FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ...

11
FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315

Transcript of FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ...

Page 1: FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315.

FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986)

DR. JOE CICCONE

Unit 4: Monitoring Employees – CJ 315

Page 2: FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315.

Last Week - Questions

Welcome to Unit 4 Cyber-ethicsChapter 5: Regulating Internet Privacy

What happens in other countries in this area?

Your Work?Your Kids?Your feelings?

Page 3: FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315.

Topics for the night

Employee e-mails. Can an employer legally check their

employees e-mails? Should an employer check their employees e-

mails? Should an employee have an expectation of

privacy when sending e-mails?NCIC - who can view?Police Computer Systems?Det. Mark Ferman?

Page 4: FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315.

Project – Review (due tomorrow)

You are the director of human resources for a large corporation and your task is to educate employees on what is acceptable use of the Internet in the workplace. 

Don’t reinvent the wheel ? Meaning ? Create a 6-8 slide PowerPoint presentation or 3-5 page document

to inform employees of the corporation’s Internet Usage Policy.  Address the following in your presentation: Areas in which the employee may have expectations of

privacy The employer’s right to monitor the employees activities,

and to address potential consequences for violating the policy -

Page 5: FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315.

What is Computer Ethics

According to James H. Moore, who is believed to have first coined the phrase "computer ethics", Computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology.What else should be here?What is your definition?

Page 6: FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315.

Can we stop a Cyber Attack this way?

Terrorist attacks and the raise in cyber attacks have raised concern about the security of information, security of individuals, and a need to protect the nation’s cyber infrastructure. How safe are we?

Page 7: FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315.

Causes of Computer Hate – the need for Ethics

Vendetta/Revenge Demonstrations at World Trade Organization (WTO)

in Seattle, Washington, the World Bank and the International Monetary Fund in Washington, D.C., Prague, Hungry, and Geneo Italy – against globalization.

Joke/Hoax/Prank The Hacker's Ethics

All information should be free Terrorism Political and Military Espionage Business ( Competition) Espionage Hate (national origin, gender, and race) Personal gain/Fame/Fun/Notoriety Ignorance

Page 8: FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315.

Agency Programs & Ethics Needs

Miami-Dade County – Real-time AnalysisRobbery Information

Multiple Agencies Reports are immediately processed Review and Verification BOLO sent to federal, state, and local agencies

What do you think takes place on their; MDT Laptops Department Cell/I phone Police Radio

Page 9: FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315.

National Crime Information Center (NCIC)Codes

Enhanced Name Search: Uses the New York State Identification and Intelligence System (NYSIIS). Returns phonetically similar names (e.g. Marko, Marco or Knowles, Nowles or derivatives of names such as William,Willie, Bill).

Fingerprint Searches: Stores and searches the right index fingerprint. Search inquiries compare the print to all fingerprint data on file (wanted persons and missing persons).

Probation/Parole: Convicted Persons or Supervised Release File contains records of subjects under supervised release.

Online Manuals: State Control Terminal Agencies (CTAs) can download manuals and make them available to users on-line.

Improved Data Quality: Point-of-entry checks for errors; validates that data is entered correctly (e.g., VINs); checks that data is entered in all mandatory fields; links text and image information; and expands miscellaneous fields.

Information Linking: Connects two or more records so that an inquiry on one retrieves the other record(s). Mugshots: One mugshot per person record may be entered in NCIC 2000. One fingerprint, one signature,

and up to 10 other identifying images (scars, marks, tattoos) may also be entered. Other Images: One identifying image for each entry in the following files: Article, Vehicle, Boat, Vehicle or

Boat Part. A file of generic images (e.g., a picture of a 1989 Ford Mustang) is maintained in the system Convicted Sex Offender Registry: Contains records of individuals who are convicted sexual offenders or

violent sexual predators. SENTRY File: An index of individuals incarcerated in the federal prison system. Response provides

descriptive information and location of prison. Delayed Inquiry: Every record entered or modified is checked against the inquiry log. Provides the entering

and inquiring agency with a response if any other agency inquired on the subject in the last five days. On-line Ad-hoc Inquiry: A flexible technique that allows users to search the active databases and access

the system’s historical data.

Page 10: FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315.

No Seminar next week – Unit 6 Project

Electronic profiling and how it is evidenced through telemarketing and spam. Unwanted intrusions are a result of your activities on the Internet. 

Write a 3-5 page paper (excluding cover and reference pages) analyzing the privacy concerns related to databases, electronic profiling, spam, and telemarketing. 

Page 11: FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315.

Questions

Grade UPDATE - how are you doing now?Your Concerns? - DARE Officer Ciccone