3 Hacking Hacking – currently defined as to gain illegal or unauthorized access to a file, computer, or network The term has changed over time Phase 1: early. 1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property Original Slides prepared by Cyndi Chie and Sarah Frye Adapted by Enas Naffar for use. What We Will Cover Rapid Pace of Change New Developments and Dramatic Impacts Issues and Themes Ethics.

Author: Goltigami Vobar
Country: Guinea-Bissau
Language: English (Spanish)
Genre: Politics
Published (Last): 25 December 2009
Pages: 244
PDF File Size: 16.75 Mb
ePub File Size: 6.14 Mb
ISBN: 824-9-74758-927-4
Downloads: 89579
Price: Free* [*Free Regsitration Required]
Uploader: Shakashakar

It originally referred to a device that recorded the numbers called from a phone. Encryption Encryption generally includes a coding scheme, or cryptography algorithm, and specific sequences of characters digits or letters. Against software patents Patents can stifle innovation, rather than encourage it.

First online social networking site was in Myspace, founded in had roughly million member profiles by Facebook was started at Harvard as an online version of student directories Sites like Second Life combine many of the features of social networking sites with the 3-D aspects of video games. Ethical Challenges Ethics Principles of right and wrong that. Freedom from intrusion being left alone Control of information about oneself Freedom from surveillance being tracked, followed, watched Original Slides prepared by Cyndi Chie and Sarah Frye Adapted by Enas Naffar for use in Computing Ethics course —Philadelphia university.

A Gift of Fire Sara Baase Chapter 6: Work Third edition

Either filter out industry owned material. DRM prevents fair uses as yhird as infringing uses. Will parents rely more on gadgets than on talking to their children?


Terminology and principles for data collection and use: Use the list in Fig. The advertiser pays fees to the copyright holder. Space shuttle had a one-megahertz computer What type of electronic communications do you use on a regular basis?

The first computer is built Slide E-commerce Kenneth C. Personal information in blogs and online profiles Pictures of ourselves and our families File sharing and storing Is privacy old-fashioned? Grokster, people who wanted to operate legitimate businesses providing music realized they had to: Patents protect inventions of new things or processes The Supreme Court said that software could not be patented; however a machine that included software could In s and s, U.

Would there be sufficient motivation to produce the huge quantity of consumer software? The intangible creative work, not its particular physical form Value of intelligence and artistic work comes from creativity, ideas, research, skills, labor, non- material efforts and attributes the creator provides Protected by copyrights, patent laws or trademarks.

OK Professional Ethics and Responsibilities.

Millions of crime suspects are searched in government databases Shift from presumption of innocence basse presumption of guilt Computer software characterizes suspects – Innocent people are sometimes subject to embarrassing searches and expensive investigations and to arrest and jail. Regulation Technical tools for privacy protection, market mechanisms, and business policies are not perfect.

Many computer scientists see all algorithms as mathematical formulas. How is your data protected? Computer Crime1 Computer Crime.


Creating and displaying thumbnail images is fair use Court ordered Google to remove links to pages that infringe copyright. Who is the consumer in this situation?

Gift of Fire, A: Social, Legal, and Ethical Issues for Computing and the Internet, 3rd Edition

Auth with social network: Public Records – records available sra general public bankruptcy, property, and arrest records, salaries of government employees, etc. Catching and Punishing Hackers cont. Effect of use on potential market or value of the copyright work will it reduce sales of work? Laws of nature and mathematical formulas cannot be patented.

Libel, Speech and Commercial Law: What are the negative and positive rights for the different parties? Description In this timely revision of a sarra, Baase explores the social, legal, philosophical, ethical, political, constitutional, and economic implications of computing and the controversies they raise.

Depending on agreements between the companies, the site can block the post entirely or pay the entertainment company editiob its appearance on the site. Rise of amateur videos on the web Boom of websites like Youtube and Myspace Many videos on the web can infringe copyrights owned by entertainment companies.