Computer Ethics

Published on January 2017 | Categories: Documents | Downloads: 105 | Comments: 0 | Views: 338
of 20
Download PDF   Embed   Report

Comments

Content

CHAPTER I Insolvency, Bankruptcy, and the Board: Risk, Rules, and Realities Before a struggling company reaches insolvency, decides to seek bankruptcy protection, or decides to make a general assignment for the benefit of creditors, its board of directors must address a number of issues that, if ignored or inappropriate addressed, may result in litigation or personal liability. Ethical Issues and Challenges When a company is struggling, the organizational environment is fraught with ethical pitfalls and traps. The first step is to recognize the ethical issues. Inevitably, someone or some group(s) will be damaged by whatever decisions are made. Often decision makers will have to make a choice between two or more bad alternatives. Decision makers will be pressured by various parties, all of whom will have real or perceived conflicts of interest. Stakeholders will be looking for a speedy resolution of the problem, and short cuts will be hard to resist, even when decision makers have every intension to act ethically. One of the challenges will be to identify all of the individuals and groups that have an important stake in the outcome. Judging that some concerns are of more importance than others will be an important next step. Once the options are identified, prioritizing them according to which do the most good or the least harm will take discipline and energy. Grappling with the fairness and "proportionality" of the options is also a critical step. After a tentative decision is reached, it should be tested and communicated to the stakeholders, an important step to maintain transparency in the process. Testing the decision with a third party who is both knowledgeable and disinterested could provide value to the process. Finally, thought should be given to how the decision is to be implemented; will the implementation reflect care and attention to the significant consequences for the primary stakeholders? Although it takes both institutional and personal courage, performing a post mortem would also be valuable to those involved in the process.

The ADHD Scam and the Mass Drugging of Schoolchildren (Transcript) Today I am bringing you news from the world of ADHD, because scientists claim they have found a difference in the brains of children with ADHD versus "normal" children. The brains of these children who have been diagnosed with ADHD were scanned with an MRI machine. They compared 40,000 different points in their brains looking for signs of thickness in the brain tissue.

They discovered that the brains of children diagnosed with ADHD were a little behind schedule in growing. Yes, you heard that right. They said they are about three years behind the brains of other children. Everything else was normal. They said if they wait three years those children will catch up and turn out just fine.

Now who is "they?" Dr. Phillip Shaw from the National Institute of Health, which is probably the National Institute of Mental Health -- they are the ones who did this research and this research has been making the rounds in mainstream media. You hear stories about it all over the radio. I heard one on national public radio today.

It just blew my mind. I will tell you why in a minute. Headlines in newspapers and magazines, TV news, cable news network¶s all across the country -- they have experts on there now claiming that ADHD is a physical disease. There is something wrong with the brains of these children. Apparently they forgot to look at the research that came out just two days before. Do you know what that research shows?

Sal DiCiccio's stake in South Mountain Freeway plan

A year ago, the Phoenix real-estate broker filled a vacancy on the City Council, reclaiming the seat he held a decade earlier. Ever since, he's championed moving the planned Loop 202 extension south, from Ahwatukee Foothills to the Gila River Reservation. To supporters, DiCiccio is working to find the best outcome for his Phoenix constituents. Opponents say his development deals along the freeway blur personal and public matters and represent a conflict of interest. The Arizona Republic took a closer look at DiCiccio's possible stake in the planned 22-mile freeway, examining city financial forms and court records, plus letters, e-mails and other documents obtained under a public-records request. The picture that emerged shows that DiCiccio: ‡ Benefited financially from a business partner's purchase of land that was resold to the state for the proposed South Mountain Freeway. The purchase, which The Republic uncovered in records, allowed the business partner to repay a $100,000 loan from DiCiccio that the councilman says was unrelated to the freeway property. ‡ Was paid thousands of dollars in 2006 by an Arizona Department of Transportation consultant to persuade Gila River leaders to permit the Chandler-to-Laveen freeway to cross their reservation. ‡ Has investments in leases of two Gila River tribal properties, one located near the proposed Loop 202 extension route. DiCiccio won't say how much he invested or what his potential profit could be. The tribe, his development partner, stands to gain millions of dollars and wilderness land if it sells right of way to the state for the freeway. DiCiccio was not in public office when he made the investments or worked as a consultant - a fact that he points to in denying critics' accusations that his efforts to move the freeway path pose a conflict of interest. He said he has never voted on the freeway and doesn't plan to. But DiCiccio's dual public and private roles attracted criticism in his successful fall election campaign. Some transportation officials and ethics experts say they are troubled that DiCiccio has represented all sides of the freeway debate over the past decade, whether as a politician, a businessman or an advocate. Few details are available in public records about DiCiccio's business dealings. Records show he owns a commercial real-estate firm and is a licensed real-estate broker. His dual roles threaten to muddle the $1.9 billion Loop 202 project and could delay it, after 27 years of planning. Environmental work on the existing route is six months from completion and federal approval to build is expected this year.

Dairy industry entangled with bribery, corruption and politics -- interview with Robert Cohen

The most brilliant marketing campaign in the history of humankind -- you gotta give these guys credit. They do their job well, and they spread the money well, in the right magazines. They've targeted women from women's magazines and they've also gotten to Congress. They've donated money -- lots of it -- so that chief, key people who make these laws regarding milk consumption in schools on the USDA, the food pyramid -- it's loaded, it's so supersaturated with people who have worked for or continue to work for the dairy industry. And when I use the word "bribes," I'm saying they bribed people in government. I actually filed a Freedom of Information Act Request and got a Watergate tape -- March 23, 1971, we find Richard Nixon taking $3 million dollars cash in the White House. John Connelly walks in there afterwards and is recorded saying, "These men are militants, they're adamant, they're going to place a lot of money into political activities," and they had $3 million cash! You know what Nixon did the next day? The next day in a cabinet session, despite the fact that a week earlier the Secretary of Agriculture, Clifford Horton, said there'd be no increase in the price of milk that year because there was a surplus, the next day Nixon surprised everybody by raising the price of milk across the board, translated to a $300 million increase that Americans had to pay. A year later, before the Watergate tapes were even known, Nixon was now being interviewed on television by 100 reporters, and one of the reporters at the end said, "Uh, Mr. President, how about rumors of the milk fund?" -- that $3 million bribe was paid, we now know. Nixon responded: "Milk fund? The Democrats are raising the price of milk, not the Republicans!" And he said, "I want the American people to know that their president is not a crook -- I am not a crook." That's what he said in response to a question about the milk bribe he took. The guy was a crook, and that's the way Congress works.

CHAPTER II

HIMSS: Healthcare Technology Roundup

At the Healthcare Information and Management Systems Society (HIMSS) conference in Atlanta this week, the show floor was over the top with vendors appealing to healthcare providers and other customers anxious to spend soon-to-come federal health IT stimulus funds. The federal government is still hard at work hammering out its meaning of "meaningful use" requirements for health IT stimulus programs, but those uncertain requirements are already spiking IT spending among healthcare providers. The $20 billion-plus healthcare IT stimulus program has more hospitals and doctors than ever planning to implement e-medical record and other health IT systems. But CIOs report they're finding it hard to recruit IT talent, especially those with the skills to work on EMRs and physician order entry systems. There is a near-frenzy for HIT stimulus funds, and slew of healthcare IT innovation vying for clinicians' attention, as this week's gathering in Atlanta illustrated. Information Week had a team of reporters at the show, covering the latest in electronic medical records, the governments meaningful use requirements, health IT careers, software solutions for hospitals and physicians' practices, and unified communications for the healthcare industry.

The Communication Strategy Basics
As word spread about just how dramatically CIO Dana Deasy planned to transform the IT organization, you can imagine people realized they had to get on board or get out. Deasy says the transformation idea "caught on like wildfire." To keep people focused on the right goals and to force a consistent approach, BP's IT leaders came up with a communication strategy of the Four R's, which later gave way to the Four E's. Here are the Four R's Deasy and team laid out at the start of the effort: REWIRING "We needed to take the whole global IT organization and gut it, and then rebuild it," Deasy says. RETOOLING Deasy describes this as "fixing the capability of the organization--our people and the assessment of them." That led to skill evaluations of 1,000 top IT people, cutting 1,000 full-time contractors, and focusing talent more on subject-matter experts. REENGINEERING Deasy saw too many silos of IT operation, so he centralized IT decisionmaking in year one to force people to work together. The plan was then to decentralize those roles that made sense to sit inside the business units. RESOURCING This involved rebidding $1.5 billion worth of IT spending for a single year, cutting BP's 2,200 IT supplier base, and requiring suppliers to work together. The IT team made quick progress on those goals, which created a different kind of problem. "We're coming out of the transformation and the fear is that people would be preoccupied with wondering, what's next?" Deasy says. "To avoid that, we had to create a sustainable program that everyone could get their heads around." That led to retirement of the Four R's and creation of the Four E's to explain where the IT team members had been and where they were headed:

This is what the IT team did at the first stage of the process: "We changed people, suppliers, and a lot of pretty heavy-handed things," Deasy says. EFFICIENCYPLAN Deasy characterizes this as "leveraging our scale." That starts with rebidding contracts to get new terms for 65% of its IT spending, but also demanding more ongoing transparency and cooperation from those suppliers. EFFECTIVENESS Deasy says his CEO, Tony Hayward, "always says, 'Dana, don't ever lose your efficiency edge. You've worked so hard to gain that, and you need to be sure you don't lose it.'" That drives the IT team to explore how to use its new tiered structure to deliver a service--like email, help desk, or data center capacity--that's more closely tailored to a business unit's priceperformance needs. It's pushing its five key app dev and maintenance vendors for fresh ideas.

Fujitsu Unveils Patient Kiosk, HIT Services

Fujitsu has introduced a patient-registration kiosk to reduce administrative costs for healthcare providers. The kiosk was announced at the Healthcare Information Management Systems Society (HIMSS) conference in Atlanta Monday. The Med-Serv 50 is an "open hardware platform" that independent software vendors can use to run applications. Along with patient check-in, Fujitsu says the kiosk can be used by patients to fill out satisfaction surveys and pay outstanding balances or co-pay fees. The kiosk has a 19-inch display and integrated camera. For security, Fujitsu includes as an option its PalmSecure palm vein biometric reader for authentication. Allscripts, a Fujitsu partner, uses the Med-Serv 50 as the foundation for its patient kiosk. Allscripts has integrated the kiosk with its electronic health records technology to enable patients at doctors' offices to view personal information, including a health maintenance plan. Fujitsu is one of many vendors looking to grab a share of the $17.2 billion in federal loans and grants earmarked for healthcare providers through the American Recovery and Reinvestment Act. The money is to help doctors, hospitals, and clinics implement electronic health record systems and other cost-cutting technology. Along with introducing the Med-Serv 50, Fujitsu on Monday also announced IT infrastructure services for healthcare providers. Fujitsu datacenter options for healthcare organizations include cloud computing, managed data center services and hosted offshore solutions. The company also unveiled the Healthcare Customer Feedback Management Solution, built on the Oracle customer relationship management suite. The Fujitsu system is designed to help hospitals to track, analyze, and report on customer feedback to improve service. Fujitsu is also partnering with Cerylion in upgrading the Fujitsu Telecom Expense Management system. Fujitsu TEM 2.0 provides immediate visibility into all network financial transactions in order to find ways to reduce voice, data, and wireless network infrastructure expenses.

Media Creation & Delivery

The brawn behind the brains. QuickTime Streaming Server and QuickTime Broadcaster provide a complete, integrated solution available with Mac OS X Server for encoding, broadcasting, and streaming multimedia over the Internet. QuickTime Broadcaster captures and encodes QuickTime content in the latest media formats, including MP3, 3GPP, MPEG-4, and ACC audio. When combined with QuickTime 7, QuickTime Broadcaster supports broadcasting in the H.264 video codec, providing stunning quality live streams at remarkably low data rates. QuickTime Broadcaster also can broadcast in full, 640 X 480, 30 frames-per-second video to offer a TV-like experience to audiences on Macs or PCs. Once its work is done, QuickTime Broadcaster delivers the resulting feed to QuickTime Streaming Server for live streaming. With QuickTime Streaming Server, your organization can stream news, entertainment, educational content, and more over the Internet using RTP/RTSP²all with no per stream license fees. The QuickTime platform provides a cost effective, endto-end solution for the creation, delivery, and playback of standards-based multimedia, including the H.264 codec. Together, these two servers provide an inexpensive, end-toend solution for delivering live events over the Internet. End-to-end podcast creation, production, and distribution. In addition to live streaming events delivered online, the world of rich media is increasingly moving into podcasting. Podcast Producer is a complete, end-to-end solution for encoding, publishing, and distributing high-quality podcasts. Ideal for employee training, delivery of content to large audiences, presentations²or whatever audio or video podcasts your organization requires. Podcast Producer simplifies the process of recording content, encoding, and publishing podcasts for playback in iTunes and on iPod, iPhone, and Apple TV. With Podcast Producer, your organization can take advantage of a solution that enables users to create high-quality sound recordings and cleanly produced videos. The automated workflow engine in Podcast Producer automatically converts audio and video content into the proper formats for the devices and platforms you specify. Podcast Producer can even automatically send out emails to announce each new podcast.

CHAPTER III The Dating Group Internet Scam Text taken from the James Miller blog on: Making the most of the internet @: http://www.jamesmiller.com/mtmblog/2008/07/dating-group-team.html I applied even though, their ad was a bit strange. By the way, an employer asking your age, race or sex is illegal in the U.S! But in the posting it said; ³if you have any questions feel free to ask´ and I did. In less than a few days, I heard from them via email with an ³assignment´ but no answers to any of my questions! So, I Googled this company and boy, was I in for a shock. At the bottom of the results page was a blog at jamesmiller.com there, I found out this was a money laundering scheme based somewhere in the Ukraine. I learned that instead of paying you with a check, they ask for your bank account number so they can ³deposit´ your wages, or they offer to ³wire´ you the money. Sound familiar? That¶s because it¶s a spinoff of the Nigerian email scam. From what I¶ve learned, they really do wire you small amounts of money for editing assignments to build a rapport with their victim. But little by little, they ask you do ³favors´ for them because, they want to expand their business. This usually requires that you handle more money for them via wire or bank transaction. You can safely assume the money is dirty, that¶s why you¶re handling it for them! I contacted Cleveland.com and within 24 hours the ad was taken down. I have tip my hat to them for the quick action but then on Sept 19th, I saw the same ad again! I decided to do some investigating of my own and found out that the latest trends in internet scams are people posting jobs that promise work-at-home opportunities. It¶s usually posted by someone in Africa, Eastern Europe or the U.K. They use electronic means to launder dirty money and get some naive person to help them do it. They¶re using popular jobsites like: Careerbuilder.com to post their ads and lure victims in. So in response, many of these jobsites have places where you can now report them. These conartists are getting more sophisticated so, here are a few tips to avoid becoming a victim: 1. See if they have a real website and if not, proceed with caution! Most businesses have a company website not just an email address at a free service like Hotmail or Gmail. 2. Educate yourself on the place you¶re applying to BEFORE, you actually apply. As you¶ve learned, Google can be more than useful! Here¶s a tip: when researching on Google or Yahoo, use the company name together with the word scam or fraud in quotations. 3. Beware of anonymous postings if they¶re not using their company name, then something¶s wrong! 4. Last, but not least, take your time! Don¶t be in such a rush that you forget that you should be checking them out not, just the other way around!

Criminal Defence Articles There is no formal definition of computer crime or Internet crime. However, this type of crime may be described as an activity in which a computer or the Internet is used to further a criminal purpose. Simply put, it¶s an offence involving the use of a computer or the Internet. The possession and distribution of child pornography are examples of crimes that can be committed with the aid of computers and the Internet. The offence of mischief in relation to data doesn¶t specifically refer to either the term computers or Internet in its definition. However, today¶s reality is that data is stored on computers. Other crimes such as fraud, criminal harassment, and uttering threats may also be committed with the aid of these devices. There are many more. However, there is no mention of computers or the Internet in the definitions of any of these offences. Therefore, they can also be committed outside the world of computers and the Internet. There are, however, offences that specifically address certain types of computer and Internet behaviour. As an example, it is an offence under the Criminal Code of Canada to fraudulently obtain any computer service or possess a device designed primarily to fraudulently obtain computer service. In 2002, amendments were made to the sections of the Criminal Code dealing with child pornography. These amendments now specify both transmitting and accessing child pornography as offences. These changes were created to deal with Internet activity. Another amendment to the Criminal Code enacted in 2002 deals with the luring of children ³by means of a computer system´. Criminal Code provisions also allow for the issuance of search warrants in relation to child pornography, hate propaganda, or other evidence with respect to the commission of an offence stored on a computer system. As society¶s reliance on computers and the Internet continues to grow, so does the need to protect it through the making and enforcement of criminal laws in relation to computer and Internet activity. Therefore, it is inevitable that the courts will continue to see a growing number of prosecutions of computer and Internet crimes working their way through the criminal justice system.

Winning the war against cyber crime

What are governments doing to ensure that critical online operations remain operational when under attack from cyber criminals? FutureGov asked senior civil servants in Taiwan, Hong Kong, China and the Philippines to reveal how they are preparing their defences against hackers. Hsiang-Chen Li, Director of Computer Centre, National Police Agency of Taiwan Hacking in Taiwan gets more serious by the year. In 2008 the National Police Agency detected more attacks than in any other year ± 4664, which is around three to four hacks a day. It is interesting to note that the age range of hackers is getting younger too. Almost one half of the hackers we know about in Taiwan are between the age of 12 and 17 years old, while the rest are between 18 and 23. The problem is allowed to get worse ± and it will, most likely ± because more people are using the internet in their daily and working lives. The average length of time Taiwanese spend on the internet is at least two hours each day, which leaves a lot of time for hackers to steal confidential information. They then sell it to criminal gangs, commit fraud or intimidate people with it. We started tackling the problem back in 1996. We created a Computer Crime Squad within the police department, and two years later all law enforcement units ± including the district attorney ± had a task force to handle internet crime. Also, the government established N-CERT and N-SOC in 2001 ± initiatives to protect information infrastructure. We are also trying to connect with other countries since most hack attacks were launched from abroad. Pang Yandong, Director of Information Industry Office, Government of Maoming City, China Information dissemination through web sites as a mean of promoting openness in government affairs is becoming increasingly important in China. And government portals are becoming a key platform for communication between government and citizen. But these platforms are magnetic for hackers. Our administrative web site in Maoming City has received many attacks at escalating cost in terms of disruption and down time. And they are using a variety of methods. Hackers hack into operating systems and expose vulnerabilities in control servers. They have been able to crack the system password, launch denial-of-service attacks, take over the server upload process and tamper with databases and page codes. We have been tackling the problem in the following ways. The first is to strengthen the information security system. Second, to increase user awareness of information security. This involves training network administrators regularly, so that we know how to cope with an attack. We also ensure that we have the most up-to-date security settings and that users change their passwords regularly. And in the event of an attack we record precisely how the hacker got through our system, and make notes on how we rectified the system ± and how we might do it better next time.

Cybercrime is in a state of flux In the recently released internet thriller Untraceable, starring Diane Lane, a criminal uses advanced technology to ensure that his own macabre website remains "untraceable" to FBI agents trying to close him down. Cybercriminals in the real world have their own version, "fast flux", to hide the location of phishing and spamming sites and illegal malware. The technique was first recognised in March 2007 by security companies monitoring criminal botnets like Storm and Nugache. By January, it had become a standard weapon of choice for phishers and spammers. Robert McCardle, from security firm Trend Micro, says: "Fast flux is one of the biggest tools being used by criminal botnets today. One of the earliest reported sightings was in April 2006, when Brian Eckman, security analyst at the University of Minnesota, was monitoring a botnet later called Nugache. The basic weakness of botnets or "robot networks" is that they can be easily detected. Botnets are built up by creating a herd of infected PCs or "bots" which take orders from a single Command and Control (C&C) server at the top. When the C&C server breaks cover to give orders it can be detected and disabled, and all the bots beneath it no longer function. But Eckman noticed that the Nugache botnet was spreading peer-to-peer via AOL's instant messenger, using encrypted code as the Command and Control mechanism. This meant it was "headless" and far harder to detect. James Blessing, chair of the broadband group at the UK Internet Service Providers' Association (ISPA), says: "To an investigator [the bots] look like a P2P file-sharing arrangement. There is no head to cut off. They just sit there waiting for instructions." Fast flux techniques were to evolve still further, Blessing says. Early on, the Nugache bot could be detected because it would connect to exactly 22 other static IP addresses. "Now they change the IP addresses they use frequently and use encrypted code." David Dittrich, one of the top US botnet researchers at Washington University, believes the use of fast flux evasion could make botnets like Nugache unstoppable. "The shape and size of the botnet was changing almost constantly. The bots were communicating with each other over an encrypted channel, making it all but impossible to listen in on conversations."

CHAPTER IV Fighting back Against Identity Theft

If you are a victim of identity theft, take the following steps as soon as possible, and keep a record with the details of your conversations and copies of all correspondence. Place a fraud alerts on your credit reports, and review your credit reports. Fraud alerts can help prevent an identity thief from opening any more accounts in your name. Contact the toll-free fraud number of any of the three consumer reporting companies below to place a fraud alert on your credit report. You only need to contact one of the three companies to place an alert. The company you call is required to contact the other two, which will place an alert on their versions of your report, too. If you do not receive a confirmation from a company, you should contact that company directly to place a fraud alert. Once you place the fraud alert in your file, you're entitled to order one free copy of your credit report from each of the three consumer reporting companies, and, if you ask, only the last four digits of your Social Security number will appear on your credit reports. Once you get your credit reports, review them carefully. Look for inquiries from companies you haven't contacted, accounts you didn't open, and debts on your accounts that you can't explain. Check that information, like your Social Security number, address(es), name or initials, and employers are correct. If you find fraudulent or inaccurate information, get it removed. See Correcting Fraudulent Information in Credit Reports to learn how. When you correct your credit report, use an Identity Theft Report with a cover letter explaining your request, to get the fastest and most complete results. Continue to check your credit reports periodically, especially for the first year after you discover the identity theft, to make sure no new fraudulent activity has occurred.

Internet Banking Made Safe And Easy
Internet banking from your home or office is safe, reliable, and so convenient, that you will not need to do it any other way once you try it. And there is so much more that can be accomplished other than just viewing your statements or paying your bills on line. There may still be the stigma of insecurity in on line banking, but your banking institution will assure that your funds, as well as your privacy is safe. You will be given, or you will choose a unique username, password and security key or code. You will be able to change your password at any time for added security. And you will not be burdened by a liability amount. In fact, it is for zero dollars at most banks now and they guarantee your safety. You¶re on line banking is easy to use, and improvements in security continue to be made. With the elimination of the auto complete browser function, you can be assured that your financial information is safe from unauthorized individuals to view and manipulate. You are not liable in any way if your funds are tampered with, and the bank will guarantee this. Internet access is needed, as well as a computer, whether you do it at home or at your office or at the library. You will need to make sure that your banking institution supports your browser, and do not worry about software, you will not need anything special as it is all supplied on line. You will now need to register for services on line. All that is needed is your social security number and a debit card or credit card number , along with the pin (personal identification number). If these cards are not available, you will be able to use an account number such as a savings account, or perhaps your checking account. You may also use your mortgage or loan account numbers, or home equity account number, as well. The ease and convenience of on line banking will make life that much easier. If your computer and Internet service is at home, you will not need to leave it. Without having to spend money on gas for traveling, you will save a lot there, not to mention the time it takes out of your day to travel. Available twenty four hours in a day and seven days of the week, it is fast, secure and easy to bank this way. You can also be sure to receive a confirmation number for every transaction you make. You may want to apply for other accounts and services, or request a higher line of credit on your credit card. You can pay any bill anywhere in the United States. And you can see check transactions, atm purchases, that is automatic teller machine transactions, and this also includes deposits and withdrawals. And you can request stop payments on a check, as well. You will be able to view your checks images and your statements for checking accounts as well as your savings accounts. And you can make transfers to other banks, credit unions or brokerage accounts. Before you use Internet banking, it would be wise to check with your banking institution to make sure that they will provide you with all of the services and guarantees that you will need to rest assured that your financial information is safe.

Computer Security Institute (CSI)

Computer Security Institute (CSI) is the original and leading educational membership organization for information security professionals, with over 30 years of experience in the industry. Our mission is simple: to provide you with the resources with which to succeed both in your job and in your career. At the forefront of security trends and research, CSI is uniquely qualified to provide the practical, yet often undiscovered, insight, strategies and trends that will protect your organization and move you ahead.
y

CSI Computer Crime and Security Survey: Only CSI Members have access to the Comprehensive Edition, full 40-page report. The Comprehensive Edition goes into fuller detail about respondents' security programs and attacks experienced, including policies implemented, tools used, degree of outsourcing, use of metrics and effects of compliance requirements, incident response to the attacks and how the CSI survey findings compare to the findings of similar studies. Ten in-depth ALERT security reports: These comprehensive reports provide a deep dive on emerging security issues and solutions, going beyond the weekly news stories. Designed to prepare you for challenges now and around the corner, you'll get the level of information that will actually make a difference in the way you perceive and practice security. Guides to Social Networking Security: Your employees are on Facebook, LinkedIn, Twitter and MySpace - make sure your company is protected. These four guides are designed to distribute to your end users, and show them how to use these sites responsibly and securely. Webcasts and Discounted Member Courses: Whether you are looking to stay ahead of the curve, satisfy your thirst for knowledge, or fulfill certification requirements, CSI offers monthly webcasts and courses that will cover topics ranging from hardware virtualization security to cloud security and more. Significant savings at CSI conferences: Members enjoy up to $200 off registration to CSI Security Exchange, May 26-27, 2010 in San Francisco, and CSI Annual, October 2529, 2010 in Washington, D.C. Security Resource Center: Head to the CSI resource center to find insightful articles on topics ranging from end-user awareness and risk management to identity management and virtualization. Awareness solutions at significant discounts. Technology is a huge part of security, but so is careful training of front-line staff. CSI has created three leading components for successful awareness training and we make them especially affordable for the CSI community.

y

y

y

y

y

y

Protect your Computer and Internet Privacy

Is a known fact that every time you open a browser to view a web page, order something online, or read your email in a web based viewer that information is stored on your computer for later use. Whether you are viewing the weather online, reading sports, catching up on the latest world news or viewing something a little more private, all that information is stored in your computer. Windows operating systems store all this material in what are called Temporary Internet Files or cache. Web pages may store bits of information about who you are when you visit web sites in files called cookies on your computer. Your web browser will store a list of web sites you've visited and places you've gone in a history file in your computer. Even if you are not online, programs will store histories of the files you've opened, played, or viewed. Generally there might not be any reason to worry about all these files in your computer, but what if you sell your computer and all that information is left for someone else to see. Maybe friends and relatives visit and use your computer and you dont want everyone to know what files you are running on your computer. Then you are going to want to know how to delete these files. Even if you are not worried about privacy on your computer, you may be surprised to realize how much hard drive space all this information takes up. If you are running out of drive space, you may want to delete these files. This deleting method is only good if you want to free space, because normal file deletion only removes a file's directory entry, and leaves the data contained in the file on your hard drive, which can be easily recovered by any average computer user using a undelete utility. If you delete cookies or if you delete history using conventional methods anyone can recover them! Even after a hard drive format, files can be recovered using expensive hardware and software which use forensic latency track analysis algorithms.

CHAPTER V INTERNET FILTERS The Internet is here to stay, and so is the battle over how it should be governed. This issue is nowhere more pertinent and contested than in libraries. Free public access to the Internet is now considered a basic right in many communities, but the issue of what content should be accessible in such a setting is grounds for legislative war. Library Internet access opens whole new worlds to users. Patrons can freely access multimedia information on subjects ranging from space exploration to local community issues. At the same time, children and adults now have easy access to controversial sites that contain pornography, hate literature and bomb information. Internet filtering software offers some control, but its use remains hotly contested by many. The debate finds the protectors of First Amendment rights pitted against those who have deep concerns about child safety. The following sites can help you get up to speed on the issue:
y

American Library Association's Resolution on the Use of Internet Filters Outlines the group's firm belief that the use of library filters violates the "Library Bill of Rights", which the association adopted in 1948. As the primary organization to set library standards worldwide, its voice is powerful.

Defamation Of Character Jan 26, 2001 -- (Originally published in the Entertainment Law column in the New York Law Journal, January The Appellate Division has upheld the dismissal by the New York State Supreme Court of a claim brought against the creators, producers and broadcaster of the ³Seinfeld´ television series (the ³Series´). In that action, plaintiff had sought relief for purported violation of sections 50 and 51 of the New York Civil Rights Law, for being cast in a false light and for defamation. Plaintiff Michael Costanza asserts that the character of George Costanza as portrayed in the Series is based upon him. The fictional George Costanza, a long time friend of the lead character, Jerry Seinfeld, is constantly having problems with poor employment situations, disastrous romantic relationships, conflicts with his parents and general selfabsorption. The interplay between George Costanza and the actors in the Series has been responsible in some measure for the great success of the Series. In support of his claim that his name and likeness are being appropriated, plaintiff points to similarities between him and the George Costanza character. Both are short, fat and bald; both knew Jerry Seinfeld from college and both came from Queens. Plaintiff asserts that the self-centered nature and unreliability of the George Costanza character are attributed to him, and this humiliates him. Plaintiff complains that defendants used his name and likeness without his permission, that they invaded his privacy and that he was portrayed in a negative, humiliating light. Plaintiff also claims that he was defamed by defendant Larry David. Plaintiff had written a book in which he set forth his relationship with Jerry Seinfeld and claimed to be the ³real´ George Costanza. David, in response to an inquiry as to his thoughts concerning that book, reportedly replied that plaintiff was a ³flagrant opportunist´ seeking to cash in when the hyperbole of the Seinfeld program¶s final episode was at its peak. Defendants moved to dismiss plaintiff¶s claims. In considering the motion, the Supreme Court read the allegations of the complaint as true and gave them every favorable inference. It first traced the history of the development of a right to privacy in New York State. Responding to the roundly criticized decision involving the unsuccessful claim brought by Abigail Marie Roberson against a flour company for using her picture without her consent, the New York legislature, early in the twentieth century, enacted the nation¶s first right to privacy statute, now codified as sections 50 and 51 of the Civil Rights Law.

Your Morning Commute is Unique: On the Anonymity of Home/Work Location Pairs

Philippe Golle and Kurt Partridge of PARC have a cute paper (pdf) on the anonymity of geolocation data. They analyze data from the U.S. Census and show that for the average person, knowing their approximate home and work locations ² to a block level ² identifies them uniquely. Even if we look at the much coarser granularity of a census tract ² tracts correspond roughly to ZIP codes; there are on average 1,500 people per census tract ² for the average person, there are only around 20 other people who share the same home and work location. There¶s more: 5% of people are uniquely identified by their home and work locations even if it is known only at the census tract level. One reason for this is that people who live and work in very different areas (say, different counties) are much more easily identifiable, as one might expect. The paper is timely, because Location Based Services are proliferating rapidly. To understand the privacy threats, we need to ask the two usual questions: 1. who has access to anonymized location data? 2. how can they get access to auxiliary data linking people to location pairs, which they can then use to carry out re-identification? The authors don¶t say much about these questions, but that¶s probably because there are too many possibilities to list! In this post I will examine a few. GPS navigation. This is the most obvious application that comes to mind, and probably the most privacy-sensitive: there have been many controversies around tracking of vehicle movements, such as NYC cab drivers threatening to strike. The privacy goal is to keep the location trail of the user/vehicle unknown even to the service provider ² unlike in the context of social networks, people often don¶t even trust the service provider. There are several papers on anonymizing GPS-related queries, but there doesn¶t seem to be much you can do to hide the origin and destination except via charmingly unrealistic cryptographic protocols. The accuracy of GPS is a few tens or few hundreds of feet, which is the same order of magnitude as a city block. So your daily commute is pretty much unique. If you took a (GPS-enabled) cab home from work at a certain time, there¶s a good chance the trip can be tied to you. If you made a detour to stop somewhere, the location of your stop can probably be determined. This is true even if there is no record tying you to a specific vehicle.

Should Limits Be Placed on Freedom of Expression?

The sale of pornographic materials has long been one of the most contentious issues surrounding the right to free speech---and the rapid spread of online pornography has intensified this debate. Critics argue that online pornography makes indecent material more pervasive and easily accessible than ever before. They emphasize how easy it is for children to access such material. The courts have traditionally upheld adults' rights to view pornography, while also allowing laws that protect children from it. Free speech advocates, however, maintain that it is very difficult to use this type of regulatory framework on the Internet. Due to the nature of the medium, any attempt to limit children's access to objectionable material will unavoidably limit adults' access to it as well, undermining free expression on the web. The federal government's first attempt to deal with Internet pornography was the 1996 Communications Decency Act (CDA), which made it a crime to send sexually explicit messages to anyone under eighteen. The Supreme Court struck down the law in 1997, however, on the grounds that it was too broad and vague in its definition of what types of messages were prohibited. In 1998 Congress tried to avoid the flaws of the CDA with the Child Online Protection Act (COPA). The law provides a narrower definition of what is banned: material depicting "sexual acts" and "lewd acts" that the "average person, applying contemporary community standards, would find ... is designed ... to pander to the prurient interest and ... lacks serious literary, artistic, political, or scientific value to minors." The wording of the law harkens back to the 1973 Supreme Court decision Miller v. California, which distinguished between pornography, which the Court held is protected by the First Amendment, and obscenity, which is not. Pornography consists of erotic or sexually explicit material, while obscenity, according to the Supreme Court, is 1) sexually explicit, 2) offensive according to "contemporary community standards," and 3) lacking in literary, artistic, or political value. Free speech advocates have objected to the "community standards" criterion as it pertains to the Internet. The American Civil Liberties Union, for example, argued that under COPA the community standards of the most conservative towns in America could be used to shut down websites that are not offensive to most of the country. Agreeing with this logic, a federal court in Philadelphia blocked COPA from taking effect. In May 2002, however, the Supreme Court overturned the lower court's decision, ruling that it is not unconstitutional to use "contemporary community standards" to define obscenity.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close