AC640 Government, Public Policy, and the Law (Political Communication) :Law and Ethics [13]
论文作者:None论文属性:讲稿 Lecture Notes登出时间:2007-07-25编辑:点击率:27570
论文字数:5000论文编号:org200707250901489726语种:英语 English地区:英国价格:免费论文
附件:unit5.pdf
关键词:
R. On the one hand, he was instrumental in
assisting the American Red Cross raise money and recruit volunteers during World War
On the other, he was accused of helping coal mining companies break strikes, and of
assisting I.G. Farben, a major German company with ties to the Nazis, in the years
preceding World War II.
Martin closes by making a philosophical point about the nature of truth. It is sometimes
argued that the truth or falsity of a message should be judged by its consequence. For
example, if the story about Iraqi soldiers removing babies from incubators during the
invasion of Kuwait led to Western support for the first Persian Gulf War and the liberation
of that country, what does it matter that it was probably a lie perpetuated by the PR firm,
Hill and Knowlton? Martin begs to differ. An indifference to truth leads to two disastrous
consequences. First, where there is no concern for truth, the powerful have a free hand
to do what they will. Truth cannot speak to power where it has no voice. Second, without
a strong commitment to truth, our ability to reason is based on little but words and
wishful thinking. There is no means to judge the value of what we believe or know,
leaving us quite helpless.
3. Alternatives and Applications: Phishing and Identity Theft
source: “Identity Theft: What, Me Worry?” PC Magazine, March 2, 2004
Have you ever received an e-mail from what appears to be a bank or an online institution
like Paypal or Ebay asking you to provide confidential financial information to a website
linked to the message? If so, like millions of others, you’ve been the target of a phishing
attack. Phishing offers one of the more compelling recent examples of a violation of
communication ethics at its most profound.
The Anti-Phishing Working Group—an industry association devoted to research in and
consumer education about phishing—offers the following definition:
“Phishing attacks use 'spoofed' e-mails and fraudulent websites designed to fool
recipients into divulging personal financial data such as credit card numbers, account
usernames and passwords, social security numbers, etc…. By hijacking the trusted
brands of well-known banks, online retailers and credit card companies, phishers are
able to convince recipients to respond to them.”
The word “phishing” derives from a playful variation on the word, “fishing,” as some
people take the bait and are reeled in, while others don’t. The Anti-Phishing Working
Group’s site is linked at the Rogues’ Gallery:
Identify theft through phishing—or as it is also known, “carding” or “brand spoofing”--
represents a new frontier in communication ethics. While it’s always been possible to
impersonate another person—one famous recent case involved Canadian financier
Albert Walker, who killed a friend and then pretended to be the dead man for a number
of years—it’s become much easier when the details of who we are can be reduced to a
few bits of digital information. Identity theft through phishing is also the product of the
casual way in which we share credit card information, biographical details, or other data
with individuals, institutions, and websites. The problem is widespread: a 2004 US
survey indicated that 1 in 8 Americans had been victims of identity theft, and at an
average cost of $10,000 (US) per incident. Eighty-five percent of fraud victims find out
about the crime months later, when
本论文由英语论文网提供整理,提供论文代写,英语论文代写,代写论文,代写英语论文,代写留学生论文,代写英文论文,留学生论文代写相关核心关键词搜索。