Social, Ethical and Professional Issues in the Information bob.pilgrim/540/lectures/intro_to_ آ 

  • View

  • Download

Embed Size (px)

Text of Social, Ethical and Professional Issues in the Information bob.pilgrim/540/lectures/intro_to_ آ 

  • Social, Ethical and Professional Issues

    in the Information Age

    CSC 540

    Topics for Articles & Papers

  • Internet of (Every)thing(s) from the Sublime to the Ridiculous

  • Augmented Reality

  • Remote Healthcare

  • Theory of Computing

    The question of whether P=NP is an important topic in

    theoretical computer science and applied mathematics. It

    seems likely that the answer to the questions P =NP? is

    false. However, if it turns out to be true, what would it

    mean to everyone else?

    Public-Key Encryption

    Online Commerce

    Banking Transactions


  • Microtargeting through Social Networks Microtargeting is (also called micro-targeting or micro-niche targeting) is a marketing strategy that uses consumer data

    and demographics to identify the interests of specific individuals or very small groups of like-minded individuals and

    influence their thoughts or actions.

  • Catfishing

  • Weaponizing IT

    Weaponized information is a message or content piece that is designed to affect the recipient's perception

    about something or someone in a way that is not warranted. The term implies a target and the intention to

    cause harm.

    The goal of weaponized information is bringing about a change in beliefs and attitudes and, as a result,

    promote behavior that serves the attacker's purpose. Attacks involving weaponized information are

    sometimes referred to as cognitive hacking.

  • Artificial Organ Generation/Transplanting We are the Borg

    Organs that have been successfully 3D printed and implemented in a clinical setting are either flat, such as skin, vascular, such as blood vessels, or hollow, such as the bladder. When artificial organs are prepared for transplantation, they are often produced with the recipient's own cells.

  • Cloning & Designer Babies The New Brave New World

  • Personal Genetic Engineering

    This DIY Lab starter kit provides all the

    equipment, reagents and materials you need to

    get started in molecular biology and genetic

    engineering. Also, includes a Genotyping Kit and

    supplies from our DIY CRISPR Kit so you can

    run your first experiments! Comes with tutorials

    explaining the Science and how to use the


  • Computer Technology and the Very Young

  • Net Neutrality

  • Is Facebook Evil?

  • Internet Censorship

  • The Internet is Lovely, Dark, and Deep

    The deep web, invisible web, or hidden web are parts of the World

    Wide Web whose contents are not indexed by standard web search

    engines for any reason. The opposite term to the deep web is the

    surface web, which is accessible to anyone using the Internet.

    Computer scientist Michael K. Bergman is credited with coining the

    term deep web in 2001 as a search indexing term. The content of the

    deep web is hidden behind HTML forms, and includes many very

    common uses such as web mail, online banking and services that

    users must pay for, and which is protected by a paywall, such as

    video on demand, some online magazines and newspapers, and

    many more.

    The dark web is a part of the world wide web that requires special

    software (e.g.Tor) to access. Once inside, web sites and other

    services can be accessed through a browser in much the same way

    as the normal web. However, some sites are effectively hidden, in

    that they have not been indexed by a search engine and can only be

    accessed if you know the address of the site. Special markets also

    operate within the dark web called, darknet markets, which mainly

    sell illegal products like drugs and firearms, paid for in

    cryptocurrency .

  • Quantum Computing The Dark Side

    The dark side of quantum computers. ... The era of fully fledged quantum computers threatens to destroy internet security