Presentation is loading. Please wait.

Presentation is loading. Please wait.

William H. Bowers – Ethics for the Information Age Chapter 3 - Networking.

Similar presentations


Presentation on theme: "William H. Bowers – Ethics for the Information Age Chapter 3 - Networking."— Presentation transcript:

1 William H. Bowers – whb108@psu.edu Ethics for the Information Age Chapter 3 - Networking

2 William H. Bowers – whb108@psu.edu Topics Introduction Introduction Introduction Email & Spam Email & Spam Email & Spam Email & Spam The Spam Epidemic The Spam Epidemic The Spam Epidemic The Spam Epidemic Ethical Evaluations of Spamming Ethical Evaluations of Spamming Ethical Evaluations of Spamming Ethical Evaluations of Spamming Making Direct Email Moral Making Direct Email Moral Making Direct Email Moral Making Direct Email Moral

3 William H. Bowers – whb108@psu.edu Topics (cont.) Fighting Spam Fighting Spam Fighting Spam Fighting Spam Ethical Evaluations of MAPS Ethical Evaluations of MAPS Ethical Evaluations of MAPS Ethical Evaluations of MAPS Proposed Solutions to the Spam Epidemic Proposed Solutions to the Spam Epidemic Proposed Solutions to the Spam Epidemic Proposed Solutions to the Spam Epidemic CAN SPAM Act of 2003 CAN SPAM Act of 2003 CAN SPAM Act of 2003 CAN SPAM Act of 2003

4 William H. Bowers – whb108@psu.edu Topics (cont.) Control of the World Wide Web Control of the World Wide Web Control of the World Wide Web Control of the World Wide Web Ethical Perspectives on Pornography Ethical Perspectives on Pornography Ethical Perspectives on Pornography Ethical Perspectives on Pornography Censorship Censorship Censorship Children and the Web Children and the Web Children and the Web Children and the Web Breaking Trust on the Internet Breaking Trust on the Internet Breaking Trust on the Internet Breaking Trust on the Internet

5 William H. Bowers – whb108@psu.edu Introduction The value of a PC increases dramatically once it is networked The value of a PC increases dramatically once it is networked The value of the net is tremendous due to the connectivity The value of the net is tremendous due to the connectivity Distributed computing (SETI project) harnesses many lost CPU cycles Distributed computing (SETI project) harnesses many lost CPU cycles The greatest net impact is communication The greatest net impact is communication

6 William H. Bowers – whb108@psu.edu Introduction Two required conditions Two required conditions –Network must support usage –Users must act responsibly How do we define ‘act responsibly’? How do we define ‘act responsibly’? Can we apply ethical theories to technology? Can we apply ethical theories to technology?

7 William H. Bowers – whb108@psu.edu Email & Spam Email is broken into packets Email is broken into packets Transmission is usually indirect Transmission is usually indirect Top 10 most common subject lines in 2002 Top 10 most common subject lines in 2002 1.Protect your computer against viruses for $9.95 2.Verification Department

8 William H. Bowers – whb108@psu.edu Email & Spam – Top 10 most common subject lines in 2002 3.Refinancing? Get a FREE quote on any mortgage loan program 4.Printer Cartridges – Save up to 80% - Free Shipping Offer 5.Miniature Remote Control Car. Great Gift! 6.$100 FREE, Please Play Now

9 William H. Bowers – whb108@psu.edu Email & Spam Top 10 most common subject lines in 2002 Top 10 most common subject lines in 2002 7.Online Auction Marketing Secrets! 8.Important news Kuira 9.URGENT & CONFIDENTIAL. 10.GET A FREE PASS TO THOUSANDS OF XXX SITES!

10 William H. Bowers – whb108@psu.edu The Spam Epidemic – About 40% of all email in 2003 – Cost to business is in the billions per year – Low cost – about $500 - $2,000 per email vs. almost $250,000 for postal mail, not including the mailer – Opt-in lists

11 William H. Bowers – whb108@psu.edu The Spam Epidemic – Dictionary attacks, check for unbounced email – Net crawlers – Spoofing – AOL blocks over 1 billion messages per day – Hard to control as spammers change ID easily and frequently

12 William H. Bowers – whb108@psu.edu Ethical Evaluations of Spamming – Kantian Evaluation –Assume that I have a great idea for a product or service –I send unsolicited email to a large list –Some recipients must pay by the message –I am treating recipients as a means to the end of selling my product

13 William H. Bowers – whb108@psu.edu Ethical Evaluations of Spamming – Act Utilitarian Evaluation –I send the email to 100 million people –1 in 100,000 may buy my product –Assume that 90% of customers are happy, 10% unhappy –We have 99,990,000 unhappy people –9,000 happy customers –1 happy me

14 William H. Bowers – whb108@psu.edu Ethical Evaluations of Spamming – Rule Utilitarian Evaluation –Use the same scenario as before –If everyone were interested, I could not fulfill the orders –People may be inclined to drop or change email to prevent spam –Usefulness of email decreases

15 William H. Bowers – whb108@psu.edu Ethical Evaluations of Spamming Social Contract Theory Evaluation Social Contract Theory Evaluation –We each have the right to free speech –That right does not include the requirement that the rest of us have to listen –If email is an invitation to correspond, the sender must identify subject and author

16 William H. Bowers – whb108@psu.edu Making Direct Email Moral Evaluating spam from four perspectives each concludes it is unethical Evaluating spam from four perspectives each concludes it is unethical Can it be made ethical? Can it be made ethical? Use real address and subject Use real address and subject Send only to those who opt in Send only to those who opt in

17 William H. Bowers – whb108@psu.edu Fighting Spam Mail Abuse Prevention System (MAPS) Mail Abuse Prevention System (MAPS) http://www.mail-abuse.com/ http://www.mail-abuse.com/ http://www.mail-abuse.com/ Uses a Realtime Blackhole List (RBL) Uses a Realtime Blackhole List (RBL) List of IP addresses that generate or forward spam List of IP addresses that generate or forward spam Use their own guidelines to determine who should be black listed Use their own guidelines to determine who should be black listed http://www.mail- abuse.com/support/pdf/WP_MAPS_RBL_060 104.pdf http://www.mail- abuse.com/support/pdf/WP_MAPS_RBL_060 104.pdf http://www.mail- abuse.com/support/pdf/WP_MAPS_RBL_060 104.pdf http://www.mail- abuse.com/support/pdf/WP_MAPS_RBL_060 104.pdf

18 William H. Bowers – whb108@psu.edu Fighting Spam Proper email guidelines Proper email guidelines –Recipients must have asked to receive email –Must provide recipients with simple way to be removed from the list (including at least one non-email communication method) –Must remove invalid addresses in a timely manner

19 William H. Bowers – whb108@psu.edu Fighting Spam Proper email guidelines Proper email guidelines –Must disclose how recipient addresses will be used, including frequency and subject of future mailings When a violation is suspected When a violation is suspected –MAPS contacts marketer (or ISP) –Warns of potential blacklisting

20 William H. Bowers – whb108@psu.edu Fighting Spam When a violation is suspected When a violation is suspected –Evaluates response –Makes decision Those who have been Blockholed may apply for removal Those who have been Blockholed may apply for removal

21 William H. Bowers – whb108@psu.edu Fighting Spam Arguments against MAPS Arguments against MAPS –It prevents free speech –If an entire ISP is blocked, innocent individuals may be blocked

22 William H. Bowers – whb108@psu.edu Ethical Evaluations of MAPS Social Contract Theory Social Contract Theory –MAPS presumes email should be of “direct and equal benefit to the sender and the recipient” –Negates the argument of having a right to have a message delivered –Use of MAPS is by request (and payment) only

23 William H. Bowers – whb108@psu.edu Ethical Evaluations of MAPS Utilitarian Evaluation Utilitarian Evaluation –ISP’s benefit - decrease in spam = less network traffic and improved performance –ISP’s lose - useful email may be blocked which reduces the value of the net –Innocent senders may be harmed –Must compare net benefit of senders to net benefit of receivers

24 William H. Bowers – whb108@psu.edu Ethical Evaluations of MAPS Kantian Evaluation Kantian Evaluation –Goal of RBL is to improve ISP’s behavior –Customer’s inconvenience may lead to complaints to ISP and suppression of spammers –MAPS is treating customers as a means to an end –This violates the Categorical Imperative

25 William H. Bowers – whb108@psu.edu Proposed Solutions to the Spam Epidemic Require explicit subscriber opt in Require explicit subscriber opt in –Increases recipient response rate –Decreases total email volume –Mandated by European Union Require labeling of spam Require labeling of spam Add a cost to every email sent Add a cost to every email sent Ban unsolicited email Ban unsolicited email

26 William H. Bowers – whb108@psu.edu CAN SPAM Act of 2003 Controlling the Assault of Non-Solicited Pornography and Marketing (CAN SPAM) http://frwebgate.access.gpo.gov/cgi- bin/getdoc.cgi?dbname=108_cong_bills&do cid=f:s877enr.txt.pdf Controlling the Assault of Non-Solicited Pornography and Marketing (CAN SPAM) http://frwebgate.access.gpo.gov/cgi- bin/getdoc.cgi?dbname=108_cong_bills&do cid=f:s877enr.txt.pdf http://frwebgate.access.gpo.gov/cgi- bin/getdoc.cgi?dbname=108_cong_bills&do cid=f:s877enr.txt.pdf http://frwebgate.access.gpo.gov/cgi- bin/getdoc.cgi?dbname=108_cong_bills&do cid=f:s877enr.txt.pdf Divides business email into three categories Divides business email into three categories –Transactional or relational Message header, sender, organization and transmission information must be correct Message header, sender, organization and transmission information must be correct Must not disguise ID of the sending computer Must not disguise ID of the sending computer

27 William H. Bowers – whb108@psu.edu CAN SPAM Act of 2003 Divides business email into three categories Divides business email into three categories –Consensual commercial email Must inform recipient of option to be removed from list Must inform recipient of option to be removed from list Must provide internet based removal functional for at least 30 days after the message was sent Must provide internet based removal functional for at least 30 days after the message was sent Must contain postal address of sender Must contain postal address of sender –Unsolicited email

28 William H. Bowers – whb108@psu.edu CAN SPAM Act of 2003 Divides business email into three categories Divides business email into three categories –Unsolicited email Must contain “clear and conspicuous” notice that it is an advertisement Must contain “clear and conspicuous” notice that it is an advertisement If sexually explicit, must contain notice in subject line If sexually explicit, must contain notice in subject line Prohibits dictionary attacks Prohibits dictionary attacks

29 William H. Bowers – whb108@psu.edu CAN SPAM Act of 2003 Penalties for violations Penalties for violations –$250 per message, $2 million max –$6 million max for repeat offenders –Criminal penalties and jail time up to five years if used to further felonies or repeat offenders –Forfeiture of property or equipment used in commission of crime

30 William H. Bowers – whb108@psu.edu CAN SPAM Act of 2003 Critics call it the “You CAN SPAM Act” Critics call it the “You CAN SPAM Act” Defines and permits unsolicited email Defines and permits unsolicited email Does not prevent spam at all Does not prevent spam at all Opt out not feasible as it confirms the email address and address can be sold to other spammers Opt out not feasible as it confirms the email address and address can be sold to other spammers Weaker than some existing state laws Weaker than some existing state laws Enforceable only in the US Enforceable only in the US

31 William H. Bowers – whb108@psu.edu World Wide Web Attributes Decentralized, no control over content Decentralized, no control over content URL’s are unique URL’s are unique Based on the Internet, therefore accessible to all OS’s Based on the Internet, therefore accessible to all OS’s

32 William H. Bowers – whb108@psu.edu World Wide Web Uses Shopping, e-commerce Shopping, e-commerce Formal education Formal education Genealogy Genealogy Online gaming Online gaming Paying taxes Paying taxes Gambling Gambling Blogging Blogging

33 William H. Bowers – whb108@psu.edu Control of the World Wide Web No access in North Korea or Burma (as of 2003) No access in North Korea or Burma (as of 2003) Saudi Arabia controls all access in country Saudi Arabia controls all access in country –Blocks pornography, gambling, non-Islamic religious organizations –Women’s health and sexuality, gay rights, Middle Eastern politics, ways to circumvent filtering

34 William H. Bowers – whb108@psu.edu Control of the World Wide Web People’s Republic of China People’s Republic of China –Allows many ISP’s –Each must agree to voluntarily block politically or morally objectionable web pages –Also blocks BBC news, CNN, sites related to Taiwan and Tibet –Can affect Hong Kong which routes through PRC

35 William H. Bowers – whb108@psu.edu Control of the World Wide Web Germany Germany –Forbids neo-Nazi or anti-Semitic US US –Two attempts at legal restriction struck down by US Supreme Court

36 William H. Bowers – whb108@psu.edu Control of the World Wide Web US US –Children’s Internet Protection Act upheld –Argument transcript http://www.supremecourtus.gov/oral_arg uments/argument_transcripts/02-361.pdf http://www.supremecourtus.gov/oral_arg uments/argument_transcripts/02-361.pdf http://www.supremecourtus.gov/oral_arg uments/argument_transcripts/02-361.pdf –Opinion http://www.supremecourtus.gov/opinions /02pdf/02-361.pdf http://www.supremecourtus.gov/opinions /02pdf/02-361.pdf http://www.supremecourtus.gov/opinions /02pdf/02-361.pdf

37 William H. Bowers – whb108@psu.edu Ethical Perspectives on Pornography US government mandates filtering in public libraries that receive federal funding US government mandates filtering in public libraries that receive federal funding Should the government restrict access? Should the government restrict access? Pornography is hard to define Pornography is hard to define Book’s definition for this discussion Book’s definition for this discussion

38 William H. Bowers – whb108@psu.edu Analyses Concluding Pornography is Immoral Kantianism Kantianism –Model(s) are used as means to an end –Used as objects, not persons –Violates Categorical Imperative

39 William H. Bowers – whb108@psu.edu Analyses Concluding Pornography is Immoral Utilitarianism Utilitarianism –Reduces the dignity of human life –Portraying sexual abuse helps create an environment in which true victims are less likely to be dealt with sympathetically –Imitators may be incited to rape, etc. –Pornography is offensive to most people –Diverts resources from more redeeming activities

40 William H. Bowers – whb108@psu.edu Analyses Concluding Pornography is Moral Presumes viewers and models are consenting adults Presumes viewers and models are consenting adults Three benefits Three benefits –Individuals involved are making money –Consumers derive pleasure –Provides consumer with harmless outlet for exploring sexual fantasies

41 William H. Bowers – whb108@psu.edu Commentary Harms and benefits can be contradictory Harms and benefits can be contradictory –Viewing pornography incites crime –Provides harmless outlet Benefits or harms are difficult to ascertain or quantify Benefits or harms are difficult to ascertain or quantify Should government aid parents in protecting children? Should government aid parents in protecting children?

42 William H. Bowers – whb108@psu.edu Censorship Attempts to suppress or regulate public access to offensive or harmful material Attempts to suppress or regulate public access to offensive or harmful material Usually exercised by government or religious institutions Usually exercised by government or religious institutions Printing press allowed wider dissemination of material Printing press allowed wider dissemination of material Made more difficult by divergence of church and state Made more difficult by divergence of church and state

43 William H. Bowers – whb108@psu.edu Direct Censorship Three forms Three forms –Government monopolization State controls all media State controls all media No private radio, TV or newspapers No private radio, TV or newspapers Made more difficult by computers and internet Made more difficult by computers and internet

44 William H. Bowers – whb108@psu.edu Direct Censorship Three forms Three forms –Prepublication review Essential to keep secrets Essential to keep secrets Generally accepted for national security Generally accepted for national security Used by totalitarian governments to suppress dissent Used by totalitarian governments to suppress dissent –Licensing and registration Used to apportion limited bandwidth Used to apportion limited bandwidth Radio, TV frequencies, channels Radio, TV frequencies, channels Allows de facto censorship Allows de facto censorship

45 William H. Bowers – whb108@psu.edu Self-Censorship May be used to maintain good relationships with government May be used to maintain good relationships with government Reporters do not wish to alienate sources Reporters do not wish to alienate sources Voluntary rating systems Voluntary rating systems Agreement to not show mature material during prime time Agreement to not show mature material during prime time

46 William H. Bowers – whb108@psu.edu Challenges Posed by the Internet Many to many communications Many to many communications The Internet is dynamic, always changing The Internet is dynamic, always changing Size of the Internet Size of the Internet The Internet is global The Internet is global Identities are hard to verify Identities are hard to verify

47 William H. Bowers – whb108@psu.edu Ethical Perspectives on Censorship Kantian View Kantian View –People must think for themselves –Must not rely on others to tell them what is permissible

48 William H. Bowers – whb108@psu.edu Ethical Perspectives on Censorship John Stuart Mill John Stuart Mill –Four reasons for freedom of expression None of us is infallible – mistakes may silence the truth None of us is infallible – mistakes may silence the truth Majority opinion is not the whole truth, other opinions must be heard Majority opinion is not the whole truth, other opinions must be heard A clash of ideas is necessary to determine the truth A clash of ideas is necessary to determine the truth Opinions must be tested to be verified Opinions must be tested to be verified

49 William H. Bowers – whb108@psu.edu Ethical Perspectives on Censorship John Stuart Mill John Stuart Mill –Principle of Harm –“The only ground on which intervention is justified is to prevent harm to others, the individual’s own good is not a sufficient condition.”

50 William H. Bowers – whb108@psu.edu Freedom of Expression First Amendment history – –1275 English law prohibiting speech that could weaken loyalty to the king – –Later encompassed seditions words and words against many government officials – –Late 1700’s – no prior restraint

51 William H. Bowers – whb108@psu.edu Freedom of Expression First Amendment history – –Libel originally considered if material was harmful, truth was not a defense – –Guarantees freedom of speech – –Freedom of the press

52 William H. Bowers – whb108@psu.edu Freedom of Expression not Absolute First Amendment’s primary purpose is to protect political speech Speech is interpreted to be more than mere words, all expression is protected Libel, slander, lies, perjury, false advertising, personal abuse not allowed

53 William H. Bowers – whb108@psu.edu FCC vs. Pacifica Foundation, et al. 1973 – George Carlin’s 7 dirty words 2 PM, 30 October 1973, after warning listeners, aired by WBAI, New York FCC received complaint Issued order against station operator

54 William H. Bowers – whb108@psu.edu FCC vs. Pacifica Foundation, et al. Pacifica sued FCC for First Amendment violation 1978 US Supreme Court ruled 5 – 4, no violation – –Can be received unintentionally – –Can be received by children

55 William H. Bowers – whb108@psu.edu Children and the Web Web filters – –Installed on PC or ISP – –Checks URL against blacklist – –Or checks for key words

56 William H. Bowers – whb108@psu.edu Child Internet Protection Act Requires libraries receiving federal funds to install Internet filters About 14 million people use public Internet access Adults can ask librarians to remove filters Government argued it is an extension of existing standards

57 William H. Bowers – whb108@psu.edu Child Internet Protection Act American Library Association and ACLU argued filters may block acceptable material Asking for filter removal may be embarrassing and disruptive Act upheld by US Supreme Court

58 William H. Bowers – whb108@psu.edu Ethical Evaluations of CIPA Kantianism evaluation – –Individual reason should lead to enlightenment of society – –Web filters may not be accurate – –Web sites do not consent to being blocked – –Treats non-offensive, blocked pages as means to an end

59 William H. Bowers – whb108@psu.edu Ethical Evaluations of CIPA Act Utilitarianism – –Not all children access Internet in libraries, not all bad sites will be blocked – –Probable that CIPA will result in fewer children being exposed to pornography – –May block legitimate sites, resulting in less useful research – a harmful consequence

60 William H. Bowers – whb108@psu.edu Ethical Evaluations of CIPA Act Utilitarianism – –Adults may be embarrassed to ask for access – –Some blocked sites may be associated with minority political views, the blocking of which would be harmful

61 William H. Bowers – whb108@psu.edu Ethical Evaluations of CIPA – –Social Contract Theory Freedom of thought and expression is valued Private viewing of pornography is individual and therefore outside of the social contract Blocking may inhibit free expression of ideas Does not treat adults who depend on library access as free and equal citizens

62 William H. Bowers – whb108@psu.edu Breaking Trust on the Internet Identity theft – –Phony emails asking to update information – –According to FBI, 2/3 of all cases of identity theft begin with email solicitation – –2002 – about 75,000 complaints – –About $40 million in fraud

63 William H. Bowers – whb108@psu.edu Chat Room Predators Participation varies by country Easy to impersonate young children

64 William H. Bowers – whb108@psu.edu Ethical Evaluations of Police Sting Operations Is it right to trap pedophiles? Direct effect of catching and convicting – –Perpetrator is deprived of freedom – –Public is safer – –Therefore, net benefit

65 William H. Bowers – whb108@psu.edu Ethical Evaluations of Police Sting Operations Indirect effects – –Deterrence of others – –Makes chat room participants aware that not everyone is genuine Kantian Evaluation – –Police need to lie to trap suspect – –Therefore, sting operation is wrong

66 William H. Bowers – whb108@psu.edu Ethical Evaluations of Police Sting Operations Social Contract Theory – –People should be honest in chat rooms – –Pedophiles violate this rule – –Police may entrap otherwise honest person – –Both involve lying and wrongdoing – –Therefore, it is wrong

67 William H. Bowers – whb108@psu.edu False Information Web pages and not necessarily correct or honest No review for correctness No pre-publication review

68 William H. Bowers – whb108@psu.edu Questions & Discussion


Download ppt "William H. Bowers – Ethics for the Information Age Chapter 3 - Networking."

Similar presentations


Ads by Google