2. Ethical dilemma is a complex situation that will often involve an apparent
mental conflict between moral imperatives, in which to obey one would
result in transgressing another.
also called an ethical paradox.
3. - occurs when there is an intrusion upon your reasonable
expectation to be left alone.
4. Intrusion of Solitude
Appropriation of Name or Likeness
Public Disclosure of Private Facts
False Light
5. Intrusion of Solitude
This type of invasion of privacy is commonly associated with
"peeping Toms," someone illegally intercepting private phone
calls, or snooping through someone's private records.
6. occurs when someone uses the name or likeness of another for
their own benefit.
7. Public disclosure of private facts
occurs when someone publishes hurtful, embarrassing or offensive facts
about a person's private life
8. False Light
arises anytime you unflatteringly portray - in words or pictures- a
person as something that he or she is not.
9. HACKING
The word “hacking” has two definitions.
the first definition refers to the
hobby/profession of working with
computers.
the second definition refers to breaking into
computer systems.
In the Web site wisegeek.com they defines computer "hacking" as
"the practice of modifying computer hardware and software to
accomplish a goal outside of the creator's original purpose. "
10. There are three category of hackers:
Hacktivists - those who hack as a form of political
activism.
Hobbyist hackers - those who hack to learn, for fun or
to share with other hobbyists.
Research and Security Hackers - those concerned with discovering
security vulnerabilities and writing the code fixes.
11. Ethical Theories of
HACKING
ETHICAL QUESTIONS
From a Utilitarian Perspective
From a Rights Perspective
From Fairness or Justice Perspective
From a Common Good Perspective
From a Virtue Perspective
12. Is there any information that should really be kept secret?
How do we balance the need for transparency with the need to protect ourselves,
for example, from groups who do not believe in transparency and other democratic
values?
Do we trust the ability of hackers to balance out the good and the harm that may
result from their disclosures?
Do we trust governments or corporations more, when it comes to striking that
balance?
From a Utilitarian Perspective
13. From a Rights Perspective
• Do all of us have an absolute right to access all the information available on the
Internet?
• Do we have a right to communicate and associate freely?
• And, if so, does hacking promote freedom of speech and of association by breaking
barriers set up around certain information?
• Should hacking be seen as a way of critiquing a system in order
to reform it, somewhat similar to parody?
14. From Fairness or Justice Perspective
• Does hacking then make Internet use more fair, by allowing to any user
access to information that would otherwise be available only to some?
• Or is hacking an unjust takeover of information from those who don't
have the know-how or resources to protect it?
15. From a Common Good Perspective
• Is unrestricted access to information one path to individual and
communal fulfillment?
• Or does hacking undermine the usefulness of the Internet as a
common good because it makes users reluctant to share information
online?
• Overall, does hacking promote or hinder the development of
relationships and the building of community?
16. From a Virtue Perspective
• Are hackers pushing individuals to become more virtuous users of the
Internet—or are they mostly tearing down what others have built, and
ultimately limiting the usefulness of the Internet?
• Does hacking promote the development of ethical character?
17. SECURITY
Security as a form of protection are structures and processes that provide
or improve security as a condition.
Information security (IS) is designed to protect the confidentiality,
integrity and availability of computer system data from those with
malicious intentions.
18. C-I-A
Confidentiality - protecting information from being
disclosed to unauthorized parties.
Integrity - protecting information from being changed by
unauthorized parties.
Availability - to the availability of information to
authorized parties only when requested.
19. MEASURES TO PROTECT COMPUTER SECURITY
• Restricting access both to the hardware locations (physical
access) and into the system itself (over the network) using
firewalls
• Implementing a plan to prevent break-ins
• Changing passwords frequently
• Making backup copies
• Using anti-virus software
• Encrypting data to frustrate interception
• Anticipating disasters (disaster recovery plan)
• Hiring trustworthy employees
20. THEFT
(Identity Theft)
it happens when someone steals your personal information
and uses it without your permission
a serious crime
can disrupt your finances, credit history, and reputation
take time, money, and patience to resolve.
21. OCCURS BY:
Stealing your wallets and purses containing identification cards, credit
cards and bank information.
Stealing your mail including credit and bank statements, phone or utility
bills, new checks, and tax information.
Completing a “change of address form” to redirect the destination of
your mail.
Rummaging through your trash for discarded personal data in a practice
known as “dumpster diving.”
Taking personal information that you share or post on the Internet.
22. PREVENTION
1. Use passwords on all your credit card, bank, and phone accounts.
2. Never keep passwords, “PINs” or your SSN card in your wallet or purse.
3. Learn about security procedures in your workplace.
4. Never give out personal information on the phone, through mail, or over
the internet unless you know the receiver and have initiated the contact.
5. Guard your mail and trash from theft.
6. Shred or destroy discarded financial statements in your trash.
7. Give your SSN only when absolutely necessary.
8. Keep your purse or wallet in a safe place at work.