Networking

advertisement
Ethics for the
Information Age
Chapter 3 - Networking
William H. Bowers – whb108@psu.edu
Topics





Introduction
Email & Spam
The Spam Epidemic
Ethical Evaluations of Spamming
Making Direct Email Moral
William H. Bowers – whb108@psu.edu
Topics (cont.)




Fighting Spam
Ethical Evaluations of MAPS
Proposed Solutions to
the Spam Epidemic
CAN SPAM Act of 2003
William H. Bowers – whb108@psu.edu
Topics (cont.)





Control of the
World Wide Web
Ethical Perspectives
on Pornography
Censorship
Children and the Web
Breaking Trust on the Internet
William H. Bowers – whb108@psu.edu
Introduction




The value of a PC increases
dramatically once it is networked
The value of the net is tremendous
due to the connectivity
Distributed computing (SETI project)
harnesses many lost CPU cycles
The greatest net impact is
communication
William H. Bowers – whb108@psu.edu
Introduction

Two required conditions
– Network must support usage
– Users must act responsibly


How do we define ‘act responsibly’?
Can we apply ethical theories to
technology?
William H. Bowers – whb108@psu.edu
Email & Spam



Email is broken into packets
Transmission is usually indirect
Top 10 most common subject lines in
2002
1. Protect your computer against viruses
for $9.95
2. Verification Department
William H. Bowers – whb108@psu.edu
Email & Spam
–
Top 10 most common subject lines in 2002
3. Refinancing? Get a FREE quote on any
mortgage loan program
4. Printer Cartridges – Save up to 80% - Free
Shipping Offer
5. Miniature Remote Control Car. Great Gift!
6. $100 FREE, Please Play Now
William H. Bowers – whb108@psu.edu
Email & Spam

Top 10 most common subject lines in
2002
7. Online Auction Marketing Secrets!
8. Important news Kuira
9. URGENT & CONFIDENTIAL.
10. GET A FREE PASS TO THOUSANDS OF
XXX SITES!
William H. Bowers – whb108@psu.edu
The Spam Epidemic
–
–
–
–
About 40% of all email in 2003
Cost to business is in the billions per
year
Low cost – about $500 - $2,000 per
email vs. almost $250,000 for postal
mail, not including the mailer
Opt-in lists
William H. Bowers – whb108@psu.edu
The Spam Epidemic
–
–
–
–
–
Dictionary attacks, check for unbounced
email
Net crawlers
Spoofing
AOL blocks over 1 billion messages per day
Hard to control as spammers change ID
easily and frequently
William H. Bowers – whb108@psu.edu
Ethical Evaluations of
Spamming
–
Kantian Evaluation
– Assume that I have a great idea for a
product or service
– I send unsolicited email to a large list
– Some recipients must pay by the
message
– I am treating recipients as a means to the
end of selling my product
William H. Bowers – whb108@psu.edu
Ethical Evaluations of
Spamming
–
Act Utilitarian Evaluation
– I send the email to 100 million people
– 1 in 100,000 may buy my product
– Assume that 90% of customers are
happy, 10% unhappy
– We have 99,990,000 unhappy people
– 9,000 happy customers
– 1 happy me
William H. Bowers – whb108@psu.edu
Ethical Evaluations of
Spamming
–
Rule Utilitarian Evaluation
– Use the same scenario as before
– If everyone were interested, I could not
fulfill the orders
– People may be inclined to drop or change
email to prevent spam
– Usefulness of email decreases
William H. Bowers – whb108@psu.edu
Ethical Evaluations of
Spamming

Social Contract Theory Evaluation
– We each have the right to free speech
– That right does not include the
requirement that the rest of us have to
listen
– If email is an invitation to correspond, the
sender must identify subject and author
William H. Bowers – whb108@psu.edu
Making Direct Email Moral




Evaluating spam from four
perspectives each concludes it is
unethical
Can it be made ethical?
Use real address and subject
Send only to those who opt in
William H. Bowers – whb108@psu.edu
Fighting Spam






Mail Abuse Prevention System (MAPS)
http://www.mail-abuse.com/
Uses a Realtime Blackhole List (RBL)
List of IP addresses that generate or
forward spam
Use their own guidelines to determine who
should be black listed
http://www.mailabuse.com/support/pdf/WP_MAPS_RBL_060
104.pdf
William H. Bowers – whb108@psu.edu
Fighting Spam

Proper email guidelines
– Recipients must have asked to receive
email
– Must provide recipients with simple way
to be removed from the list (including at
least one non-email communication
method)
– Must remove invalid addresses in a timely
manner
William H. Bowers – whb108@psu.edu
Fighting Spam

Proper email guidelines
– Must disclose how recipient addresses will
be used, including frequency and subject
of future mailings

When a violation is suspected
– MAPS contacts marketer (or ISP)
– Warns of potential blacklisting
William H. Bowers – whb108@psu.edu
Fighting Spam

When a violation is suspected
– Evaluates response
– Makes decision

Those who have been Blockholed may
apply for removal
William H. Bowers – whb108@psu.edu
Fighting Spam

Arguments against MAPS
– It prevents free speech
– If an entire ISP is blocked, innocent
individuals may be blocked
William H. Bowers – whb108@psu.edu
Ethical Evaluations of MAPS

Social Contract Theory
– MAPS presumes email should be of
“direct and equal benefit to the sender
and the recipient”
– Negates the argument of having a right
to have a message delivered
– Use of MAPS is by request (and payment)
only
William H. Bowers – whb108@psu.edu
Ethical Evaluations of MAPS

Utilitarian Evaluation
– ISP’s benefit - decrease in spam = less
network traffic and improved
performance
– ISP’s lose - useful email may be blocked
which reduces the value of the net
– Innocent senders may be harmed
– Must compare net benefit of senders to
net benefit of receivers
William H. Bowers – whb108@psu.edu
Ethical Evaluations of MAPS

Kantian Evaluation
– Goal of RBL is to improve ISP’s behavior
– Customer’s inconvenience may lead to
complaints to ISP and suppression of
spammers
– MAPS is treating customers as a means to
an end
– This violates the Categorical Imperative
William H. Bowers – whb108@psu.edu
Proposed Solutions to
the Spam Epidemic

Require explicit subscriber opt in
– Increases recipient response rate
– Decreases total email volume
– Mandated by European Union



Require labeling of spam
Add a cost to every email sent
Ban unsolicited email
William H. Bowers – whb108@psu.edu
CAN SPAM Act of 2003


Controlling the Assault of Non-Solicited
Pornography and Marketing (CAN SPAM)
http://frwebgate.access.gpo.gov/cgibin/getdoc.cgi?dbname=108_cong_bills&do
cid=f:s877enr.txt.pdf
Divides business email into three categories
– Transactional or relational


Message header, sender, organization and transmission
information must be correct
Must not disguise ID of the sending computer
William H. Bowers – whb108@psu.edu
CAN SPAM Act of 2003

Divides business email into three categories
– Consensual commercial email



Must inform recipient of option to be removed from list
Must provide internet based removal functional for at
least 30 days after the message was sent
Must contain postal address of sender
– Unsolicited email
William H. Bowers – whb108@psu.edu
CAN SPAM Act of 2003

Divides business email into three
categories
– Unsolicited email
Must contain “clear and conspicuous” notice
that it is an advertisement
 If sexually explicit, must contain notice in
subject line


Prohibits dictionary attacks
William H. Bowers – whb108@psu.edu
CAN SPAM Act of 2003

Penalties for violations
– $250 per message, $2 million max
– $6 million max for repeat offenders
– Criminal penalties and jail time up to five
years if used to further felonies or repeat
offenders
– Forfeiture of property or equipment used
in commission of crime
William H. Bowers – whb108@psu.edu
CAN SPAM Act of 2003






Critics call it the “You CAN SPAM Act”
Defines and permits unsolicited email
Does not prevent spam at all
Opt out not feasible as it confirms the email
address and address can be sold to other
spammers
Weaker than some existing state laws
Enforceable only in the US
William H. Bowers – whb108@psu.edu
World Wide Web Attributes



Decentralized, no control over content
URL’s are unique
Based on the Internet, therefore
accessible to all OS’s
William H. Bowers – whb108@psu.edu
World Wide Web Uses







Shopping, e-commerce
Formal education
Genealogy
Online gaming
Paying taxes
Gambling
Blogging
William H. Bowers – whb108@psu.edu
Control of the
World Wide Web


No access in North Korea or Burma (as of
2003)
Saudi Arabia controls all access in country
– Blocks pornography, gambling, non-Islamic
religious organizations
– Women’s health and sexuality, gay rights, Middle
Eastern politics, ways to circumvent filtering
William H. Bowers – whb108@psu.edu
Control of the
World Wide Web

People’s Republic of China
– Allows many ISP’s
– Each must agree to voluntarily block
politically or morally objectionable web
pages
– Also blocks BBC news, CNN, sites related
to Taiwan and Tibet
– Can affect Hong Kong which routes
through PRC
William H. Bowers – whb108@psu.edu
Control of the
World Wide Web

Germany
– Forbids neo-Nazi or anti-Semitic

US
– Two attempts at legal restriction struck
down by US Supreme Court
William H. Bowers – whb108@psu.edu
Control of the
World Wide Web

US
– Children’s Internet Protection Act upheld
– Argument transcript
http://www.supremecourtus.gov/oral_arg
uments/argument_transcripts/02-361.pdf
– Opinion
http://www.supremecourtus.gov/opinions
/02pdf/02-361.pdf
William H. Bowers – whb108@psu.edu
Ethical Perspectives
on Pornography




US government mandates filtering in
public libraries that receive federal
funding
Should the government restrict
access?
Pornography is hard to define
Book’s definition for this discussion
William H. Bowers – whb108@psu.edu
Analyses Concluding
Pornography is Immoral

Kantianism
– Model(s) are used as means to an end
– Used as objects, not persons
– Violates Categorical Imperative
William H. Bowers – whb108@psu.edu
Analyses Concluding
Pornography is Immoral

Utilitarianism
– Reduces the dignity of human life
– Portraying sexual abuse helps create an
environment in which true victims are less likely
to be dealt with sympathetically
– Imitators may be incited to rape, etc.
– Pornography is offensive to most people
– Diverts resources from more redeeming activities
William H. Bowers – whb108@psu.edu
Analyses Concluding
Pornography is Moral


Presumes viewers and models are
consenting adults
Three benefits
– Individuals involved are making money
– Consumers derive pleasure
– Provides consumer with harmless outlet
for exploring sexual fantasies
William H. Bowers – whb108@psu.edu
Commentary

Harms and benefits can be
contradictory
– Viewing pornography incites crime
– Provides harmless outlet


Benefits or harms are difficult to
ascertain or quantify
Should government aid parents in
protecting children?
William H. Bowers – whb108@psu.edu
Censorship




Attempts to suppress or regulate public
access to offensive or harmful material
Usually exercised by government or
religious institutions
Printing press allowed wider dissemination
of material
Made more difficult by divergence of church
and state
William H. Bowers – whb108@psu.edu
Direct Censorship

Three forms
– Government monopolization
State controls all media
 No private radio, TV or newspapers
 Made more difficult by computers and
internet

William H. Bowers – whb108@psu.edu
Direct Censorship

Three forms
– Prepublication review



Essential to keep secrets
Generally accepted for national security
Used by totalitarian governments to suppress dissent
– Licensing and registration



Used to apportion limited bandwidth
Radio, TV frequencies, channels
Allows de facto censorship
William H. Bowers – whb108@psu.edu
Self-Censorship




May be used to maintain good
relationships with government
Reporters do not wish to alienate
sources
Voluntary rating systems
Agreement to not show mature
material during prime time
William H. Bowers – whb108@psu.edu
Challenges Posed
by the Internet





Many to many communications
The Internet is dynamic, always
changing
Size of the Internet
The Internet is global
Identities are hard to verify
William H. Bowers – whb108@psu.edu
Ethical Perspectives
on Censorship

Kantian View
– People must think for themselves
– Must not rely on others to tell them what
is permissible
William H. Bowers – whb108@psu.edu
Ethical Perspectives
on Censorship

John Stuart Mill
– Four reasons for freedom of expression
None of us is infallible – mistakes may
silence the truth
 Majority opinion is not the whole truth, other
opinions must be heard
 A clash of ideas is necessary to determine the
truth
 Opinions must be tested to be verified

William H. Bowers – whb108@psu.edu
Ethical Perspectives
on Censorship

John Stuart Mill
– Principle of Harm
– “The only ground on which intervention is
justified is to prevent harm to others, the
individual’s own good is not a sufficient
condition.”
William H. Bowers – whb108@psu.edu
Freedom of Expression

First Amendment history
– 1275 English law prohibiting speech
that could weaken loyalty to the
king
– Later encompassed seditions words
and words against many
government officials
– Late 1700’s – no prior restraint
William H. Bowers – whb108@psu.edu
Freedom of Expression

First Amendment history
– Libel originally considered if
material was harmful, truth was not
a defense
– Guarantees freedom of speech
– Freedom of the press
William H. Bowers – whb108@psu.edu
Freedom of Expression not
Absolute



First Amendment’s primary purpose is
to protect political speech
Speech is interpreted to be more than
mere words, all expression is
protected
Libel, slander, lies, perjury, false
advertising, personal abuse not
allowed
William H. Bowers – whb108@psu.edu
FCC vs. Pacifica Foundation, et
al.




1973 – George Carlin’s 7 dirty
words
2 PM, 30 October 1973, after
warning listeners, aired by WBAI,
New York
FCC received complaint
Issued order against station
operator
William H. Bowers – whb108@psu.edu
FCC vs. Pacifica Foundation, et
al.


Pacifica sued FCC for First
Amendment violation
1978 US Supreme Court ruled 5 –
4, no violation
– Can be received unintentionally
– Can be received by children
William H. Bowers – whb108@psu.edu
Children and the Web

Web filters
– Installed on PC or ISP
– Checks URL against blacklist
– Or checks for key words
William H. Bowers – whb108@psu.edu
Child Internet Protection Act




Requires libraries receiving federal
funds to install Internet filters
About 14 million people use public
Internet access
Adults can ask librarians to remove
filters
Government argued it is an extension
of existing standards
William H. Bowers – whb108@psu.edu
Child Internet Protection Act



American Library Association and
ACLU argued filters may block
acceptable material
Asking for filter removal may be
embarrassing and disruptive
Act upheld by US Supreme Court
William H. Bowers – whb108@psu.edu
Ethical Evaluations of CIPA

Kantianism evaluation
– Individual reason should lead to
enlightenment of society
– Web filters may not be accurate
– Web sites do not consent to being
blocked
– Treats non-offensive, blocked pages as
means to an end
William H. Bowers – whb108@psu.edu
Ethical Evaluations of CIPA

Act Utilitarianism
– Not all children access Internet in
libraries, not all bad sites will be blocked
– Probable that CIPA will result in fewer
children being exposed to pornography
– May block legitimate sites, resulting in
less useful research – a harmful
consequence
William H. Bowers – whb108@psu.edu
Ethical Evaluations of CIPA

Act Utilitarianism
– Adults may be embarrassed to ask for
access
– Some blocked sites may be associated
with minority political views, the blocking
of which would be harmful
William H. Bowers – whb108@psu.edu
Ethical Evaluations of CIPA
– Social Contract Theory
Freedom of thought and expression is valued
 Private viewing of pornography is individual
and therefore outside of the social contract
 Blocking may inhibit free expression of ideas
 Does not treat adults who depend on library
access as free and equal citizens

William H. Bowers – whb108@psu.edu
Breaking Trust on the Internet

Identity theft
– Phony emails asking to update
information
– According to FBI, 2/3 of all cases of
identity theft begin with email solicitation
– 2002 – about 75,000 complaints
– About $40 million in fraud
William H. Bowers – whb108@psu.edu
Chat Room Predators


Participation varies by country
Easy to impersonate young children
William H. Bowers – whb108@psu.edu
Ethical Evaluations of
Police Sting Operations


Is it right to trap pedophiles?
Direct effect of catching and convicting
– Perpetrator is deprived of freedom
– Public is safer
– Therefore, net benefit
William H. Bowers – whb108@psu.edu
Ethical Evaluations of
Police Sting Operations

Indirect effects
– Deterrence of others
– Makes chat room participants aware that
not everyone is genuine

Kantian Evaluation
– Police need to lie to trap suspect
– Therefore, sting operation is wrong
William H. Bowers – whb108@psu.edu
Ethical Evaluations of
Police Sting Operations

Social Contract Theory
– People should be honest in chat rooms
– Pedophiles violate this rule
– Police may entrap otherwise honest
person
– Both involve lying and wrongdoing
– Therefore, it is wrong
William H. Bowers – whb108@psu.edu
False Information



Web pages and not necessarily correct
or honest
No review for correctness
No pre-publication review
William H. Bowers – whb108@psu.edu
Questions & Discussion
William H. Bowers – whb108@psu.edu
Download