SlideShare uma empresa Scribd logo
1 de 15
Social Implications &
Ethics
Kelsey Breslin
Jason Spiegel
Jimmy Zelinske
Lan Nguyen
Increase capability of the
individual
Internet
Social networking
Jobs
Dating (eHarmony)
Merchandising
Increase capability of the
individual
Transportation
Subways/Metro
Cars
Airplanes
Future: jetpacks? Teleportation devices?
Increase capability of the
individual
Jobs
Dangerous tasks are done more safely
Tedious jobs are done more efficiently
More output is produced at a lower cost and faster pace
Increase capability of the
individual
Medicine
Microscopes, MRI machines, CAT scans, x-rays, etc. all allow
research to be done on different ailments and diseases,
making the chance of a discovering a cure increase
Increase vulnerability of the user
Computer Literacy
Understanding the capabilities of computer’s
Ability to use computers adequately
I.D. theft
Computers are the first resource for Identity thieves
Targets
Applications are the top
vulnerabilities
Microsoft SQL, FTP servers
OS
Apple
QuickTime
Source: http://www.sans.org/top-
cyber-security-risks/trends.php
Solutions to Vulnerability
Updates (patches)
Use secure sites
Protect passwords
Ethics of internet users
Ethics on the internet
Acceptance that internet is not a free zone
The internet is a free place, but there should be restrictions on
contents allowed to be on the web.
Off-line world laws to on-line world
Laws should be involved in some cases, such as copyright
Global cultures
Put some sensitivity on the contents
Internet Development
1960: Used to share information in the military
1969: used in some universities for research
1970’s-1990’s: Developments in speed and connections
1996-present: internet connection speed increasing, Wi-Fi
connection.
Internet Development
From 80’s with the development of Windows, more and
more people use the internet
Estimate to around 25-30 billions web pages
Unlike before, where the internet only can be use in a small
area, now it can be used anywhere.
Ethics of internet providers (US-
like countries)
ISPs take little to no responsibility
View the internet as neutral and so they remain neutral
Only things like child pornography etc... are blacklisted
DMCA and copyright infringement is simply forwarded to the
offender
Ethics of internet providers (US-
like countries)
There is almost no filtering
Fairly frequently censorship bills are introduced
Protest groups like DemandProgress.org attempt to shoot it
down
Ethics of internet providers
China-like countries)
ISPs take things into their own hands
View the internet as something they own
ISPs won't hesitate to take something offline
ISPs heavily filter traffic based on politics
Countries like China and Australia have long blacklists of
websites their citizens cannot visit due to political interests
Sources
http://www.techfluency.org/computer-literacy.htm
http://www.sans.org/top-cyber-security-risks/trends.php
http://www.cert.org/blogs/vuls/2009/02/internet_explorer_vulnerabilit.html
Howe, Walt. "A Brief History of the Internet." Walt Howe's Internet Learning Tree. 24 Mar.
2010. Web. 14 Nov. 2010. <http://www.walthowe.com/navnet/history.html>.
"Internet Ethics." Roger Darlington's World. Web. 14 Nov. 2010.
<http://www.rogerdarlington.co.uk/Internetethics.html>.
Kristula, Dave. "The History of the Internet." Dave's Site / Davesite.com. Web. 14 Nov. 2010.
<http://www.davesite.com/webstation/net-history.shtml>.
"WWW FAQs: How Many Websites Are There?" Welcome to Boutell.Com, Inc.! Web. 14 Nov.
2010. <http://www.boutell.com/newfaq/misc/sizeofweb.html>.

Mais conteúdo relacionado

Mais procurados

3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentationJonathan Ezor
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityDavid B. Whittier, Ed D
 
2017 atj fellows
2017 atj fellows2017 atj fellows
2017 atj fellowsJohn Mayer
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality PresentationJonathan Ezor
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the WorkplaceTawny Brown
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in TechnologyGregory Barnes
 
4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLEJonathan Ezor
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingYUSRA FERNANDO
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in iHassan Nasir
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
The social and ethical issues of sdd
The social and ethical issues of sddThe social and ethical issues of sdd
The social and ethical issues of sddsarthakgarg97
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin itRushana Bandara
 

Mais procurados (20)

3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school community
 
2017 atj fellows
2017 atj fellows2017 atj fellows
2017 atj fellows
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the Workplace
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
The social and ethical issues of sdd
The social and ethical issues of sddThe social and ethical issues of sdd
The social and ethical issues of sdd
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 

Destaque

[Elite YM] Corporate PR - Bich Van & Hoang Lan
[Elite YM] Corporate PR - Bich Van & Hoang Lan[Elite YM] Corporate PR - Bich Van & Hoang Lan
[Elite YM] Corporate PR - Bich Van & Hoang LanLân Nguyễn
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
W Lan Userguide
W Lan UserguideW Lan Userguide
W Lan Userguidemvde3000
 
Supervision training for volunteers and novis supervisors
Supervision training for volunteers and novis supervisorsSupervision training for volunteers and novis supervisors
Supervision training for volunteers and novis supervisorsImke WoodT&C
 
Penguatan Etika Publik: Innovating Ethics in Public Administration
Penguatan Etika Publik: Innovating Ethics in Public AdministrationPenguatan Etika Publik: Innovating Ethics in Public Administration
Penguatan Etika Publik: Innovating Ethics in Public AdministrationTri Widodo W. UTOMO
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 

Destaque (8)

[Elite YM] Corporate PR - Bich Van & Hoang Lan
[Elite YM] Corporate PR - Bich Van & Hoang Lan[Elite YM] Corporate PR - Bich Van & Hoang Lan
[Elite YM] Corporate PR - Bich Van & Hoang Lan
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
W Lan Userguide
W Lan UserguideW Lan Userguide
W Lan Userguide
 
Chap5pp
Chap5ppChap5pp
Chap5pp
 
Supervision training for volunteers and novis supervisors
Supervision training for volunteers and novis supervisorsSupervision training for volunteers and novis supervisors
Supervision training for volunteers and novis supervisors
 
Penguatan Etika Publik: Innovating Ethics in Public Administration
Penguatan Etika Publik: Innovating Ethics in Public AdministrationPenguatan Etika Publik: Innovating Ethics in Public Administration
Penguatan Etika Publik: Innovating Ethics in Public Administration
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 

Semelhante a Social Implications and Ethics

Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityFreedom House
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of securityGemy Chan
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionAlvaro Lopez Ortega
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimesijfcstjournal
 

Semelhante a Social Implications and Ethics (17)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Exposing the Hidden Web
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden Web
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 

Último

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Último (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Social Implications and Ethics

  • 1. Social Implications & Ethics Kelsey Breslin Jason Spiegel Jimmy Zelinske Lan Nguyen
  • 2. Increase capability of the individual Internet Social networking Jobs Dating (eHarmony) Merchandising
  • 3. Increase capability of the individual Transportation Subways/Metro Cars Airplanes Future: jetpacks? Teleportation devices?
  • 4. Increase capability of the individual Jobs Dangerous tasks are done more safely Tedious jobs are done more efficiently More output is produced at a lower cost and faster pace
  • 5. Increase capability of the individual Medicine Microscopes, MRI machines, CAT scans, x-rays, etc. all allow research to be done on different ailments and diseases, making the chance of a discovering a cure increase
  • 6. Increase vulnerability of the user Computer Literacy Understanding the capabilities of computer’s Ability to use computers adequately I.D. theft Computers are the first resource for Identity thieves
  • 7. Targets Applications are the top vulnerabilities Microsoft SQL, FTP servers OS Apple QuickTime Source: http://www.sans.org/top- cyber-security-risks/trends.php
  • 8. Solutions to Vulnerability Updates (patches) Use secure sites Protect passwords
  • 9. Ethics of internet users Ethics on the internet Acceptance that internet is not a free zone The internet is a free place, but there should be restrictions on contents allowed to be on the web. Off-line world laws to on-line world Laws should be involved in some cases, such as copyright Global cultures Put some sensitivity on the contents
  • 10. Internet Development 1960: Used to share information in the military 1969: used in some universities for research 1970’s-1990’s: Developments in speed and connections 1996-present: internet connection speed increasing, Wi-Fi connection.
  • 11. Internet Development From 80’s with the development of Windows, more and more people use the internet Estimate to around 25-30 billions web pages Unlike before, where the internet only can be use in a small area, now it can be used anywhere.
  • 12. Ethics of internet providers (US- like countries) ISPs take little to no responsibility View the internet as neutral and so they remain neutral Only things like child pornography etc... are blacklisted DMCA and copyright infringement is simply forwarded to the offender
  • 13. Ethics of internet providers (US- like countries) There is almost no filtering Fairly frequently censorship bills are introduced Protest groups like DemandProgress.org attempt to shoot it down
  • 14. Ethics of internet providers China-like countries) ISPs take things into their own hands View the internet as something they own ISPs won't hesitate to take something offline ISPs heavily filter traffic based on politics Countries like China and Australia have long blacklists of websites their citizens cannot visit due to political interests
  • 15. Sources http://www.techfluency.org/computer-literacy.htm http://www.sans.org/top-cyber-security-risks/trends.php http://www.cert.org/blogs/vuls/2009/02/internet_explorer_vulnerabilit.html Howe, Walt. "A Brief History of the Internet." Walt Howe's Internet Learning Tree. 24 Mar. 2010. Web. 14 Nov. 2010. <http://www.walthowe.com/navnet/history.html>. "Internet Ethics." Roger Darlington's World. Web. 14 Nov. 2010. <http://www.rogerdarlington.co.uk/Internetethics.html>. Kristula, Dave. "The History of the Internet." Dave's Site / Davesite.com. Web. 14 Nov. 2010. <http://www.davesite.com/webstation/net-history.shtml>. "WWW FAQs: How Many Websites Are There?" Welcome to Boutell.Com, Inc.! Web. 14 Nov. 2010. <http://www.boutell.com/newfaq/misc/sizeofweb.html>.