Raphael Cohen-Almagor 21.04.20141. Lecture Plan Section I -- Introduction Section II -- moral and social responsibility. Section III -- responsibility.

Slides:



Advertisements
Similar presentations
Monday, January 13, Instructor Development Lesson 9.
Advertisements

Monday, January 13, Instructor Development Lesson 6 Instructor Resources.
Rev Monday, January 13, Foundations, Technology, Skills Tools.
an innovative solution by central control
1/30/20141 The Public Sector Equality Duty England (and non-devolved bodies in Scotland and Wales)
Welcome Welcome to the next session in the professional development program focused around the 9-12 Mathematics Standards. 3/1/20141Geometry.
Raphael Cohen-Almagor. Internet Contains Worse of Humanity The Internet contains the best products of humanity. Unfortunately, the Internet.
Holocaust Denial in Canada Raphael Cohen-Almagor
SAP-Customizing SAP-Customizing.

6/1/20141 The Legislative Process in Alaska 6/1/20142 Courtesy of the Juneau Legislative Information Office.
Northside I.S.D. Acceptable Use Policy
6/2/20141 A Short Tour of our School. 6/2/20142 Hazelwood is a part of the Edmonds School District th Street SW Lynnwood, WA (425)
© 2007 Cisco Systems, Inc. All rights reserved. 1 Valašské Meziříčí Networking Media.
6/12/20141 Money and Banking Chapter Outline The Functions of Money The Functions of Money The Components of Money Supply The Components of Money.
Please, select a question: How does a personal account work? How to apply to a job offer? How to send a spontaneous application? How to recover your password?
10/6/20141 The PeopleSide of Change Agenda Why is the People Side of Change Important Components of a Successful Change Program How We Get There.
10/11/20141 MART Managers’ Conference G. George Wallin, PhD, MBA Vice President/Chief Operating Officer Sherburne TeleSystems, Inc.
Session Agenda  What is WebCRD?  The four ways to place an order  Placing an order from an application  Uploading a document  Placing a Catalog order.
10/12/20141Chem-160. Covalent Bonds 10/12/20142Chem-160.
10/22/20141 GDP and Economic Growth Chapter /22/20142 Outline Gross Domestic Product Gross Domestic Product Economic Growth Economic Growth.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
e-safety and cyber bullying
Raphael Cohen-Almagor University of Hull
September 9, 2009 Michael W. McKeehan Executive Director, Internet & Technology Policy Online Safety: Protecting Consumers.
©2015 Paul Read 7.5 Writing Discussion Essays in Part Two /sizes/z/in/photostream/
Can I really get in trouble for that post? Youth, Bullying, and Technology Jenn Capps, PhD, LPC Denise Mowder, JD, PhD.
The Growth of Dual-Use Bioethics Lecture No.13 Further Inf. For further information and video link please click on the right buttons in the following slides.
1 WHY IS WHISTLEBLOWING IMPORTANT AND ON WHAT PRINCIPLES SHOULD PROTECTIVE LEGISLATION BE BASED? David Lewis, Professor of Employment Law, MiddlesexUniversity,
Presented by Yeshwanth Boppana Sowmya Nagubadi. overview Introduction SL and WOW Virtual Laboratory Experiments Observational Social and Economic Science.
Social Networking in Education Presented by Justin R. Clark.
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
Internet Safety Guide for Teens Don’t give out personal information about yourself, your family situation, your school, your telephone number, or your.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Cyber Bullying Challenges for Educators, Legal issues, and Advice for Students and Parents.
Stephanie Muchai ARTICLE 19 KENYA Presentation for: “Bloggers Responsible And Ethical Use Of Online Freedom In The Election Period”
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
 What are the risks?  Technologies your children use  Tips for protection  Advice and help  Questions? Topics.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Business Ethics Lecture Rights and Duties 1.
Mihaela Bingula Andrea Matić VanesaVarga Nives Mikelić Preradović Faculty of Humanities and Social Sciences Zagreb.
Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.
Philosophy 223 Technology in the Workplace: The Concern for Privacy.
Moral, Social and Ethical issues associated with the Internet
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Ethics & Research Dr. Guerette. Defining Ethics Deal with matters of right and wrong. Deal with matters of right and wrong. May be defined as behavior.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Presentation by: Jennifer Collins Roldan Padilla.
E-Safety. A great place… Image by: Shutterstock/nasirkhan As we have discussed over the last few lessons, the Internet is a great tool for sharing information,
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
What’s Cyberbullying?. Today’s Objective: To be able to empathize with the targets of cyberbullying, recognize some of the key similarities and differences.
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
9.1 Audience Appreciation
Revision Session 6 The Media. So what is the media?
ACWA 2008 Nick Burnett. Background  Legal  Rights of the Child  Children Acts  OHS.
Online Shopping: Research Paper Eimear Greene. My Objectives Why People shop online How Online retail has changed What category of product do people shop.
Ethics. The branch of philosophy that involves systematizing, defending, and recommending concepts of right and wrong conduct Moral principles that govern.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Welcome to our E – Safety Open Evening.
E-Safety Briefing
What are human rights?.
Pre-writing topic discussion: Speak to your partner
Working to Keep our Children Safe in a World Filled with Technology
Video: Digital citizenship is defined as the norms of appropriate,
The Issues with Technology in education
Lecture 04: A Brief Summary
Presentation transcript:

Raphael Cohen-Almagor

Lecture Plan Section I -- Introduction Section II -- moral and social responsibility. Section III -- responsibility of Net agents. Section IV -- responsibilities of Internet providers and web-hosting companies

Introduction The Internet is a macro system of interconnected private and public spheres: household, literary, military, academic, business and government networks. The mix of open standards, diverse networks, and the growing ubiquity of digital devices makes the Internet a revolutionary force that undermines traditional media and challenges existing regulatory institutions based on national boundaries

The Internet The Internet contains the best products of humanity

5

Ufff…

Worse of Humanity Unfortunately, the Internet also contains the worse products of humanity: Child Pornography, Pedophilia Terror Racism, Hate speech and Holocaust denial Crime-facilitating speech

Relevant Factors History Culture Morality Law

The Object of this Paper The object of this Paper is to discuss moral and social responsibility of people who utilize the Internet for their own purposes. The Paper addresses the ethical problems rooted in technology in response to potential risks on the Internet. The Internet is not the problem. The problem arises where it is utilized to undermine our well-being as autonomous beings living in free societies

Moral and Social Responsibility Legal responsibility refers to addressing the issue by agencies of state power. In moral responsibility, the personal responsibility of the agent to conscience is at issue, with appeals to moral consideration. Social responsibility relates to the societal implications of a given conduct

Aristotle Only a certain kind of agent qualifies as a moral agent and is thus properly subject to ascriptions of responsibility, namely, one who possess a capacity for decision. Choice is important, to have desirable ends and relevant means to pursue the end. By moral responsibility it is meant that autonomous agents have the understanding of the options before them, have access to evidence required for making judgments about the benefits and hazards of each option, and able to weigh the relative value of the consequences of their choice

William J. FitzPatrick all cases of moral responsibility for bad actions must involve a strong form of akrasia, i.e. acting against ones better judgment. If an agent does something bad, either she does so in full knowledge that she should not be doing it, which is clear-eyed akrasia, or she is acting from ignorance. In the former cases she will be held responsible. In the latter case whether she is responsible or not will depend on whether or not her ignorance is culpable

Online/Offline The Internet has a dis-inhibition effect. The freedom allows language one would dread to use in real life, words one need not abide by, imagination that trumps conventional norms and standards

Agent's Responsibility An agent will be held blameworthy for her bad conduct when she clearly aims at doing bad or when she can be held culpable for her ignorance in making bad choices. As Aristotle said, an autonomous agent is aware of what she was doing

Power of Words Words can wound. Words can hurt. Words can move people to action. The anonymity of the Internet is most convenient for spreading unfounded allegations, for backstabbing, for malicious rumours, for pushing people to conduct harmful actions to others as well as to themselves

Suicide suicide pills and "exit bags "save the planet, kill yourself Notwithstanding the extent of the agents' liberalism, they should consider the prudence of such postings given the vulnerability of the people that such sites might attract

The Megan Meier Affair Youre the kind of boy a girl would kill herself over. Lori Drew and her co-conspirators are blameworthy and morally culpable for their involvement in this tragedy, for playing on Megans emotions in a crude and cynical way without thinking which way this game might lead. They were fully aware of what they were doing. No one coerced them to take this crude path. They chose it freely, exhibiting a strong form of clear- eyed akrasia, acting against their adult better judgment

The Megan Meier Affair parental responsibility

Responsibility of Internet Service Providers (ISPs) and Web Hosting Services Those who object the idea of holding ISPs responsible for content on their servers argue that the Internet is like a telephone carrier. But the Internet is different from the phone in some critical technological, organizational and geographical ways that make the comparison unconvincing. Let me uncover some of the major differences. Better analogies than the Internet and a phone carrier are those between the Internet and a large first and second hand bookstore, or between the Internet and a large library

Cryptome.com Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance -- open, secret and classified documents

US Nuclear Weapons Storage Kwajalein, Marshall Islands

ISPs and web-hosting rules and regulations ISPs and web-hosting companies have the right and the duty to report potentially criminal activities to the appropriate law enforcement agency. ISPs may prohibit posting legally seditious or offensive content. What a legitimate realm includes may vary from one ISP to another. child pornography

Should ISPs and host companies be proactive? They are obviously reluctant for very practical reason – the costs involved in employing professional staff who will scrutinize the information

Rowdiness The Red Light District in Amsterdam. Likewise, there are rowdy websites entertained by rowdy ISPs

Restricted areas In many research libraries, books known to be problematic for their content are kept in designated area, under the open eye of an experienced librarian. Similar arrangement can be made on the Net. Some problematic material will have restricted access and people will have to sign up for reading it, providing some details about their identity and why they wish to read this particular piece of information

VampireFreaks.com It is possible to monitor traffic on large websites. It is a question of will and of priorities in allocating resources for monitoring

Child Pornography The ISP can detect criminal behavior by analyzing patterns of use, much as a bank can detect credit card theft by monitoring each customer's pattern of purchases. It is difficult to understand why newsgroups which are known to carry child pornography are allowed to survive, let alone made available to ISP subscribers

Child Pornography In February 2009, Facebook removed more than 5,500 accounts of convicted sex offenders. This came after Myspace announcement that it removed more than 90,000 accounts of sex offenders

Suicide In mid-2004, Internet Service Providers, police, academics and NGOs in Japan discussed what actions should be taken regarding suicide chatrooms and prevention of online suicide pacts. ISPs should continue to develop and embrace initiatives designed to protect users, especially children. These include technological tools as well as educational campaigns

Hate Anti-Defamation league (ADL). The YouTube Abuse & Safety Center

Business aspects 80% of the British public believes that large companies have a moral duty to society. Four forms of Corporate social responsibility. Economic concerns. Naming and shaming Internet Service Providers

Conclusion The Internet does not have any borders but it does have limits. Aristotles Rule of the Golden Mean. ISPs should scrutinize their servers. Readers should use tip lines and alert the authorities upon encountering dangerous, anti-social content. Global cooperation

From Alberto Ríos/In Us This Day Sometimes, we are brutal and dark green. We are the fishhook thorns on the wild cactus. But sometimes as well, we are the sky itself, That great blue living room filled with endless space In every direction there is to see. We are, As things turn out, the answer and the problem both. Every day we must choose our suit of clothes

We are in a border time, The border between countries, between centuries, The border between yesterday and tomorrow, What we have been and what we are going to be. We are a state of many languages, many cultures. We must translate this into a state with many ideas. Let us choose the best from this treasury of dreams. Let us create a future We would want to speak in any language. We should not try to predict the future Instead, let us make it, and let us make it our own. Governor On the occasion of the Inauguration of Janet Napolitano Governor of the State of Arizona January 2003

Thank you