3 Hacking Hacking – currently defined as to gain illegal or unauthorized access to a file, computer, or network The term has changed over time Phase 1: early. 1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property Original Slides prepared by Cyndi Chie and Sarah Frye Adapted by Enas Naffar for use. What We Will Cover Rapid Pace of Change New Developments and Dramatic Impacts Issues and Themes Ethics.
|Published (Last):||8 March 2016|
|PDF File Size:||8.24 Mb|
|ePub File Size:||2.31 Mb|
|Price:||Free* [*Free Regsitration Required]|
New compression technologies make copying large files e.
A Gift of Fire Third edition Sara Baase
Banning, suing and taxing Should we ban or restrict a technology, a device or a software because it has the potential for illegal use? DRM is sometimes ineffective! The cost of creating data again.
The people who posted baaase documents argued it was a fair use. Auth with social network: Some large companies like IBM and Microsoft, use their economic influence to improve consumer privacy on the web, by bxase ads from their web sites.
Effect of use on potential market or value of the copyright work will it reduce sales of work? Ethics and Social Concerns.
A Gift of Fire Third edition Sara Baase – ppt download
Some people posted copyrighted documents containing sacred teaching of the Church of Scientology on the internet. With derivative works, publishers do not worry only about loss of potential revenue but also about damages to their image. Right, wrong and okay Negative rights liberties The right to act without interference Positive rights claim-rights An obligation of some people to provide certain things for others.
Security cameras in Shopping centers, malls, banks, etc. Oliver Schulte Simon Fraser University. Search query data can be subpoenaed in court. Huge amounts of data are stored. What do you think would work, and what do you think would not?
Use of hacking to promote a political cause Disagreement about whether it is a form of civil disobedience and how whether it should be punished Some use the appearance of hacktivism to hide other criminal activities How do you determine whether something is hacktivism or simple vandalism? Personal information in blogs and online profiles Pictures of ourselves and our families File sharing and storing Is privacy old-fashioned? Search engines make finding material easier.
Against software patents Patents can stifle innovation, rather than encourage it.
Gift of Fire, A: Social, Legal, and Ethical Issues for Computing and the Internet, 3rd Edition
A collection of small items can provide a detailed picture. Public Records – records available to general public bankruptcy, property, and arrest records, salaries of government employees, etc.
Positive right to job: Privacy and Security Chapter Five. To make this website work, we log user data and share it with processors. Property in Cyberspace 1. We think you have liked this presentation. Sign Up Already have an access code?
The work is protected by local and international copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning. Broadband connections make transferring files easier and enable streaming video. We can be more careful about the information we give out, and the privacy policies of sites we use or visit. Discussion Question What devices are now computerized that were not originally?
Probe for what concerns the class may have about the data that is collected. Privacy-enhancing technologies for consumers New applications of technology often can solve problems that arise as side effects of technology. Stolen and Lost Data: To make copies To produce derivative works, such as translations into other languages or movies based on books To distribute copies To perform the work in public music, plays, etc.