Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CS 306: Computers in Society - Chapter 3: Privacy and Ethics, Papers of Computer Science

This chapter from cs 306 explores the relationship between privacy, ethics, and computer technology. Various ethical theories, privacy aspects, and historical cases of privacy invasion, such as government surveillance and communication interception. It also covers encryption methods and their implications for individual privacy and security.

Typology: Papers

Pre 2010

Uploaded on 08/19/2009

koofers-user-48g
koofers-user-48g 🇺🇸

10 documents

1 / 4

Toggle sidebar

Related documents


Partial preview of the text

Download CS 306: Computers in Society - Chapter 3: Privacy and Ethics and more Papers Computer Science in PDF only on Docsity! CS 306 - Computers in Society Chapter 3 - Privacy Protecting our freedom and privacy In western counties, with the development of ingenious electronic devices, Big Ears and Big Eyes hide in the deep blue sky. Satellites see us in action in our backyard, if needed, our conversations are wiretapped by some powerful agencies… In the less developed countries, surveillance is realized by human eyes and ears. In Vietnam where the freedom speech is “legally” banned, I remember being taught to listen to family members and report conversations having some specific keywords, such as “communism, “ “ United States,” old government … and I would have done it for the good of my country. I’d witnessed kid-heroes sending their families to concentration camps. Without freedom of speech, with fear of speaking, we listened with resignation. – Thuc Luu 1.4 Ethics 1.41. What is Ethics, Anyway? Link: Software Engineering Code of Ethics And ACM Code ACM 1.4.2 A variety of ethical views . Deontological theories . Utilitarianism . Natural rights . No Simple answers 1.4.3 Some Important Distinctions Right, wrong, and Okay Negative and positive rights, or liberties and claim rights In philosophy books, these rights are usually called: Negatives and positive rights, but the terms liberties and claim rights are descriptive of the distinction. 1. Negative rights, or liberties, are rights to act without interference. 2. Claim rights, positives rights, impose an obligation on some people to provide certain things for others. Distinguishing wrong and harm Carelessly needlessly causing harm is wrong, but… Separating goals from constraints Law and ethics 2.1 Privacy and Computer Technology Introduction: The paper files filled an estimated 125 miles of self space. There are 3 key aspects of privacy: 1. Freedom from intrusion --- being left alone 2. Control of information about oneself 3. Freedom from surveillance (from being followed, tracked, watched, and eavesdropped on) How quick was the Government to use communication for spying? How long did it take for Congress to embrace wiretapping and electronic surveillance and what changed their mind? Tapping the World Fantastic Pen Register and Trap and Trace: What are they? Communication Assistance for Law Enforcement Act (CALEA) What is it? What does it do? Cheap or Expensive? +Carnivore Who invented Carnivore? Tell me about Carnivore Court Order Required? What does it do? ------------------------------------------------------------------------------------------------------------ +Echelon Who invented Echelon? Tell me about Echelon Court Order Required? What does Echelon do? What is the NSA’s reported budget? Which countries are in Echelon besides the U.S.? BANTIC Which country leaked Echelon information? Please fill the X’s in ECHELON may intercept as many as X communications everyday. An estimated X percent of all traffic that flows through the Internet is copied by Echelon.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved