1 Networking Sevak Asadorian & James Brunelle
2 Topics Introduction Introduction & Spam (how to fight spam) & Spam (how to fight spam) The World Wide Web The World Wide Web Ethical Perspectives on Pornography Ethical Perspectives on Pornography Censorship Censorship Freedom of Expression Freedom of Expression Children and the Web Children and the Web Internet Addiction Internet Addiction
3 Introduction Computer’s utility increases tremendously when it is connected to a network. Computer’s utility increases tremendously when it is connected to a network. Shared resources Shared resources Storage Storage Printers / Scanners Printers / Scanners Files Files
4 Introduction Internet Internet Connects millions of computers Connects millions of computers Surf the web Surf the web Information Information Products Products Services Services Send to anyone in the world Send to anyone in the world
5 10 Most Common Subject Lines We carry the most popular medications We carry the most popular medications You’ve been sent an Insta-Kiss! You’ve been sent an Insta-Kiss! You have 17 new pictures You have 17 new pictures STEAMY HOT LESBIAN ACTION LIVE ON CAMERA STEAMY HOT LESBIAN ACTION LIVE ON CAMERA All orders are shipped from authorized locations All orders are shipped from authorized locations 2005 Digital Cable Filters 2005 Digital Cable Filters F R E E * 30 second Pre-Qualification MORTGAGE Application F R E E * 30 second Pre-Qualification MORTGAGE Application HURRY HURRY Hot Stock on the RISE HURRY HURRY Hot Stock on the RISE Sale PRICES ARE BEST ONLINE! Sale PRICES ARE BEST ONLINE! Breaking news on the TOP Pick stock Breaking news on the TOP Pick stock Top 10 Spam Subject Lines with the last 24 hours!
6 & Spam Messages embedded in files transferred from on computer to another via a telecommunication system. Messages embedded in files transferred from on computer to another via a telecommunication system. Everyone has an address which is a unique mailbox in cyberspace Everyone has an address which is a unique mailbox in cyberspace address address 1 st part: Individual user name 1 st part: Individual user name 2 nd part: Domain name 2 nd part: Domain name
7 & Spam Billions of s are exchanged daily Billions of s are exchanged daily 2000 – 8% spam 2000 – 8% spam 2003 – 40% spam 2003 – 40% spam Spammers disguise themselves Spammers disguise themselves Change and IP addresses to disguise sending machine Change and IP addresses to disguise sending machine Use an innocent person’s computer as a launch pad for a spam attack Use an innocent person’s computer as a launch pad for a spam attack
8 & Spam How do they get your address? How do they get your address? Opt-In Lists Opt-In Lists Dictionary attacks Dictionary attacks Spammers buy spam-screening software to help themselves in improving their msg. quality. Spammers buy spam-screening software to help themselves in improving their msg. quality.
9 & Spam Spam costs companies $500 - $2000 to hire an Internet marketing firm to send an advertisement to millions Spam costs companies $500 - $2000 to hire an Internet marketing firm to send an advertisement to millions Using USPS to send out the same advertisement: Using USPS to send out the same advertisement: $40,000 – mailing list $40,000 – mailing list $190,000 – bulk-rate postage $190,000 – bulk-rate postage Not including the brochures Not including the brochures ad is 100 times cheaper than traditional flyer sent out in the mail ad is 100 times cheaper than traditional flyer sent out in the mail
10 & Spam Is spamming wrong? Is spamming wrong? Kantian Evaluation……………………………..Yes Kantian Evaluation……………………………..Yes Act Utilitarian Evaluation………………………Yes Act Utilitarian Evaluation………………………Yes Rule Utilitarian Evaluation……………………...Yes Rule Utilitarian Evaluation……………………...Yes Social Contract Theory Evaluation……………...Yes Social Contract Theory Evaluation……………...Yes Conclusion: Sending spam is wrong & immoral. Conclusion: Sending spam is wrong & immoral. address of marketers sending the spam is not correct, and subject lines of the messages are misleading. address of marketers sending the spam is not correct, and subject lines of the messages are misleading.
11 & Spam How should we fight spam? How should we fight spam? Subscribers need to be on a lists to receive ads Subscribers need to be on a lists to receive ads Require labeling of advertising (“ADV”) Require labeling of advertising (“ADV”) Add cost to every that is sent Add cost to every that is sent Ban unsolicited completely Ban unsolicited completely
12 & Spam M.A.P.S. (Mail Abuse Prevention System) M.A.P.S. (Mail Abuse Prevention System) RBL (Realtime Blackhole List) RBL (Realtime Blackhole List) Set of Guidelines (have to comply) Set of Guidelines (have to comply) Company must prove recipient is on their list Company must prove recipient is on their list They must provide subscribers with simple ways to terminate their subscription They must provide subscribers with simple ways to terminate their subscription Must remove invalid addresses in a timely manner Must remove invalid addresses in a timely manner Must take care not to overwhelm individual hosts or LANs Must take care not to overwhelm individual hosts or LANs Must disclose subscribers how their addresses will be used Must disclose subscribers how their addresses will be used
13 & Spam M.A.P.S. – Is It Ethical? M.A.P.S. – Is It Ethical? Social Contract Theory Evaluation – YES Social Contract Theory Evaluation – YES Kantian Evaluation -- NO Kantian Evaluation -- NO
14 The World Wide Web How do we use the web? How do we use the web? Shopping Shopping Business Business Information Information Explore our roots Explore our roots Games Games Virtual Worlds Virtual Worlds Taxes Taxes Gamble Gamble Blog Blog
15 The World Wide Web Internet access is limited in some countries Internet access is limited in some countries Saudi Arabia – no access to pornography, gambling sites, and pages that are deemed to be offensive to Islam Saudi Arabia – no access to pornography, gambling sites, and pages that are deemed to be offensive to Islam Germany – forbids access to any neo-Nazi Websites Germany – forbids access to any neo-Nazi Websites United States – FULL ACCESS United States – FULL ACCESS
16 The World Wide Web Types of Censorship Types of Censorship Direct Censorship Direct Censorship Government Monopolization Government Monopolization Prepublication Review Prepublication Review Licensing and Registration Licensing and Registration Self Censorship Self Censorship A group deciding for itself not to publish material A group deciding for itself not to publish material
17 The World Wide Web Problems the Internet poses for Censorship Problems the Internet poses for Censorship Many to many vs. 1 to many Many to many vs. 1 to many The internet is dynamic The internet is dynamic The internet is huge The internet is huge The internet is global The internet is global No age verification No age verification
18 The World Wide Web Freedom of Expression Freedom of Expression First Amendment to the U.S. Constitution First Amendment to the U.S. Constitution Freedom of Expression is not an absolute right Freedom of Expression is not an absolute right U.S. law prohibits advertising cigarettes on T.V. U.S. law prohibits advertising cigarettes on T.V. FCC vs. Pacifica Foundation et al FCC vs. Pacifica Foundation et al George Carlin’s “Filthy Words” George Carlin’s “Filthy Words”
19 Ethical Perspectives on Pornography According to Dictionary.com, According to Dictionary.com, “Pornography is sexually explicit pictures, writings, or other material whose primary purpose is to cause sexual arousal.”
20 Ethical Perspectives on Pornography Some Utilitarians conclude that pornography is wrong based on five harmful consequences it has on society: Some Utilitarians conclude that pornography is wrong based on five harmful consequences it has on society: 1.) Pornography reduces the dignity of human life. 1.) Pornography reduces the dignity of human life. 2.) Creates an environment where true victims of sexual abuse are less likely to be dealt with sympathetically by the justice system. 2.) Creates an environment where true victims of sexual abuse are less likely to be dealt with sympathetically by the justice system. 3.) People imitate crimes that they have seen portrayed in pornography. 3.) People imitate crimes that they have seen portrayed in pornography. 4.) Offends most people. 4.) Offends most people. 5.) Existence of the pornography industry diverts resources from activities that would have more redeeming social value. 5.) Existence of the pornography industry diverts resources from activities that would have more redeeming social value.
21 Ethical Perspectives on Pornography Some say adult pornography is moral Some say adult pornography is moral Some Utilitarians conclude it is moral for adults to view pornography Some Utilitarians conclude it is moral for adults to view pornography Three beneficial consequences of pornography: Three beneficial consequences of pornography: 1.) Make money 1.) Make money 2.) Physical pleasure 2.) Physical pleasure 3.) provides the costumer with harmless outlet for exploring sexual fantasies 3.) provides the costumer with harmless outlet for exploring sexual fantasies
22 Children and the Web Many parents want what's best for their children. Many parents want what's best for their children. Many parents believe they ought to protect their children from exposure to pornography and violent material on the web. Many parents believe they ought to protect their children from exposure to pornography and violent material on the web. Using Web Filters can help prevent certain web pages from being displayed in your browser. Using Web Filters can help prevent certain web pages from being displayed in your browser.
23 Internet Addiction According to Joseph Weizenbaum the reason why programmers are attracted to their machines is the feeling of freedom and power. According to Joseph Weizenbaum the reason why programmers are attracted to their machines is the feeling of freedom and power. Computer program whatever your heart desires. Computer program whatever your heart desires. The resulting thrill causes programmers to have a “compulsion to program.” The resulting thrill causes programmers to have a “compulsion to program.”
24 Q & A