Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
by Leszek T. Lilien,
2006
9.2.
9.3.
9.4.
Computer Crime
Privacy
Ethics
a) Introduction to Ethics
b) Case Studies of Ethics
c) Codes of Professional Ethics
2
by Leszek T. Lilien,
2006
Outline:
a) Protecting Programs and Data
b) Information and the Law
c) Ownership Rights of Employees and Employers
d) Software Failures (and Customers)
by Leszek T. Lilien,
2006
Original work
by Leszek T. Lilien,
2006
Protected
Object Made
Public
Yes; intention is
to promote
publication
Design filed at
Patent Office
No
Must
Distribute
Yes
No
No
Ease of filing
Very
complicated;
specialist
lawyer
suggested
No filing
Duration
Originators life
+ 70 yrs; 95 y.
For company
19 years
Indefinite
by Leszek T. Lilien,
2006
Expression of
idea, not idea
itself
Protects
by Leszek T. Lilien,
2006
H/w
Patent
Firmware (microcode)
Not depletable
Information commerce
Electronic publishing
Protecting data in DB
E-commerce
by Leszek T. Lilien,
2006
Law categories:
1) Criminal Law / Statutory Law
2) Civil Law
(I hope Im right with these subcategories)
2a) Common Law / Tort Law
2b) Contracts
by Leszek T. Lilien,
2006
Criminal Law
Civil Law
Defined by
Statutes
Cases
brought by
Government
Government
Individuals and
companies
Wronged
party
Society
Individuals and
companies
Remedy
Jail, fine
Damages, typically
monetary
10
by Leszek T. Lilien,
2006
Ownership of products
Ownership of patents
Ownership of copyrights
Similar to patents
by Leszek T. Lilien,
2006
Employment contracts
Licenses
12
by Leszek T. Lilien,
2006
d)
Refund: possible
by Leszek T. Lilien,
2006
Vendor interests
User interests
E.g. First notify the vendor, give vendor a few weeks to fix
If vendor delays fixes, ask coordinator for help
by Leszek T. Lilien,
2006
Bits of info are now considered property (were not in 1984 case)
Value of data
by Leszek T. Lilien,
2006
Difficulty of defining CC
Difficulty of prosecuting CC
Reasons:
Lack of understanding / lack of physical evidence /
lack of recognition of assets / lack of political impact /
complexity of CC cases / lenient treatment of juveniles
comitting CCs
16
by Leszek T. Lilien,
2006
by Leszek T. Lilien,
2006
International CC Laws
Multinational activity
Complexity
Cryptography Challenges
by Leszek T. Lilien,
2006
Threats to privacy
Government threats
Privacy (2)
by Leszek T. Lilien,
2006
Authentication
Anonymity
Pseudonymity
by Leszek T. Lilien,
2006
9.4. Ethics
a) Introduction to Ethics (1)
by Leszek T. Lilien,
2006
Systems of ethics
1) Consequence-based do what results in
greatest good, least harm
1a) Egoism
I do whats good for me
1b) Utilitarianism
I do whats brings greatest collective good
2)
22
---[OPTIONAL]---
by Leszek T. Lilien,
2006
Ethics
b) Case Studies of
Read especially:
23
by Leszek T. Lilien,
2006
---[OPTIONAL]--
IEEE Fig. 9-1, p. 623
24
by Leszek T. Lilien,
2006
End of Section 9
Student project presentations
follow
25