William H. Bowers – Ethics for the Information Age Chapter 3 - Networking.

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Networked Communications (Quinn Chapter 3)
Breaking Trust On The Internet
Ethics in Information Technology, Fourth Edition
Legal and Ethical Issues: Privacy and Security Chapter Five.
Anonymity and SPAM The Good, the Bad and the Ugly!
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
1 Freedom of Expression Prepared By Joseph Leung.
Pornography and the Internet Amanda Gillespie Donna Jones EDCI 564.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Spam We know that everyone hates spam. So the question is why does it still exist in our society? We know that everyone hates spam. So the question is.
Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3: Networking Ethics for the Information Age Third Edition by Michael.
Chapter 3 Networking. Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Chapter Overview (1/2) Introduction .
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
1 Networking Sevak Asadorian & James Brunelle. 2 Topics Introduction Introduction & Spam (how to fight spam) & Spam (how to fight spam) The.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
INTERNET and CODE OF CONDUCT
Chapter 5 Freedom of Expression
Chapter 3 Networking. Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Chapter Overview (1/2) Introduction .
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Responsible Targeting Chapter One. Content from The Essential Guide to Web Strategy for Entrepreneurs unless otherwise noted Chapter One Opt-in.
Ethics in Information Technology
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Nine Elements of Digital Citizenship BH. Nine elements is identified to create a digital citizenship. Digital Access: full electronic participation in.
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Chapter 19 Ben Eric Craig 5 th Hour AP Gov. Section 1.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3
Chapter 4 Civil Liberties.  Pages Thursday’s Reading.
Moral, Social and Ethical issues associated with the Internet
Chapter 9: The Internet and World Wide Web Two contrasting views: Media Critic Marshall McCLuhan: the Internet would help create a “global village” of.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Freedom of Speech First Amendment Expression, Speech and Symbolic Speech.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Revision Session 6 The Media. So what is the media?
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3.
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3: Networking Ethics for the Information Age Forth Edition by NYANZI A.
CHAPTER 5 FREEDOM OF EXPRESSION.
Freedom of Expression.
Ethics.
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
Ethics Tutorial Assignment#1
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Presentation transcript:

William H. Bowers – Ethics for the Information Age Chapter 3 - Networking

William H. Bowers – Topics Introduction Introduction Introduction & Spam & Spam & Spam & Spam The Spam Epidemic The Spam Epidemic The Spam Epidemic The Spam Epidemic Ethical Evaluations of Spamming Ethical Evaluations of Spamming Ethical Evaluations of Spamming Ethical Evaluations of Spamming Making Direct Moral Making Direct Moral Making Direct Moral Making Direct Moral

William H. Bowers – Topics (cont.) Fighting Spam Fighting Spam Fighting Spam Fighting Spam Ethical Evaluations of MAPS Ethical Evaluations of MAPS Ethical Evaluations of MAPS Ethical Evaluations of MAPS Proposed Solutions to the Spam Epidemic Proposed Solutions to the Spam Epidemic Proposed Solutions to the Spam Epidemic Proposed Solutions to the Spam Epidemic CAN SPAM Act of 2003 CAN SPAM Act of 2003 CAN SPAM Act of 2003 CAN SPAM Act of 2003

William H. Bowers – Topics (cont.) Control of the World Wide Web Control of the World Wide Web Control of the World Wide Web Control of the World Wide Web Ethical Perspectives on Pornography Ethical Perspectives on Pornography Ethical Perspectives on Pornography Ethical Perspectives on Pornography Censorship Censorship Censorship Children and the Web Children and the Web Children and the Web Children and the Web Breaking Trust on the Internet Breaking Trust on the Internet Breaking Trust on the Internet Breaking Trust on the Internet

William H. Bowers – Introduction The value of a PC increases dramatically once it is networked The value of a PC increases dramatically once it is networked The value of the net is tremendous due to the connectivity The value of the net is tremendous due to the connectivity Distributed computing (SETI project) harnesses many lost CPU cycles Distributed computing (SETI project) harnesses many lost CPU cycles The greatest net impact is communication The greatest net impact is communication

William H. Bowers – Introduction Two required conditions Two required conditions –Network must support usage –Users must act responsibly How do we define ‘act responsibly’? How do we define ‘act responsibly’? Can we apply ethical theories to technology? Can we apply ethical theories to technology?

William H. Bowers – & Spam is broken into packets is broken into packets Transmission is usually indirect Transmission is usually indirect Top 10 most common subject lines in 2002 Top 10 most common subject lines in Protect your computer against viruses for $ Verification Department

William H. Bowers – & Spam – Top 10 most common subject lines in Refinancing? Get a FREE quote on any mortgage loan program 4.Printer Cartridges – Save up to 80% - Free Shipping Offer 5.Miniature Remote Control Car. Great Gift! 6.$100 FREE, Please Play Now

William H. Bowers – & Spam Top 10 most common subject lines in 2002 Top 10 most common subject lines in Online Auction Marketing Secrets! 8.Important news Kuira 9.URGENT & CONFIDENTIAL. 10.GET A FREE PASS TO THOUSANDS OF XXX SITES!

William H. Bowers – The Spam Epidemic – About 40% of all in 2003 – Cost to business is in the billions per year – Low cost – about $500 - $2,000 per vs. almost $250,000 for postal mail, not including the mailer – Opt-in lists

William H. Bowers – The Spam Epidemic – Dictionary attacks, check for unbounced – Net crawlers – Spoofing – AOL blocks over 1 billion messages per day – Hard to control as spammers change ID easily and frequently

William H. Bowers – Ethical Evaluations of Spamming – Kantian Evaluation –Assume that I have a great idea for a product or service –I send unsolicited to a large list –Some recipients must pay by the message –I am treating recipients as a means to the end of selling my product

William H. Bowers – Ethical Evaluations of Spamming – Act Utilitarian Evaluation –I send the to 100 million people –1 in 100,000 may buy my product –Assume that 90% of customers are happy, 10% unhappy –We have 99,990,000 unhappy people –9,000 happy customers –1 happy me

William H. Bowers – Ethical Evaluations of Spamming – Rule Utilitarian Evaluation –Use the same scenario as before –If everyone were interested, I could not fulfill the orders –People may be inclined to drop or change to prevent spam –Usefulness of decreases

William H. Bowers – Ethical Evaluations of Spamming Social Contract Theory Evaluation Social Contract Theory Evaluation –We each have the right to free speech –That right does not include the requirement that the rest of us have to listen –If is an invitation to correspond, the sender must identify subject and author

William H. Bowers – Making Direct Moral Evaluating spam from four perspectives each concludes it is unethical Evaluating spam from four perspectives each concludes it is unethical Can it be made ethical? Can it be made ethical? Use real address and subject Use real address and subject Send only to those who opt in Send only to those who opt in

William H. Bowers – Fighting Spam Mail Abuse Prevention System (MAPS) Mail Abuse Prevention System (MAPS) Uses a Realtime Blackhole List (RBL) Uses a Realtime Blackhole List (RBL) List of IP addresses that generate or forward spam List of IP addresses that generate or forward spam Use their own guidelines to determine who should be black listed Use their own guidelines to determine who should be black listed abuse.com/support/pdf/WP_MAPS_RBL_ pdf abuse.com/support/pdf/WP_MAPS_RBL_ pdf abuse.com/support/pdf/WP_MAPS_RBL_ pdf abuse.com/support/pdf/WP_MAPS_RBL_ pdf

William H. Bowers – Fighting Spam Proper guidelines Proper guidelines –Recipients must have asked to receive –Must provide recipients with simple way to be removed from the list (including at least one non- communication method) –Must remove invalid addresses in a timely manner

William H. Bowers – Fighting Spam Proper guidelines Proper guidelines –Must disclose how recipient addresses will be used, including frequency and subject of future mailings When a violation is suspected When a violation is suspected –MAPS contacts marketer (or ISP) –Warns of potential blacklisting

William H. Bowers – Fighting Spam When a violation is suspected When a violation is suspected –Evaluates response –Makes decision Those who have been Blockholed may apply for removal Those who have been Blockholed may apply for removal

William H. Bowers – Fighting Spam Arguments against MAPS Arguments against MAPS –It prevents free speech –If an entire ISP is blocked, innocent individuals may be blocked

William H. Bowers – Ethical Evaluations of MAPS Social Contract Theory Social Contract Theory –MAPS presumes should be of “direct and equal benefit to the sender and the recipient” –Negates the argument of having a right to have a message delivered –Use of MAPS is by request (and payment) only

William H. Bowers – Ethical Evaluations of MAPS Utilitarian Evaluation Utilitarian Evaluation –ISP’s benefit - decrease in spam = less network traffic and improved performance –ISP’s lose - useful may be blocked which reduces the value of the net –Innocent senders may be harmed –Must compare net benefit of senders to net benefit of receivers

William H. Bowers – Ethical Evaluations of MAPS Kantian Evaluation Kantian Evaluation –Goal of RBL is to improve ISP’s behavior –Customer’s inconvenience may lead to complaints to ISP and suppression of spammers –MAPS is treating customers as a means to an end –This violates the Categorical Imperative

William H. Bowers – Proposed Solutions to the Spam Epidemic Require explicit subscriber opt in Require explicit subscriber opt in –Increases recipient response rate –Decreases total volume –Mandated by European Union Require labeling of spam Require labeling of spam Add a cost to every sent Add a cost to every sent Ban unsolicited Ban unsolicited

William H. Bowers – CAN SPAM Act of 2003 Controlling the Assault of Non-Solicited Pornography and Marketing (CAN SPAM) bin/getdoc.cgi?dbname=108_cong_bills&do cid=f:s877enr.txt.pdf Controlling the Assault of Non-Solicited Pornography and Marketing (CAN SPAM) bin/getdoc.cgi?dbname=108_cong_bills&do cid=f:s877enr.txt.pdf bin/getdoc.cgi?dbname=108_cong_bills&do cid=f:s877enr.txt.pdf bin/getdoc.cgi?dbname=108_cong_bills&do cid=f:s877enr.txt.pdf Divides business into three categories Divides business into three categories –Transactional or relational Message header, sender, organization and transmission information must be correct Message header, sender, organization and transmission information must be correct Must not disguise ID of the sending computer Must not disguise ID of the sending computer

William H. Bowers – CAN SPAM Act of 2003 Divides business into three categories Divides business into three categories –Consensual commercial Must inform recipient of option to be removed from list Must inform recipient of option to be removed from list Must provide internet based removal functional for at least 30 days after the message was sent Must provide internet based removal functional for at least 30 days after the message was sent Must contain postal address of sender Must contain postal address of sender –Unsolicited

William H. Bowers – CAN SPAM Act of 2003 Divides business into three categories Divides business into three categories –Unsolicited Must contain “clear and conspicuous” notice that it is an advertisement Must contain “clear and conspicuous” notice that it is an advertisement If sexually explicit, must contain notice in subject line If sexually explicit, must contain notice in subject line Prohibits dictionary attacks Prohibits dictionary attacks

William H. Bowers – CAN SPAM Act of 2003 Penalties for violations Penalties for violations –$250 per message, $2 million max –$6 million max for repeat offenders –Criminal penalties and jail time up to five years if used to further felonies or repeat offenders –Forfeiture of property or equipment used in commission of crime

William H. Bowers – CAN SPAM Act of 2003 Critics call it the “You CAN SPAM Act” Critics call it the “You CAN SPAM Act” Defines and permits unsolicited Defines and permits unsolicited Does not prevent spam at all Does not prevent spam at all Opt out not feasible as it confirms the address and address can be sold to other spammers Opt out not feasible as it confirms the address and address can be sold to other spammers Weaker than some existing state laws Weaker than some existing state laws Enforceable only in the US Enforceable only in the US

William H. Bowers – World Wide Web Attributes Decentralized, no control over content Decentralized, no control over content URL’s are unique URL’s are unique Based on the Internet, therefore accessible to all OS’s Based on the Internet, therefore accessible to all OS’s

William H. Bowers – World Wide Web Uses Shopping, e-commerce Shopping, e-commerce Formal education Formal education Genealogy Genealogy Online gaming Online gaming Paying taxes Paying taxes Gambling Gambling Blogging Blogging

William H. Bowers – Control of the World Wide Web No access in North Korea or Burma (as of 2003) No access in North Korea or Burma (as of 2003) Saudi Arabia controls all access in country Saudi Arabia controls all access in country –Blocks pornography, gambling, non-Islamic religious organizations –Women’s health and sexuality, gay rights, Middle Eastern politics, ways to circumvent filtering

William H. Bowers – Control of the World Wide Web People’s Republic of China People’s Republic of China –Allows many ISP’s –Each must agree to voluntarily block politically or morally objectionable web pages –Also blocks BBC news, CNN, sites related to Taiwan and Tibet –Can affect Hong Kong which routes through PRC

William H. Bowers – Control of the World Wide Web Germany Germany –Forbids neo-Nazi or anti-Semitic US US –Two attempts at legal restriction struck down by US Supreme Court

William H. Bowers – Control of the World Wide Web US US –Children’s Internet Protection Act upheld –Argument transcript uments/argument_transcripts/ pdf uments/argument_transcripts/ pdf uments/argument_transcripts/ pdf –Opinion /02pdf/ pdf /02pdf/ pdf /02pdf/ pdf

William H. Bowers – Ethical Perspectives on Pornography US government mandates filtering in public libraries that receive federal funding US government mandates filtering in public libraries that receive federal funding Should the government restrict access? Should the government restrict access? Pornography is hard to define Pornography is hard to define Book’s definition for this discussion Book’s definition for this discussion

William H. Bowers – Analyses Concluding Pornography is Immoral Kantianism Kantianism –Model(s) are used as means to an end –Used as objects, not persons –Violates Categorical Imperative

William H. Bowers – Analyses Concluding Pornography is Immoral Utilitarianism Utilitarianism –Reduces the dignity of human life –Portraying sexual abuse helps create an environment in which true victims are less likely to be dealt with sympathetically –Imitators may be incited to rape, etc. –Pornography is offensive to most people –Diverts resources from more redeeming activities

William H. Bowers – Analyses Concluding Pornography is Moral Presumes viewers and models are consenting adults Presumes viewers and models are consenting adults Three benefits Three benefits –Individuals involved are making money –Consumers derive pleasure –Provides consumer with harmless outlet for exploring sexual fantasies

William H. Bowers – Commentary Harms and benefits can be contradictory Harms and benefits can be contradictory –Viewing pornography incites crime –Provides harmless outlet Benefits or harms are difficult to ascertain or quantify Benefits or harms are difficult to ascertain or quantify Should government aid parents in protecting children? Should government aid parents in protecting children?

William H. Bowers – Censorship Attempts to suppress or regulate public access to offensive or harmful material Attempts to suppress or regulate public access to offensive or harmful material Usually exercised by government or religious institutions Usually exercised by government or religious institutions Printing press allowed wider dissemination of material Printing press allowed wider dissemination of material Made more difficult by divergence of church and state Made more difficult by divergence of church and state

William H. Bowers – Direct Censorship Three forms Three forms –Government monopolization State controls all media State controls all media No private radio, TV or newspapers No private radio, TV or newspapers Made more difficult by computers and internet Made more difficult by computers and internet

William H. Bowers – Direct Censorship Three forms Three forms –Prepublication review Essential to keep secrets Essential to keep secrets Generally accepted for national security Generally accepted for national security Used by totalitarian governments to suppress dissent Used by totalitarian governments to suppress dissent –Licensing and registration Used to apportion limited bandwidth Used to apportion limited bandwidth Radio, TV frequencies, channels Radio, TV frequencies, channels Allows de facto censorship Allows de facto censorship

William H. Bowers – Self-Censorship May be used to maintain good relationships with government May be used to maintain good relationships with government Reporters do not wish to alienate sources Reporters do not wish to alienate sources Voluntary rating systems Voluntary rating systems Agreement to not show mature material during prime time Agreement to not show mature material during prime time

William H. Bowers – Challenges Posed by the Internet Many to many communications Many to many communications The Internet is dynamic, always changing The Internet is dynamic, always changing Size of the Internet Size of the Internet The Internet is global The Internet is global Identities are hard to verify Identities are hard to verify

William H. Bowers – Ethical Perspectives on Censorship Kantian View Kantian View –People must think for themselves –Must not rely on others to tell them what is permissible

William H. Bowers – Ethical Perspectives on Censorship John Stuart Mill John Stuart Mill –Four reasons for freedom of expression None of us is infallible – mistakes may silence the truth None of us is infallible – mistakes may silence the truth Majority opinion is not the whole truth, other opinions must be heard Majority opinion is not the whole truth, other opinions must be heard A clash of ideas is necessary to determine the truth A clash of ideas is necessary to determine the truth Opinions must be tested to be verified Opinions must be tested to be verified

William H. Bowers – Ethical Perspectives on Censorship John Stuart Mill John Stuart Mill –Principle of Harm –“The only ground on which intervention is justified is to prevent harm to others, the individual’s own good is not a sufficient condition.”

William H. Bowers – Freedom of Expression First Amendment history – –1275 English law prohibiting speech that could weaken loyalty to the king – –Later encompassed seditions words and words against many government officials – –Late 1700’s – no prior restraint

William H. Bowers – Freedom of Expression First Amendment history – –Libel originally considered if material was harmful, truth was not a defense – –Guarantees freedom of speech – –Freedom of the press

William H. Bowers – Freedom of Expression not Absolute First Amendment’s primary purpose is to protect political speech Speech is interpreted to be more than mere words, all expression is protected Libel, slander, lies, perjury, false advertising, personal abuse not allowed

William H. Bowers – FCC vs. Pacifica Foundation, et al – George Carlin’s 7 dirty words 2 PM, 30 October 1973, after warning listeners, aired by WBAI, New York FCC received complaint Issued order against station operator

William H. Bowers – FCC vs. Pacifica Foundation, et al. Pacifica sued FCC for First Amendment violation 1978 US Supreme Court ruled 5 – 4, no violation – –Can be received unintentionally – –Can be received by children

William H. Bowers – Children and the Web Web filters – –Installed on PC or ISP – –Checks URL against blacklist – –Or checks for key words

William H. Bowers – Child Internet Protection Act Requires libraries receiving federal funds to install Internet filters About 14 million people use public Internet access Adults can ask librarians to remove filters Government argued it is an extension of existing standards

William H. Bowers – Child Internet Protection Act American Library Association and ACLU argued filters may block acceptable material Asking for filter removal may be embarrassing and disruptive Act upheld by US Supreme Court

William H. Bowers – Ethical Evaluations of CIPA Kantianism evaluation – –Individual reason should lead to enlightenment of society – –Web filters may not be accurate – –Web sites do not consent to being blocked – –Treats non-offensive, blocked pages as means to an end

William H. Bowers – Ethical Evaluations of CIPA Act Utilitarianism – –Not all children access Internet in libraries, not all bad sites will be blocked – –Probable that CIPA will result in fewer children being exposed to pornography – –May block legitimate sites, resulting in less useful research – a harmful consequence

William H. Bowers – Ethical Evaluations of CIPA Act Utilitarianism – –Adults may be embarrassed to ask for access – –Some blocked sites may be associated with minority political views, the blocking of which would be harmful

William H. Bowers – Ethical Evaluations of CIPA – –Social Contract Theory Freedom of thought and expression is valued Private viewing of pornography is individual and therefore outside of the social contract Blocking may inhibit free expression of ideas Does not treat adults who depend on library access as free and equal citizens

William H. Bowers – Breaking Trust on the Internet Identity theft – –Phony s asking to update information – –According to FBI, 2/3 of all cases of identity theft begin with solicitation – –2002 – about 75,000 complaints – –About $40 million in fraud

William H. Bowers – Chat Room Predators Participation varies by country Easy to impersonate young children

William H. Bowers – Ethical Evaluations of Police Sting Operations Is it right to trap pedophiles? Direct effect of catching and convicting – –Perpetrator is deprived of freedom – –Public is safer – –Therefore, net benefit

William H. Bowers – Ethical Evaluations of Police Sting Operations Indirect effects – –Deterrence of others – –Makes chat room participants aware that not everyone is genuine Kantian Evaluation – –Police need to lie to trap suspect – –Therefore, sting operation is wrong

William H. Bowers – Ethical Evaluations of Police Sting Operations Social Contract Theory – –People should be honest in chat rooms – –Pedophiles violate this rule – –Police may entrap otherwise honest person – –Both involve lying and wrongdoing – –Therefore, it is wrong

William H. Bowers – False Information Web pages and not necessarily correct or honest No review for correctness No pre-publication review

William H. Bowers – Questions & Discussion