Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-r5zm4 Total loading time: 0 Render date: 2024-06-16T07:57:04.892Z Has data issue: false hasContentIssue false

Appendix: Topics for Presentations, Discussions, and Papers

Published online by Cambridge University Press:  05 June 2012

Robert N. Barger
Affiliation:
University of Notre Dame, Indiana
Get access

Summary

Accountability of bloggers – A blog is a Web site containing analyses, opinions, and sometimes hyperlinks. What is the accountability of the owner of the blog for this material?

Carnivore's use by the FBI – Carnivore is an investigative device used to monitor e-mail and other electronic communications by means of “packet sniffing.” It has raised privacy concerns.

Computer viruses – Programs that enter a computer through trickery or stealth, infecting it and usually corrupting its data and/or affecting its operation.

Credit card fraud online – Often involves “spoofing” (see Web spoofing) to obtain personal information that will enable illicit use of a credit card.

Cybersquatting – Usually involves investing in domain names that might in turn be sold to companies for a higher price than was originally paid.

Data mining – The practice of sifting through large amounts of data in search of information that might be used for commercial purposes, for example, to target potential customers.

Dating on the Internet – Involves using the Internet to find and make contact with other people for romantic purposes. The anonymity afforded by the Internet can make this a dangerous activity, however.

Fake ID manufacture and sale with computers – Involves use of Internet technology to sell fake identification cards (e.g., drivers' licenses). These are often described by the online sales sites as “novelty” cards to avoid criminal liability for their sale.

Gambling on the Internet – Involves wagering on sports events or games of chance. This activity often involves offshore sites and runs the risk of inauthentic practices that make the odds of winning (or being paid off) much less than they are at a physical casino or sports facility.

Type
Chapter
Information
Computer Ethics
A Case-based Approach
, pp. 227 - 230
Publisher: Cambridge University Press
Print publication year: 2008

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×