Com ethics and privacy

Cards (69)

  • Internet and Network Attacks
    1. Viruses, Worms, and Trojan Horses
    2. Denial of Service Attacks
    3. Spoofing
  • Virus a program that affects or infects a computer and can spread throughout, damaging and altering files
  • Worm a program that copies itself repeatedly, e.g. in memory of on a network, using up resources and possibly shutting down the computer or network
  • Trojan Horse a program that hides within or looks like a legitimate program; cause loss / theft of data; does not replicate itself
  • Worms use Computer Networks to spread itself while, Viruses spread to different systems through executable files.
  • The virus needs human action to replicate, whereas, Worms don't.
  • Spreading speed of a Worm is faster than a Virus,
  • The virus tends to damage, destroy or alter the files of target computers, whereas, Worms does not modify any file but aims to harm the resources
  • Anti Virus Software
    • Scans for programs that attempt to modify programs that are normally read only
    • Uses virus signature (specific pattern of virus code) to identify a virus
    • Inoculates a program file records information such as file size and file creation date in an inoculation file to determine if file has been tampered
    • Quarantines infected file in a separate area of a hard disk
  • Denial of Service Attacks purpose is to disrupt computer access to an internet service e.g. web or email; influx of confusing data messages are sent to the computer network
  • Spoofing technique used by intruders to make their network or internet transmission appear legitimate e.g. IP spoofing is when intruder computer fools a network into believing that its IP address is associated with a trusted
    source
  • Firewall hardware and/or software that protects a network’s resources from intrusion (Use of proxy server to screen incoming and outgoing
    messages)
  • Intrusion Detection Software automatically analyzes network traffic, identifies unauthorized intrusions, and notifies network administrators of possible system breaches
  • Honeypots a vulnerable computer set up to entice an intruder to break into
  • Computer Ethics
    • Moral guidelines that govern the use of computers and information systems
    • Areas of Computer Ethics
    1. Unauthorized use of computers and networks
    2. Software theft (piracy)
    3. Information accuracy
    4. Intellectual Property Rights
    5. Codes of Conduct
    6. Information Privacy
    1. Unauthorized use of computers and networks
    • Gain access to a bank computer to perform unauthorized
    transfer
    • Employee using an organization’s computer to send
    personal e mail messages
    Safeguard : Companies should have Acceptable Use Policy (AUP) which outlines the computer activities for which computer and network may or may not be used
  • Software Theft
    • Stealing of software media
    • Intentional erasing of program
    • Illegal Copies of Program (Piracy)
    Safeguard : Issuing of licence agreement for software use
  • Information Accuracy
    • Information on the Web may not be accurate
    • Concerns about the ethics of using computers to alter output primarily graphical output
  • Information Accuracy
    • Information on the Web may not be accurate
    • Concerns about the ethics of using computers to alter output primarily graphical output National Press Photographers Association believes that allowing alterations could lead to misrepresentative photographs
  • Intellectual Property Rights
    • IP (Intellectual Property) unique and original works such as ideas, inventions, art, writings, processes, company and product name and logos
    • Intellectual Property Rights rights to which creators are entitled for their work
  • IP (Intellectual Property) unique and original works such as ideas, inventions, art, writings, processes, company and product name and logos
  • Intellectual Property Rights rights to which creators are entitled for their work
  • Intellectual Property Rights
    • Copyright gives authors and artists exclusive rights to duplicate, publish, and sell their materials
    • Patent is an exclusive right granted for an invention
  • 5. Code of Conduct
    • An IT (Information Technology) __ is a written guideline that helps determine whether a specific computer action is ethical or unethical
     Computers may not be used to harm other people
     Computers may not be used to steal
     Computers may not be used to bear false witness
     Employees may not meddle in others’ computer files
     Employees may not use others’ computer resources without authorization
     Employees shall consider the social impact of programs and systems they design
  • Information Privacy
    • Everytime you fill out an e form e.g. for magazine subscription, contest entry, product warranty, your information is entered into a database
    • Everytime you click an advertisement on the Web or register software online, your information and preferences enter a database
  • Information Privacy
    • Cookie
    A small text file that a Web server stores on your computer; contains data about you e.g. your preferences
    Preferences:
    User passwords
    User’s shopping cart
    Visits to a site and web pages visited
  • Information Privacy
    • Spyware - A program placed on a computer without the user’s knowledge that secretly collects information about the user
    • Can be hidden in adware, a program that displays an online advertisement in a banner or pop up window on web pages, email or internet services
  • Spyware - Another type of spyware, called a Web bug, is hidden on Web pages on in email messages in the form of graphical images. Web businesses use Web bugs to monitor online habits of online visitors
  • Spam - unsolicited email messages
  • Phishing - when seemingly legitimate / official looking email attempts to obtain personal /financial information
  • Security Breaches
    • Cambridge Analytica and Facebook: The Scandal and the Fallout So Far Revelations that digital consultants to the Trump campaign misused the data of millions of Facebook users set off a furor on both sides of the Atlantic. This is how The Times covered it.
    • The Times reported that in 2014 contractors and employees of Cambridge Analytica, eager to sell psychological profiles of American voters to political campaigns, acquired the private Facebook data of tens of millions of users the largest known leak in Facebook history.
  • Philippines elections hack 'leaks voter data’. The Philippines may have suffered its worst ever government data breach barely a month before its
    elections. Personal information, including fingerprint data and passport information, belonging to around 70 million people is said to have been compromised by hackers.
  • A second hacker group called LulzSec Philippines is believed to have posted Comelec's entire database online several days later. Comelec claims that no sensitive information was released, according to multiple reports.
    However, cybersecurity firm Trend Micro believes the incident is the biggest government related data breach in history and that authorities are downplaying the problem. "Every registered voter in the Philippines is now susceptible to fraud and other risks," it said in a report.
  • Artificial intelligence ( refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions. AI is frequently applied to the project of developing systems endowed with the intellectual processes characteristic of humans, such as the ability to reason, discover meaning, generalize, or learn from past experience
  • Other definitions of artificial intelligence
    • A branch of computer science dealing with the simulation of intelligent behavior in computers.
    • The capability of a machine to imitate intelligent human behavior.
    • A computer system able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision making, and translation between languages.
  • Year 1943 - The first work which is now recognized as AI was done by Warren McCulloch and Walter Pits in 1943 They proposed a model of artificial neurons
    Year 1950 - The Alan Turing who was an English mathematician and pioneered Machine learning in 1950 Alan Turing published "Computing Machinery and Intelligence" in which he proposed a test The test can
    check the machine's ability to exhibit intelligent behavior equivalent to human intelligence, called a Turing test.
  • Year 1955 - An Allen Newell and Herbert A Simon created "Logic Theorist" It performed automated reasoning and was said to be the "first artificial intelligence program“
    • This program proved 38 of 52 Mathematics theorems, and found new and more elegant proofs for some theorems
    Year 1956 - The word "Artificial Intelligence" first adopted by American Computer scientist John McCarthy at the Dartmouth Conference For the first time, AI coined as an academic field
  • John McCarthy, widely recognized as one of the godfathers of AI, defined AI as “the science and engineering of making intelligent machines"
  • Year 1966 - The researchers emphasized developing algorithms which
    can solve mathematical problems Joseph Weizenbaum created the
    first chatbot in 1966 which was named as ELIZA
    Year 1972 - The first intelligent humanoid robot was built in Japan which was named as WABOT 1
    • The duration between years 1974 to 1980 was the first AI winter duration
    • AI winter refers to the time period where computer scientist dealt with a severe shortage of funding from government for AI researches. During AI winters, an interest of publicity on artificial intelligence was decreased
    • During 1970 s, expert system was introduced