SlideShare uma empresa Scribd logo
1 de 19
CISB 412
Social and Professional Issues

 Understanding Ethical Issues in
         Networking
Reference
• Materials used in this presentation are extracted mainly from
  the following texts, unless stated otherwise.



                                    Michael J. Quinn “Ethics for the
                                    Information Age”, 3rd edition.
                                    Pearson 2009
Learning Outcomes
• At the end of this lesson you should be able to
  – Identify issues that come with networking especially
    the use of world wide web.
  – Apply the ethical principles on the issues to establish
    morality of the action
Networking
• Description
• What comes with the territory?
   – Email SPAM
   – Pornography
   – Children and the web
     • Web Filters
  – Identity theft
  – Online Predators
  – Internet Addiction
Issues in Networking
• Work in your team
• Refer to the handouts and prepare for a brief
  presentation to address the question(s) asked
Email Spam
• Email spam, 3 important attributes
   – anonymity: the sender’s identity and address are
     concealed
   – mass mailing: spam email is sent to a large number of
     recipients and in high quantities
   – unsolicited: the individuals receiving spam would
     otherwise not have opted to receive it
• Amount of email that is spam has increased
   – 8% in 2001, 40% in 2003, More than 50% in 2004
• Spam is effective
   – More than 100 times cheaper than “junk mail”
   – Profitable even if only 1 in 100,000 buys product
Email Spam
• How firms get email addresses
   – Opt-in lists
   – Dictionary attacks
• Spammers seek anonymity
   – Change email and IP addresses to disguise sending
     machine
   – Hijack another system as a spam launch pad
• Spam blockers
   – Attempt to screen out spam
   – Have led to more picture-based spam
CAN SPAM Act of 2003
• Took effect January 1, 2004
• The law divides emails sent by business into three
  categories
   – Transactional email messages related to a commercial
     transaction or ongoing business that have already
     been established
   – Commercial email messages to which recipients have
     presumably consented (by explicitly request or by not
     opting out)
   – Unsolicited commercial email messages
CAN SPAM Act of 2003
     Emails Categories               Must meet these
                                       requirements
Transactional email messages   • message header, sender,
related to a commercial        organization and information
transaction    or    ongoing   must be correct
business that have already     •Must not disguise the
been established               identity of the computer
                               from which the message was
                               sent
CAN SPAM Act of 2003
     Emails Categories               Must meet these
                                       requirements
Commercial email messages      •must meet all the above
to which recipients have       requirement
presumably consented (by       •must inform recipient can
explicitly request or by not   opt out from the mailing list
opting out)                    •Must     provide   internet
                               based mechanism to opt out
                               •Must contain postal address
                               of the sender
CAN SPAM Act of 2003
     Emails Categories              Must meet these
                                       requirements
Unsolicited commercial email • must meet all the above
messages                     requirement
                             • must include clear notice
                             that it is an advertisement
                             • if it contains explicit
                             materialism must include in
                             the subject line
CAN SPAM Act of 2003
• Critics call it “You CAN Spam Act”
   – Spam still legal, as long as regulations followed
   – Opting out can have harmful consequences – it
      confirms your email is valid
   – Spammers can avoid prosecution by locating outside
      United States
World Wide Web
How we use it?
• Shopping
• Promoting business
• Learning
• Exploring our roots
• Playing games
• Entering virtual worlds
• Paying taxes
• Gambling
• Blogging
• Lots more!
Apparent issues with WWW
Pornography
• Description - Printed or visual material containing
  the explicit description or display of sexual organs or
  activity.
• Different opinions
   – Pornography is immoral (How do you explain that
     from Kantianism viewpoints?)
   – Adult pornography is moral (How do you explain
     that from Utilitarianism viewpoints?)
Apparent issues with WWW
• Censorship : An attempt to suppress or regulate
  public access to material considered offensive or
  harmful.
• Direct censorship
   – Government monopolization
   – Pre-publication review
   – Licensing and registration
• Self-censorship
  — A group deciding for itself not to publish material
   • What are the benefits and harms of Internet
     censorship?
Apparent issues with WWW
Children and the Web
• Many parents believe they ought to protect their
  children from exposure to pornographic and violent
  materials on the Web
   – Web Filters
   – Child Internet Protection Act
     • Libraries receiving federal networking funds must filter
       pages containing obscenity or child pornography
     • How do you see this Act from act utilitarianism
       viewpoints?
Apparent issues with WWW
Breaking Trust
• Identity Theft
• Chat Room Predator
• False Information
Apparent issues with WWW
Internet Addiction
• Is it real?
• Factors contributing to addictive behavior
• Some liken compulsive computer use to pathological
  gambling
• Traditional definition of addiction:
   – Compulsive use of harmful substance or drug
   – Knowledge of its long-term harm
Questions?

Mais conteúdo relacionado

Destaque

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2SMITA V MORE
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry BenRay95
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Arniel Ping
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Arniel Ping
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Destaque (14)

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Semelhante a lecture 3:understanding ethical issue in networking

How Your Email is Impacted by SPAM Laws
How Your Email is Impacted by SPAM LawsHow Your Email is Impacted by SPAM Laws
How Your Email is Impacted by SPAM LawsVerticalResponse
 
Bill C-28: What is it and what does it mean for marketers?
Bill C-28: What is it and what does it mean for marketers?Bill C-28: What is it and what does it mean for marketers?
Bill C-28: What is it and what does it mean for marketers?TC Media
 
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,Internet Law Center
 
Permission Based Email Marketing
Permission Based Email MarketingPermission Based Email Marketing
Permission Based Email MarketingBlue Sky Factory
 
Email Marketing UK legal and ISP Landscape
Email Marketing UK legal and ISP LandscapeEmail Marketing UK legal and ISP Landscape
Email Marketing UK legal and ISP LandscapeRiaz Kanani
 
Fighting Internet and Wireless Spam Act
Fighting Internet and Wireless Spam ActFighting Internet and Wireless Spam Act
Fighting Internet and Wireless Spam ActMatt Vernhout
 
e-Marketing Policy-Building Workshop
e-Marketing Policy-Building Workshope-Marketing Policy-Building Workshop
e-Marketing Policy-Building WorkshopMatt Vernhout
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012curlistl
 
Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...
Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...
Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...Vivastream
 
3 Best Practices for Email Marketing
3   Best Practices for Email Marketing3   Best Practices for Email Marketing
3 Best Practices for Email MarketingFriday Explorer
 
Spamming as cyber crime
Spamming as cyber crimeSpamming as cyber crime
Spamming as cyber crimegagan deep
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
 
Ethical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceEthical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceNicholas Davis
 
Power of Email Marketing (NADA 2010) Peter Martin
Power of Email Marketing (NADA 2010) Peter MartinPower of Email Marketing (NADA 2010) Peter Martin
Power of Email Marketing (NADA 2010) Peter MartinSean Bradley
 
Fall Into Compliance - CASL
Fall Into Compliance - CASLFall Into Compliance - CASL
Fall Into Compliance - CASLAct-On Software
 
B2B email marketing rechenda smith
B2B email marketing rechenda smithB2B email marketing rechenda smith
B2B email marketing rechenda smithCIM East of England
 
Email Marketing Best Practices
Email Marketing Best PracticesEmail Marketing Best Practices
Email Marketing Best PracticesBill Powell
 
little green plane's ten email marketing commandments
little green plane's ten email marketing commandmentslittle green plane's ten email marketing commandments
little green plane's ten email marketing commandmentslittle green plane
 

Semelhante a lecture 3:understanding ethical issue in networking (20)

How Your Email is Impacted by SPAM Laws
How Your Email is Impacted by SPAM LawsHow Your Email is Impacted by SPAM Laws
How Your Email is Impacted by SPAM Laws
 
Bill C-28: What is it and what does it mean for marketers?
Bill C-28: What is it and what does it mean for marketers?Bill C-28: What is it and what does it mean for marketers?
Bill C-28: What is it and what does it mean for marketers?
 
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
Withstanding FTC and State Scrutiny of Emerging e-Marketing Practices,
 
Permission Based Email Marketing
Permission Based Email MarketingPermission Based Email Marketing
Permission Based Email Marketing
 
Email Marketing UK legal and ISP Landscape
Email Marketing UK legal and ISP LandscapeEmail Marketing UK legal and ISP Landscape
Email Marketing UK legal and ISP Landscape
 
Email marketing today
Email marketing todayEmail marketing today
Email marketing today
 
Fighting Internet and Wireless Spam Act
Fighting Internet and Wireless Spam ActFighting Internet and Wireless Spam Act
Fighting Internet and Wireless Spam Act
 
e-Marketing Policy-Building Workshop
e-Marketing Policy-Building Workshope-Marketing Policy-Building Workshop
e-Marketing Policy-Building Workshop
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...
Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...
Notes Version: Email Marketing Workshop Part 5 Deliverability, Compliance and...
 
Marketing Automation's Role In Ensuring You Stay CASL Compliant - David Fowle...
Marketing Automation's Role In Ensuring You Stay CASL Compliant - David Fowle...Marketing Automation's Role In Ensuring You Stay CASL Compliant - David Fowle...
Marketing Automation's Role In Ensuring You Stay CASL Compliant - David Fowle...
 
3 Best Practices for Email Marketing
3   Best Practices for Email Marketing3   Best Practices for Email Marketing
3 Best Practices for Email Marketing
 
Spamming as cyber crime
Spamming as cyber crimeSpamming as cyber crime
Spamming as cyber crime
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Ethical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerceEthical, social and political issues raised by e commerce
Ethical, social and political issues raised by e commerce
 
Power of Email Marketing (NADA 2010) Peter Martin
Power of Email Marketing (NADA 2010) Peter MartinPower of Email Marketing (NADA 2010) Peter Martin
Power of Email Marketing (NADA 2010) Peter Martin
 
Fall Into Compliance - CASL
Fall Into Compliance - CASLFall Into Compliance - CASL
Fall Into Compliance - CASL
 
B2B email marketing rechenda smith
B2B email marketing rechenda smithB2B email marketing rechenda smith
B2B email marketing rechenda smith
 
Email Marketing Best Practices
Email Marketing Best PracticesEmail Marketing Best Practices
Email Marketing Best Practices
 
little green plane's ten email marketing commandments
little green plane's ten email marketing commandmentslittle green plane's ten email marketing commandments
little green plane's ten email marketing commandments
 

lecture 3:understanding ethical issue in networking

  • 1. CISB 412 Social and Professional Issues Understanding Ethical Issues in Networking
  • 2. Reference • Materials used in this presentation are extracted mainly from the following texts, unless stated otherwise. Michael J. Quinn “Ethics for the Information Age”, 3rd edition. Pearson 2009
  • 3. Learning Outcomes • At the end of this lesson you should be able to – Identify issues that come with networking especially the use of world wide web. – Apply the ethical principles on the issues to establish morality of the action
  • 4. Networking • Description • What comes with the territory? – Email SPAM – Pornography – Children and the web • Web Filters – Identity theft – Online Predators – Internet Addiction
  • 5. Issues in Networking • Work in your team • Refer to the handouts and prepare for a brief presentation to address the question(s) asked
  • 6. Email Spam • Email spam, 3 important attributes – anonymity: the sender’s identity and address are concealed – mass mailing: spam email is sent to a large number of recipients and in high quantities – unsolicited: the individuals receiving spam would otherwise not have opted to receive it • Amount of email that is spam has increased – 8% in 2001, 40% in 2003, More than 50% in 2004 • Spam is effective – More than 100 times cheaper than “junk mail” – Profitable even if only 1 in 100,000 buys product
  • 7. Email Spam • How firms get email addresses – Opt-in lists – Dictionary attacks • Spammers seek anonymity – Change email and IP addresses to disguise sending machine – Hijack another system as a spam launch pad • Spam blockers – Attempt to screen out spam – Have led to more picture-based spam
  • 8. CAN SPAM Act of 2003 • Took effect January 1, 2004 • The law divides emails sent by business into three categories – Transactional email messages related to a commercial transaction or ongoing business that have already been established – Commercial email messages to which recipients have presumably consented (by explicitly request or by not opting out) – Unsolicited commercial email messages
  • 9. CAN SPAM Act of 2003 Emails Categories Must meet these requirements Transactional email messages • message header, sender, related to a commercial organization and information transaction or ongoing must be correct business that have already •Must not disguise the been established identity of the computer from which the message was sent
  • 10. CAN SPAM Act of 2003 Emails Categories Must meet these requirements Commercial email messages •must meet all the above to which recipients have requirement presumably consented (by •must inform recipient can explicitly request or by not opt out from the mailing list opting out) •Must provide internet based mechanism to opt out •Must contain postal address of the sender
  • 11. CAN SPAM Act of 2003 Emails Categories Must meet these requirements Unsolicited commercial email • must meet all the above messages requirement • must include clear notice that it is an advertisement • if it contains explicit materialism must include in the subject line
  • 12. CAN SPAM Act of 2003 • Critics call it “You CAN Spam Act” – Spam still legal, as long as regulations followed – Opting out can have harmful consequences – it confirms your email is valid – Spammers can avoid prosecution by locating outside United States
  • 13. World Wide Web How we use it? • Shopping • Promoting business • Learning • Exploring our roots • Playing games • Entering virtual worlds • Paying taxes • Gambling • Blogging • Lots more!
  • 14. Apparent issues with WWW Pornography • Description - Printed or visual material containing the explicit description or display of sexual organs or activity. • Different opinions – Pornography is immoral (How do you explain that from Kantianism viewpoints?) – Adult pornography is moral (How do you explain that from Utilitarianism viewpoints?)
  • 15. Apparent issues with WWW • Censorship : An attempt to suppress or regulate public access to material considered offensive or harmful. • Direct censorship – Government monopolization – Pre-publication review – Licensing and registration • Self-censorship — A group deciding for itself not to publish material • What are the benefits and harms of Internet censorship?
  • 16. Apparent issues with WWW Children and the Web • Many parents believe they ought to protect their children from exposure to pornographic and violent materials on the Web – Web Filters – Child Internet Protection Act • Libraries receiving federal networking funds must filter pages containing obscenity or child pornography • How do you see this Act from act utilitarianism viewpoints?
  • 17. Apparent issues with WWW Breaking Trust • Identity Theft • Chat Room Predator • False Information
  • 18. Apparent issues with WWW Internet Addiction • Is it real? • Factors contributing to addictive behavior • Some liken compulsive computer use to pathological gambling • Traditional definition of addiction: – Compulsive use of harmful substance or drug – Knowledge of its long-term harm