ISAT 615

advertisement
ISAT 615
Cyber Ethics
By
Drs. Alkadi & Acosta
ISAT 615
1
Cyber Ethics
 The majority of the slides were taken from
the book, “Cyber Ethics” by Halbert Ingulli,
which is referenced later.
 For more information, go to:
http://halbert.westbuslaw.com
ISAT 615
2
Intellectual Property & Cyberspace
 If seven million people are stealing, they aren’t stealing.
David Post, Prof. of law, Temple Univ.
 Today’s Internet pirates try to hide behind some contrived
New Age arguments of cyberspace, but all they are really
doing is trying to make a case for Age Old Thievery. When
they hack a DVD and then distribute it on the web, it is no
different that if someone puts a quarter in a newspaper
machine and then takes out all the papers, which of course
would be illegal and morally wrong.
Michael Eisner, Chairman & CEO, The Walt Disney Company
ISAT 615
3
Ethics Case: Napster
 Is it ethical to listen to as many times as you want a song that you
didn’t buy?
 You will probably send it to a dozen of your closest fiends and relatives.
 Napster operates on a (P2P) computing model. Users who have
downloaded the free S/W from its site can then access the directory of
available music and add tunes of their own. Napster’s server is an
intermediary, allowing one user to reach the files of another.
 In other words, you are able to broadcast your request to millions of
other music lovers in the Napster’s community.
 Does anyone else have this CD on their PC, are they online?
 What happened to Napster?
 http://archives.cnn.com/2001/LAW/02/20/napster.settlement.03/
ISAT 615
4
Intellectual Property Law
 Our legal system has developed ways of protecting intellectual
property.
 Congress passed copyrights, patent and trademark laws.
 What is protected is the expression of an idea, not the idea itself.
 This follows from the high value we place on freedom of speech and
expression.
 Copyright law protects the tangible expression of an idea from being
reproduced without the permission of the copyright holder.
 A copyrighted work of art must be original, and created independently
by the artist.
 The law curbs this right, making it last only for a set time period.
 It also permits reproduction of portions of copyrighted work for limited
work such as criticism or classroom instruction.
 Visit http://www.copyright.gov
ISAT 615
5
ISAT 615
6
Ten Commandments Of Computer Ethics
Created by the Computer Ethics Institute
 1.Thou Shalt Not Use A Computer To Harm Other People.
 2.Thou Shalt Not Interfere With Other People’s Computer
Work.
 3.Thou Shalt Not Snoop Around In Other People’s
Computer Files.
 4.Thou Shalt Not Use A Computer To Steal.
 5.Thou Shalt Not Use A Computer To Bear False Witness.
 6.Thou Shalt Not Copy Or Use Proprietary Software For
Which You have Not Paid.
 7.Thou Shalt Not Use Other People’s Computer Resources
Without Authorization Or Proper Compensation.
ISAT 615
7
Ten Commandments Of Computer Ethics
Continued
 8.Thou Shalt Not Appropriate Other People’s Intellectual
Output.
 9.Thou Shalt Think About The Social Consequences Of
The Program You Are Writing Or The System You Are
Designing.
 10.Thou Shalt Always Use A Computer In Ways That
Insure Consideration And Respect For Your Fellow
Humans.

http://www.brook.edu/its/cei/overview/Ten_Commanments_of_Computer_Ethics.htm
ISAT 615
8
ISAT 615
9
Workplace Surveillance
 90% of all companies with more than 1,000 employees
currently use e-mail.
 Sixty billion messages are sent annually.
 Employees are under the impression that their messages
are private.
 Old and deleted messages are archived and easily
accessible by the management.
 In the US there is no comprehensive, uniform legal
standard protecting privacy.
 http://www.PrivacyExchange.org
ISAT 615
10
ISAT 615
11
Interesting Quotes
 I find the information age to be a healthy thing…the more
you know about somebody else, the better off everybody
is.
Owner of personal database company
 There is the possibility of becoming an even more satisfied
society based on unequal access to information in which
individuals live in glass houses, while the external walls of
large corporations are one-way mirrors.
Gary T. Marx, Professor of Sociology, MIT
ISAT 615
12
Government Regulation Vs. Industry
Self-Policing
 In 1998, several major companies such as, IBM, HP, AOL
and MS formed the Online Privacy Alliance (OPA).
 The Website is: http://www.privacyalliance.com
 The AOL incident in 1998 stepped up the self-policing on
the part of businesses to protect themselves against
lawsuits.
 It has forced AOL to revise its privacy policy in 1999.
 MS and IBM announced that their companies would pull
their advertising from Websites that failed to post privacy
policies in sync with their own.
ISAT 615
13
ISAT 615
14
What Cyberspace Knows About You
 If you go to http://www.cdt.org you will learn how much
government and employers can discover about you.
 Go to http://www.aclu.org/privacy and you will find that a lot
of information about you could be available to anyone.
 Spy Technology has become increasingly sophisticated,
check out some of the sites that retail surveillance
technology:
http://www.intercept-spytech.com
http://eaglevision1.com
ISAT 615
15
ISAT 615
16
ISAT 615
17
ISAT 615
18
ISAT 615
19
Big Brother in Cyberspace
 The government is doing its part in educating Internet
users especially our most valuable asset, our kids.
 Go to:
http://www.cybercrime.gov/links1.htm
and select the following link:
Safety Tips for Kids on the Internet from the Federal
Bureau of Investigation
This is a hyperlink to the following:
http://www.fbi.gov/publications/pguide/pguidee.htm
ISAT 615
20
ISAT 615
21
ISAT 615
22
Medical Privacy
 In his book, The Limits of Privacy, Amitai Etzioni says “it’s
Big Bucks we need to worry about, not Big government.”
 Etzioni continues that in 1996, 35% of the Fortune 500
companies acknowledged that they draw on personal
health information in making employment decisions.
 These companies employ millions of people.
 Kathleen A. Frawley, VP of the American Health Info.
Mgmt. Assoc. says “There is a whole market of people buying and
selling medical information.”
 A.G. Breitenstein, Health Law Institute Director, said,
“People are not going to go to feel comfortable going to the doctor, b/c
now you are going to have a permanent record that will follow you
around for the rest of your life that says you have syphilis, or
depression, or an abortion or whatever else.”
ISAT 615
23
The Library Bills of Rights
I.
Books and other library resources should be provided for the interest,
information, and enlightenment of all people of the community the library
serves. Materials should not be excluded because of the origin, background,
or views of those contributing to their creation.
II. Libraries should provide materials and information presenting all points of
view on current and historical issues. Materials should not be proscribed or
removed because of partisan or doctrinal disapproval.
III. Libraries should challenge censorship in the fulfillment of their responsibility to
provide information and enlightenment.
IV. Libraries should cooperate with all persons and groups concerned with
resisting abridgment of free expression and free access to ideas.
V. A person’s right to use a library should not be denied or abridged because of
origin, age, background, or views.
VI. Libraries which make exhibit spaces and meeting rooms available to the
public they serve should make such facilities available on an equitable basis,
regardless of the beliefs or affiliations of individuals or groups requesting their
use.
ISAT 615
24
ISAT 615
25
Questions
 Should children be protected from offensive
online speech? Should adults?
 Who should do the protecting: Government?
Schools? Public Libraries? Parents?
ISAT 615
26
Internet Anonymity
 In 1997, in ACLU v. Reno the supreme court noted that the
Internet “provides relatively unlimited low-cost capacity for
communication of all kinds. This dynamic, multifaceted
category of communication includes not only traditional
print and news service, but also audio, video, and still
images, as well as interactive, real-time dialogue. Through
the use of chat rooms, any person with a phone line can
become a town crier with a voice that resonates farther
than it could from any soapbox. Through the use of Web
pages, mail exploders, and newsgroups, the same
individual can become pamphleteer.”
ISAT 615
27
Internet Anonymity Cont’d.
 The Supreme Court goes on to say, “Anonymity is
a shield from the tyranny of the majority. …It thus
exemplifies the purpose behind the Bill of Rights,
and of the First Amendment in particular: to protect
unpopular individuals from retaliation– and their
ideas from suppression– at the hand of an
intolerant society.”
 What do you think about the Supreme Court’s
stance?
ISAT 615
28
Democracy and the Internet
 I’m very optimistic about the role of human beings in the Information
Age, because this is an era where people – their knowledge, and their
ability to put that knowledge to work – will be more important than ever
before. … The Information Age is enabling people who were previoulsy
forced to pursue a single means of wealth creation –those, for
example, who lived in remote areas had no option but to work on the
land – to choose from a far wide range of work. Technology such as
the PC; the Internet and cheap telecommunications have brought
amazing mobility to the factors of production.”
Bill Gates, 1999
 What about non-democratic countries?
ISAT 615
29
Ethics and Professionalism

“Engineers shall hold paramount the safety, health and
welfare of the public in the performance of their
professional duties.”
Accreditation Board for Engineering and Technology (ABET)
http://www.abet.org/

1.
2.
3.
Websites for general resources on Engineering Ethics:
http://www.niee.org “National Institute for Engineering Ethics”
http://www.nspe.org “National Society of Professional Engineers”
http://www.onlineethics.org/ “The online Ethics Center for
Engineering and Science”
ISAT 615
30
References
 Ingulli, Halbert, Cyber Ethics, West Thomas
Learning, 2002
 Martin, Mike W., Schinzinger, Roland, Ethics
in Engineering, Fourth Edition, McGraw Hill,
2005
ISAT 615
31
Download