Chapter 1 The Internet and Ethical Values Introductory Comments • “…the Internet has the potential to magnify the power of the individual and fortify democratic processes.” • “..the control of technology through law and regulation has often been a futile effort, ‘correcting’ technology with other technology has been more effective.” – Ex) law has had a hard time controlling dissemination of pornography on the Internet but blocking software that filter out indecent material has been more successful Two Assumptions of the text • The directive and architectonic (of or relating to architecture or design) role of moral ideals and principles in determining responsible behavior in cyberspace and • The capacity of free and responsible human beings to exercise some control over the forces of technology (technological realism) – Technological realism is a philosophy that argues technology is a powerful agent for social change and progress. Cyberethics and the “Law of the Horse” • Constraints on our behavior – From Week 1, list some institutions that impact our moral behavior – Our Book lists: laws of civil society, social pressures of the communities in which we live and work • Book: Code and Other Laws of Cyberspace – Larry Lessig – Describes four constraints that regulate our behavior in real space and are subject to the same four constraints in cyberspace Four Constraints on Behavior • Law – a prominent regulator of behavior because if you fail to follow the law their can be consequences • Social Norms - understandings or expectations of how I ought to behave – These can regulate behavior in a far wider array of contexts than any law • Market – regulates by price, by pricing goods, the market sets my opportunities, and through this range of opportunities it regulates • Nature or what he calls architecture – The constraint of the world as it is – I can’t see through walls, a constraint on my ability to know what is happening on the other side – No wheel chair ramp can constrain access to a library for a wheel chair bound individual – In the cyber world, the equivalent of this architectural constraint is code, the programs and protocols that make up the Internet. Regulation through the Four Constraints • To understand a regulation we must understand the sum of the four constraints operating together • Any one cannot represent the effect of the four together Cyberspace Hype • • • • Cyberspace is unavoidable Cyberspace is unregulable No nation can live without it No nation will be able to control behavior in it • A place where individuals are inherently free from the control of real space sovereigns Lessig’s attack against the Hype • He has a different view • Now entering a world where freedom is not assured • Cyberspace has the potential to be the most fully and extensively regulated space that we have ever known • Unless we understand this we are likely to miss the transition from freedom into control Connecting Cyberspace to Real Space • Similar to the real world, behavior in cyberspace is regulated by four types of constraints • Again, Law is one of those constraints – copyright law, defamation law, sexual harassment law – In spite of the hype that cyberspace is wide open, these laws constrain behavior similarly to how behaviors are constrained in real space • There are also Norms in cyberspace as there are in real space • When norms are not followed, punishments are meted out Connecting 2 • The market also constrains cyberspace as in real space – change the price of access and constraints on access differ • Architecture, the fourth, is most significant of the four – He calls this CODE - meaning the SW and HW which constitute cyberspace – the set of protocols implemented or codified in the SW of cyberspace that determine how people interact, or exist in the space – It sets the terms upon which we enter or exist in cyberspace, just like the architecture of the real space How Architecture(CODE) constrains Behavior • Sometimes one must enter a password, othertimes they don’t • Some transactions produce link back to individual, othertimes they don’t • Sometimes encryption is an option, sometimes it isn’t • These differences are created by code by programmers, they constrain some behavior while allowing others possible • They are like architecture of real space regulating behavior in cyberspace Real Space and CyberSpace • In real space architecture, market, norms, and law regulate behavior • In cyberspace code, market, norms, and law regulate behavior • As with real space, in cyberspace we need to look at how the four work together to constrain behavior Example - Regulation of Indecency on the Net • Concern sharply grew in 1995 • Kids using net more frequently mixed with availability of “porn” • A paper at the time cited a controversial and flawed study in Georgetown Law Review reported that the Internet was “awash with porn.” • Time and Newsweek ran cover articles about its availability • Senators and Congressman bombarded with demands to do something to regulate cybersmut Why the Outcry? • At the time it was written that more indecent materials existed in real space than in cyberspace • Most kids (at that time )didn’t have access to cyberspace, so why the outcry? • Look at it differently, what regulates indecent materials in real space? Why (U.S. View) • 1) US laws regulate distribution of indecent materials to kids – ID checks to check age of buyers – Laws requiring these businesses to be far from kids • 2) Norms - possibly more important than laws – Norms constrain adults not to sell this to kids • 3) Market Norms - To buy this costs money and most kids do not have money • 4) Architecture - difficult in real space to hide the fact that you are a kid • So, constraints on being a kid are effective in real space Cyberspace is Different Though • In real space hard to hide that you are a kid, in cyberspace the default is anonymity • Easy to hide who one is • Practically impossible for the same laws and norms to apply in cyberspace • Key difference is the regulability of cyberspace, the ability of governments to regulate behavior there • Currently, cyberspace is less regulable than real space, less governments can do Why? • Key difference is the code that constitutes cyberspace • Its current architecture is essentially unregulable (at least in 1995) • The architecture of 1995 and 1996 essentially allowed anyone w/ access to roam w/o identifying who they were - Net95 • One’s identity was invisible to the net then • One could enter w/o credentials, w/o an internal passport • Users were fundamentally equal, essentially free Communications Decency Act (1996) • With Net95 as the architecture of the network at the time-- this statute was declared unconstitutional • Because, at the time, any regulation attempting to zone kids from indecent materials would be a regulation that was too burdensome on speakers and listeners • As the net was then, regulation would be too burdensome • Key problem was that the court spoke as if this architecture, net95, was the only architecture that the net could have But... • We know that the net has no nature, no single architecture • Net 95 is a set of features or protocols that constituted the net at a particular period in time • Nothing requires it to always be that way (remember malleability?) • Court spoke as if it had discovered the nature of the net and was therefore deciding on the nature of any possible regulation of the net Univ of Chicago - Harvard Story • Author was professor at UoC, to gain access to net, just plug into a jack (located throughout Univ) • Any machine could do it and you would have full, anonymous, free access to the net • It was this way because of the administration • This policy established the architectural design of the UoC net @Harvard • One cannot connect one’s machine to the net unless the machine is registered – That is, licensed, approved, verified • Only members of the Univ community can register their machine • Once registered all transactions over the net are potentially monitored and identified to a particular machine • Anonymous speech on this net is not permitted • Access can be controlled based on who someone is, interactions can be traced Two Views • Controlling access is the ideal at Harvard • Facilitating access is the ideal at Univ of Chicago • These two views are common today at Univ’s across America • UoC is Net95 • Harvard is not an Internet but an Intranet architecture – within an intranet, identity is sufficiently established such that access can be controlled and usage monitored Philosophies • They both are built from TCP/IP but at Harvard you have Internet Plus, the plus means the power to control • They reflect two philosophies about access and reflect two sets of principles or values on how speech should be controlled • they parallel difference between political regimes of freedom and political regimes of control The Point • Nothing against Harvard or Chicago • Wants us to see that at the level of a nation, architecture is inherently political • In cyberspace, the selection of an architecture is as important as the choice of a constitution • The code of cyberspace is its constitution, it sets terms for access, sets the rules, controls their behavior, a sort of sovereignty competing with real space sovereigns in the regulation of behavior of real space citizens Architecture Shift • From an architecture of freedom to an architecture of control • As it becomes an architecture of control it becomes more regulable • US government is moving the architecture in these directions • How? The government can regulate the architectures in cyberspace so that behaviors in cyberspace become more regulable Spinello’s View on Lessig’s Work • Describes Lessig’s work as a neat regulatory framework • Feels that Lessig includes ethical standards in the broad category of norms • Spinello believes cultural norms should be segregated from ethical ideals and principles – Cultural norms are variable social action guides that are relative and dependent on a given social or cultural environment – Fundamental principles of ethics are “metanorms” they have universal validity remaining the same whether we are doing business in another country or in cyberspace. Spinello and Lessig • Spinello believes that ethics and cultural norms must be kept distinct • Explains that this defies popular notion of ethical relativism which he says often equates the two – Ethical relativism is the theory that holds that morality is relative to the norms of one's culture. That is, whether an action is right or wrong depends on the moral norms of the society in which it is practiced. – We could spend weeks on just this one term, author writes that “a full refutation of that viewpoint is beyond the scope of our discussion here.” Quote from contemporary philosopher • Phillippa Foot – “…All need affection, the cooperation of others, a place in community, and help in trouble.” – What does this connect to from our Introduction to Ethics (Week 1)? Spinello’s Final Comments on Lessig • The observed weakness does not invalidate Lessig’s framework • Chief contribution the four constraints of the real world also regulate in cyber space • And, the structures of software can potentially do even more than laws to curtail freedom. (Provide more constraints) Extending Lessig’s Framework • Spinello believes the model can be improved by adding fixed ethical values as a constraining force citing • James Moor- list of core human goods includes life, happiness, and autonomy • John Finnis, list of intrinsic goods: life, knowledge, play (and skillful work), aesthetic experience, sociability, religion, and practical reasonableness (which includes autonomy) A Moral Ideal • So, the ultimate good, the human flourishing of ourselves and of others should function as a prescriptive guidepost of enduring value, serving as a basis for crafting laws, developing social institutions, or regulating the Internet • Applying this to policy making can be difficult so we have ethical principles such as the golden rule or from Kant, “act so that you treat humanity always as an end and never as a means” • Author thus feels that the role of morality is the ultimate regulator of cyberspace that sets the boundaries for activities and policies in figure 1-1 on page 7, it sits above the four constraints of Lessig. Iron Cage or Gateway to Utopia (p7) • There is skepticism about anyone’s ability to control the evolution and effects of the technologies of networking and computing • Author asks, are our attempts to regulate cyberspace merely a chimera? (a fanciful notion?) • Some philosophers have regarded technology as a dark and oppressive force – Menaces our individuality and authenticity – Views of technology determinists – see technology as an independent and dehumanizing force • Most interpretations of technological determinism share two general ideas: – that the development of technology itself follows a predictable, traceable path largely beyond cultural or political influence, and – that technology in turn has "effects" on societies that are inherent, rather than socially conditioned or produced because that society organizes itself to support and further develop a technology once it has been introduced. Other Philosophers • French philosopher, Jacques Ellul writes, technique has become a dominant and untranscendable human value. – The totality of methods rationally arrived at and having absolute efficiency in every field of human activity – Feels that modern technology has irreversibly shaped the way we live, work, and interact in this world • Similarly, Max Weber, coined term iron cage, – Meaning, how technology locks us in to certain ways of being or patterns of behavior – A more fragmented, narrow-minded society dominated by a crude instrumental rationality • Martin Heidegger saw technology not merely as a tool that we can manipulate but as a way of “being in the world” that deeply affects how we relate to that world. A Not so Bleak View • Technology neutralists argue that technology is a neutral force, completely dependent on human aims and objectives – this view holds that technologies are free of bias and do not promote one type of behavior over another – Technology is just a tool and does not compromise our human freedom or determine our destiny in any appreciable way – Up to us to whether the tool is a powerful force for good or bad The Ideal View • Technological utopianism regards certain technologies as making possible an ideal world with improved lifestyles and workplaces • An optimistic philosophy believes humanity can eradicate many of technology’s adverse effects and manipulate this tool effectively to improve the human condition Author’s Concerns • Technological neutralism and utopianism seem problematic – Technology does condition with givens that are virtually impossible to overcome – Langdon Winner describes this as the adjustment of human ends to match the character of the available means – Author writes that it is an exaggeration to claim that computer and network technology locks us into a virtual but inescapable iron cage – Middle ground between these extremes is technological realism • “although technology has a force of its own, it is not independent of political and social forces.” • Indicates this is echoed in Lessig’s work, sometimes code is an instrument of social and political control, it is not always neutral • We do have the capacity to redirect or subdue technology when it becomes necessary • Author agrees with Charels Taylor, “We are not, indeed, locked in. But there is a slope, an incline in things that is all too easy to slide down.” Ethical Values and the Digital frontier (p10) • Several theories that embody the moral point of view • Kant describes the principle that we must respect humanity in all our choices and actions • Rights-based theories discuss core human goods in terms of protection of human rights like life, liberty, and the pursuit of happiness • Utilitarian approach emphasizes happiness • Modern ethical frameworks fall under 2 broad categories teleological or deontological – 1st means goal or end, these theories argue that the rightness or wrongness of an action depends on whether or not they bring about the end in questions (like happiness) – Deontological consider actions to be intrinsically right or wrong and do not depend in any way on the consequences they effect • These frameworks emphasize duty and obligation Utilitarianism (p11) • This is a teleological theory and is most popular version of consequentialism • Classic utilitarianism was developed by 2 British philosophers: – Jeremy Bentham and John Stuart Mill – Right course of action is to promote the general good, can be described in terms of utility – Utility refers to the net benefits (or good) created by an action – Another way to think of this is, persons ought to act in a way that promotes the maximum net expectable utility, that is, the greatest net benefits or the lowest net costs, for the broadest community affected by their actions. – On one level, utilitarianism asks us to make moral decision by means of a rational, objective cost/benefit analysis Example pg. 11-12 • An organization has to make a decision about random inspection of employee e-mail • It is perfectly legal but some managers wonder if it is the right thing to do as it seems to violate privacy rights of employees • Rightness in the utilitarian ethical model is determined by consequences that become clear in a cost/benefit analysis • 3 possible choices: 1) email not inspected; 2) email inspected but policy clearly displayed; 3) email inspected, not policy displayed • Look at pg. 13 for a table summarizing costs and benefits (first write one for the class on the board with their own ideas of benefits and costs Summary of Utilitarianism • Theory has strengths but some serious flaws too • In certain contexts, could be used to justify the infliction of pain on a small number of individuals for the sake of the happiness or benefits of the majority. • No intrinsically unjust or immoral acts for the utilitarian which poses a problem • What happens when human rights conflict with utility? • This theory lacks sensitivity to the ideals of justice and human rights Contract Rights (Contractarianism) p 12 • • • • • uses rights based analysis a deontologic theory looks at moral issues from viewpoint of the human rights that may be at stake A right is an entitlement or a claim to something Contractarianism differs from utilitarianism in that the consequences of an action are morally irrelevant for those who support contractarianism – rights are enjoyed by all citizens, and the rights of the minority cannot be suspended or abolished even if that abolition will maximize social welfare – A problem with most rights-based theories is that they do not provide adequate criteria for resolving practical disputes when rights are in conflict • eg those who send spam claim they are exercising their right to free speech but those receiving it say that it is intrusive • How do we resolve this? • Rights based theories are not always helpful in making this determination Moral Duty (Pluralism) P14 • This framework is based not on rights but on duty • Immanuel Kant is one of the foremost philosophers of this approach • The moral point of view is best expressed by discerning and carrying out one’s moral duty. • A duty-based, deontological ethical framework • Sometimes referred to as pluralism Immanuel Kant • Consequences of an action are morally irrelevant • Actions only have moral worth when they are done for the sake of duty • According to Kant’s systematic philosophy, our moral duty is simple: to follow the moral law which, like the laws of science or physics, must be rational • And, like all rational laws, the moral law must be universal • Kant, is one of the more difficult to read philosophers but quite interesting. • A good example (for readability and understandability) can be found on pg. 16 (you read). Understanding Kant • Kant’s universal law is expressed as what is called the categorical imperative: • “I should never act except in such a way that I can also will that my maxim should become a universal law.” • The imperative is “categorical” because it does not allow for any exceptions • A maxim (as used here) is an implied general principle or rule understanding a particular action Clarifying • Read middle of pg 16 steve Difficulties with Kant’s Framework • Kant’s moral philosophy is very rigid • No exceptions to the moral laws derived from the absolute categorical imperative • Lying is always wrong even though we can think of times where it might seem reasonable (to save a life) – In examples like this, there is a conflict of moral laws – The law to tell the truth and the law to save a life in jeopardy Another duty-based philosopher (William D. Ross) • Believes we must follow several basic duties that we know through simple reflection • The duties are conditional and not absolute – Under normal circumstances we would follow a particular duty – But, in those unusual situations where duties conflict with one another, one duty may be overridden by another duty that is judged to be superior (at least in this environment). – Ross, unlike Kant, allows exceptions – One criticism of Ross’ work is that his list of 7 moral duties is incomplete – But, like other frameworks we have discussed, it does have some merit New Natural Law (p18) • Often neglected in business and computer ethics books • Claim is its too “impractical” and too closely associated with the philosophy of St. Thomas Aquinas • The new natural law (John Finnis and Germain Grisez) is faithful to the theories of Aquinas but modified to address contemporary moral problems • They claim the first practical principle is: “Good should be done and evil avoided, “ where good means what is intelligibly worthwhile More on the New Natural Law • What is the good? • Finnis considers 7 human goods key to human flourishing: life and health, knowledge of the truth, play (and some forms of work), aesthetic experience, sociability (includes friendship and marriage), religion, and practical reasonableness • This framework provides another way to look at ethical dilemmas in cyberworld • It asks us to consider whether certain policies or actions are consistent with human flourishing • Does Spamming pass the test? • Pg. 21 has a table with a summary of the theoretical frameworks that we have discussed and the general questions that one asks in determining if an action is moral or not. Normative Principles (p21) • • • • When ethical theory is too abstract, an approach called principilism can be used. Often used in biomedical ethics These moral principles are derived from an compatible with all of the moral theories previously mentioned in the text They describe prima facie duties that are always in force but may conflict on occasion – This term was introduced back on page 17 (re-read) – –noun 1.at first appearance; at first view, before investigation.2.plain or clear; self-evident; obvious. – adv. At first sight; before closer inspection: They had, prima facie, a legitimate complaint. adj. – True, authentic, or adequate at first sight; ostensible: prima facie credibility. – Evident without proof or reasoning; obvious: a prima facie violation of the treaty. Principilism • • Principlism is a system of ethics based on the four moral principles of: 1. Autonomy--free-will, one’s capacity to be autonomous or self-determining – When someone is deprived of their autonomy, their plans are interfered with and they are not treated with the respect they deserve • 2. Beneficence—a positive duty, to do good, we should act in such a a way that we advance the welfare of other people when we are able to do so – When do we have such a duty to act? • 1. the need is serious or urgent • 2. we have knowledge or awareness of the situation, and • 3. we have the capability to provide assistance (“ought assumes can” is the operative principle – Author comments, that this principle has some relevance when we evaluate society’s questionable duty of beneficience to provide universal Internet service. Prinicpilism Continued • 3. Nonmaleficence--not to harm, and or, “above all, do no harm” • 4. Justice– follows a basic formal principle: “Similar cases ought to be treated in similar ways.” – Justice requires fair treatment and impartiality – Determining “similar” cases leads to an underlying principle for how we should distribute the benefits and burdens of social life – Leading to theories of distributive justice • “all goods should be distributed equally”; although John Rawls has argued that an unequal distribution of goods is acceptable when it works for the advantage of everyone especially the least advantaged (called the difference principle). • Or, benefits or resources should be distributed according to the contribution each individual makes to the furtherance of society’s goals • Another, “from each according to his ability, to each according to his needs.” • Not choosing one over another, moral judgments should be based in part on the formal principle of justice. Concluding Principilism • Advocates for principilism argue that from the beginning of recorded history most moral decision-makers descriptively and prescriptively have used these four moral principles; that they are part of or compatible with most intellectual, religious, and cultural beliefs. End of Chapter • Hand out homework assignment