Ethics Part 2
Ethics Part 2
Digital Archiving
Dr. Ahmed El-Awady
The Ten Commandments of Computer Ethics
Examples………………….
Why Ethics is important in ICT???
By keeping ethics in ICT, the risk of dishonesty and security breaches can be reduced
The six characteristics of ethics
1- Trustworthiness
2- Respect
3- Responsibility
4- Fairness
5- Caring
6- Citizenship
What are the biggest ethical issues today ????
1- Trademarks
2- Copyrights
3- Patent
4- Trade Secrets (Cocacola vs. Pepsi) (Rogers vs. Bell ….French and English)
13
14
Copyright
• A copyright is a form of protection available to the creator of an original artistic,
musical, or literary work, such as a book, movie, software program, song, or
painting.
• It gives the copyright holder the exclusive right to publish, reproduce, distribute,
perform, or display the work.
• The copyright protection is recently extended to nonpublished works, so,
immediately after creating a work in some type of material form (such as on
paper, film, videotape, or a digital storage medium), the creator automatically
owns the copyright of that work.
15
Copyright
• Copyright protects “original works of authorship fixed in a tangible medium of
expression.” Such works include literature, movies, art, screenplays, websites, music,
architectural works, and photographs.
• Contrary to what a lot of folks believe, copyright doesn’t protect ideas, themes,
concepts, discoveries, or inventions. There’s also no copyright protection available
for titles, short phrases, facts, or quotations.
• Finally, a copyright can be registered with the copy right office.
16
Trademark
• Trademarks are the most valuable assets a business will likely
ever own.
• A trademark is typically a word, logo, phrase, symbol, or
character that’s used in connection with the advertising and sale
of products and services.
• Trademarks can also be sounds (the NBC chimes), colours (the
Kodak yellow), and even scents (sewing thread that smells like
plumeria blossoms).
17
Trademark
• Business owners use trademarks to distinguish their products and services from
those offered by their competitors.
• Consumers use trademarks to identify and compare different products and
services and to make our buying decisions.
• Trademarks are also important because they embody the qualities and
characteristics of the products and services with which they’re used, while also
offering consumers an assurance of quality and consistency.
• Finally, trademarks may be registered with the Patent and Trademark Office
(PTO).
18
Patent
• Unlike copyrights (which protect artistic and literary works)
and trademarks (which protect a company’s logo and brand
names), a patent protects inventions by granting exclusive
rights of an invention to its inventor for a period of 20 years.
• Utility patents basically protect the way an invention
functions and works, while design patents protect the
ornamental appearance of an invention rather than its
utilitarian features.
• Once a patent is issued by the PTO, the invention cannot be
commercially made, used, distributed, or sold without the
patent owner’s permission.
• When the patent expires, the invention falls into the public
domain and anyone who wants to make or sell the invention
is free to do so.
19
Key Intellectual Property Issues
20
Plagiarism
• Stealing someone’s ideas or words and passing them off
as one’s own
• Many students:
– Do not understand what constitutes plagiarism
– Believe that all electronic content is in the public domain
• Plagiarism is also common outside academia. Popular
literary authors, musicians, journalists, and even software
developers have been accused of it
21
Plagiarism (cont’d.)
22
23
Plagiarism (cont’d.)
• Plagiarism detection systems check submitted material against databases
of electronic content. They match text in different documents as a means of
identifying potential plagiarism
24
Reverse Engineering
26
Reverse Engineering (cont’d.)
27
Open Source Code
• Basic premise
– Many programmers can help software improve
– Can be adapted to meet new needs
– Bugs rapidly identified and fixed
– High reliability
28
Open Source Code
Why would firms or individual developers create open
source code if they do not receive money for it?
• Some people share code to earn respect for solving a
common problem in an elegant way.
• Some people have used open source code that was
developed by others and feel the need to pay back.
• A firm may be required to develop software as part of
an agreement to address a client’s problem. It may
decide to license the code as open source and use it
either to promote the firm’s expertise or as an incentive
to attract other potential clients with a similar problem.
29
Open Source Code
• A firm may develop open source code in the hope of earning software
maintenance fees if the end user’s needs change in the future.
• A firm may develop useful code but may be reluctant to license and
market it, and so might donate the code to the general public.
30
Open Source License
• A software developer could attempt to make a program open source
simply by putting it into the public domain with no copyright.
• This would allow people to share the program and their improvements,
but it would also allow others to revise the original code and then
distribute the resulting software as their own proprietary product.
• Users who received the program in the modified form would no longer
have the freedoms associated with the original software.
• Use of an open source license avoids this scenario.
31
32
Trademark Infringement
33
Trademark Infringement
Examples
34
35
Globalization vs. Morals and Religions
Mind Teaser Activity
After watching the Video, answer these questions!?
1. When electronic records must be transferred?
2. When should records be publicly accessible?
3. When must they be destroyed or archived?
4. What type of documents should be in each file?
• Obsolescence: With advances in technology, storage media comes and goes. Remember floppy
disks? Updating your digital archive is an important part of your digital archive policy.
• Metadata: This is a critical component when digital archiving. Without it, or enough of it, you will
have trouble finding the data you want when you try to retrieve it.
• Corruption of information.
• In-house or outsource? [Example: UWaterloo Turnitin servers outsourcing problem to save students’
reports]
• Preventing loss of data is easier with digital archives since they can be backed
up
IT System Infrastructure
Legal background
Digital Components
Process Re-engineering
Digital Transformation: Questions!
1. Is it okay to share photos of students on the
university website?
2. What equipment do you need?
3. How could there be “Transparency”
4. Intranet or internet connections for DA networks?
And Why?
5. Types of digital components
6. What process needs to be changed to allow for
digital archiving?
7. How to guarantee quality of DA?
Digital Transformation: Questions!
1. Is it okay to share photos of students on the
university website?
It’s illegal to post students’ photos without
consent!!!
2. How could there be “Transparency”
Publishing laws, regulations and bylaws / Jobs /
admission requirements and more to the public!
3. What equipment do you need?
Smart device connected to internet / fast scanner /
storage devices for backups…
Digital Transformation: Questions!
1. Intranet or internet connections for DA networks?
And Why?
Intranet is more secured!
2. Types of digital components
Documents / multimedia / databases / designs …
3. What process needs to be changed to allow for digital
archiving?
Varies of course
4. How to guarantee quality of DA?
A thorough audit process should be in place
Activity
Tool Risk
USB stick
CD
APP
Software
Cloud Storage
Is it challenging to choose the best way to archive data digitally??
Digital Archiving Risks & Threats!
Training and Development Center (TDC) -Ain Shams University READ
Training and Development Center (TDC) -Ain Shams University READ
Case Study
I stayed quiet, and was waiting until I see what the university would
do
After I left Canada, the medical testing laboratory that my family used
to visit, which is the biggest chain labs in Canada, sent me an email
about information breach and that my family’s information are leaked
and hacked among millions of lab clients
!!!!!!!!!!
They paid millions of dollars then to solve the problem in the future
Privacy Protection and the Law
• Systems collect and store key data from every
interaction with customers to make better decisions
• Many people object to data collection policies of
government and business
• Privacy
– Key concern of Internet users
– Top reason why nonusers still avoid the Internet
• Reasonable limits must be set to balance needs of
business against rights of consumers
• Today, in addition to protection from government
intrusion, people want and need privacy protection from
private industry
56
Information Privacy
• Definition of privacy
– “The right to be left alone—the most comprehensive of rights, and the
right most valued by free people”
• Information privacy is a combination of:
1. Communications privacy
• Ability to communicate with others without being monitored by other
persons or organizations
2. Data privacy
• Ability to limit access to one’s personal data by other individuals and
organizations in order to have a large degree of control over that data
and its use
57
PAPA Rights
• Society’s four basic rights in terms of information. coined the acronym
PAPA (privacy, accuracy, property, and accessibility)
58
Data Collection Policies
• Opt-out policy
– Organization assumes that consumers approve of companies collecting
and storing their personal information
– Requires consumers to actively request to opt out
– Favored by data collectors
• Opt-in policy
– Organization must obtain specific permission from consumers before
collecting any data
– Favored by consumers
• Identity theft
• Electronic discovery
• Consumer profiling
• Treating customer data responsibly
• Workplace monitoring
• Advanced surveillance technology
60
Identity Theft
61
Identity Theft (cont’d.)
• Identity (ID) theft happens when someone steals your
personal information to commit fraud.
• The identity thief may use your information to
fraudulently apply for credit, file taxes, or get medical
services. These acts can damage your credit status and
cost you time and money to restore your good name.
• Four approaches used by identity thieves
1. Create a data breach
2. Purchase personal data
3. Use phishing
4. Install spyware to capture keystrokes of victims
62
Data Breaching
63
Data Breaching
64
Identity Theft (cont’d.)
• Purchase of personal data
– Black market for:
• Credit card numbers in bulk—$.40 each
• Logon name and PIN for bank account—$10
• Identity information—including DOB, address,
SSN, and telephone number—$1 to $15
• Phishing
– Sending legitimately looking emails claiming to be
from reputable companies to encourage individuals
to reveal personal information on a fake Web site.
65
Identity Theft (cont’d.)
• Spyware
– Keystroke-logging software downloaded to users’
computers without the knowledge of the user
– Collects:
• Account usernames
• Passwords
• Credit card numbers
– Operates even if infected computer is not online,
until the user connects to Internet then, data
captured by spyware is emailed directly to the spy
or is posted to a Web site where the spy can view it
66
CASE
• An employee of a company was suspected of placing a
Trojan horse in the company network. The employment
had been terminated, and the suspicion was that the
employee had placed a Trojan horse to get back at the
company for firing him.
• The Trojan horse was detected and analysed by the
company’s IT department, and it was evident that it was
configured to send information to an IP address located
close to where the former employee lived.
• Since search warrants and tracing IP addresses are off
limits for companies, other actions had to be taken.
67
CASE (cont.)
• After careful examination of how the Trojan horse got inserted into the
network, it seems as if it had been copied from a USB stick. It was also
possible to determine the unique identifier for the USB stick.
• A USB device that was issued by the company and used by the employee
was examined, and the unique identifier was the same as for the USB stick
that was used to distribute the malware.
• When the employee was confronted with the evidence, he admitted to
having injected the Trojan horse, and a civil lawsuit was filed.
68
Digital Forensics
• The devices that are being examined will be used by someone and
very likely to contain personal data.
• A company may employ policies against personal use of company
resources. However, even if such a policy is in place, one can
assume to find personal information originating from social media,
online banking, or whatever.
• Any forensic examination is by definition a breach of someone’s
privacy. While that breach is sometimes necessary, it should not be
taken lightly by forensic examiner.
70
Digital Forensics: Ethical Issues
73
Ethical Boundaries With Customer Profiling
• To develop customer profiles, businesses must collect information about
their customers.
• How businesses collect that information, however, is an ethical dilemma,
and businesses do not all agree where the ethical boundary lies. Some
businesses collect customer information using surveys and order-form
questionnaires. Other businesses use software programs that track what
sites customers visit online.
• Some businesses have privacy policies that guarantee that an individual's
personal information will not be sold, while others have websites expressly
for the purpose of gathering and sharing customer information.
74
Consumer Profiling
• Companies openly collect personal information about
Internet users when they register at Web sites,
complete surveys, fill out forms, or enter contests
online
• Cookies
Text files that a Web site can download to visitors’ hard
drives so that it can identify visitors later
• Tracking software
Analyzes browsing habits and deduce personal
interests and preferences and creates user profile
75
Consumer Profiling (cont’d.)
• Aggregating consumer data
– Databases contain a huge amount of consumer
behavioral data (what they like, how they behave,
what motivates them to buy)
– Marketing firms provide this data to companies so
that they can customize their products and services
to individual consumer preferences
– Advertisers use the data to more effectively target
and attract customers to their messages
– A group of Web sites served by a single advertising
network is called a collection of affiliated Web sites
76
Consumer Profiling (cont’d.)
77
Consumer Profiling (cont’d.)
• Personalization software
Recommend the number, frequency, and mixture
of their ad placements according to user profile
Evaluate how visitors react to new ads.
78
Workplace Monitoring
81
No Digital Archiving System will be good enough without cyber security
Why Computer Incidents Are So Prevalent
84
Types of Attacks
86
Worms
87
Trojan Horses
• Malicious code hidden inside seemingly harmless
programs
• Users are tricked into installing them
• Delivered via email attachment, downloaded from a
Web site, or contracted via a removable media device
• Trojans are found in image files, audio files or games.
It differs from a virus because it binds itself to non-
executable files
• Logic bomb: Executes when triggered by certain
event, such as typing a specific series of keystrokes or
by a specific time or date
88
Rootkits
89
Spam
90
Phishing
• Smishing
– Phishing via short text messages
• Vishing
– Phishing via voice mail messages
93
• Dumpster Diving is investigating a person or business’s trash
to find information to be used to attack a computer network.
Dumpster • Dumpster divers locate financial statements, government
records, medical bills, résumés, and the like simply through
Diving exploring the victim’s rubbish.
• Once in hand, the information is used to piece together identity
profiles, making social engineering more likely to succeed.
Types of Attackers
• Attackers include:
– Adventure seekers wanting a challenge
– Common criminals looking for financial gain
– Industrial spies trying to gain an advantage
– Terrorists seeking to cause destruction
• Different objectives and access to varying resources
• Willing to take different levels of risk to accomplish an objective
• Hacktivist
– Hacking to gather information in order to achieve a political or social goal
• Cyberterrorist
– Attacks computers or networks in an attempt to threaten or force a
government to advance certain political or social objectives
– Seeks to cause harm rather than gather information
– Destroys infrastructure components of financial utilities and emergency
response units
97
Cybersecurity Tracks
• Defensive Track: Uses a reactive approach to security that
focuses on prevention, detection, and response to attacks. It
uses more traditional methods to keep networks safe from
cyber crime. The tactics rely on a thorough understanding of a
system environment and how to analyze it to detect potential
network flaws. This analysis influences the development and
deployment of preventive and protective measures that
discourage or outright stop cyber attacks.
100
Skills and Certifications
• An ethical hacker should have a wide range of computer skills.
They often specialize, becoming subject matter experts (SME) on a
particular area within the ethical hacking domain.
101
What is Turnitin and iThenticate???
Video Gamers…………..
Brain USB (Neuralink)
Privacy
Digital Governance
The Importance of Integrity
Title tag
Meta description tag
(or first para of text if no
meta added)
Keywords
Search Engine Optimization (SEO)
132
Professional Codes of Conduct
• State the principles and core values that are essential to the work of an
occupational group
133
Professional Relationships That Must Be Managed
134
Discrimination
Work Discrimination
You suddenly find yourself getting yelled at or written up
for your work, and there have been no obvious change to
the quality of your work at any time during your career
with that company
Age Discrimination
• Direct comments, harassing behavior or jokes
• Example: employees are being promoted or hired due
to their young age, while older, more experienced
employees are being overlooked again and again
135
Qs ?????????????