Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 1 Regulating.

Slides:



Advertisements
Similar presentations
1 Lesson 15 Evaluating Electronic Information Computer Concepts BASICS 4 th Edition Wells.
Advertisements

Obscenity Obscenity Defamation Defamation Hate Speech Hate Speech Boundaries of Free Speech.
Lorrie Cranor AT&T Labs Avi Rubin AT&T Labs Marc Waldman
Freedom of Speech Chapter 37.
Ethics in Information Technology, Fourth Edition
Ethics in Information Technology, Second Edition
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Fair Information.
Background Information Definition:. Background Information Controversy Ex)
1 Freedom of Expression Prepared By Joseph Leung.
Computers and Society Carnegie Mellon University Spring 2007 Cranor/Tongia 1 Regulating Online Speech Week.
Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 1 Regulating Online Speech.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Regulating speech How the Net changes attitudes and assumptions, and creates new societal tensions 1 and unintended consequences March 10, 2011Harvard.
Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 1 Spam / Regulating Online.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Identity, Anonymity,
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Final PowerPoint Presentation. The Wide World of Censorship By: Donnia Zack-Williams Sarah D’Orsie Katie Sullivan.
Ian Jackson. History Lesson 1833 – Charles Babbage develops Difference Engine 1890 – Herman Hollerith develops Tabulating System Used in 1900 U.S. census.
Chapter 5 Freedom of Expression
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
FIRST AMENDMENT RIGHTS Mr. Chris Sandford American Government and Politics.
Ethics in Information Technology
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Freedom of Speech in Cyberspace
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Anonymity and Privacy Enhancing.
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 52 Parental Controls on the Internet.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
LIBS100 July 20, 2005 First Amendment Library Bill of Rights.
The Bill of Rights The First 10 Amendments. Amendment 1 Protects 5 freedoms Religion Assembly Press Petition Speech.
Journalism Chapter 2 Making Ethical Choices. ethics Branch of philosophy that deals with right and wrong.
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
Chapter 5.  It creates the three branches of government  Executive  Legislative  Judicial  It allocates powers to these branches  It protects individual.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Identity, Anonymity, and.
Summary of Part V Freedom of Expression Constitutional Law Mr. Morrison Spring 2006.
A near-invisible niche for the vast majority of its existence, computer culture has only recently stepped into the big leagues and has yet to even learn.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Fair Information Practices September 9, 2008.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Intro to Ethics. Ethics The branch of philosophy that deals with right and wrong The branch of philosophy that deals with right and wrong System of moral.
Chapter 14 How Universal is access to Computers and the Web.
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
1 ST AMENDMENT; FREE SPEECH AND FREEDOM OF THE PRESS ELIZABETH MANWILL MIA MAY RAMI KHALAF MATT MARTY.
The 1 st Amendment U.S. Government Ms. Kemp. 1 st Amendment Rights Press Press Religion Religion Petition Petition Assembly Assembly Speech Speech.
1. Vagueness and Overbreadth: Laws governing free speech must be clear and specific. > Laws that unnecessarily prohibit too much expression are considered.
LIBS100 March 23, 2005 First Amendment Library Bill of Rights.
Media Regulation GOVT 2305, Module 7.
As you Arrive…. Place your cell phone or other small electronic devices in the in the Cell Phone Parking Lot. Take out your blogging assignment. Take.
“Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of.
Freedom of Expression.
Media Regulation October 19, 2017.
A Gift of Fire Third edition Sara Baase
Constitutional Issues
Unit 2 Civil Rights and Civil Liberties.
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 1 Regulating Online Speech Week 3 - January 29, 31

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 2 Administrivia Questions about the quiz (plagiarism)? Questions about proper citations and avoiding plagiarism? Homework #2 now posted sp07/homework/hw2.html sp07/homework/hw2.html

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 3 Homework 1 discussion How would your life be different without computers?

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 4 CMU Libraries ( Engineering and Science (a.k.a. E&S) Location: 4 th floor, Wean Hall Subjects: Computer Science, Engineering, Mathematics, Physics, Science, Technology Hunt (CMU’s main library) Location: its own building (possibly 2 nd ugliest on campus behind Wean), between Tepper and Baker Subjects: Arts, Business, Humanities, Social Sciences Software Engineering Institute (a.k.a. SEI) Location: th Avenue Subjects: “Security, Software, Technology” Research and Communication Skills

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 5 Coolest Thing in CMU Libraries Posner Memorial Collection at Posner Center Rare books Early prints of famous works Original copy of the Bill of Rights Research and Communication Skills

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 6 START HERE: Cameo Cameo is CMU’s online library catalog Catalogs everything CMU has – books, journals, periodicals, multimedia, etc. Search Cameo online at Research and Communication Skills

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 7 Research and Communication Skills If it’s not in Cameo, but you need it today: Local Libraries Carnegie Library of Pittsburgh University of Pittsburgh Libraries

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 8 If it’s not in Cameo, and you can wait: ILLiad and E-ZBorrow ILLiad and E-ZBorrow are catalogs of resources available for Interlibrary Loan from other libraries nationwide (ILLiad) and in Pennsylvania (E-ZBorrow) Order items online (almost always free) Wait for delivery – average 10 business days Find links to ILLiad and E-ZBorrow online catalogs at Research and Communication Skills

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 9 Special needs: Other Useful Databases Links to these and many more databases available at Lexis-Nexis Massive catalog of legal sources – law journals, case law, news stories, etc. IEEE and ACM journal databases IEEE Xplore and ACM Digital Library INSPEC database Huge database of scientific and technical papers Research and Communication Skills

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 10 And of course… Reference librarians are available at all CMU libraries, and love to help people find what they need – just ask! Research and Communication Skills

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 11 Bill of Rights First Amendment Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 12 The Internet can’t be censored “The Net treats censorship as damage and routes around it.” - John Gillmore

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 13 Cartoon dogs are anonymous on the Internet

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 14 Real dogs are anonymous on the Internet too!

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 15 Actually, none of this is true It is easy to adopt a pseudonym or a persona on the Internet, but it is difficult to be truly anonymous Identities can usually be revealed with cooperation of ISP, local sys-admins, web logs, phone records, etc. The Internet can put up a good fight against censorship, but in the end there is still a lot of Internet censorship Repressive governments and intellectual property lawyers have been pretty successful at getting Internet content removed

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 16 Communications Decency Act Title V of the Telecommunications Act of 1996 Prohibited Internet distribution of indecent or patently offensive material to minors Created restrictions for the Internet similar to broadcast media Introduced by Sen. James Exon (D-Nebraska) Cited Marty Rimm study Immediately challenged in court Supreme Court struck down CDA in 1997 (Reno v. American Civil Liberties Union)

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 17 Opposition to the CDA Over-broad, vague, unenforceable CDA includes “indecency standard” Obscenity and child pornography are already illegal to distribute (child pornography is also illegal to possess) Obscenity - Miller test:  Whether the average person, applying contemporary community standards, would find that the work, taken as a whole, appeals to the prurient interest,  Whether the work depicts/describes, in a patently offensive way, sexual conduct specifically defined by applicable state law,  Whether the work, taken as a whole, lacks serious literary, artistic, political, or scientific value. But indecency is defined in CDA as “any comment, request, suggestion, proposal, image, or other communications, that, in context, depicts or describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs.”  What community do we look at when regulating the Internet? Internet should not be regulated like broadcast Law would chill free speech Internet filters are a better solution

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 18 Support for the CDA Senator James Exon (D-Nebraska), sponsor of Bill: Need to protect children from online pornography Laws that restrict selling porn to children in other media should apply to the Internet Filters are not sufficient Parents may not be able to figure out how to use them Children may access computers away from home

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 19 Platform for Internet Content Selection (PICS) Developed by the World Wide Web Consortium Specification for associating metadata with Internet content Supports self-labels and third-party labels Supports the development of many rating systems Implemented in MS Internet Explorer and other products

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 20 How technology tools work Person or tool classifies content For what age group is it appropriate? Is it educational? Is it fun? Tool takes an action Suggest Search Inform Monitor Warn Block Internet content Web Usenet Chat Gopher FTP

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 21 Who does the classification? Third-party experts Automated tools Local administrators Content providers Survey or vote

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 22 Classification scheme Good for kids Bad for kids Characteristics of content Age suitability Who created content

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 23 Rating systems and vocabularies Math Science English Spelling History French Spanish Gym Art Music Drama A B B+ D- C A- F A+ B- C B

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 24 Descriptive versus subjective Many variables Few variables SubjectiveDescriptive simple complex

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 25 Can’t derive descriptive from subjective Characters not well developed Gratuitous sex and violence ? Bad acting? Boring plot? Bad script? Dull characters? Unbelievable premise? Unoriginal? Too much violence? Not enough violence?

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 26

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 27 Scope Web sites FTP, gopher, etc. Chat Instant messaging Newsgroups Telnet

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 28 Actions Suggest Inform Search Monitor Block Warn

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 29 Mechanisms and interface Location Updates Customizability Other features

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 30 Where are the tools located? Personal computer Server LAN or local proxy Remote proxy Internet service provider Search engine Web site

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 31 Updates How are tools updated? Manual updates required Automatic updates No updates required

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 32 Customizability Action Allow and block list elements Categories of content Words and phrases Time of day Policies for each user

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 33 Other features Time limits Separate settings for each child Protect parents’ files Block individual words and pictures vs. full page or whole site Explanation of why blocked vs. silent blocking

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 34 Discussion Diversity of tools in the marketplace is important Need for increased transparency from vendors about the criteria used to classify content

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 35 CDA Sequels Child Online Protection Act (COPA) - passed in 1998 Banned commercial distribution of material harmful to minors ACLU challenged this law - Supreme Court has twice upheld lower court injunctions against enforcement, back to lower court in October Children’s Internet Protection Act (CIPA) passed in 1999 Requires schools and libraries that receive federal funds for Internet access to filter out child pornography, obscene materials, and materials harmful to minors Upheld by Supreme Court in 2003 Many state laws Most have been declared unconstitutional

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 36

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 37 Anonymous censorship-resistant publishing The printing press and the WWW can be powerful revolutionary tools Political dissent Whistle blowing Radical ideas but those who seek to suppress revolutions have powerful tools of their own Stop publication Destroy published materials Prevent distribution Intimidate or physically or financially harm author or publisher

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 38 Anonymity increases censorship-resistance Reduces ability to force “voluntary” self- censorship Allows some authors to have their work taken more seriously Reduces bias due to gender, race, ethnic background, social position, etc. Many historical examples of important anonymous publications In the Colonies during Revolutionary War when British law prohibited writings suggesting overthrow of the government Federalist papers

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 39 Publius design goals Censorship resistant Tamper evident Source anonymous Updateable Deniable Fault tolerant Persistent Extensible Freely Available

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 40 Publius Overview Publius Content – Static content (HTML, images, PDF, etc) Publishers – Post Publius content Servers – Host Publius content Retrievers – Browse Publius content PublishersServersRetrievers

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 41 Publishing a Publius document Generate secret key and use it to encrypt document Use “secret splitting” to split key into n shares This technique has special property that only k out of n shares are needed to put the key back together Publish encrypted document and 1 share on each of n servers Generate special Publius URL that encodes the location of each share and encrypted document – example: PublishersServers

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 42 Retrieving a Publius document Break apart URL to discover document locations Retrieve encrypted document and share from k locations Reassemble key from shares Decrypt retrieved document Check for tampering View in web browser PublishersServersRetrievers

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 43 Publius proxies Publius proxies running on a user’s local machine or on the network handle all the publish and retrieve operations Proxies also allow publishers to delete and update content PublishersServersRetrievers PROXYPROXY PROXYPROXY

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 44 Threats and limitations Attacks on server resources 100K Content Limit (easy to subvert) Server limits # of files it will store Possibility: use a payment scheme Threats to publisher anonymity “Rubber-Hose Cryptanalysis” Added “don’t update” and don’t delete bit Logging, network segment eavesdropping Collaboration of servers to censor content A feature?

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 45

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 46

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 47

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 48 Discussion Technology that can protect “good” speech also protects “bad” speech What if your dog does publish your secrets to the Internet and you can't do anything about it? Is building a censorship-resistant publishing system irresponsible? If a tree falls in a forest and nobody hears it….

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 49 For further reading Publius web site Publius chapter in Peer-to-Peer: Harnessing the Power of Disruptive Technologies edited by Andy Oram The Architecture of Robust Publishing Systems. ACM Transactions on Internet Technology 1(2):

Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 50