Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Networking Sevak Asadorian & James Brunelle. 2 Topics Introduction Introduction Email & Spam (how to fight spam) Email & Spam (how to fight spam) The.

Similar presentations


Presentation on theme: "1 Networking Sevak Asadorian & James Brunelle. 2 Topics Introduction Introduction Email & Spam (how to fight spam) Email & Spam (how to fight spam) The."— Presentation transcript:

1 1 Networking Sevak Asadorian & James Brunelle

2 2 Topics Introduction Introduction Email & Spam (how to fight spam) Email & Spam (how to fight spam) The World Wide Web The World Wide Web Ethical Perspectives on Pornography Ethical Perspectives on Pornography Censorship Censorship Freedom of Expression Freedom of Expression Children and the Web Children and the Web Internet Addiction Internet Addiction

3 3 Introduction Computer’s utility increases tremendously when it is connected to a network. Computer’s utility increases tremendously when it is connected to a network. Shared resources Shared resources Storage Storage Printers / Scanners Printers / Scanners Files Files

4 4 Introduction Internet Internet Connects millions of computers Connects millions of computers Surf the web Surf the web Information Information Products Products Services Services Send e-mail to anyone in the world Send e-mail to anyone in the world

5 5 10 Most Common Subject Lines We carry the most popular medications We carry the most popular medications You’ve been sent an Insta-Kiss! You’ve been sent an Insta-Kiss! You have 17 new pictures You have 17 new pictures STEAMY HOT LESBIAN ACTION LIVE ON CAMERA STEAMY HOT LESBIAN ACTION LIVE ON CAMERA All orders are shipped from authorized locations All orders are shipped from authorized locations 2005 Digital Cable Filters 2005 Digital Cable Filters F R E E * 30 second Pre-Qualification MORTGAGE Application F R E E * 30 second Pre-Qualification MORTGAGE Application HURRY HURRY Hot Stock on the RISE HURRY HURRY Hot Stock on the RISE Sale PRICES ARE BEST ONLINE! Sale PRICES ARE BEST ONLINE! Breaking news on the TOP Pick stock Breaking news on the TOP Pick stock Top 10 Spam Subject Lines with the last 24 hours!

6 6 Email & Spam Messages embedded in files transferred from on computer to another via a telecommunication system. Messages embedded in files transferred from on computer to another via a telecommunication system. Everyone has an email address which is a unique mailbox in cyberspace Everyone has an email address which is a unique mailbox in cyberspace Email address Email address 1 st part: Individual user name 1 st part: Individual user name 2 nd part: Domain name 2 nd part: Domain name

7 7 Email & Spam Billions of e-mails are exchanged daily Billions of e-mails are exchanged daily 2000 – 8% spam 2000 – 8% spam 2003 – 40% spam 2003 – 40% spam Spammers disguise themselves Spammers disguise themselves Change e-mail and IP addresses to disguise sending machine Change e-mail and IP addresses to disguise sending machine Use an innocent person’s computer as a launch pad for a spam attack Use an innocent person’s computer as a launch pad for a spam attack

8 8 Email & Spam How do they get your e-mail address? How do they get your e-mail address? Opt-In Lists Opt-In Lists Dictionary attacks Dictionary attacks Spammers buy spam-screening software to help themselves in improving their msg. quality. Spammers buy spam-screening software to help themselves in improving their msg. quality.

9 9 Email & Spam Spam costs companies $500 - $2000 to hire an Internet marketing firm to send an advertisement to millions Spam costs companies $500 - $2000 to hire an Internet marketing firm to send an advertisement to millions Using USPS to send out the same advertisement: Using USPS to send out the same advertisement: $40,000 – mailing list $40,000 – mailing list $190,000 – bulk-rate postage $190,000 – bulk-rate postage Not including the brochures Not including the brochures Email ad is 100 times cheaper than traditional flyer sent out in the mail Email ad is 100 times cheaper than traditional flyer sent out in the mail

10 10 Email & Spam Is spamming wrong? Is spamming wrong? Kantian Evaluation……………………………..Yes Kantian Evaluation……………………………..Yes Act Utilitarian Evaluation………………………Yes Act Utilitarian Evaluation………………………Yes Rule Utilitarian Evaluation……………………...Yes Rule Utilitarian Evaluation……………………...Yes Social Contract Theory Evaluation……………...Yes Social Contract Theory Evaluation……………...Yes Conclusion: Sending spam is wrong & immoral. Conclusion: Sending spam is wrong & immoral. E-mail address of marketers sending the spam is not correct, and subject lines of the messages are misleading. E-mail address of marketers sending the spam is not correct, and subject lines of the messages are misleading.

11 11 Email & Spam How should we fight spam? How should we fight spam? Subscribers need to be on a email lists to receive ads Subscribers need to be on a email lists to receive ads Require labeling of email advertising (“ADV”) Require labeling of email advertising (“ADV”) Add cost to every email that is sent Add cost to every email that is sent Ban unsolicited email completely Ban unsolicited email completely

12 12 Email & Spam M.A.P.S. (Mail Abuse Prevention System) M.A.P.S. (Mail Abuse Prevention System) RBL (Realtime Blackhole List) RBL (Realtime Blackhole List) Set of Guidelines (have to comply) Set of Guidelines (have to comply) Company must prove recipient is on their e-mail list Company must prove recipient is on their e-mail list They must provide subscribers with simple ways to terminate their subscription They must provide subscribers with simple ways to terminate their subscription Must remove invalid e-mail addresses in a timely manner Must remove invalid e-mail addresses in a timely manner Must take care not to overwhelm individual hosts or LANs Must take care not to overwhelm individual hosts or LANs Must disclose subscribers how their addresses will be used Must disclose subscribers how their addresses will be used

13 13 Email & Spam M.A.P.S. – Is It Ethical? M.A.P.S. – Is It Ethical? Social Contract Theory Evaluation – YES Social Contract Theory Evaluation – YES Kantian Evaluation -- NO Kantian Evaluation -- NO

14 14 The World Wide Web How do we use the web? How do we use the web? Shopping Shopping Business Business Information Information Explore our roots Explore our roots Games Games Virtual Worlds Virtual Worlds Taxes Taxes Gamble Gamble Blog Blog

15 15 The World Wide Web Internet access is limited in some countries Internet access is limited in some countries Saudi Arabia – no access to pornography, gambling sites, and pages that are deemed to be offensive to Islam Saudi Arabia – no access to pornography, gambling sites, and pages that are deemed to be offensive to Islam Germany – forbids access to any neo-Nazi Websites Germany – forbids access to any neo-Nazi Websites United States – FULL ACCESS United States – FULL ACCESS

16 16 The World Wide Web Types of Censorship Types of Censorship Direct Censorship Direct Censorship Government Monopolization Government Monopolization Prepublication Review Prepublication Review Licensing and Registration Licensing and Registration Self Censorship Self Censorship A group deciding for itself not to publish material A group deciding for itself not to publish material

17 17 The World Wide Web Problems the Internet poses for Censorship Problems the Internet poses for Censorship Many to many vs. 1 to many Many to many vs. 1 to many The internet is dynamic The internet is dynamic The internet is huge The internet is huge The internet is global The internet is global No age verification No age verification

18 18 The World Wide Web Freedom of Expression Freedom of Expression First Amendment to the U.S. Constitution First Amendment to the U.S. Constitution Freedom of Expression is not an absolute right Freedom of Expression is not an absolute right U.S. law prohibits advertising cigarettes on T.V. U.S. law prohibits advertising cigarettes on T.V. FCC vs. Pacifica Foundation et al FCC vs. Pacifica Foundation et al George Carlin’s “Filthy Words” George Carlin’s “Filthy Words”

19 19 Ethical Perspectives on Pornography According to Dictionary.com, According to Dictionary.com, “Pornography is sexually explicit pictures, writings, or other material whose primary purpose is to cause sexual arousal.”

20 20 Ethical Perspectives on Pornography Some Utilitarians conclude that pornography is wrong based on five harmful consequences it has on society: Some Utilitarians conclude that pornography is wrong based on five harmful consequences it has on society: 1.) Pornography reduces the dignity of human life. 1.) Pornography reduces the dignity of human life. 2.) Creates an environment where true victims of sexual abuse are less likely to be dealt with sympathetically by the justice system. 2.) Creates an environment where true victims of sexual abuse are less likely to be dealt with sympathetically by the justice system. 3.) People imitate crimes that they have seen portrayed in pornography. 3.) People imitate crimes that they have seen portrayed in pornography. 4.) Offends most people. 4.) Offends most people. 5.) Existence of the pornography industry diverts resources from activities that would have more redeeming social value. 5.) Existence of the pornography industry diverts resources from activities that would have more redeeming social value.

21 21 Ethical Perspectives on Pornography Some say adult pornography is moral Some say adult pornography is moral Some Utilitarians conclude it is moral for adults to view pornography Some Utilitarians conclude it is moral for adults to view pornography Three beneficial consequences of pornography: Three beneficial consequences of pornography: 1.) Make money 1.) Make money 2.) Physical pleasure 2.) Physical pleasure 3.) provides the costumer with harmless outlet for exploring sexual fantasies 3.) provides the costumer with harmless outlet for exploring sexual fantasies

22 22 Children and the Web Many parents want what's best for their children. Many parents want what's best for their children. Many parents believe they ought to protect their children from exposure to pornography and violent material on the web. Many parents believe they ought to protect their children from exposure to pornography and violent material on the web. Using Web Filters can help prevent certain web pages from being displayed in your browser. Using Web Filters can help prevent certain web pages from being displayed in your browser.

23 23 Internet Addiction According to Joseph Weizenbaum the reason why programmers are attracted to their machines is the feeling of freedom and power. According to Joseph Weizenbaum the reason why programmers are attracted to their machines is the feeling of freedom and power. Computer program whatever your heart desires. Computer program whatever your heart desires. The resulting thrill causes programmers to have a “compulsion to program.” The resulting thrill causes programmers to have a “compulsion to program.”

24 24 Q & A


Download ppt "1 Networking Sevak Asadorian & James Brunelle. 2 Topics Introduction Introduction Email & Spam (how to fight spam) Email & Spam (how to fight spam) The."

Similar presentations


Ads by Google