Chapter 1: Unwrapping the Gift • Rapid Pace of Change • New Developments and Dramatic Impacts • Issues and Themes • Ethics Rapid Pace of Change • 1940s: The first computer is built • 1956: First hard-disk drive weighed a ton and stored five megabytes • 1991: Space shuttle had a one-megahertz computer • 2006: Pocket devices hold a terabyte (one trillion bytes) of data • 2006: Automobiles can have 100-megahertz computers • What devices are now computerized that were not originally? Think back 10, 20, 50 years ago. In addition to automobiles you can prompt the class with the following: • TVs • Clocks and watches • Phones • Cash registers • Cameras • Ovens • Etc. New Developments Blogs (Word made up from ‘web log’): • Began as outlets for amateurs who want to express ideas or creativity • Appealing because present personal views, are funny and creative, and present a quirky perspective on current events • Now used as alternatives to mainstream news and for business public relations • Popular blogs have 100,000 to 500,000 readers per day and can peak at several million views per day Video Sharing: • Rise of amateur videos on the web • Boom of websites like Youtube and Myspace • Many videos on the web can infringe copyrights owned by entertainment companies Cell Phones: • Can now be used for travel, last minute planning, taking pictures and downloading music • Talking on cell phones while driving is a problem • Cell phones can interfere with privacy, quiet and concentration • Cameras in cell phones and privacy issues Some states have passed laws prohibiting use of hand-held devices. Recent studies show hands-free devices, while freeing up the hands, do not reduce distractions, particularly among young adult and teenage drivers who often text message while driving. Cameras in cell phones threaten privacy. Where is the line between capturing news events and evidence of crimes, and voyeurism? Social Networking: • First online social networking site was www.classmates.com in 1995 • Myspace, founded in 2003 had roughly 100 million member profiles by 2006 • Facebook was started at Harvard as an online version of student directories Sites like Second Life (www.secondlife.com) combine many of the features of social networking sites with the 3-D aspects of video games. What new problems/benefits arise when a person can take on a physical persona (an avatar) that may be completely different from who they are in real life? Some people with physical disabilities can interact with others without revealing their handicap. Collaboration: • Wikipedia, the online, collaborative encyclopedia • Open Directory Project (ODP) • Collaboration between scientists in different states or countries • Watch-dogs on the Web Wikipedia’s reliability was brought into question when a major contributor was found to be a 14 year-old boy instead of a scientist with a PhD and years of experience. He got most of his information from other Web sources. Web Watch-dog sites are controversial. A web site where a woman can publish the names and pictures of men who other women should watch out for has made the news recently. E-commerce and Free Stuff: • Free stuff on the web: email, books, newspapers, games, etc. • www.Amazon.com started in 1994 and 10 years later annual sales reached $8.5 billion • TV show episode are available to view on the Web Artificial Intelligence (AI), Robotics, and Motion: • AI suited to narrow, specialized skills • Robotic devices often special-purpose devices, and may require AI to function • Motion sensing devices are used to give robots the ability to walk, trigger airbags in a crash and cushion laptops when dropped Tools for Disabled People: • Restoration of abilities, productivity and independence • Screen readers and scanners • Speech recognition • Prosthetics and motion sensors What’s next? • Medical records on chips attached to medical bracelets • Biological and computer sciences will combine new ways to insert micro-processors or controlled devices on human bodies New Developments Discussion Question • What changes and new developments do you expect in the next 50 years? • How will life be different than it is today? Some ideas to add to the discussion: • Wearable computers • Enhanced intelligence (via instant communications and/or direct computer interface) Issues and Themes Issues: • Unemployment • Alienation and customer service • Crime • Loss of privacy • Errors Themes: • Old problems in a new context: crime, pornography, and violent • Adapting to new technology: thinking in a new way • Varied sources of solutions to problems: natural part of change and life • Global reach of net: ease of communication with distant countries • Trade-offs and controversy: increasing security means reducing convenience • Difference between personal choices, business policies, and law Ethics What is Ethics? • Study of what it means to “do the right thing” • Assumes people are rational and make free choices • Rules to follow in our interactions and our actions that affect others Ethical Views: • Deontological • Utilitarianism • Natural rights • No simple answers – Do organizations (businesses) have ethics? Important Distinctions: • Right, wrong and okay • Negative rights (liberties) – • The right to act without interference Positive rights (claim-rights) – An obligation of some people to provide certain things for others • Difference between wrong and harm • Personal preference and ethics • Law and Ethics Ethics Discussion Question • Can you think of examples of liberties (negative rights) and claim-rights (positive rights) that are at opposition to each other? This question is the foundation for many issues and controversies discussed in later chapters. One example you can introduce here is the right to freedom of speech versus the need to protect children from materials that are inappropriate for them. Have the class identify who the affected parties are. What are the negative and positive rights for the different parties? Note: the laws pertaining to this issue are discussed in chapter three. Chapter 2: Privacy • Privacy and Computer Technology • “Big Brother is Watching You” • Privacy Topics • Protecting Privacy • Communications Privacy and Computer Technology Key Aspects of Privacy: • Freedom from intrusion (being left alone) • Control of information about oneself • Freedom from surveillance (being tracked, followed, watched) New Technology, New Risks: • Government and private databases • Sophisticated tools for surveillance and data analysis • Vulnerability of data Terminology: • Invisible information gathering - collection of personal information about someone without the person’s knowledge • Secondary use - use of personal information for a purpose other than the one it was provided for • Data mining - searching and analyzing masses of data to find patterns and develop new information or knowledge • Computer matching - combining and comparing information from different databases (using social security number, for example, to match records) • Computer profiling - analyzing data in computer files to determine characteristics of people most likely to engage in certain behavior Principles for Data Collection and Use: • Informed consent • Opt-in and opt-out policies • Fair Information Principles (or Practices) • Data retention Privacy and Computer Technology Discussion Questions • Have you seen opt-in and opt-out choices? Where? How were they worded? • Were any of them deceptive? • What are some common elements of privacy policies you have read? If the class doesn't mention it, make sure to mention that online opt-in choices may be prechecked and require you un-checking the box to avoid opting in. Be sure to mention the "subject to change without notice" clause found in most privacy policies. "Big Brother is Watching You" Databases: • Government Accountability Office (GAO) - monitors government's privacy policies • Burden of proof and "fishing expeditions" • Data mining and computer matching to fight terrorism The Fourth Amendment, Expectation of Privacy and Surveillance Technologies: • Weakening the Fourth Amendment • Supreme Court decisions and expectation of privacy – • Modern surveillance techniques are redefining expectation of privacy The USA Patriot Act and national security letters – No court order or court oversight needed – 2003-2005 report found "widespread and serious misuse" of the FBIs national security letter authorities Video Surveillance: • Security cameras – Increased security – Decreased privacy "Big Brother is Watching You" Discussion Questions • What data does the government have about you? • Who has access to the data? • How is your data protected? Use the list in Fig. 2.2 (page 58) to start the conversation. Probe for what concerns the class may have about the data that is collected. Diverse Privacy Topics Marketing, Personalization and Consumer Dossiers: • • Targeted marketing – Data mining – Paying for consumer information – Data firms and consumer profiles Credit records Location Tracking: • Global Positioning Systems (GPS) -computer or communication services that know exactly where a person is at a particular time • Cell phones and other devices are used for location tracking Stolen and Lost Data: • Hackers • Physical theft (laptops, thumb-drives, etc.) • Requesting information under false pretenses • Bribery of employees who have access Except for hackers, these are not new to computer technology. Before computers, files were stolen, receipts were stolen, information was requested under false pretenses and employees were bribed. But, with computers, the extent and impact have grown. What We Do Ourselves: • Personal information in blogs and online profiles • Pictures of ourselves and our families • File sharing and storing • Is privacy old-fashioned? – Young people put less value on privacy than previous generations – May not understand the risks Public Records: Access vs. Privacy: • Public Records - records available to general public (bankruptcy, property, and arrest records, salaries of government employees, etc.) • Identity theft can arise when public records are accessed • How should we control access to sensitive public records? National ID System: • • • Social Security Numbers – Too widely used – Easy to falsify A new national ID system - Pros – would require the card – harder to forge – have to carry only one card A new national ID system - Cons – Threat to freedom and privacy – Increased potential for abuse Children: • The Internet – Not able to make decisions on when to provide information – • Vulnerable to online predators Parental monitoring – Software to monitor Web usage – Web cams to monitor children while parents are at work – GPS tracking via cell phones or RFID Diverse Privacy Topics Discussion Questions • Is there information that you have posted to the Web that you later removed? Why did you remove it? Were there consequences to posting the information? • Have you seen information that others have posted about themselves that you would not reveal about yourself? Protecting Privacy Technology and Markets: • Privacy enhancing-technologies for consumers • Encryption – • Public-key cryptography Business tools and policies for protecting data Rights and laws: • Theories – Warren and Brandeis – Thomson • Transactions • Ownership of personal data • Regulation – Health Insurance Portability and Accountability Act (HIPAA) Rights and laws: Contrasting Viewpoints: • • Free Market View – Freedom of consumers to make voluntary agreements – Diversity of individual tastes and values – Response of the market to consumer preferences – Usefulness of contracts – Flaws of regulatory solutions Consumer Protection View – Uses of personal information – Costly and disruptive results of errors in databases – Ease with which personal information leaks out – Consumers need protection from their own lack of knowledge, judgment, or interest Privacy Regulations in the European Union (EU): • Data Protection Directive – More strict than U.S. regulations – Abuses still occur – Puts requirements on businesses outside the EU Protecting Privacy Discussion Question • How would the free-market view and the consumer protection view differ on errors in Credit Bureau databases? • Who is the consumer in this situation? Communication Wiretapping and E-mail Protection: • Telephone – 1934 Communications Act prohibited interception of messages – 1968 Omnibus Crime Control and Safe Streets Act allowed wiretapping and electronic surveillance by law-enforcement (with court order) • E-mail and other new communications – Electronic Communications Privacy Act of 1986 (ECPA) extended the 1968 wiretapping laws to include electronic communications, restricts government access to e-mail The meaning of pen register has changed over time. It originally referred to a device that recorded the numbers called from a phone. Now it also refers to logs phone companies keep of all numbers called, including time and duration. Designing Communications Systems for Interception: • Communications Assistance for Law Enforcement Act of 1994 (CALEA) – Telecommunications equipment must be designed to ensure government can intercept telephone calls – Rules and requirements written by Federal Communications Commission (FCC) Secret Intelligence Gathering: • The National Security Agency (NSA) – • Foreign Intelligence Surveillance Act (FISA) established oversight rules for the NSA Secret access to communications records Encryption Policy: • Government ban on export of strong encryption software in the 1990s (removed in 2000) • Pretty Good Privacy (PGP) Communication Discussion Questions • What types of communication exist today that did not exist in 1968 when wiretapping was finally approved for law-enforcement agencies? • What type of electronic communications do you use on a regular basis? Chapter 3: Freedom of Speech • Changing Communication Paradigms • Controlling Offensive Speech • Censorship on the Global Net • Political Campaign Regulations in Cyberspace • Anonymity • Protecting Access and Innovation: Net Neutrality or De-regulation? Changing Communication Paradigms Regulating Communications Media: • First Amendment protection and government regulation – Print media (newspapers, magazines, books) – Broadcast (television, radio) – Common carries (telephones, postal system) Print: - Has strongest first amendment protection - Trend toward fewer government restraints on printed words Broadcast: - Government regulates structure of industry and content of programs - Government grants broadcast licenses - Federal Communication Commission (FCC) is the regulating body Common carriers: - Provide medium of communication and make service available to everyone Telecommunication Act of 1996: • Changed regulatory structure and removed artificial legal divisions of service areas and restrictions on services that telephone companies can provide • No provider or user of interactive computer service shall be treated as a publisher of any information provided by another information- content provider Free-speech Principles: • Written for offensive and/or controversial speech and ideas • Restriction on the power of government, not individuals or private businesses • Supreme Court principles and guidelines • Advocating illegal acts is legal • Does not protect libel and direct, specific threats • Inciting violence is illegal • Allows some restrictions on advertising • Protect anonymous speech Controlling Offensive Speech What is it? What is illegal? • Answer depends on who you are • Many efforts to censor the Internet with a focus on child pornography or sexually explicit material What was already illegal? • Obscenity – Depicts a sexual act against state law – Depicts these acts in a patently offensive manner that appeals to prurient interest as judged by a reasonable person using community standards – Lacks literary, artistic, social, political or scientific value Internet Censorship Laws & Alternatives: • • Communication Decency Act (CDA) – Federal judge stated that the Internet is the most participatory form of mass communication – Attempted to avoid conflict with first amendment by focusing on children – The Internet deserves the highest protection from government intrusion – Found to be unconstitutional: • The worst material threatening children was already illegal • It was too vague and broad • It did not use the least restrictive means of accomplishing the goal of protecting children Child Online Protection Act of 1998 (COPA): – Federal crime for commercial web sites to make available to minors harmful material by FCC standards – Found to be unconstitutional: • Government did not show that COPA was necessary to protect children • • • Child Online Protection Commission concluded that less restrictive means, filtering, was superior to COPA Children's Internet Protection Act of 2000 (CIPA): – Requires schools and libraries that participate in certain federal programs to install filtering software – Upheld in court: • Does not violate First Amendment since it does not require the use of filters, impose jail or fines • It sets a condition for receipt of certain federal funds Filters – Blocks sites with specific words, phrases or images – Parental control for sex and violence – Updated frequently but may still screen out too much or too little – Not possible to eliminate all errors – What should be blocked? Spam: • • • What’s the problem? – Loosely described as unsolicited bulk email – Mostly commercial advertisement – Angers people because content and the way it’s sent Free speech issues – Spam imposes a cost on others not protected by free speech – Spam filters do not violate free speech (free speech does not require anyone to listen) Anti-spam Laws – Controlling the Assault of Non-Solicited Pornography and Marketing Act (CANSPAM Act) – Targets commercial spam – Criticized for not banning all spam, legitimized commercial spam Controlling Offensive Speech Discussion Questions • Why is ‘least restrictive means’ important? • Do you consider the Internet an appropriate tool for young children? Why or why not? Censorship on the Global Net Global Impact of Censorship • Global nature of the Internet protects against censorship (banned in one country, move to another) • May impose more restrictive censorship (block everything in an attempt to block one thing) • Yahoo and French censorship – Yahoo, eBay and others make decisions to comply with foreign laws for business reasons Censorship in Other Nations: • Attempts to limit the flow of information on the Internet similar to earlier attempts to place limits on other communications media • Some countries own the Internet backbone within their countries, block at the border specific sites and content • Some countries ban all or certain types of access to the Internet Aiding Foreign Censors: • Companies who do business in countries that control Internet access must comply with the local laws • Google argued that some access is better than no access Censorship on the Global Net Discussion Questions • What impact does the global net have on free speech? • Does censorship in other countries have an impact on free speech in the U.S.? • How does free speech in ‘free countries’ impact more restrictive countries? Political Campaign Regulations in Cyberspace • Campaign Laws and the Internet: • Bipartisan Campaign Reform Act of 2002 (BCRA) – • Prohibits corporations, unions and other organizations from paying for ads that show a candidate's name or face close to an election (60 days for elections, 30 days for primaries or conventions) Federal Election Commission (FEC) administers election laws – Covers content placed on the Internet for a fee – Unpaid individuals may put political content on their Web site, send emails, blog, create or host a campaign-related Web site and provide links to campaign sites – Media exemption applies to traditional news media and those whose only presence is on the Web Anonymity Common Sense and the Internet: • Anonymity protected by the First Amendment • Services available to send anonymous email (Anonymizer.com) • Anonymizing services used by individuals, businesses, law enforcement agencies, and government intelligence services Is Anonymity Protected? • FEC exempted individuals and organizations that are not compensated from election laws that restrict anonymity • Supreme Court has overturned state laws that restrict anonymity • SLAPP, a Strategic Lawsuit Against Public Participation - lawsuits filed (generally libel) used to obtain the identities (via subpoena) of those expressing critical or dissenting opinions Against Anonymity: • • Fears – It hides crime or protects criminals – Glowing reviews (such as those posted on eBay or Amazon.com) may actually be from the author, publisher, seller, or their friends U.S. and European countries working on laws that require ISPs to maintain records of the true identity of each user and maintain records of online activity for potential use in criminal investigations Anonymity Discussion Questions • Where (if anywhere) is anonymity appropriate on the Internet? • What are some kinds of Web sites that should prohibit anonymity? • Where (if anywhere) should laws prohibit anonymity on the Internet? Protecting Access and Innovation Net Neutrality or De-regulation? • FCC eliminated line-sharing requirements (2003-2005) • Should companies be permitted to exclude or give special treatment to content transmitted based on the content itself or on the company that provides it? • Should companies be permitted to provide different levels of speed at different prices? • Net Neutrality • • Argue for equal treatment of all customers De-regulation • Flexibility and market incentives will benefit customers Discussion Questions • What are the pros and cons to anonymity on the Internet? • The First-Amendment was created to protect political and offensive speech. Anonymity is key to that protection. Should the free speech principles of the First Amendment apply to the Internet, even to speech outside the U.S.? Chapter 4: Intellectual Property • Intellectual Property and Changing Technology • Copyright Law and Significant Cases • Copying and Sharing • Search Engines and Online Libraries • Free-Speech Issues • Free Software • Issues for Software Developers Intellectual Property and Changing Technology What is Intellectual Property? • The intangible creative work, not its particular physical form • Value of intelligence and artistic work comes from creativity, ideas, research, skills, labor, non-material efforts and attributes the creator provides • Protected by copyright and patent law • Copyright holders have exclusive rights: • To make copies • To produce derivative works, such as translations into other languages or movies based on books • To distribute copies • To perform the work in public (e.g. music, plays) • To display the work in public (e.g. artwork, movies, computer games, video on a Web site) Challenges of New Technology: • Digital technology and the internet has made copyright infringement easier and cheaper • New compression technologies have made copying large files (e.g. graphics, video and audio files) feasible • New tools allow us to modify graphics, video and audio files to make derivative works • Scanners allow us to change the media of a copyrighted work, converting printed text, photos, and artwork to electronic form Intellectual Property and Changing Technology Discussion Questions • How is intellectual property like physical property? • How is intellectual property different than physical property? • Do you agree with the idea that someone can "own" intellectual property? Copyright Law and Significant Cases A bit of history: • 1790 first copyright law passed • 1909 Copyright Act of 1909 defined an unauthorized copy as a form that could be seen and read visually • 1976 and 1980 copyright law revised to include software and databases that exhibit "authorship" (original expression of ideas), included the "Fair Use Doctrine" • 1982 high-volume copying became a felony • 1992 making multiple copies for commercial advantage and private gain became a felony • 1997 No Electronic Theft Act made it a felony to willfully infringe copyright by reproducing or distributing one or more copies of copyrighted work with a total value of more than $1,000 within a six-month period • 1998 Digital Millennium Copyright Act (DMCA) prohibits making, distributing or using tools to circumvent technological copyright protection systems and included protection from some copyright lawsuits for Web sites where users post material • 2005 Congress made it a felony to record a movie in a movie theater Fair Use Doctrine: • Four factors considered – Purpose and nature of use – commercial (less likely) or non-profit purposes – Nature of the copyrighted work – Amount of significance or portion used – Effect of use on potential market or value of the copyright work (will it reduce sales of work?) • No single factor alone determines • Not all factors given equal weight, varies by circumstance Significant Cases: • Sony v. Universal City Studios (1984) • – Supreme Court decided that the makers of a device with legitimate uses should not be penalized because some people may use it to infringe on copyright – Supreme Court decided copying movies for later viewing was fair use – Arguments against fair use • People copied the entire work • Movies are creative, not factual Sony v. Universal City Studios (1984) (cont.) – Arguments for fair use • The copy was for private, noncommercial use and generally was not kept after viewing • The movie studios could not demonstrate that they suffered any harm • The studios had received a substantial fee for broadcasting movies on TV, and the fee depends on having a large audience who view for free • Reverse engineering: game machines • Sega Enterprises Ltd. v. Accolade Inc. (1992) • Atari Games v. Nintendo (1992) • Sony Computer Entertainment, Inc. v. Connectix Corporation (2000) • Courts ruled that reverse engineering does not violate copyright if the intention is to make new creative works (video games), not copy the original work (the game systems) • Sharing music: the Napster case • Was the sharing of music via Napster fair use? • Napster's arguments for fair use – The Sony decision allowed for entertainment use to be considered fair use – Did not hurt industry sales because users sampled the music on Napster and bought the CD if they liked it • Sharing music: the Napster case (cont.) • RIAA's (Recording Industry Association of America) arguments against fair use – "Personal" meant very limited use, not trading with thousands of strangers – Songs and music are creative works and users were copying whole songs – Claimed Napster severely hurt sales • Court ruled sharing music via copied MP3 files violated copyright • Sharing music: the Napster case (cont.) • Was Napster responsible for the actions of its users? • Napster's arguments – It was the same as a search engine, which is protected under the DMCA – They did not store any of the MP3 files – Their technology had substantial legitimate uses • Sharing music: the Napster case (cont.) • RIAA's arguments – Companies are required to make an effort to prevent copyright violations and Napster did not take sufficient steps – Napster was not a device or new technology and the RIAA was not seeking to ban the technology • Court ruled Napster liable because they had the right and ability to supervise the system, including copyright infringing activities • File sharing: MGM v. Grokster • Grokster, Gnutella, Morpheus, Kazaa, and others provided peer-to-peer (P2P) file sharing services – The companies did not provide a central service or lists of songs – P2P file transfer programs have legitimate uses • Lower Courts ruled that P2P does have legitimate uses • Supreme Court ruled that intellectual property owners could sue the companies for encouraging copyright infringement Copyright Law and Significant Cases Discussion Question • What do you think the impact would be on creative industries, such as music, movies and fiction novels, if copyright laws did not protect their intellectual property? Copying and Sharing Responses from the Content Industries: • • Ideas from the software industries – Expiration dates within the software – Dongles (a device that must be plugged into a computer port) – Copy protection that prevents copying – Activation or registration codes – Obtained court orders to shut down Internet bulletin boards and Web sites Banning, suing and taxing – Ban or delay technology via lawsuits • CD-recording devices • Digital Audio Tapes (DAT) • DVD players • Portable MP3 players – Require that new technology include copyright protections – Tax digital media to compensate the industry for expected losses Digital Rights Management: • Collection of techniques that control uses of intellectual property in digital formats • Includes hardware and software schemes using encryption • The producer of a file has flexibility to specify what a user may do with it • Apple, Microsoft and Sony all use different schemes of DRM “Digital rights management” The DMCA “Digital Millennium Copyright Act” vs. Fair Use, Freedom of Speech, and Innovation: • Lawsuits have been filed to ban new technologies • U.S. courts have banned technologies such as DeCSS even though it has legitimate uses, while courts in other countries have not. • Protesters published the code as part of creative works (in haiku, songs, short movies, a computer game and art) • U.S. courts eventually allowed publishing of DeCSS, but prohibited manufacturers of DVD players from including it in their products Video Sharing: Conflict and Solutions: • Industry issues "take down" notices per the DMCA “Digital Millennium Copyright Act” • As long as sites like YouTube and MySpace comply with take down notices they are not in violation • Take down notices may violate fair use, some have been issued against small portions of video being used for educational purposes New Business Models and Constructive Solutions: • Organizations set up to collect and distribute royalty fees (e.g. the Copyright Clearance Center), users don't have to search out individual copyright holders • Sites such as iTunes and the new Napster provide legal means for obtaining inexpensive music and generate revenue for the industry and artists • Revenue sharing allows content-sharing sites to allow the posting of content and share their ad revenues with content owners in compensation • The industry imbeds advertising in files that it then posts to the P2P sites, the advertiser gets its message out and the industry gets its fees • Fan fiction is generally not seen as a threat, the writers are also the customers for the original works Ethical Arguments about Copying: • Unlike physical property, copying or distributing a song, video, or computer program does not decrease the use or enjoyment by another person • Copying can decrease the economic value of creative work produced for sale • The fair use guidelines are useful ethical guidelines • There are many arguments for and against unauthorized copying International Piracy: • Some countries do not recognize or protect intellectual property • Countries that have high piracy rates often do not have a significant software industry • Many countries that have a high amount of piracy are exporting the pirated copies to countries with strict copyright laws • Economic sanctions often penalize legitimate businesses, not those they seek to target Copying and Sharing Discussion Question • Some have argued that copyright lawsuits have been used to stifle innovation, do you agree? Why or why not? Search Engines and Online Libraries Search Engines • Caching and displaying small excerpts is fair use • Creating and displaying thumbnail images is fair use • Court ordered Google to remove links to pages that infringe copyright; Google is appealing Books Online • Project Guttenberg digitizes books in the public domain • Microsoft scanned millions of public domain books in University of California's library • Google has scanned millions of books that are in the public domain and that are not; they display only excerpts from those still copyrighted Some court rulings favor search engines and information access; some favor content producers Free-Speech Issues Domain Names: • Domain names may be used to criticize or protest (e.g. XYZIsJunk.org) • Companies sue under trademark violation, but most cases dismissed • Some companies buy numerous domain names containing their name so others cannot use them Posting Documents for Criticism: • Documents that are copyrighted and trade secrets have been posted as a form of criticism • Organizations have sued to have the documents removed from the Web • In some cases courts have ruled that it is a copyright violation and the documents must be removed • In one judgment against the Church of Scientology, the court ruled that the church’s primary motivation was "to stifle criticism of Scientology in general and to harass its critics" Free Software • Free software - idea, an ethic, advocated and supported by large, loose-knit group of computer programmers who allow people to copy, use, and modify their software • Free means freedom of use, not necessarily lack of cost • Open source - software distributed or made public in source code (readable and modifiable) • Proprietary software - (commercial) sold in object code (obscure, not modifiable) (E.g.: Microsoft Office) Should All Software Be Free? • Would there be sufficient incentives to produce the huge quantity of consumer software available now? • Would the current funding methods for free software be sufficient to support all software development? • Should software be covered under copyright law? • Concepts such as copyleft and the GNU Public License provide alternatives to proprietary software within today's current legal framework Issues for Software Developers Patents for Software? • Patents protect inventions of new things or processes • The Supreme Court said that software could not be patented; however a machine that included software could • Patents are not supposed to be given for things that are obvious or are already in common use • The Patent Office has made mistakes Patents on Web Technologies: • Amazon agreed to pay IBM who holds patents for online catalogs and targeted advertising • Microsoft was fined $1.5 billion for violating MP3 patents. The decision was voided; the case continues. • Friendster applied for a patent on its social-networking Web techniques. While the patent was pending, sites such as MySpace sprang up. Friendster's patent was granted and it may now charge licensing fees to businesses using the technology. Chapter 5: Crime • Hacking • Identity Theft and Credit Card Fraud • Scams and Forgery • Crime Fighting Versus Privacy and Civil Liberties Hacking • Hacking – currently defined as to gain illegal or unauthorized access to a file, computer, or network • The term has changed over time • Phase 1: early 1960s to 1970s • • – It was a positive term – A "hacker" was a creative programmer who wrote elegant or clever code – A "hack" was an especially clever piece of code Phase 2: 1970s to mid-1990s – Hacking took on negative connotations – Breaking into computers for which the hacker does not have authorized access – Still primarily individuals – Includes the spreading of computer worms and viruses and ‘phone phreaking’ – Companies began using hackers to analyze and improve security Phase 3: beginning with the mid 1990s – The growth of the Web changed hacking; viruses and worms could be spread rapidly – Political hacking (Hacktivism) surfaced – Denial-of-service (DoS) attacks used to shut down Web sites – Large scale theft of personal and financial information Hacktivism, or Political Hacking: • Use of hacking to promote a political cause • Disagreement about whether it is a form of civil disobedience and how (whether) it should be punished • Some use the appearance of hacktivism to hide other criminal activities • How do you determine whether something is hacktivism or simple vandalism? The Law: Catching and Punishing Hackers: • • • • • 1986 Congress passed the Computer Fraud and Abuse Act (CFAA) – Covers government computers, financial and medical systems, and activities that involve computers in more than one state, including computers connected to the Internet – The USA Patriot Act expanded the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems A variety of methods for catching hackers – Law enforcement agents read hacker newsletters and participate in chat rooms undercover – They can often track a handle by looking through newsgroup archives – Security professionals set up ‘honey pots’ which are Web sites that attract hackers, to record and study – Computer forensics is used to retrieve evidence from computers Penalties for young hackers – Many young hackers have matured and gone on to productive and responsible careers – Temptation to over or under punish – Sentencing depends on intent and damage done – Most young hackers receive probation, community service, and/or fines – Not until 2000 did a young hacker receive time in juvenile detention Security – Internet started with open access as a means of sharing information for research – Attitudes about security were slow to catch up with the risks – Firewalls are used to monitor and filter out communication from untrusted sites or that fit a profile of suspicious activity – Security is often playing catch-up to hackers as new vulnerabilities are discovered and exploited Responsibility for Security – Developers have a responsibility to develop with security as a goal – Businesses have a responsibility to use security tools and monitor their systems to prevent attacks from succeeding – Home users have a responsibility to ask questions and educate themselves on the tools to maintain security (personal firewalls, anti-virus and anti-spyware) Hacking Discussion Questions • Is hacking that does no direct damage or theft a victimless crime? • Do you think hiring former hackers to enhance security is a good idea or a bad idea? Why? Identity Theft and Credit Card Fraud Stealing Identities: • • • Identity Theft –various crimes in which a criminal or large group uses the identity of an unknowing, innocent person – Use credit/debit card numbers, personal information, and social security numbers – 18-29 year-olds are the most common victims because they use the web most and are unaware of risks – E-commerce has made it easier to steal card numbers and use without having the physical card Techniques used to steal personal and financial information – Phishing - e-mail fishing for personal and financial information disguised as legitimate business e-mail – Pharming - false Web sites that fish for personal and financial information by planting false URLs in Domain Name Servers – Online resumes and job hunting sites may reveal SSNs, work history, birth dates and other information that can be used in identity theft Techniques used to protect personal and financial information – Activation for new credit cards – Retailers do not print the full card number and expiration date on receipts – Software detects unusual spending activities and will prompt retailers to ask for identifying information – Services, like PayPal, act as third party allowing a customer to make a purchase without revealing their credit card information to a stranger Responses to Identity Theft: • Authentication of e-mail and Web sites • Use of encryption to securely store data, so it is useless if stolen • Authenticating customers to prevent use of stolen numbers, may trade convenience for security • In the event information is stolen, a fraud alert can flag your credit report; some businesses will cover the cost of a credit report if your information has been stolen Biometrics: • Biological characteristics unique to an individual • No external item (card, keys, etc.) to be stolen • Used in areas where security needs to be high, such as identifying airport personnel • Biometrics can be fooled, but more difficult to do so, especially as more sophisticated systems are developed Identity Theft and Credit Card Fraud Discussion Questions • What steps can you take to protect yourself from identity theft and credit card fraud? • How can you distinguish between an e-mail that is a phishing attempt and an e-mail from a legitimate business? Scams and Forgery Auctions: • • FTC reports that online auction sites are one of the top sources of fraud complaints – Some sellers do not send items or send inferior products – Shill bidding is used to artificially raise prices – Sellers give themselves or friends glowing reviews to garner consumer trust Auction sites use various techniques to counter dishonest sellers Forgery: • Click fraud - repeated clicking on an ad to either increase a site’s revenue or to use up a competitor's advertising budget • Stock fraud - most common method is to buy a stock low, send out e-mails urging others to buy, and then sell when the price goes up, usually only for a short time • Digital Forgery - new technologies (scanners and high quality printers) are used to create fake checks, passports, visas, birth certificates, etc., with little skill and investment Crime Fighting Versus Privacy and Civil Liberties Search and Seizure of Computers: • Requires a warrant to search and seize a computer – • Court rulings inconclusive about whether information found on computers, but not covered by a warrant, is considered in ‘plain view’ Automated searches – Can monitor constantly and less likely to miss suspicious activity – Can be programmed to only look for what is covered in a warrant The Issue of Venue: • Charges are generally filed where the crime occurs • Laws differ between states and countries • Where charges are filed may have significant impact if community standards apply • The FBI usually files in the state where the crime was discovered and the investigation began Cybercrime Treaty: • International agreement to foster international cooperation among law enforcement agencies of different countries in fighting copyright violations, pornography, fraud, hacking and other online fraud • Treaty sets common standards or ways to resolve international cases Chapter 7: Evaluating and Controlling Technology • Information, Knowledge, and Judgment • Computers and Community • The ‘Digital Divide’ • Evaluations of the Impact of Computer Technology • Making Decisions About Technology Information, Knowledge, and Judgment Evaluating Information on the Web: • • • • • • Expert information or ‘wisdom of the crowd’ – Dense amount of information on the web, much of this information is not correct – Search engines are replacing librarians, but Web sites are ranked by popularity, not by expert evaluation – Wisdom of the crowd - ratings by public of website – If millions participate, the results will be useful Wikipedia: – Written by volunteers, some posts are biased and not accurate – Although anyone can write, most people do not – Those that do typically are educated and experts Wisdom of the crowd – Problems of unreliable information are not new – The Web magnifies the problems – Rating systems are easy to manipulate Weak viewers – Less educated individuals – Children Responsibilities of site operators – Should identify user-supplied content – Make clear which information has been verified Manipulation of images: – Movies and videos use special effects to add creativity and enjoyment of entertainment – People can use technology for deception and fraud – Ease with which we can modify digital images and video • Should news agencies modify images and videos? • Faking photos is not a new phenomenon; more people can do it now because it’s easy Writing, Thinking and Deciding: • New tools have displaced skills that were once important • Abdicating responsibility – People willing to let computers do their thinking – Reliance on computer systems over human judgment may become institutionalized – Fear of having to defend your own judgment if something goes wrong Computer Models: • • Evaluating Models – How well do the modelers understand the underlying science or theory? – Models necessarily involve assumptions and simplifications of reality – How closely do the results or predictions correspond with the results from physical experiments or real experience? Why models may not be accurate – We might not have complete knowledge of the system we are modeling – The data describing current conditions or characteristics may be incomplete of inaccurate – Computing power may be inadequate for the complexity of the model – It is difficult, if not impossible, to numerically quantify variables that represent human values and choices Information, Knowledge, and Judgment Discussion Questions • How do you evaluate the reliability of information you find on the Web? How do your evaluation methods compare to the way you evaluate information from other sources? • Some computer models are better than others. What types of models work well? What types don't? Why? Computers and Community • It is human nature to form associations based on common interests • Some feared early technologies, such as telephones, thinking communication would be de-humanized • Computers and the Internet were blamed for the decline in community involvement and memberships in clubs and organizations • The Internet provides communities focused on specialized interests or problems • The Internet brings people together from all over the world • E-mail and the Internet provide convenient and cheap ways for families and friends to stay in contact • New trends include social-networking sites such as MySpace and virtual environments such as Second Life Computers and Community Discussion Questions • How convincing is the argument that electronic commerce threatens small (“brick and mortar”) community businesses and thus the health of small communities? • Do you think that communicating by text messaging and via social-networking sites depersonalizes or dehumanizes your relationships with friends? The "Digital Divide" Trends in Computer Access: • New technologies only available to the wealthy • The time it takes for new technology to make its way into common use is decreasing • Cost is not the only factor; ease of use plays a role • Businesses provide low cost options for people who cannot otherwise afford something • Government funds technology in schools • As technology becomes more prevalent, the issues shift from the haves and have-nots to level of service The Global Divide and the Next Billion Users: • Approximately one billion people worldwide have access to the Web; approximately five billion do not • Non-profit organizations and huge computer companies are spreading computer access to people in developing countries • Bringing new technology to poor countries is not just a matter of money to buy equipment; PCs and laptops must work in extreme environments • Some people actively working to shrink the digital divide emphasize the need to provide access in ways appropriate to the local culture Evaluations of the Impact of Computer Technology The Neo-Luddite View of Computers, Technology, and Human Needs: • Computers cause massive unemployment • No real need (We use technologies because they are there, not because they satisfy real needs) • Computers cause social inequity • Benefit big business and the government most • Do little or nothing to solve real problems • Computers separate humans from nature and destroy the environment Accomplishments of Technology: • Prices of food are down and raw materials are rich • Real buying power is up • Dramatic impact on life expectancy • Assistive technologies benefit those with disabilities The Difficulty of Prediction: • Each new technology finds new and unexpected uses • The history of technology is full of wildly wrong predictions • Weizenbaum argued against developing speech recognition technology – Mistaken expectations of costs and benefits – Should we decline a technology because of potential abuse and ignore the benefits? – New technologies are often expensive, but costs drop as the technology advances and the demand increases Intelligent Machines and Super-intelligent Humans - Or the End of the Human Race? • Technological Distinctiveness - point at which artificial intelligence or some combined human-machine intelligence advances so far that we cannot comprehend what lies on the other side • We cannot prepare for aftermath, but prepare for more gradual developments • Select a decision making process most likely to produce what people want Making Decisions about Technology Discussion Questions • If you could decide what technologies should be developed, what would you develop? Why? • Does the prospect of super-intelligent robots scare you? Chapter 9: Professional Ethics and Responsibilities • What is Professional Ethics? • Ethical Guidelines for Computer Professionals • Scenarios What is "Professional Ethics"? • Professional ethics includes relationships with and responsibilities toward customers, clients, coworkers, employees, employers, others who use one’s products and services, and others whom they affect • A professional has a responsibility to act ethically. Many professions have a code of ethics that professionals are expected to abide by – Medical doctors – Lawyers and judges – Accountants • There are special aspects to making ethical decisions in a professional context • Honesty is one of the most fundamental ethical values; however, many ethical problems are more subtle than the choice of being honest or dishonest • Some ethical issues are controversial Ethical Guidelines for Computer Professionals Guidelines and Professional Responsibilities: • Understand what success means • Include users (such as medical staff, technicians, pilots, office workers) in the design and testing stages to provide safe and useful systems • Do a thorough, careful job when planning and scheduling a project and when writing bids or contracts • Design for real users • Don’t assume existing software is safe or correct; review and test it • Be open and honest about capabilities, safety, and limitations of software • Require a convincing case for safety • Pay attention to defaults • Develop communication skills Scenarios Methodology: • • Brainstorming phase: – List all the people and organizations affected (the stakeholders) – List risks, issues, problems, and consequences – List benefits. Identify who gets each benefit – In cases where there is no simple yes or no decision, but rather one has to choose some action, list possible actions Analysis phase – Identify responsibilities of the decision maker – Identify rights of stakeholders – Consider the impact of the options on the stakeholders (consequences, risks, benefits, harms, costs) – Categorize each potential action as ethically obligatory, prohibited, or acceptable – When there are multiple options, select one, considering the ethical merits of each, courtesy to others, practicality, self-interest, personal preferences, etc. Scenario 1: Your company is developing a free e-mail service that will include targeted advertising based on the content of the e-mail messages (similar to Google’s Gmail). You are part of the team designing the system. What are your ethical responsibilities? Scenario 2: You are a relatively junior programmer working on modules that collect data from loan application forms and convert them to formats required by the parts of the program that evaluate the applications. You find that some demographic data are missing from some forms, particularly race and age. What should your program do? What should you do? Scenario 3: Your company has 25 licenses for a computer program, but you discover that it has been copied onto 80 computers. Scenario 4: Suppose you are a member of a team working on a computer-controlled crash avoidance system for automobiles. You think the system has a flaw that could endanger people. The project manager does not seem concerned and expects to announce completion of the project soon. Do you have an ethical obligation to do something? Scenario 5: You work for the IRS, the Social Security Administration, a movie-rental company, or an Internet service provider. Someone asks you to get a copy of records about a particular person. He will pay you $500. Scenario 6: You have a small consulting business. The CyberStuff Company plans to buy software to run a new collaborative content-sharing Web site. CyberStuff wants to hire you to evaluate bids from vendors. Your spouse works for NetWorkx and did most of the work in writing the bid that NetWorkx plans to submit. You read the bid while your spouse was working on it and you think it is excellent. Do you tell CyberStuff about your spouse’s connection with NetWorkx? Scenario 7: A team of programmers is developing a communications system for firefighters to use when fighting a fire. Firefighters will be able to communicate with each other, with supervisors near the scene, and with other emergency personnel. The programmers will test the system in a field near the company office. Scenario 8: You are the computer system administrator for a mid-sized company. You can monitor the company network from home, and you frequently work from home. Your niece, a college student, is visiting for a week. She asks to use your computer to check her e-mail. Sure, you say. You are being a gracious host. What is the ethical problem?