SlideShare a Scribd company logo
Social Implications &
Ethics
Kelsey Breslin
Jason Spiegel
Jimmy Zelinske
Lan Nguyen
Increase capability of the
individual
Internet
Social networking
Jobs
Dating (eHarmony)
Merchandising
Increase capability of the
individual
Transportation
Subways/Metro
Cars
Airplanes
Future: jetpacks? Teleportation devices?
Increase capability of the
individual
Jobs
Dangerous tasks are done more safely
Tedious jobs are done more efficiently
More output is produced at a lower cost and faster pace
Increase capability of the
individual
Medicine
Microscopes, MRI machines, CAT scans, x-rays, etc. all allow
research to be done on different ailments and diseases,
making the chance of a discovering a cure increase
Increase vulnerability of the user
Computer Literacy
Understanding the capabilities of computer’s
Ability to use computers adequately
I.D. theft
Computers are the first resource for Identity thieves
Targets
Applications are the top
vulnerabilities
Microsoft SQL, FTP servers
OS
Apple
QuickTime
Source: http://www.sans.org/top-
cyber-security-risks/trends.php
Solutions to Vulnerability
Updates (patches)
Use secure sites
Protect passwords
Ethics of internet users
Ethics on the internet
Acceptance that internet is not a free zone
The internet is a free place, but there should be restrictions on
contents allowed to be on the web.
Off-line world laws to on-line world
Laws should be involved in some cases, such as copyright
Global cultures
Put some sensitivity on the contents
Internet Development
1960: Used to share information in the military
1969: used in some universities for research
1970’s-1990’s: Developments in speed and connections
1996-present: internet connection speed increasing, Wi-Fi
connection.
Internet Development
From 80’s with the development of Windows, more and
more people use the internet
Estimate to around 25-30 billions web pages
Unlike before, where the internet only can be use in a small
area, now it can be used anywhere.
Ethics of internet providers (US-
like countries)
ISPs take little to no responsibility
View the internet as neutral and so they remain neutral
Only things like child pornography etc... are blacklisted
DMCA and copyright infringement is simply forwarded to the
offender
Ethics of internet providers (US-
like countries)
There is almost no filtering
Fairly frequently censorship bills are introduced
Protest groups like DemandProgress.org attempt to shoot it
down
Ethics of internet providers
China-like countries)
ISPs take things into their own hands
View the internet as something they own
ISPs won't hesitate to take something offline
ISPs heavily filter traffic based on politics
Countries like China and Australia have long blacklists of
websites their citizens cannot visit due to political interests
Sources
http://www.techfluency.org/computer-literacy.htm
http://www.sans.org/top-cyber-security-risks/trends.php
http://www.cert.org/blogs/vuls/2009/02/internet_explorer_vulnerabilit.html
Howe, Walt. "A Brief History of the Internet." Walt Howe's Internet Learning Tree. 24 Mar.
2010. Web. 14 Nov. 2010. <http://www.walthowe.com/navnet/history.html>.
"Internet Ethics." Roger Darlington's World. Web. 14 Nov. 2010.
<http://www.rogerdarlington.co.uk/Internetethics.html>.
Kristula, Dave. "The History of the Internet." Dave's Site / Davesite.com. Web. 14 Nov. 2010.
<http://www.davesite.com/webstation/net-history.shtml>.
"WWW FAQs: How Many Websites Are There?" Welcome to Boutell.Com, Inc.! Web. 14 Nov.
2010. <http://www.boutell.com/newfaq/misc/sizeofweb.html>.

More Related Content

What's hot

3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation
Jonathan Ezor
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityDavid B. Whittier, Ed D
 
2017 atj fellows
2017 atj fellows2017 atj fellows
2017 atj fellows
John Mayer
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
Anirudhya Reevu
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
syedsaqibrazarizvi
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation
Jonathan Ezor
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the Workplace
Tawny Brown
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
Gregory Barnes
 
4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE
Jonathan Ezor
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
YUSRA FERNANDO
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
AtiqurRehman129
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
Hassan Nasir
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
The social and ethical issues of sdd
The social and ethical issues of sddThe social and ethical issues of sdd
The social and ethical issues of sddsarthakgarg97
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
kelly kusmulyono
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
Rushana Bandara
 

What's hot (20)

3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school community
 
2017 atj fellows
2017 atj fellows2017 atj fellows
2017 atj fellows
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the Workplace
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
The social and ethical issues of sdd
The social and ethical issues of sddThe social and ethical issues of sdd
The social and ethical issues of sdd
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 

Viewers also liked

[Elite YM] Corporate PR - Bich Van & Hoang Lan
[Elite YM] Corporate PR - Bich Van & Hoang Lan[Elite YM] Corporate PR - Bich Van & Hoang Lan
[Elite YM] Corporate PR - Bich Van & Hoang LanLân Nguyễn
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
itrraincity
 
W Lan Userguide
W Lan UserguideW Lan Userguide
W Lan Userguide
mvde3000
 
Supervision training for volunteers and novis supervisors
Supervision training for volunteers and novis supervisorsSupervision training for volunteers and novis supervisors
Supervision training for volunteers and novis supervisors
Imke WoodT&C
 
Penguatan Etika Publik: Innovating Ethics in Public Administration
Penguatan Etika Publik: Innovating Ethics in Public AdministrationPenguatan Etika Publik: Innovating Ethics in Public Administration
Penguatan Etika Publik: Innovating Ethics in Public Administration
Tri Widodo W. UTOMO
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
Sandeep Singh
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 

Viewers also liked (8)

[Elite YM] Corporate PR - Bich Van & Hoang Lan
[Elite YM] Corporate PR - Bich Van & Hoang Lan[Elite YM] Corporate PR - Bich Van & Hoang Lan
[Elite YM] Corporate PR - Bich Van & Hoang Lan
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
W Lan Userguide
W Lan UserguideW Lan Userguide
W Lan Userguide
 
Chap5pp
Chap5ppChap5pp
Chap5pp
 
Supervision training for volunteers and novis supervisors
Supervision training for volunteers and novis supervisorsSupervision training for volunteers and novis supervisors
Supervision training for volunteers and novis supervisors
 
Penguatan Etika Publik: Innovating Ethics in Public Administration
Penguatan Etika Publik: Innovating Ethics in Public AdministrationPenguatan Etika Publik: Innovating Ethics in Public Administration
Penguatan Etika Publik: Innovating Ethics in Public Administration
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 

Similar to Social Implications and Ethics

Internet Safety
Internet SafetyInternet Safety
Internet Safety
Charles Mok
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityFreedom House
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
Excel Asama
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
Excel Asama
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
Gemy Chan
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Alvaro Lopez Ortega
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
IJCSIS Research Publications
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Binit Kumar
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
donnajames55
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
homeworkping8
 
Exposing the Hidden Web
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden Web
Luis Taveras EMBA, MS
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
ijfcstjournal
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
Associate Professor in VSB Coimbatore
 

Similar to Social Implications and Ethics (17)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Exposing the Hidden Web
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden Web
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 

Recently uploaded

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Social Implications and Ethics

  • 1. Social Implications & Ethics Kelsey Breslin Jason Spiegel Jimmy Zelinske Lan Nguyen
  • 2. Increase capability of the individual Internet Social networking Jobs Dating (eHarmony) Merchandising
  • 3. Increase capability of the individual Transportation Subways/Metro Cars Airplanes Future: jetpacks? Teleportation devices?
  • 4. Increase capability of the individual Jobs Dangerous tasks are done more safely Tedious jobs are done more efficiently More output is produced at a lower cost and faster pace
  • 5. Increase capability of the individual Medicine Microscopes, MRI machines, CAT scans, x-rays, etc. all allow research to be done on different ailments and diseases, making the chance of a discovering a cure increase
  • 6. Increase vulnerability of the user Computer Literacy Understanding the capabilities of computer’s Ability to use computers adequately I.D. theft Computers are the first resource for Identity thieves
  • 7. Targets Applications are the top vulnerabilities Microsoft SQL, FTP servers OS Apple QuickTime Source: http://www.sans.org/top- cyber-security-risks/trends.php
  • 8. Solutions to Vulnerability Updates (patches) Use secure sites Protect passwords
  • 9. Ethics of internet users Ethics on the internet Acceptance that internet is not a free zone The internet is a free place, but there should be restrictions on contents allowed to be on the web. Off-line world laws to on-line world Laws should be involved in some cases, such as copyright Global cultures Put some sensitivity on the contents
  • 10. Internet Development 1960: Used to share information in the military 1969: used in some universities for research 1970’s-1990’s: Developments in speed and connections 1996-present: internet connection speed increasing, Wi-Fi connection.
  • 11. Internet Development From 80’s with the development of Windows, more and more people use the internet Estimate to around 25-30 billions web pages Unlike before, where the internet only can be use in a small area, now it can be used anywhere.
  • 12. Ethics of internet providers (US- like countries) ISPs take little to no responsibility View the internet as neutral and so they remain neutral Only things like child pornography etc... are blacklisted DMCA and copyright infringement is simply forwarded to the offender
  • 13. Ethics of internet providers (US- like countries) There is almost no filtering Fairly frequently censorship bills are introduced Protest groups like DemandProgress.org attempt to shoot it down
  • 14. Ethics of internet providers China-like countries) ISPs take things into their own hands View the internet as something they own ISPs won't hesitate to take something offline ISPs heavily filter traffic based on politics Countries like China and Australia have long blacklists of websites their citizens cannot visit due to political interests
  • 15. Sources http://www.techfluency.org/computer-literacy.htm http://www.sans.org/top-cyber-security-risks/trends.php http://www.cert.org/blogs/vuls/2009/02/internet_explorer_vulnerabilit.html Howe, Walt. "A Brief History of the Internet." Walt Howe's Internet Learning Tree. 24 Mar. 2010. Web. 14 Nov. 2010. <http://www.walthowe.com/navnet/history.html>. "Internet Ethics." Roger Darlington's World. Web. 14 Nov. 2010. <http://www.rogerdarlington.co.uk/Internetethics.html>. Kristula, Dave. "The History of the Internet." Dave's Site / Davesite.com. Web. 14 Nov. 2010. <http://www.davesite.com/webstation/net-history.shtml>. "WWW FAQs: How Many Websites Are There?" Welcome to Boutell.Com, Inc.! Web. 14 Nov. 2010. <http://www.boutell.com/newfaq/misc/sizeofweb.html>.