Uploaded by felixjones3847

Computer Ethics

advertisement
– Utilitarianism - John Stuart Mill
– Deontological - Immanuel Kant
– Natural Right - John Locke - if both parties agree then ethical, negative right (your liberties), positive right (provided
– Society view : doing one’s work honestly and ethically
Privacy cases: 1934 Communications Act: Prohibited interception of messages unless authorized by sender
1968 Omnibus Crime Control and Safe Streets Act : Allowed wiretapping and electronic surveillance
1974 Privacy Act : Fed publish notice of record systems, Allow people to access their record,Prohibit disclosure without person's consent
1986 Electronic Communications Privacy Act : Extended 1968 with electronic communications,Restricts government from accessing email ,Law enforcement can get header info of communication
1994 The Communications Assistance for Law Enforcement Act, Require telecommunications to be designed for government to intercept,FCC
COPPA – Children's Online Privacy Protection Act ,Website parental permission to collect under 13 years old Unexpected consequences
2001 Patriot Act: Gov can access personal info without court order
1928 Olmsted v United States: Wiretapping is not unconstitutional ,Forth amendment don't apply to convos
1934 Communications Act
1937 Nordone v United States Supreme count said wiretapping violated the law Law enforcement still continued
1967 Katz v United States,Reversed Olmsted vs United States,Fourth applys to convos,Protect people not places
1976 United States and Miller ,No privacy if info was shared,Counts use this today
2001 Kyllo vs United States:Cannot use thermal imaging devices to search home without warrant
2012 US vs Jones :Police need search warrant for GPS tracking
2014 Riley vs Cali: Police cannot search content of phone without warrant \
Warren and Brandeis : Right to prohibit publication of public info ,Some actions violate no other rights expect privacy,
Concerns with protect privacy more
Judith Jarvis Thomson : A violation of privacy is always coupled with a violation of some other right. You may waive your
property rights, intentionally or inadvertently
Google AI issues : scam center can use it to fake, used to DDOS a restaurant, can’t deal with unique situation
Ad blockers : Rawl’s unethical, stop being free, poor families must paid, help keep things free
Uber drivers employee or contractor : Uber vs Labor Union (London, UK) two uber drivers sued Uber arguing that they should
Be employees and get benefits.
Uber loses this U.K court fight and so Uber considers them employee
France, Uber drivers are considered employees
California AB5 (Assembly Bill 5), Ruled in August 10, 2020 that Uber drivers are employees, taken down by prop 22, still
Challenged and decision yet to come
Taxi vs Uber : Uber, Lyft to limit size of fleet in NYC, Uber pulled out of Denmark and had 2,000 employees.
Canada : uber said it will suspend operation in Quebec if auth pass law to say driver need background check and 35h training
AirBnB vs Hotels : some cities and states restrict max number of nights you can rent or min of nights you must rent due to
Competition with hotels.
DMCA = Digital Millennium Copyright act in 1998 : amend title 17, extend copyright to online material
Provisions : Safe Harbor, limited liability of online service providers, Anti Circumvention which criminalized tech devices that
Circumvent access to copyrighted material.
Anonymity : express / publish info privately like Edward Showden (whistleblower) and Wikileaks,
also Clearview AI will not store data about us
Anonymity : hard to find criminals like “swatting”, dangerous prank of calling false emergency and law enforcement, also
Online harassment like the one with Lori Drew
Net Neutrality : ensure ISP enables access to all resources equally and non discriminatory. So net neutralist do not believe in
Free market
Cambridge Analytica and Facebook : Cambridge bought data from Facebook in 2018 scandal, used data to target political
advertising during the 2016 political campaign. May have impacted the US election and a massive breach of privacy.
PRISM : secret surveillance program operated by the NSA that was exposed by Edward Showden in 2013. PRISM was a
Mass collection of electronic communications data, email, text from Google, Facebook, Microsoft, to find potential national
Security threats. And spy on foreign leaders
Edward Showden : An American that leaked highly classified information from the NSA and PRISM in 2013
Facebook v Power Ventures : power ventures to collect data from Facebook, ruled in favor of Facebook
CALEA (1994) : ensure gov can intercept telephone calls, add backdoors,
USA Patriot Act (2001) : amended CFAA, increased penalty, allows gov to monitor online activity of suspected hackers.
Intellectual property :
Copyright: books, articles, plays, songs, art, software (author life + 70 years) US copyright law title 17
Patent and trademark : software based inventions
Fair use : use to contribute to creation of new work not likely to deprive of authors income, teaching, research, news ..
Computers and Crimes :
CFAA (Computer Fraud and Abuse Act of 1984) : illegal to access without authorization, exceed one's auth, read/copy/mod
Aaron Schwartz:
Lori Drew:
US v Nosal: David Nosal, former Korn emp in SF, obtained proprietary information, prosec : logged on network from another
Individuals laptop “acted without authorization”, Defense : federal crime for something that is just a violation of company
Convicted and tried to appeal to the Ninth Circuit. 1st in july 5 2016 2-1 and Ninth clarified the CFAA. 1y and 1d prison
Workplace monitoring :
Telecommuting : working from home,
Offshoring : basing company processes like jobs overseas to take advantage of cost, tax, minimum wage, etc.
Shared Economy : matches people how desire goods and services to those who want to sell. Mainly PtoP, Ex. Airbnb
Parked cars for rent, physical assets as services. YOU DON”T NEED TO OWN EVERYTHING.
On-demand services : quick delivery of various products and services, Netflix, Amazon
Gig : Independent contract based work, Uber Lyft
ECPA (Electronic Communications Privacy Act) : bans reading of emails without court order, bans excludes companies
Reading Email from their own systems. Anything sent over a company email system is up for grabs,
Controlling technology (DEEP FAKE, AI, TECH):
Self-Policing : People and companies provide the fact-checking and ensure the accuracy
Digital Divide : some people have access to modern information technology while others do not
Neo Luddism : Don’t want technology, Computer cause massive unemployment and deskilling of jobs, Computers are not
An essential need, computers cause social inequity, computers cause social disintegration and isolation, computers benefit
Big business and government, develop poor social skills, computers solve little to none real human problems.
Errors and Failures: Minor error : # on insta redirect to wrong #, GPS system drives someone to a lake.
Failures not ethical : Boeing 737 MAX aircraft, two airline crashes, first on Oct 29, 2018, Lion Air Flight 610 in Indonesia,
Second on March 10, 2019, Ethiopian Airlines Flight 302 in Ethiopia, 346 lives lost. Issue was MCAS (Maneuvering
Characteristic Augmentation System), kept pointing plane down, no control. Because a bigger engine needed MCAS to help.
FAA, overlooked certification process of Boeing, for fuel efficiency and money, no training (didn’t know MCAS),
did not test enough. FAA overlook because Boeing American and rival was Airbus, European aerospace manufacturer,
Errors not bad : pennsylvania women stunned by 284 billion dollar electric bill, or insurance rate of 101 y/o man tripled
Because the program only handled 100 accidentally treated him as a teen.
A family harassed and threatened after state post address in sex offender registry even tho the offender moved.
Individual reason for error : insufficient testing, complexities of programming, large amount of data, automate processes
Can’t handle special cases.
System failures: lack of plan for security, insufficient testing and training Ex. 1986 space shuttle challenger explosion, Ariane
Healthcare.gov, launch website as part of ACA (affordable care act), also known as Obamacare, website was a portal to
Enroll but oct 1, 2013, glitches and issues from high volume caused frustration.
Ford Pinto : car produced by Ford Motor in the 1970s, issue with design of fuel tank. It was vulnerable to rupturing in read end
Collisions that could result in fire and explosion. It was to save money so it was unethical. Profit over safety. All because Japan
Was winning in car manufacturing just like in Boeing 737 Max with Airbus.
New design/test in 1972 to withstand 20mph and 1973 would be 30mph.
Pinto wanted to release it by 1971 to dodge it and save money, more cost effective. It saved $5 to $8 for each vehicle. Internal
Document release revealed Ford did a cost/benefit analysis. Several hundred fatalities, 95% would survive.
Therac -25 : An equipment with laser to kill cancer cells, computer controlled but failed and radiation poisoning to patients that
Died. It was a software and hardware issue, lack of testing. Issue was software with a race condition caused to which to
High-powered megavolt (MV).
Safety Critical System: A system whose failure would result in injury/loss of life
Software Engineering Institute and computer security organization CERT developed detailed coding standards.
Agile development : constant client interaction, daily team meetings
User stories: each unit of functionality should be testable, clear error messages
IV&V: Independent verification and validation, separate testing teams.
Challenger space shuttle : Burning gasses leaked from rocket after launch, night before engineers argued for delay, they knew
The cold weather would pose a severe threat to the shuttle.
Columbia space shuttle : A large piece of foam dislodged and struck the wing of the columbia space shuttle, NASA knew but
Though it was fine cuz it happened before. Exploded when reentering earth’s atmosphere at end of mission.
Guideline/principle for good systems : test system, include users in design and test, add default settings, redundancy and self
Legacy systems : Old applications, form of technology that is still used, out of date, not updated
Legacy System not updated reasons : Constant need for the system, cost too high to renovate, training new software is high
The old designer of the system has left, if it works don’t break it.
Dependence on computers : Elderly woman lay dead in Rotterdam home for 10 years, all bills paid automatically, automatic
Pension checks, similar case : Joyce Vincent, London 2 years
Download