Presentation on theme: “A Gift of Fire Third edition Sara Baase”— Presentation transcript: 1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Original. 1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property Original Slides prepared by Cyndi Chie and Sarah Frye Adapted by Enas Naffar for use. 3 Hacking Hacking – currently defined as to gain illegal or unauthorized access to a file, computer, or network The term has changed over time Phase 1: early.

Author: Kigagrel Tagis
Country: Guinea-Bissau
Language: English (Spanish)
Genre: Environment
Published (Last): 26 July 2004
Pages: 130
PDF File Size: 19.42 Mb
ePub File Size: 20.89 Mb
ISBN: 974-3-41033-472-6
Downloads: 67210
Price: Free* [*Free Regsitration Required]
Uploader: Akinoshura

Software Quality Assurance Daniel Galin.

A Gift of Fire Third edition Sara Baase

System failures, safety-critical applications, software design problems, and techniques for improving reliability and safetyHow societies make decisions about new technologiesAbout the AuthorSara Baase, Professor Emeritus of Computer Science at San Diego State University, has won three Outstanding Faculty awards.

All edges clean, neat and free of foxing. Using privacy audits to check for leaks of information, review the company’s privacy policyetc.

Consumer Protection View Uses of personal information Costly and disruptive results of errors in databases Ease with which personal information leaks out Consumers need protection from their own lack of knowledge, judgment, or interest Original Slides prepared by Cyndi Chie and Sarah Frye Adapted by Enas Naffar for use in Computing Ethics course —Philadelphia university.

What type of electronic communications do you use on a regular basis?

The Issue of Venue: Targeted and personalized marketing business, political parties, etc Paying for consumer information Examples Trading data to win prizes Targeting ads to users by scanning their s! Libel, Speech and Commercial Law: Informed consent People should be informed about the data collection and use policies of a business or organization, They can then decide whether or not to interact with that business or organization.


With a computer scientist’s perspective, and with historical context for many issues, she covers the issues readers will face both as members of a technological society and as professionals in computer-related fields.

Were any of them deceptive? RIAA’s arguments Companies are required to make an effort to prevent copyright violations and Napster did not take sufficient steps Napster was not a device or new technology and the RIAA was not seeking to ban the technology Court ruled Napster liable because they had the right and ability to supervise the system, including copyright infringing activities Original Slides prepared by Cyndi Chie and Sarah Frye Adapted by Enas Naffar for use in Computing Ethics course —Philadelphia university.

Essence of Decision Graham T. Government agencies collect many types of information Ask business to report about consumers Buy personal information from sellers Main publicized reason: We depend upon businesses and organizations to protect it. Very Good Condition Edition: Hackers Physical theft laptops, thumb-drives, etc. Property in Cyberspace 1. Biological characteristics unique to an individual No external item card, keys, etc. Purpose and nature of use — commercial vs.

Who gets to see this data? What are the ethical responsibilities of a computer professional? How can you distinguish editiob an that is a phishing attempt and an from a legitimate business?

A Gift of Fire Sara Baase Chapter 6: Work Third edition

Use of hacking to promote a political cause Disagreement about whether it is a form of civil disobedience and how whether it should be punished Some use the appearance of hacktivism to hide other criminal activities How do you determine whether something is hacktivism or simple vandalism?


Baase received her doctoral degree from the University of California, Berkeley. Records of online activity, video surveillance, GPS location tracking, consumer dossiers, national ID systems, and moreInternet censorship laws and alternatives, spam, political campaign regulation, anonymity, and Net neutralityIntellectual property: To make copies To produce derivative works, such as translations into other languages or movies based on books To distribute copies To perform ediition work in public music, baade, etc.

Firre and Video Sharing 1. Sorry, no APO deliveries.

Gift Of Fire, A by Baase, Sara

Napster users copied and distributed songs they had without authorization. Published by Felix Banks Modified over 3 years ago.

After supreme court decision in MGM v. Auth with social network: Text body is clean, and free from previous owner annotation, underlining and highlighting. Data wdition phones are vulnerable to loss, hacking, and misuse. All textbook arrives within business days.

A Gift of Fire : Sara Baase :

Goodreads is the world’s largest site for readers with over 50 million reviews. Great condition for a used book! Some Regulations may be so expensive and difficult to apply. But they do not apply to true personal information. Intellectual Property n Based on A primary goal is firw develop computer professionals who understand the implications of what they create and how it fits into society at large. Auth with social network: Is copying legally purchased files to and from the cloud a fair use?

Either filter out industry owned material.