OverviewIntroduction• Characterize cybertechnology and cyberethics• Professional, philosophical and descriptive perspectiveson cyberethicsEthical Theories• Grounding moral systems in religion, l aw or philosophicalethics• Characteristics of ethical theories: coherent, consistent,comprehensive, and systematic• Right to distribute pro pri etar y software and other infor-mation on the Internet• Theories: consequence, duty contract, character based• Apply theories to analyze ethical issues and propose res-olutions1Professional E thi cs• Moral r esponsibility of professionals• Codes of ethics: ACM, IEEE, SECEPP: pro’s and con’s• Apply codes to scenariosPrivacy• aspects of personal privacy: freedom from intrusion andinterference, control over flow of personal data• Why important? supports trust, friendship, security andautonomy• Data mer gi ng, matching, mining• Personal privacy in public: search engines, online publicrecords• PET’s anonymity, trustm arks2Security• What is security: elements are confidentiality, integrity,availability• Data, system and network security: examples, differ-ences• Hacking, cybert er ro ri sm, information warfare• Security and anonymity• Risk analysis3Cybercrime• Cybercrime vs. cybere xacerbate d and cyberassisted crime• Piracy, trespass and vandalism: characterize, examples• Identity theft and corporate espionage• Combating cybercrime: entrapment, sting operations,keystroke monitoring, packet sniffing, TIA, Patriot Act,encryption, biometric techniques• Jurisdiction problems for legisl atio nCompare privacy security and cybercri me4IP• What is IP? Why protect it?• Software as IP• Copyright Law– History. SBCETA and DMCA– What does it protect?– Fair use doctrine– First sale doctrine– Software piracy vs copyright– Jurisdictional issues• Patents, trademarks and trade secrets: characterize, ex-amples• Philosophical foundations: labor, utilitarianism, pe rso n-ality theories• FSF and Open Source: GPL, similarities and
View Full Document