Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3: Networking Ethics for the Information Age Third Edition by Michael.

Slides:



Advertisements
Similar presentations
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Advertisements

DATE: APRIL 9, 2013 TOPIC: FREEDOM OF EXPRESSION AIM: HOW IS THE FREEDOM OF EXPRESSION PRESENTED IN THE FIRST AMENDMENT? DO NOW: INCORPORATION DOCTRINE.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
1 Ch. 3. Advertising and Society. 2 Advertising’s Legal and Regulatory Environment.
Networked Communications (Quinn Chapter 3)
Breaking Trust On The Internet
Ethics in Information Technology, Fourth Edition
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
William H. Bowers – Ethics for the Information Age Chapter 3 - Networking.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Anonymity and SPAM The Good, the Bad and the Ugly!
Censorship Knowledge is powerful, dangerous, and deadly!
Background Information Definition:. Background Information Controversy Ex)
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
1 Freedom of Expression Prepared By Joseph Leung.
Spam We know that everyone hates spam. So the question is why does it still exist in our society? We know that everyone hates spam. So the question is.
Chapter 3 Networking. Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Chapter Overview (1/2) Introduction .
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
1 Networking Sevak Asadorian & James Brunelle. 2 Topics Introduction Introduction & Spam (how to fight spam) & Spam (how to fight spam) The.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
SECTION 1 Freedom of Speech and Press Discuss the meaning and importance of each of the rights guaranteed under the Bill of Rights and how each is secured.
Chapter 5 Freedom of Expression
Chapter 3 Networking. Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Chapter Overview (1/2) Introduction .
Chapter 4 section 1 The First Amendment. The First Amendment “ Congress shall make no law respecting an establishment of religion, or prohibiting the.
Advertising and Society
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Chapter 3: Networking.
1-1 Chapter 3: Networking. 1-2 Chapter Overview Spam Internet interactions Text messaging Censorship Freedom of expression Children and inappropriate.
Day 1. “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech,
Freedom of Speech in Cyberspace
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Ethics for the Information Age Fourth Edition by Michael J. Quinn Chapter.
Freedom of Expression. 2 Overview n Definition n Restrictions n Enforcement n Intellectual Property.
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Journalism Chapter 2 Making Ethical Choices. ethics Branch of philosophy that deals with right and wrong.
Chapter 9: The Internet and World Wide Web Two contrasting views: Media Critic Marshall McCLuhan: the Internet would help create a “global village” of.
Censorship Knowledge is powerful, dangerous, and deadly!
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
{ The First Amendment. Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise there of;...
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
Ethical Theory A Quick Overview. If you were going to design an ethical society what would you need to define?
The 1 st Amendment U.S. Government Ms. Kemp. 1 st Amendment Rights Press Press Religion Religion Petition Petition Assembly Assembly Speech Speech.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3.
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3: Networking Ethics for the Information Age Forth Edition by NYANZI A.
Chapter 3: Networking.
“Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of.
Why do we study American citizenship…
Freedom of Expression.
Objective 2.12 First Amendment KQ- What freedoms are protected by the first Amendment?
Chapter 3: Networking.
The First Amendment!.
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3: Networking Ethics for the Information Age Third Edition by Michael J. Quinn

1-2 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-2 Chapter Overview (1/2) Introduction and spam Fighting spam World Wide Web Ethical perspectives on pornography

1-3 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-3 Chapter Overview (2/2) Censorship Freedom of expression Children and the Web Breaking trust on the Internet Internet addiction

1-4 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-4 Introduction Networking increases computer’s utility Internet connects millions of computers –Powerful computational resource –Even more powerful communication medium Network utility grows as number of users squared –10 users  90 sender-receiver combinations –100 users  9900 sender-receiver combinations

1-5 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-5 How Works Messages embedded in files transferred between computers address: Uniquely identifies cyberspace mailbox Messages broken into packets Routers transfer packets from sender’s mail server to receiver’s mail server

1-6 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-6 The Spam Epidemic (1/2) Spam: Unsolicited, bulk Amount of that is spam has increased –8% in 2001 –40% in 2003 –75% in 2007 Spam is effective –More than 100 times cheaper than “junk mail” –Profitable even if only 1 in 100,000 buys product

1-7 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-7 The Spam Epidemic (2/2) How firms get addresses –Opt-in lists –Dictionary attacks Spammers seek anonymity –Change and IP addresses to disguise sending machine –Hijack another system as a spam launch pad Spam blockers –Attempt to screen out spam –Have led to more picture-based spam

1-8 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-8 Ethical Evaluations of Spamming Kantian evaluation Act utilitarian evaluation Rule utilitarian evaluation Social contract theory evaluation From all these perspectives, it is wrong to send spam

1-9 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-9 Fighting Spam Real-Time Blackhole List run by Trend Micro Ethical evaluations of blacklisting by Trend Micro Proposed solutions to the spam epidemic CAN SPAM Act of 2003 Emergence of “spim” Need for socio-technical solutions

1-10 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-10 Real-Time Blackhole List Trend Micro contacts marketers who violate standards for bulk It puts marketers who violate standards on the Real-Time Blackhole List (RBL) Some mail relays refer to RBL list –Looks up host name on RBL list –If name on list, the gets bounced back All from blacklisted hosts gets bounced, even from non-spammers

1-11 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-11 Ethical Evaluations of Publishing Blacklist Social contract theory evaluation Utilitarian evaluation Kantian evaluation

1-12 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-12 Proposed Solutions to Spam Epidemic Require an explicit opt-in of subscribers Require labeling of advertising Add a cost to every that is sent Ban unsolicited

1-13 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-13 CAN SPAM Act of 2003 Took effect January 1, 2004 –Consumers have right to “opt out” –Sexually explicit messages must contain subject line notice –Prohibits dictionary attacks and falsifying header information Critics call it “You CAN Spam Act” –Spam still legal, as long as regulations followed –Opting out can have harmful consequences –Federal law weaker than state laws it preempted Spammers can avoid prosecution by locating outside United States

1-14 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-14 Emergence of “Spim” “Spim” is an unsolicited, bulk instant message People combat spim by accepting messages only from friends or buddies

1-15 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-15 Need for Socio-Technical Solutions New technologies sometimes cause new social situations to emerge –Calculators  feminization of bookkeeping –Telephones  blurred work/home boundaries Spam an example of this phenomenon – messages practically free –Profits increase with number of messages sent –Strong motivation to send more messages Internet design allows unfair, one-way communications

1-16 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-16 Attributes of the Web It is decentralized Every Web object has a unique address It is based on the Internet

1-17 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-17 How We Use the Web Shopping Contributing content (wikis, blogs) Promoting business Learning Exploring our roots Entering virtual worlds Paying taxes Gambling Lots more!

1-18 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-18 Too Much Control or Too Little? Not everyone in world has Internet access Saudi Arabia: centralized control center People’s Republic of China: ISPs sign “self-discipline” agreement Germany: Forbids access to neo-Nazi sites United States: Repeated efforts to limit access of minors to pornography

1-19 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-19 Pornography Is Immoral Kant –Loved person an object of sexual appetite –Sexual desire focuses on body, not complete person –All sexual gratification outside marriage wrong Utilitarianism –Pornography reduces dignity of human life –Pornography increases crimes such as rape –Pornography reduces sympathy for rape victims –Pornography is like pollution –Pornography industry diverts resources from more socially redeeming activities

1-20 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-20 Adult Pornography Is Moral Utilitarianism –Those who produce pornography make money –Consumers of pornography derive physical pleasure –Pornography is a harmless outlet for exploring sexual fantasies

1-21 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-21 Commentary Performing utilitarian calculus is difficult How to deal with contradictory “facts” by “experts?” How to quantify harms/benefits, such as harm done to people who find pornography offensive?

1-22 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-22 Direct Censorship Government monopolization Prepublication review Licensing and registration

1-23 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-23 Self-censorship Most common form of censorship Group decides for itself not to publish Reasons –Avoid subsequent persecution –Maintain good relations with government officials (sources of information) Ratings systems –Movies, TVs, CDs, video games –Not the Web

1-24 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-24 Challenges Posed by the Internet Many-to-many communication Dynamic connections Huge numbers of Web sites Extends beyond national borders, laws Can’t determine age of users

1-25 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-25 Ethical Perspectives on Censorship Kant opposed censorship –Enlightenment thinker –“Have courage to use your own reason” Mill opposed censorship –No one is infallible –Any opinion may contain a kernel of truth –Truth revealed in class of ideas –Ideas resulting from discourse are more influential

1-26 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-26 Mill’s Principle of Harm “The only ground on which intervention is justified is to prevent harm to others; the individual’s own good is not a sufficient condition.”

1-27 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-27 Freedom of Expression: History De Scandalis Magnatum (England, 1275) Court of Star Chamber 18 th century –No prior restraints on publication –People could be punished for sedition or libel American states adopted bills of rights including freedom of expression Freedom of expression in 1 st amendment to U.S. Constitution

1-28 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley st Amendment to U.S. Constitution Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.

1-29 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-29 Freedom of Expression Not an Absolute Right 1 st Amendment covers political and nonpolitical speech Right to freedom of expression must be balanced against the public good Various restrictions on freedom of expression exist

1-30 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-30 FCC v. Pacifica Foundation et al. George Carlin records “Filthy Words” WBAI in New York airs “Filthy Words” (1973) FCC issues declaratory order to Pacifica Pacifica sues U.S. Supreme Court ruled FCC did not violate 1 st Amendment (5-4 decision) –Broadcast media “uniquely pervasive” –Broadcasting uniquely accessible to children

1-31 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-31 Web Filters Web filter: software that prevents display of certain Web pages –May be installed on an individual PC –ISP may provide service for customers Methodologies –Maintain “black list” of objectionable sites –Examine content for objectionable words/phrases

1-32 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-32 Child Internet Protection Act Libraries receiving federal networking funds must filter pages containing obscenity or child pornography U.S. Supreme Court ruled CIPA did not violate 1 st Amendment guarantees (6-3 decision in June 2003)

1-33 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-33 Ethical Evaluations of CIPA Kantian evaluation: CIPA is wrong Act utilitarian evaluation: depends on how benefits and harms are weighed Social contract theory: freedom of conscience should be given precedence

1-34 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-34 Identity Theft Identity theft: when a person uses another person’s electronic identity Leading form: credit card fraud (more about this in Chapter 5) Many victims are experienced computer users comfortable with typing credit card number online

1-35 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-35 Chat Room Predators Chat room: supports real-time discussions among many people connected to network Instant messaging and chat rooms replacing telephone for many people Some pedophiles meeting children through chat rooms Police countering with “sting” operations

1-36 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-36 Ethical Evaluations of “Stings” Utilitarian evaluation Kantian evaluation Social contract theory evaluation

1-37 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-37 False Information Quality of Web-based information varies widely Other media also have information of varying quality –The New York Times v. The National Enquirer –60 Minutes v. Conspiracy Theory Google attempts to reward quality –Ranking uses “voting” algorithm –If many links point to a page, Google search engine ranks that page higher

1-38 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-38 Is Internet Addiction Real? Some liken compulsive computer use to pathological gambling Traditional definition of addiction: –Compulsive use of harmful substance or drug –Knowledge of its long-term harm Kimberly Young created test for Internet addiction Her test is controversial

1-39 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-39 Contributing Factors Social factors –Peer groups Situational factors –Stress –Lack of social support and intimacy –Limited opportunities for productive activity Individual factors –Tendency to pursue activities to excess –Lack of achievement –Fear of failure

1-40 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-40 Ethical Evaluation Enlightenment view –Individuals can and should govern their lives –People are responsible for their choices Jeffrey Reiman’s view –Addict’s behavior makes sense if addict has no hope for a better future –Society bears responsibility for putting people in hopeless situations