SlideShare una empresa de Scribd logo
1 de 15
Social Implications &
Ethics
Kelsey Breslin
Jason Spiegel
Jimmy Zelinske
Lan Nguyen
Increase capability of the
individual
Internet
Social networking
Jobs
Dating (eHarmony)
Merchandising
Increase capability of the
individual
Transportation
Subways/Metro
Cars
Airplanes
Future: jetpacks? Teleportation devices?
Increase capability of the
individual
Jobs
Dangerous tasks are done more safely
Tedious jobs are done more efficiently
More output is produced at a lower cost and faster pace
Increase capability of the
individual
Medicine
Microscopes, MRI machines, CAT scans, x-rays, etc. all allow
research to be done on different ailments and diseases,
making the chance of a discovering a cure increase
Increase vulnerability of the user
Computer Literacy
Understanding the capabilities of computer’s
Ability to use computers adequately
I.D. theft
Computers are the first resource for Identity thieves
Targets
Applications are the top
vulnerabilities
Microsoft SQL, FTP servers
OS
Apple
QuickTime
Source: http://www.sans.org/top-
cyber-security-risks/trends.php
Solutions to Vulnerability
Updates (patches)
Use secure sites
Protect passwords
Ethics of internet users
Ethics on the internet
Acceptance that internet is not a free zone
The internet is a free place, but there should be restrictions on
contents allowed to be on the web.
Off-line world laws to on-line world
Laws should be involved in some cases, such as copyright
Global cultures
Put some sensitivity on the contents
Internet Development
1960: Used to share information in the military
1969: used in some universities for research
1970’s-1990’s: Developments in speed and connections
1996-present: internet connection speed increasing, Wi-Fi
connection.
Internet Development
From 80’s with the development of Windows, more and
more people use the internet
Estimate to around 25-30 billions web pages
Unlike before, where the internet only can be use in a small
area, now it can be used anywhere.
Ethics of internet providers (US-
like countries)
ISPs take little to no responsibility
View the internet as neutral and so they remain neutral
Only things like child pornography etc... are blacklisted
DMCA and copyright infringement is simply forwarded to the
offender
Ethics of internet providers (US-
like countries)
There is almost no filtering
Fairly frequently censorship bills are introduced
Protest groups like DemandProgress.org attempt to shoot it
down
Ethics of internet providers
China-like countries)
ISPs take things into their own hands
View the internet as something they own
ISPs won't hesitate to take something offline
ISPs heavily filter traffic based on politics
Countries like China and Australia have long blacklists of
websites their citizens cannot visit due to political interests
Sources
http://www.techfluency.org/computer-literacy.htm
http://www.sans.org/top-cyber-security-risks/trends.php
http://www.cert.org/blogs/vuls/2009/02/internet_explorer_vulnerabilit.html
Howe, Walt. "A Brief History of the Internet." Walt Howe's Internet Learning Tree. 24 Mar.
2010. Web. 14 Nov. 2010. <http://www.walthowe.com/navnet/history.html>.
"Internet Ethics." Roger Darlington's World. Web. 14 Nov. 2010.
<http://www.rogerdarlington.co.uk/Internetethics.html>.
Kristula, Dave. "The History of the Internet." Dave's Site / Davesite.com. Web. 14 Nov. 2010.
<http://www.davesite.com/webstation/net-history.shtml>.
"WWW FAQs: How Many Websites Are There?" Welcome to Boutell.Com, Inc.! Web. 14 Nov.
2010. <http://www.boutell.com/newfaq/misc/sizeofweb.html>.

Más contenido relacionado

La actualidad más candente

3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentationJonathan Ezor
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityDavid B. Whittier, Ed D
 
2017 atj fellows
2017 atj fellows2017 atj fellows
2017 atj fellowsJohn Mayer
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality PresentationJonathan Ezor
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the WorkplaceTawny Brown
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in TechnologyGregory Barnes
 
4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLEJonathan Ezor
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingYUSRA FERNANDO
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in iHassan Nasir
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
The social and ethical issues of sdd
The social and ethical issues of sddThe social and ethical issues of sdd
The social and ethical issues of sddsarthakgarg97
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin itRushana Bandara
 

La actualidad más candente (20)

3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school community
 
2017 atj fellows
2017 atj fellows2017 atj fellows
2017 atj fellows
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the Workplace
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
The social and ethical issues of sdd
The social and ethical issues of sddThe social and ethical issues of sdd
The social and ethical issues of sdd
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 

Destacado

[Elite YM] Corporate PR - Bich Van & Hoang Lan
[Elite YM] Corporate PR - Bich Van & Hoang Lan[Elite YM] Corporate PR - Bich Van & Hoang Lan
[Elite YM] Corporate PR - Bich Van & Hoang LanLân Nguyễn
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
W Lan Userguide
W Lan UserguideW Lan Userguide
W Lan Userguidemvde3000
 
Supervision training for volunteers and novis supervisors
Supervision training for volunteers and novis supervisorsSupervision training for volunteers and novis supervisors
Supervision training for volunteers and novis supervisorsImke WoodT&C
 
Penguatan Etika Publik: Innovating Ethics in Public Administration
Penguatan Etika Publik: Innovating Ethics in Public AdministrationPenguatan Etika Publik: Innovating Ethics in Public Administration
Penguatan Etika Publik: Innovating Ethics in Public AdministrationTri Widodo W. UTOMO
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 

Destacado (8)

[Elite YM] Corporate PR - Bich Van & Hoang Lan
[Elite YM] Corporate PR - Bich Van & Hoang Lan[Elite YM] Corporate PR - Bich Van & Hoang Lan
[Elite YM] Corporate PR - Bich Van & Hoang Lan
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
W Lan Userguide
W Lan UserguideW Lan Userguide
W Lan Userguide
 
Chap5pp
Chap5ppChap5pp
Chap5pp
 
Supervision training for volunteers and novis supervisors
Supervision training for volunteers and novis supervisorsSupervision training for volunteers and novis supervisors
Supervision training for volunteers and novis supervisors
 
Penguatan Etika Publik: Innovating Ethics in Public Administration
Penguatan Etika Publik: Innovating Ethics in Public AdministrationPenguatan Etika Publik: Innovating Ethics in Public Administration
Penguatan Etika Publik: Innovating Ethics in Public Administration
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 

Similar a Social Implications and Ethics

Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityFreedom House
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of securityGemy Chan
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionAlvaro Lopez Ortega
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimesijfcstjournal
 

Similar a Social Implications and Ethics (17)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Exposing the Hidden Web
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden Web
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 

Último

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 

Último (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 

Social Implications and Ethics

  • 1. Social Implications & Ethics Kelsey Breslin Jason Spiegel Jimmy Zelinske Lan Nguyen
  • 2. Increase capability of the individual Internet Social networking Jobs Dating (eHarmony) Merchandising
  • 3. Increase capability of the individual Transportation Subways/Metro Cars Airplanes Future: jetpacks? Teleportation devices?
  • 4. Increase capability of the individual Jobs Dangerous tasks are done more safely Tedious jobs are done more efficiently More output is produced at a lower cost and faster pace
  • 5. Increase capability of the individual Medicine Microscopes, MRI machines, CAT scans, x-rays, etc. all allow research to be done on different ailments and diseases, making the chance of a discovering a cure increase
  • 6. Increase vulnerability of the user Computer Literacy Understanding the capabilities of computer’s Ability to use computers adequately I.D. theft Computers are the first resource for Identity thieves
  • 7. Targets Applications are the top vulnerabilities Microsoft SQL, FTP servers OS Apple QuickTime Source: http://www.sans.org/top- cyber-security-risks/trends.php
  • 8. Solutions to Vulnerability Updates (patches) Use secure sites Protect passwords
  • 9. Ethics of internet users Ethics on the internet Acceptance that internet is not a free zone The internet is a free place, but there should be restrictions on contents allowed to be on the web. Off-line world laws to on-line world Laws should be involved in some cases, such as copyright Global cultures Put some sensitivity on the contents
  • 10. Internet Development 1960: Used to share information in the military 1969: used in some universities for research 1970’s-1990’s: Developments in speed and connections 1996-present: internet connection speed increasing, Wi-Fi connection.
  • 11. Internet Development From 80’s with the development of Windows, more and more people use the internet Estimate to around 25-30 billions web pages Unlike before, where the internet only can be use in a small area, now it can be used anywhere.
  • 12. Ethics of internet providers (US- like countries) ISPs take little to no responsibility View the internet as neutral and so they remain neutral Only things like child pornography etc... are blacklisted DMCA and copyright infringement is simply forwarded to the offender
  • 13. Ethics of internet providers (US- like countries) There is almost no filtering Fairly frequently censorship bills are introduced Protest groups like DemandProgress.org attempt to shoot it down
  • 14. Ethics of internet providers China-like countries) ISPs take things into their own hands View the internet as something they own ISPs won't hesitate to take something offline ISPs heavily filter traffic based on politics Countries like China and Australia have long blacklists of websites their citizens cannot visit due to political interests
  • 15. Sources http://www.techfluency.org/computer-literacy.htm http://www.sans.org/top-cyber-security-risks/trends.php http://www.cert.org/blogs/vuls/2009/02/internet_explorer_vulnerabilit.html Howe, Walt. "A Brief History of the Internet." Walt Howe's Internet Learning Tree. 24 Mar. 2010. Web. 14 Nov. 2010. <http://www.walthowe.com/navnet/history.html>. "Internet Ethics." Roger Darlington's World. Web. 14 Nov. 2010. <http://www.rogerdarlington.co.uk/Internetethics.html>. Kristula, Dave. "The History of the Internet." Dave's Site / Davesite.com. Web. 14 Nov. 2010. <http://www.davesite.com/webstation/net-history.shtml>. "WWW FAQs: How Many Websites Are There?" Welcome to Boutell.Com, Inc.! Web. 14 Nov. 2010. <http://www.boutell.com/newfaq/misc/sizeofweb.html>.