computer crime - broad criminal activity targeting or using (comm. tools) computers OR using computers as a medium (storage devices)
EG: cyberattacks, data leaks, using computers to store harmful or stolen info
convention on cybercrime - international council determining cybercrime
EG: illegal access, interception, undermining availability
encourages law enforcement on cybercrimes
THINK: being unable to apprehend cybercriminals in foreign countries
law enforcement challenges:
lack of expertise
expensive resources
foreign countries
challenges → increased cybercriminals + victims
broad profiles (no cybercriminal databases), but cybercriminals tend to be
young
tech-saavy
part of large networks
victims fostered by a lack of resources (tech, physical, human)
victims tend not to report cybercrimes
lack of faith in law enforcement
care about reputation
THINK: data breaches could ward off customers
encourage management ←> law enforcement
criminal investigation + compliance
intellectual property can include:
software - can be commercial or for private use
databases - collection of unique data
EG: research for statistics
digital content/work
algorithm (EG: cryptohtaphy)
copyright - protects expression of idea BUT NOT the idea itself
EG: You can copyright a specific type of pizza, but you cannot copyright the entire recipe of pizza
allows same idea but different form
exclusive rights (others can’t do w/o permission)
reproduction
modification
distribution
public performance + display
patent - sole owner of an idea
utility: new process/machine
design: new original, ornamental design
plant: discovery of plants
trademark - exclusive, distinguishing, representative symbol
prevents others from using something similar (i.e bootlegging)
does NOT prevent distribution of same idea
US Digital Millennium Copyright Act - nobody can access/copy a work for online copyrightable work
Criminalizes + civil penalizes exploiters
Exemptions:
Fair Use
Reverse engineering
Encryption research
Security testing
Privacy asks should data be visible to others?
NOT Confidentiality; controls who can see what
Big Data which seeks to analyze data w/o user permission
Privacy Protection:
Technical approach: Using the technical mechanisms used by the database
Social Media approach: who can see what
EG: Privacy settings
Data Organization: ???
Policy approach: Informed consent for data collection
Governance: management oversignt of data
Ownership + authorship: Who owns their data
Ethics: Moral principles asking what is right/wrong
Ethical challenges:
Scale of activities impossibly large
Creation of novel technologies w/o rules
Owner of information?
Who regulates?
Ethical duty as a professional may conflict with employer loyalty (power dynamics)
Whistleblowing
Whistleblowing can harm both the organization but also the person
Must protect the person
Algorithms can be subject to bias
EG: Denying loans to women
Code of Conduct benefits
Is a positive stimulus
Be educational
Provides support
Enhances image
Cybercrimes
Victims + Cybercriminals
Law Enforcement
Intellectual Property
Copyright
Patent
Trademark
Privacy + Protection
Ethics
Challenges
Ethics + Professionalism