Nazi
memorabilia on its auction sites.
– The sale of such items is not illegal in the
US, but not in EU states.
CSC1720 – Introduction to Internet
18
All copyrights reserved by C.C. Cheung 2003.
Threats
In April 1999, they killed
12 fellow students and
Teacher.
There is no evidence that
they intended to carry out
their threats in the chat
Room.
CSC1720 – Introduction to Internet
19
All copyrights reserved by C.C. Cheung 2003.
Information War &
Digital Crime


In 1989, Kevin Mitnick, who was convicted of
stealing software from Digital Equipment
Corp. (DEC).
Information warfare may take the form of
propaganda, espionage (commercial or
political), or even target n websites
– such as DDoS, happened with Yahoo! And Amazon
in 2000

Digital crime is often associated with viruses.
(still remember Robert Morris (Worm)?
CSC1720 – Introduction to Internet
20
All copyrights reserved by C.C. Cheung 2003.
Surveillance?

“Computerization has a tremendous
potential for destructive invasion of
privacy …” – Marry Williams.
– Most people using any form of
communication will assume that anything
they transmit will remain confidential.
– Phone taps may be established to locate
criminals.
– What will happen in the Internet?
CSC1720 – Introduction to Internet
21
All copyrights reserved by C.C. Cheung 2003.
Harassment



Another potential problem for Internet
Users.
Offensive materials on the Web should
not bring to workplace.
An employee who receives an email
that contains religiously, or sexually, or
racially offensive jokes, should not
forwards this email to the coworkers.
CSC1720 – Introduction to Internet
22
All copyrights reserved by C.C. Cheung 2003.
Software Piracy







Piracy – Not Privacy!
Public Domain – no copyright, can be freely copied,
distributed.
Freeware – has copyright, can be copied and distributed
without payment, but donation may be needed.
Shareware – copyrighted, can be distributed without payment,
but payment is expected in use.
Licensed software – copyrighted, payment is prior to use.
If the software costs money, but you are using it in violation
of the user agreement  stolen the software
Criminal and civil law violation.
CSC1720 – Introduction to Internet
23
All copyrights reserved by C.C. Cheung 2003.
Copyright Infringements



Duplication or distribution of
commercial software.
Unauthorized use of people’s invention
Owner has the right to exclude people
from using, making, selling, importing
his products/software.
CSC1720 – Introduction to Internet
24
All copyrights reserved by C.C. Cheung 2003.
Hoaxes and Legends

Don’t be Naïve
– You cannot believe everything you read,
especially on the Internet.


Internet is very effective to propagate
misinformation that alarm people and
generate panic.
You can visit “Urban Legends” if you
are not sure something on the Net is
right or not.
CSC1720 – Introduction to Internet
25
All copyrights reserved by C.C. Cheung 2003.
10 worst Hoaxes - CNN










10. Let the Good Times Roll
9. Help a Sick Child
8. Bill Gates Reaches Out to You
7. Dial 809 for Trouble
6. Money Nonsense in Nigeria
5. Save Big Bird
4. The $250 Cookie Recipe
3. Deodorant Endangers Your Health?
2. Last Photo From the World Trade Center Deck?
1. Next Time, Just Say "I Don't Know"
CSC1720 – Introduction to Internet
26
All copyrights reserved by C.C. Cheung 2003.
Internet Ethics

The Robert Morris Case
– Release the “worm” in 1988.
– The whole network was clogged with the worm.
– 3 years’ probation, fined $10,000, 400 hours of
community service.
– Someone said that the worm has alerted the
vulnerability of the systems.
– Different opinions said he should/shouldn’t go to
jail.
– What is your opinion?
CSC1720 – Introduction to Internet
27
All copyrights reserved by C.C. Cheung 2003.
Case 2: The Melissa Virus




In 1999, David Smith created the
Melissa virus.
Post on the newsgroup “Alt.Sex” and
said the attachment contained a list of
pass codes of Pornographic website.
Infected million of computers and
caused over $80 million damages.
What is your opinion for his act?
CSC1720 – Introduction to Internet
28
All copyrights reserved by C.C. Cheung 2003.
Case 3: Credit Card
Extortion





A 19-year-old Russian involved in the illegal
use of credit cards in 1997.
Steal 300,000 credit card numbers from an
online music store.
Extort $100,000 for the stolen information.
Several thousand visitors had downloaded
over 25,000 credit card numbers.
What is your opinion for this act?
CSC1720 – Introduction to Internet
29
All copyrights reserved by C.C. Cheung 2003.
Three morally significant

When compared to face-to-face
communication, Internet provides
– Global, Many-to-Many communication

Interactive comm. with speed and ease.
– Facilitates anonymity

No one knows your name, how you feel…
– Provides reproducibility

Electronic information can be easily copied
and there is no loss of value in reproduction.
CSC1720 – Introduction to Internet
30
All copyrights reserved by C.C. Cheung 2003.
Ethical Significance

Many-to-Many scope
– That means the individuals can use very
little effort to
Disrupt, steal,
 Cause property damage, snoop,
 Harass, stalk, extort, defame, …

– Its enormous benefits brings people
together and shorten the geographic
space and distance.
CSC1720 – Introduction to Internet
31
All copyrights reserved by C.C. Cheung 2003.
Ethical Significance

Anonymity
– Individuals do not have to take risks for being
seen as they act and interact.



Difficult to catch criminals who act anonymity.
You don’t know the source of the information.
It is difficult to gage the trustworthiness of the
information.
– On the other hand, consider the race, gender
and physical appearance are removed for an
online course

Would it be more fair for the teacher to evaluate
student’s performance?
CSC1720 – Introduction to Internet
32
All copyrights reserved by C.C. Cheung 2003.
Ethical Significance

Reproducibility
– Privacy and property rights issues arise.
– Facilitates the words and documents to
be forwarded to infinite number of people
or sites.
– If you receive a document from someone
via the Net, can you be sure the
document is sent/written by its claimed
sender?
CSC1720 – Introduction to Internet
33
All copyrights reserved by C.C. Cheung 2003.
Legal and Social
Implications




Internet offers great riches, but also pose
threats.
Remember the right between legal (created
by law) and human rights.
Facilitates unmediated many-to-many
communication, and access to a diversity of
online resources.
Facilitates the formation of new associations
across the geographical limitation.
CSC1720 – Introduction to Internet
34
All copyrights reserved by C.C. Cheung 2003.
Cyber-Feminism



The relationship of women with technology
has often been perceived as a problematic
one?
Although most inventors and engineers
associated with the computer revolution has
been men, women have been also involved
with computers since their inception.
Reference: http://www.wise-women.org/
– Many good online tutorials from a group of
women.
CSC1720 – Introduction to Internet
35
All copyrights reserved by C.C. Cheung 2003.
Cyber-Space: Virtual
Reality (VR)
Ref: http://sulu.npl.co.uk/netshare/guest/recursive/demo.html
CSC1720 – Introduction to Internet
36
All copyrights reserved by C.C. Cheung 2003.
Final Exam




Date: TBA
Time: TBA
Venue: TBA
Coverage:
– Lecture 1 – 15,
– Lab and tutorial exercises,
– Newsgroup
– Open notes (but not open book!!!)
CSC1720 – Introduction to Internet
37
All copyrights reserved by C.C. Cheung 2003.
References









Yahoo!
Duke
Safe Shopping Online Tips
ScamBuster
Online Harassment
Computer Ethics
Computer Ethics – D. G. Johnson
The End.
Thank you for taking CSC1720!
CSC1720 – Introduction to Internet
38
All copyrights reserved by C.C. Cheung 2003.
Download