Unformatted text preview:

OverviewIntroduction• Characterize cybertechnology and cyberethics• Professional, philosophical and descriptive perspectiveson cyberethicsEthical Theories• Grounding moral systems in religion, l aw or philosophicalethics• Characteristics of ethical theories: coherent, consistent,comprehensive, and systematic• Right to distribute pro pri etar y software and other infor-mation on the Internet• Theories: consequence, duty contract, character based• Apply theories to analyze ethical issues and propose res-olutions1Professional E thi cs• Moral r esponsibility of professionals• Codes of ethics: ACM, IEEE, SECEPP: pro’s and con’s• Apply codes to scenariosPrivacy• aspects of personal privacy: freedom from intrusion andinterference, control over flow of personal data• Why important? supports trust, friendship, security andautonomy• Data mer gi ng, matching, mining• Personal privacy in public: search engines, online publicrecords• PET’s anonymity, trustm arks2Security• What is security: elements are confidentiality, integrity,availability• Data, system and network security: examples, differ-ences• Hacking, cybert er ro ri sm, information warfare• Security and anonymity• Risk analysis3Cybercrime• Cybercrime vs. cybere xacerbate d and cyberassisted crime• Piracy, trespass and vandalism: characterize, examples• Identity theft and corporate espionage• Combating cybercrime: entrapment, sting operations,keystroke monitoring, packet sniffing, TIA, Patriot Act,encryption, biometric techniques• Jurisdiction problems for legisl atio nCompare privacy security and cybercri me4IP• What is IP? Why protect it?• Software as IP• Copyright Law– History. SBCETA and DMCA– What does it protect?– Fair use doctrine– First sale doctrine– Software piracy vs copyright– Jurisdictional issues• Patents, trademarks and trade secrets: characterize, ex-amples• Philosophical foundations: labor, utilitarianism, pe rso n-ality theories• FSF and Open Source: GPL, similarities and


View Full Document

Texas State CS 2315 - Lecture Notes

Download Lecture Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?