Social, Ethical, Security and Professional Issues in Computing
COSC 1301
Objectives of this module:
To
discuss the social, ethical, security and professional issues in computing.
DATABASES
Almost everyone uses databases. Every phone call, every financial
transaction and every visit to a doctor's office involves the use of a database.
You became part of a database when you were born, went to school, joined Social
Security and filled out a warranty card for a product that you purchased.
Some databases work behind the scenes to help keep records up to date.
Databases are used in educational institutions, hospitals, clinics, pharmacies,
police departments, attorneys, farmers and libraries. These databases help to
reduce the effort and time involved in accessing information.
Do you ever get the feeling that intimate details of your life are scattered
about in various databases? More important, you have very little control over
this information. You might be astonished by the number of organizations that
collect, process, store and exchange information about individuals. Some of
these organizations are government agencies, credit bureaus, insurance
companies, banks and mail-order companies.
All of this information probably won't cause problems that is, if it is
correct. If it isn't then the consequences could be shattering. Computers don't
forget information, they remember it forever. In addition, computers have the
ability to exchange information electronically and combine existing files. This
increases the possibility that information provided for one purpose might be
used for other purposes as well. For example,
- A Michigan man was arrested at gunpoint several times because police
records mistakenly identified him as an armed and dangerous killer
- In California, a diabetic woman was unable to buy health insurance because
an emergency-room physician had wrongly diagnosed her as being an alcoholic
- A couple spent a night in jail because a computer showed them to be
driving a stolen car. The car had been stolen, all right but from them. After
it had been returned, the records had not been corrected.
The
frequency of foul-ups can only be guessed at, but according to some estimates,
50% of current FBI records are inaccurate or incomplete. State records are only
12% to 50% accurate.
A mistake in your records is unlikely to get you arrested, but it could cost
you a job, make it difficult to buy or rent a home, keep you from getting
credit, force you to pay higher insurance premiums and affect your eligibility
for some government benefits.
COMPUTER RECORD MATCHING
Another widely used technique is computer record matching
comparing names and data in different databases. These 'match-up' programs are
used by government agencies, mostly to detect fraud and waste in welfare and
social service programs. Parents who fail to provide child-support, wage-earners
who have defaulted on student loans and social welfare recipients who violate
earnings rule can be identified in this way. The Selective Service System can
determine the names of young men who have failed to register for the draft by
comparing its lists with state driver s license records.
The IRS can flag taxpayers who underreport income by matching tax returns
with information from employers, banks, stockbrokers, mutual funds and others.
Through computer searches, the IRS can withhold refunds from defaulters on
federal loans and from parents who fail to make child-support payments. People
who owe money to Social Security may have amounts deducted from their federal
tax refund.
PRIVACY AND YOU
These two examples (database errors and computer record matching)
are just two examples of how personal information can be corrupted or abused.
There are many more opportunities for inappropriate, unauthorized or illegal use
of personal information. In some databases, the data is known to be incorrect
but little consideration for the privacy and civil liberties has been given.
Sometimes, it seems that agencies are very lax in their attempts to correct data
that is known to be incorrect.
In 1992, a poll found that 45% of Americans agreed with the statement that
"technology has almost gotten out of control". Seven out of ten U.S. consumers
feel they have lost all control over how personal information about them is
circulated and used by business, while 79% believe privacy ranks with "life,
liberty and the pursuit of happiness" as a fundamental right.
The concept of privacy is an elusive one because of its relationship to other
concepts such as confidentiality, freedom, autonomy, solitude and secrecy.
Privacy means control over exposure of self or information about oneself and
freedom from intrusion. It is related to human vulnerability to harm as well as
to the human need to retain a sense of control over one's personal life. Privacy
denotes the right of an individual to decide how much personal information to
share. It includes a right to secrecy of information and protection against
misuse or release of this information.
Confidentiality is frequently used interchangeably with privacy. However,
privacy is normally controlled by the individual while confidentiality is
controlled by the person in whom one confides. In other words, controlling
information about yourself is privacy and you controlling information about
someone else is confidentiality.
There are some sites such as http://www.publicdata.com/ where an
individual can find out things about others. At this site, there is a charge to obtain this information, but you can check out the free demonstration to see what all is available.
GETTING INVOLVED - YOUR PART
Each individual should be aware that mistakes do happen. Data in
databases is not always correct. If you suspect that an error has occurred,
investigate and if the need exists - correct the error.
Errors can enter a database through many routes. The error may be a careless
mistake - such as typing a 10 instead of a 100. Errors can be intentionally
entered - entering wrong data can sometimes lead to personal gain. Some
companies use audit trails to identify the person who enters data into the
database. If a change is made in the database, then the company can identify who
made the change. However, even though the company can determine where the blame
needs to be placed, sometimes the harm has already been done. Correcting the
results of this type of incident can be very difficult.
Learning more about computers will help you in spotting abuses. Find out what
databases have information about you. If you suspect that one contains some
inaccurate data, then work to get it corrected.
COMPUTER CRIME
Crime is an area where computers play both a beneficial and a
detrimental role. Computers can aid in preventing and solving crimes and have
strengthened the court system by allowing easier access to laws and decisions
already on the books. However, there is a reverse side. People having a good
understanding of computers may use them as a means of illegally transferring
funds to their possession. Such frauds are difficult to discover.
What does the term computer crime mean? Web defacements? DoS (Denial
of Service) attacks? Compromised systems? Fraud? Theft? It appears that if you
ask a dozen people then you will get a dozen different answers. Computer crime
can be initiated using everything from the elegant insertion of some mischievous
code to the down-and-dirty instance of copying data onto a floppy and walking
out the door. Cutting-edge techniques and technology may or may not have
anything to do with it. Generally, if the crime involves a computer in any way -
then it is a computer crime. There are four areas: fraud, data theft, data
manipulation and destruction. Computer-related crime is more of a problem than
most people realize. Americans are losing billions of dollars annually to
high-technology crooks whose activities go undetected and unpunished. Estimates
of losses range up to $50 billion per year.
Here are some of the major computer crime types:
- Viruses
- Theft of proprietary information
- Financial fraud
- Sabotage
- Laptop theft
- Denial of Service
Computer crimes involve any criminal act that
involves the use of a computer. Most computer crimes are discovered by accident.
Many crimes are never discovered because company officials do not know enough
about computers to detect them. Others are hushed up to avoid scaring customers
and stockholders. Others fear that publicity will attract copycat crooks.
Computer sabotage is generally committed by an individual who does not
benefit financially from the crime. It seems that the only motivation is
destruction. A common technique is computer viruses. Computer viruses are
transmitted either by shared disks or through data communications connections.
Many new virus programs are released each month. A user must be vigilant and use
some common sense to avoid being hit by a computer virus.
CRIME AND E-COMMERCE
American concern about 'cybercrime' is still high. Most people
believe that not enough is being done to protect Internet customers. As a
result, people are less likely to engage in e-commerce. For example, 62% of
Internet customers say that customers need more protection and 61% say they are
less likely to do business on-line. As the American society moves towards more
e-commerce, these issues will need to be dealt with.
MALICIOUS SOFTWARE
Malicious software is any software written to cause damage to or
use up the resources of a target computer. Malicious software is frequently
concealed within or masquerades as legitimate software. In some cases, it
spreads itself to other computers via e-mail or infected floppy disks. Types of
malicious software include viruses, Trojan horses, worms and hidden software for
launching denial-of-service attacks.
Viruses are the best-known type of malicious software. These programs
secretly attach themselves to other programs. What makes them dangerous is that,
before they do whatever damage they may be programmed for, they first copy
themselves to additional program files. Thus, computer viruses infect and
reproduce in a fashion somewhat analogous to biological viruses.
In addition to viruses, there is a growing threat from other types of
malicious software, including Trojan horses, worms and denial-of-service
attacks. Hostile Java applets are also an emerging threat.
A Trojan horse is a program that appears to perform a legitimate function but
also performs a harmful activity when executed. Trojan horses are frequently
used to steal passwords from computers. Unlike a virus, a Trojan horse does not
replicate itself.
Worms use up computer resources such as memory and network bandwidth, slowing
down both PCs and servers. In addition, worms sometimes delete data and spread
rapidly via e-mail.
In denial-of-service attacks, specific Web sites are overwhelmed by an
intentional onslaught of Internet traffic. Such attacks rely on launching
programs, sometimes called zombies, that have previously been hidden on hundreds
of Internet-connected computers that belong to unsuspecting third parties.
Hostile Java applets steal information from or cause damage to the computers
of users who visit hostile Web sites. Victims may be tricked into visiting the
sites when they click on links they receive via e-mail or networks.
The Chernobyl and Melissa viruses and the Worm.Explore.Zip program caused
extensive PC damage after spreading themselves around the world through email in
1999. The threat is real. In 1995, the Concept virus was launched. It took 4
months for the Concept virus to become the most prevalent virus and it caused an
estimated $50 million of damage. In 1999, the Melissa virus took only 4 days to
become the most prevalent virus and it cost about $200 million in damage. In
2000, the Love Bug virus took only 5 hours to become the most prevalent virus
and it cost more than $700 million in damage.
Experts believe that the worst is yet to come. The Love Bug virus was written
by a group of college kids who lacked the sophistication of a seasoned
professional.
Viruses are not just limited to PCs. A program billed as a Nintendo Game Boy
emulator for Palm handhelds turned out to be a virus that deletes programs from
the device.
Malicious software is a real threat for the on-line community - they should
be taken seriously. However, some of the threats are actually a hoax. If you
hear of a threat, please check it out. Don't forward emails that warn of threats
without checking it out to see if it is a real threat or just a hoax - use one
of the following links:
www.kumite.com/myths
www.datafellows.com/news/hoax
Symantec Virus Encyclopedia
Symantec Hoax Encyclopedia
www.avp.ch/avpve
or
go to a search
engine and type the name of the virus that you want to know more about.
ETHICS
Companies can implement many security measures to protect
computers and funds, but often the security of a system depends upon the ethics
of the individuals who have access to the systems. COMPUTER ETHICS is a term
used to refer to the standard of moral conduct in computer use. Ethics can
govern an individual s attitude toward use of data in databases, toward behavior
on the job and toward the copying of software.
Perhaps the most well-known matters involving ethics are the activities of
hackers who feel challenged to break the security measures designed to prevent
unauthorized access to a particular computer system. Regardless of the innocence
which is often claimed in meeting such a challenge, hackers have sometimes
erased valuable data or caused an essential system to breakdown or malfunction.
Often employees have the opportunity to use a company's computers and
software for personal use. Some companies allow employees to use equipment on
their own time and most have adopted standards of behavior regarding personal
use. These standards are only as effective as the ethics of each employee.
Gaining access to a database for illegitimate use or to copy copyrighted
software may be relatively easy, but it is illegal and unethical.
It is the responsibility of each computer user to evaluate his or her own
actions and determine the standards of morals to be followed. Only through
ethical behavior will the ultimate security and privacy of computers and
computer data be assured.
It is also the responsibility of each company to use data and information
properly. One of the main ethical problems in the e-commerce arena centers on
the controversy over data mining - the selling of consumer information by
e-commerce merchants to on-line advertisers.
SCAMS
Electronic scams are a serious threat. Elderly computer users are
defrauded in especially large numbers. They get conned because of their
gullibility, politeness and an inability to say no. Younger people are targeted
as well as seniors, but they are targeted for smaller amounts because they
haven't accumulated the level of savings that older people have.
Perhaps the biggest factor is that many older folks are Net novices, making
them less accustomed to sifting online facts from fiction, especially when
trying to make sense of the many investment opportunities that litter the Web.
Older folks think of the Web as media and assume that what is on the Web is
close to the truth. They don't understand that the Web is full of liars and scam
artists.
Some hints:
- Watch out for phrases like "High return" and "limited offer"
- Beware of ads that focus on recruiting others as opposed to the selling of
the product
- Be leery of secret stock tips
- When buying online, don't provide information that you feel uncomfortable
giving - be careful with credit card information
- Be sure that you are using a secure site when buying online
If
someone has made a bad investment, then they may be ashamed to admit it.
Reassure them that Web fraud is all too common and that you don't think less of
them for being deceived. If the scam stays a secret, then more folks will suffer
and the crooks will flourish.
PORNOGRAPHY
Pornography - the written, visual or spoken material that is
intended to arouse the viewer - has been around since the days of the Greeks and
Romans. But with each new medium, the quantity of the pornography, its ease of
distribution and the number of people who have access to the tools to create
porn grow.
Concerned parents, lawmakers, child advocacy groups, software developers and
Internet service providers have spent countless hours debating how best to
protect kids from pornography on the Web. Today, parents can buy a variety of
software filtering tools or blocking solutions that do a good job of shielding
kids from inappropriate software on the Net most of the time. The major
objection to using filtering software are that it also often blocks kids from
seeing perfectly reasonable content and that the means for identifying and
labeling inappropriate sites are not very good.
Pornographers work very hard to attract people to their sites. Often, they
rely on harvesting names from email lists. E-mails which have been forwarded
numerous times will often have hundreds of 'live' email addresses. This is
another reason to limit the emails that you forward or at least strip off the
email addresses before you forward something.
Savvy pornographers know how to trick a search engine into making their site
show up in searches for non-pornographic sites. This explains why you sometimes
search on topics like "toys" or "teens" and find yourself confronted with a list
of choices that often includes porn sites.
Also, pornographers prey on those with poor typing skills. The most famous
'typo-porn site' is Whitehouse.com (confused with Whitehouse.gov). Incorrectly
typing in Disney, Sony or even Beanie Babies can get you into trouble as well.
The US government can make anti-pornography laws, but it is very hard to
enforce laws internationally. However, it is important that we stop treating
pornography in cyberspace as an unsolvable problem. It is a difficult problem,
but we can find a solution.
ERGONOMICS
One of the most serious problems that faces computer users is Repetitive
Strain Injury (RSI). RSI occurs when the user performs the same
motions over and over. This situation occurs when typing. For your long term
health, productivity and efficiency, the standard advice is:
- prevention
- prevention
- prevention
Here are some tips on how to help prevent RSI:
- Get a chair that allows the user to sit at a height that puts their feet
firmly on the floor and has a tilt seat and back that permits the user to
create a comfortable angle between their thighs and back. Sit back in the
chair.
- Keyboards should be on a tray that can be raised and lowered so users'
wrists are kept straight and hands can hover over the keys during typing.
- The mouse should be kept as close to the keyboard as possible.
- Monitors should be at a 90-degree angle to windows and other bright light
sources to minimize glare. They should be positioned so that the top of the
monitor is at or slightly below eye level and an arm's length away.
- Get up and stretch every 25-30 minutes
Pay attention to your body.
When you get aches and pains which are associated with the use of computers,
then take a break. Any aches, pains, tingling, numbness or loss of strength in
the hands, arms, shoulders or neck should be taken seriously.
eSTRESS
E-mail overload, crashing computers and ever-changing technology
- it is no wonder that we are more frazzzled than ever. To combat this - balance
your life. Parents need to ensure that their children do not spend too much time
on the computer or in front of the TV set. All of us need to follow similar
rules:
- Go out for a walk
- Make sure that you get regular exercise
- Stay connected with nature
- Play with the kids and the dog
- Develop some hobbies that don't require computer use.
In summary,
strive for balance in your life.