Ethics and Policy Issues in Computing Spring 2008 1

advertisement
Ethics and Policy Issues in Computing
Spring 2008
Introduction - January 15, 17
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
1
Anyone know the Drunken Pirate?
 A 25 year old
woman had this
picture and title on
her MySpace page
 She was
subsequently
denied her nursing
degree
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
2
What is this Course About?
a.k.a. What we hope you’ll go away with

•
•
•
•
•
•
•
Computers aren’t perfect
They can create new problems
They highlight and exacerbate old problems
They could lead to new solutions to societal issues
There are Legal, Policy, and Moral issues
Often are linked to Non-computing issues and
precedents
Global in scope

•
Linkages between topics and underlying issues,

•
Limits what we can do legally
E.g., economics and net neutrality; open vs. closed systems
and the iPod
Multidisciplinary and Interdisciplinary
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
3
Challenges can be very serious
 13 year old girl committed suicide after the
supposed 16 year old boy she met on MySpace
turned out wasn’t
 It was actually the mother of another girl, whose
child had been slighted
 Was this fraud?
 Was she culpable?
 Reaction: Laws proposed mandating honesty in
online information
 Subtle Q: Should the punishment have been
different if the girl hadn’t died?
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
4
What you can do
Think ahead (technology is evolving)
Think differently
(no, this is not an ad for Apple);
• SOLUTIONS - design
• At least don’t come up with really stupid
solutions
 Won’t work
 Won’t scale
 Hard to implement
 Unfair
 Create new (and often worse) problems
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
5
Research
 No Exams
 “Re-search”
• Plagiarism vs. bad citations
• Good citations help you
• Good sources are important
 Final Paper - Something that interests you
 How to do research
 Push you to be explicit, transparent, consistent,
and articulate.
 Tools, methodologies, frameworks
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
6
Neat stuff!
Computing technology can be really cool!
(DEMO – XO/OLPC)
(Might also call this Information and
Communications Technology, or ICT)
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
7
Logistics
 Waitlist
 Discussions
 Participation
 Quizzes
 HW
 Debates
• Not just adversarial
 Project
 Links to materials; IP addresses
 Readings on Quinn (apologies if don’t know it COLD)
 4th iteration; broad topics, I am an “expert” in only some of these
 Blackboard (?)
• Vote
 Webpage
 Mailings
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
8
Course topics
Syllabus (slight changes possible)
• Website will be the best location
• Find it through my own COS homepage
• (May use blackboard (??))
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
9
Syllabus
Tu
January
February
March
April
Apr/May
15
22
29
5
12
19
26
4
11
18
25
1
8
15
22
29
6
Introduction
Ethics-1
Free Speech online - 1
Spam, Phishing, Spyware
Online privacy
RFIDs and Privacy
DRM, HDTV, and more
Video - Willful Infringement
SPRING BREAK
Broadband
Collaboration/Open Source
Economics
ICTD
e-Voting
Energy and Lifecycle issues
Poster Session
Who
Tongia
Tongia
Tongia
Tongia
Cranor
Tongia
Wagstrom
Tongia
Tongia
Herbslab
Tongia
Tongia
Tongia
Tongia
17
24
31
7
14
21
28
6
13
20
27
3
10
17
24
1
9
Th
What is ICT/Computing
Ethics-2
Free Speech online - 2
Defining Privacy
Privacy Tools
Wiretaps, surveilance, and encryption
Intellectual Property
Access, Connectivity
Who
Tongia
Tongia
Tongia
Tongia
Cranor
Tongia
Madison
Digital Divide
Design of the Net / History
ICT, productivity, Cost Benefit Analysis
e-Governance
Tongia
Tongia
Tongia
Tongia
Environmental Issues
Last Class; Wrap-up discussion
final papers due
Tongia
Tongia
NOTE DATE
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
10
Plagiarism
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
11
Cheating will not be tolerated
You must do your own homework
It is acceptable to discuss the reading
assignments and general approaches to
solving homework problems with your
classmates
It is not acceptable to discuss detailed
homework answers or to copy homework
answers from other students
Hopefully you already knew this….
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
12
Research and Communication Skills
CMU Policy on Cheating and Plagiarism
CMU Policy*:
Plagiarism includes, but is not limited to, failure
to indicate the source with quotation marks or
footnotes where appropriate if any of the
following are reproduced in the work submitted
by a student:
1.
2.
3.
4.
5.
A phrase, written or musical.
A graphic element.
A proof.
Specific language.
An idea derived from the work, published or
unpublished, of another person.
*http://www.cmu.edu/policies/documents/Cheating.html
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
13
Research and Communication Skills
This is serious
 Consequences of plagiarism in this class range
from zero credit for entire assignment to failing
the course to recommendation of university
disciplinary action
 Publishers and professional societies have
plagiarism policies too
 The Internet makes it easy to plagiarize
• Students are frequently cutting and pasting off the
Internet without proper quotation and/or citations
• Students are buying papers off the Internet
 The Internet also makes it easy to catch
plagiarizing
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
14
Research and Communication Skills
Avoiding plagiarism
 If you use someone’s specific words, put them in
quotes and cite the source
 If you use someone’s ideas expressed in your
own words, cite the source
 If you paraphrase, summarize in your own words,
but still cite source
• Don’t use same sentence structure with a few word
substitutions
• If you use some of the source’s words, put them in
quotes
 When in doubt, put it in quotes and cite the
source!
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
15
Research and Communication Skills
Misuse of sources
 Quinn (Appendix A) distinguishes between deliberate and
non-deliberate attempts “to conceal the source of the
words or ideas”
• Deliberate = plagiarism
• Non-deliberate = misuse of sources
 If you are accused of plagiarism, it may be difficult to
convince people that what you did wasn’t deliberate
• In this class we are warning you about plagiarism and misuse of
sources and will therefore assume that if we see something that
looks like plagiarism, it is deliberate
 So… be careful not to misuse sources
• It is not sufficient to simply cite a source when you copy material
verbatim - you must put the words in quotes!
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
16
Research and Communication Skills
Good resource on avoiding plagiarism
http://www.wisc.edu/writing/Handbook/QPA
_plagiarism.html
Includes nice examples of good and bad
paraphrasing
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
17
Take the Test
http://education.indiana.edu/%7Efrick/plagi
arism/
This is your first Quiz
• Few minutes long
• Only one you can redo (if required)
Finish before Jan 22
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
18
Introductions
My Own background
•
•
•
•
•
ICTD – ICT and Development
Digital Divide
Infrastructure
EPP/EE (geek but can’t code)
Biases
 You’ll see them here and there but these should be
separate from scholarly (neutral) analysis
– Solution is often transparency (assumptions, funding
sources, etc.)
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
19
Discussion / Q&A
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
20
What is ICT?
 “Information and Communications Technology”
• Largely a non-US term
• IT and Telecom = US parlance
 Can be as broad or as narrow as one defines
• What are the departments within SCS?
 How important is ICT?
• GDP – non-trivial but modest share
 Measurements are difficult
• Major component of economic growth (productivity)
 Measurements are even more difficult
• Is information a source of competitive advantage?
 “Knowledge Economy”
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
21
Components of ICT: 4Cs
 Computers
• All devices part of a computing system
• More than PCs
 Connectivity
• More than just the Internet
 Content
• Inputs and/or outputs;
• Software and embedded software
 (human) Capacity
• Ability to use ICTs
• Includes literacy, e-Literacy, etc.
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
22
Which is a Computer?
Husqvarna Viking Sewing Machine
Aprilaire Thermostat
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
23
What is a Computer?
Many definitions…
E.g.,
Any device that applies a set of rules to
systematically and consistently perform
calculations or operations (“algorithms”) on any
chosen set of data or information to produce
an output or lead to a defined state
Many devices are computers, e.g.,
calculators, cell phones, etc.
• Is a remote car opener a computer?
Computers per se are not very intelligent
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
24
Computers are EVERYWHERE
Don’t need to be digital…
Don’t need external software…
Can be part of a larger device that is
ostensibly not about the computing
• Cars – more value to the computing
components than the steel
Are humans computers?
• We have aspects of computers in us
 Adding up number of students in this class
 Cellular automata and genetic material?
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
25
Why do we Care About the Definition?
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
26
Why do we Care About the Definition?
We might end up with a controversy like the
Uniform Computer Information
Transactions Act
• Attempted to standardize Computer
Information transactions like the Uniform
Consumer Code for goods (Article 2)
 UCC has high consumer protections
 So, if a washing machine breaks down could a
UCITA-like law apply?
– Isn’t a washing machine with a microprocessor like a
computer?
• Other controversies had to do with shrink-wrap
licensing, public comment limitations, etc.
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
27
Research and Communication Skills
Selecting a research topic
 Brainstorm
•
•
•
•
What are you interested in?
What would you like to learn more about?
What topics might be relevant to your thesis?
What topics might be relevant to your future career?
 Select a small number of candidate topics
 Read
•
•
•
•
•
How much information seems to be available?
Is this topic over done?
What open questions or points of conflict are there?
Do you still find this topic interesting?
Do you have the skills necessary to pursue this topic?
 Focus
•
•
Select a topic
Define a focused research question
 Read some more
•
•
Feel free to
discuss with
professors
or course
assistant
Conduct a “literature review”
Adjust your topic as needed
Paper topic due March 4
Outline and bibliography due April 1
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
28
Current Issue:
Analysis of Security Vulnerabilities in
the Movie Production and Distribution
Process
Lorrie Cranor
Joint work with
Simon Byers, Dave Korman, Patrick McDaniel, Eric Cronin
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
29
Unauthorized copying of movies
 Estimated annual global revenue
losses due to unauthorized copying of
movies (2005)
• For US majors
 Via physical media: $3.8 billion
 Via Internet: $2.3 billion
• Global supply chain losses (incl. theaters,
rental, etc.) estimated at $18.2 billion!
 Arguably, these estimates are high
• Why?
 Even so, a lot of money at stake and
problem is growing
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
30
Focus of MPAA’s public discussion
Shutting down mass
production and
distribution of pirated
movies
• Relatively easy, non-controversial
Schemes to prevent consumer copying
• Broadcast flag
• Digital rights management
• Trusted computing
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
31
Concerns about DRM proposals
May restrict reasonable uses, including
uses falling under “fair use”
May chill innovation
Some industry proposals would restrict
functionality of general purpose computers
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
32
Broadcast flag
November 2003 FCC ruling would have
made it illegal as of July 2005 to
manufacture or sell devices that receive
over-the-air digital TV broadcasts unless
they contain certain copy protection
technologies
Many consumer and industry groups
raised concerns
Court of Appeals ruled that FCC did not
have the right to regulate this
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
33
New security measures
In spring and summer of 2003, movie
industry began acknowledging publicly
need for stronger security measures
• Industry insiders publicly critical of security
practices
• Security measures at pre-release screenings
 Security guards with night vision goggles
 Metal detectors
 No cell phones
• No pre-release screenings for some movies
• Compressed release time frames for some
movies
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
34
That didn’t prevent The Hulk from
showing up on the Internet two weeks
before its theater release date
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
35
Maybe helped find source of leak
Copy on Internet had obliterated water
mark
• Not clear whether this was actually used to find
source of leak
Arrest was made within 3 weeks of leak
• Kerry Gonzalez pleaded guilty to a single count
of felony copyright infringement
• Fined $5K + $2K damages and 6 months
house arrest
• Obtained pre-release video tape of “work print”
from friend, who got it from employee of print
advertising firm
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
36
Where do copies come from?
 Press reported some anecdotes, but no publicly
available data
 This data could be useful for improving security
and for more informed policy debates
 Research approach:
• Understand movie production and distribution process
 Interviews with insiders and experts
• Gather data about unauthorized copies of movies on
the Internet
 Empirical study
• Analyze security vulnerabilities in movie production
and distribution process
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
37
Many opportunities for “leaks”
 Leak = first unauthorized copy or use
 Insider (thousands of potential attackers):
•
•
•
•
•
•
Editing room
Marketing
Projectionist
DVD factory
Retail employee
Oscar screeners
 Outsider (millions of potential attackers):
• Camera in cinema
• Consumer copying videos, DVDs, broadcast
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
38
Many opportunities for “leaks”
 Leak = first unauthorized copy
 Insider (thousands of potential attackers):
•
•
•
•
•
•
Editing room
Marketing
Projectionist
DVD factory
Retail employee
Oscar screeners
Usually not good quality
Usually not fresh
 Outsider (millions of potential attackers):
• Camera in cinema
• Consumer copying videos, DVDs, broadcast
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
39
Empirical study
Identify every movie in box office top 50
from January 2002 to June 2003
Find fingerprints (checksums) and posting
dates from Content Verification Site
Download 5% of each movie clip
Watch them, identify quality and source
• TTA, VHS, DVD
• Insider vs. outsider
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
40
Identify box office top 50
http://www.rottentomatoes.com/movies/box_office.php?rank_id=362
We used perl
scripts to crawl
Rottentomatoes
and gather top
50 data for 18
month period
409 movies
312 first
released in US
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
41
Find fingerprints and post dates
We used perl
scripts to
search
ShareReactor
for films
Some fine
tuning was
necessary to
get data on the
correct films
Found 183/312
movies, some
with multiple
samples
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
42
Fetch small bit of each movie
 MLDonkey
• Open source peer-to-peer client
• Content divided into blocks, client downloads multiple
blocks simultaneously from different sources, can stop
and resume downloads
 Used perl script to download 8% of one file for
each movie (some movies stored in multiple files)
- usually resulted in a complete block from
beginning and end of movie
 285 viewable samples of 183 movies
• 18 gigabytes of data
• 200 MHz computer and cable modem
• Took one week to download
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
43
Classification
Insider if:
•
•
•
•
Appeared prior to cinema release
Editing room artifacts
Industry related text or overt watermarks
Good through-air video capture but apparently
direct captured audio and appeared prior to
DVD/VHS release date
• DVD quality and appeared prior to DVD
release date
Otherwise outsider or unknown
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
44
Insider: editing room artifacts
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
45
Insider: Watermarks/Text
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
46
Outsider
Through the air video
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
47
Findings
183 of 312 movies found on Internet (59%)
285 different rips
77% were insiders
78% DVD quality
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
48
When do movies appear online?
2.2% movies appear before theater
5% movies appear after DVD
Theater release
DVD release
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
49
Our paper
 Published in DRM03
workshop
 Presented at TPRC
 Covered in NYTimes,
CNN, Wired,
Hollywood Reporter,
and elsewhere
 Quoted in
Congressional and
FCC hearings
http://lorrie.cranor.org/pu
bs/drm03.html
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
50
Implications
High rate of insider leaks and timing
suggests that consumer copying is a
relatively minor problem (at time of study)
Opponents of broadcast flag and other
MPAA proposals have cited our study to
argue that the movie industry should clean
up its own act before imposing restrictions
on consumers
MPAA called our study “flawed”
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
51
But two weeks later
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
52
Coming back to p2p…
 Assuming the insider problem can be solved,
unauthorized copying of consumer DVDs likely to
increase
 Unauthorized copies of movies, music, software,
etc. are continuing to propagate over p2p
networks
 Anonymous p2p networks may make it very
difficult to identify source
 What should be done?
• Make p2p illegal
• Make online anonymity illegal
• Mandate DRM
Ethics and Policy issues in Computing • Carnegie Mellon University • Spring 2008 • Tongia • http://www.contrib.andrew.cmu.edu/~tongia/sp08/08-200/
53
Download