Cyberethics Scenario I • Consider the following question: If you could use a computer to steal enough money so that you and no other member of your family would every have to work again, and there was no chance that you would get caught, would you do it? • If you answered yes, then why? • If you answered no, then why not? • If there were a chance of being caught, does that change your answer? • If there were a good chance of being caught, does that change your answer? Cyberethics Defined Scenario 1 is just an example of a much larger field of study called Cyberethics Wikipedia defines Cyberthics as “the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society.” Cyberethics Examples There are many examples that would fall under the heading of cyberethics but here are a few such questions: • • • • • • • • If it is on the internet, is it ok to copy it? If you find an open port into a machine, it it ok to explore that machine? Is it ok to post false information about another individual or group? What is the definition of pornography and should access to it be limited on the internet? Where is the line between satire and blasphemy and who gets to decide? Is it ok to create a program the purpose of which is to provide illicit access to other people’s data? Is it acceptable to write a program that provides guidance to a nuclear device? Is it ok to hack if you are hacking for the “good guys?” ACM Code of Ethics These are not new questions. Many of these questions have been around since the beginning of mankind, they are simply now applied to the internet. For folks new to this discussion, a reasonable place to start is the ACM Code of Ethics. • ACM stands for Association for Computing Machinery • This is the parent professional organization for all of Information Technology (IT) • For those that wish to be IT professionals, it is a good idea to know and follow the ACM Code of Ethics but it is not just for IT professionals ACM Code of Ethics The ACM Code of Ethics is divided into multiple sections including: • • • • General Moral Imperatives More Specific Professional Responsibilities Organizational Leadership Imperatives Compliance with the Code General Moral Imperatives As an ACM member I will … • • • • • • • • Contribute to society and human well-being Avoid harm to others Be honest and trustworthy Be fair and take action not to discriminate Honor property rights including copyrights and patents Give proper credit for intellectual property Respect the privacy of others Honor confidentiality More Specific Professional Responsibilities As an ACM computing professional I will … • Strive to achieve the highest quality, effectiveness and dignity in both the process and products of professional work • Acquire and maintain professional competence • Know and respect existing laws pertaining to professional work • Accept and provide appropriate professional review • Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks • Honor contracts, agreements, and assigned responsibilities • Improve public understanding of computing and its consequences • Access computing and communication resources only when authorized to do so Organizational Leadership Imperatives As an ACM member and an organizational leader, I will … • Articulate social responsibilities of members of an organizational unit and encourage full acceptance of those responsibilities • Manage personnel and resources to design and build information systems that enhance the quality of working life • Acknowledge and support proper and authorized uses of an organization's computing and communication resources • Ensure that users and those who will be affected by a system have their needs clearly articulated during the assessment and design of requirements; later the system must be validated to meet requirements • Articulate and support policies that protect the dignity of users and others affected by a computing system • Create opportunities for members of the organization to learn the principles and limitations of computer systems Compliance with the Code As an ACM member I will … • Uphold and promote the principles of this Code • Treat violations of this code as inconsistent with membership in the ACM Scenario I • Lets reconsider our first question: If you could use a computer to steal enough money so that you and no other member of your family would have to work ever again, and there was no chance that you would ever get caught, would you do it? • If you answered yes, then why would you assume that no one would do this to you? • If you answered yes, then why would you ever place your money in a bank, credit union, or other financial institution? • If you answered yes, then perhaps you should not be an IT Professional!! Responsibility In our discussion, we have returned often to the word Responsibility. Lets consider what this word means. Wiktionary defines responsibility as “the state of being responsible, accountable, or answerable” OR as “a duty, obligation, or liability for which someone is held accountable.” For our purposes, lets consider four types of responsibility: • • • • Role Responsibility Causal Responsibility Blameworthy Liable Role Responsibility Role Responsibility describes a situation where a person is responsible simply because of the position or role that they occupy. Examples might include: • • • • A parent’s responsibility for their child and the actions of that child A teacher’s responsibility for their class room and the students in it A firefighter’s responsibility to save lives and protect property A software developer’s responsibility for the systems they develop/maintain Causal Responsibility Causal Responsibility describes a situation where a person has done something or failed to do something that has caused an event to occur. Keep in mind that there is no fault necessarily associated with causal responsibility. Examples might include: • A batter hitting a baseball over the outfield fence into a car windshield • The wind of a passing car blowing a piece of trash up into the air that gets stuck to the radiator of another car • A store owner forgetting to turn out the lights when the store is closed causing people to think that store is open • A web developer creating a back door into a system for maintenance that is eventually exploited in a hack Blameworthy Blameworthy describes a situation where a person has done something wrong or failed to do something right that has caused an event to occur. Unlike causal responsibility, there is fault associated with being blameworthy. Examples might include: • • • • A person intentionally throwing a baseball into a car windshield Failing to secure a load on a truck or trailer that comes loose and hits another car A restaurant employee forgetting to turn off the oven causing a fire A software developer intentionally creating a back door without the consent of the client for future malicious purposes Liable Liability describes a situation where a person is financially or criminally responsible for something. Keep in mind that it is possible to be liable without being blameworthy! Examples might include: • • • • A parent’s financial responsibility for the window their child broke A drunk driver’s responsibility for the injuries or deaths of others A company’s responsibility for the failure of a project A software developer’s for their code allowing the theft of millions of dollars Scenario II • Consider the following question: Eventually, as you learn about computers, operating systems, the internet and cyber security, you may have the skills to attempt to penetrate other people’s systems. Lets say that you successfully penetrate someone else’s computer without permission but that you do not do anything malicious. Is this ethical or not? • If you answered yes, then why? • If you answered no, then why not? • If there were a chance of being caught, does that change your answer? • If the law makes this clearly illegal, does that change your answer? Scenario II (continued) • Non-malicious hacking Some hackers attempt to make the case that as long as they do not do anything malicious, then they have not done anything wrong Some even argue that they are helping to discover flaws in security or operating systems However, doing so without permission is at best un-ethical and at most illegal Scenario III • Consider the following question: Taken from the movies Ferris Bueller’s Day Off and War Games, let’s suppose that your school’s computer system is not secure, that you have the ability to penetrate that system and change grades, attendance records, etc. Let’s also suppose that you are .001 points away from graduating with a GPA that would qualify you for thousands of dollars in scholarships. It would only take changing one grade from a B to a B+ to qualify. Would you do it? • If you answered yes, then why? • If you answered no, then why not? • If there were a chance of being caught, does that change your answer? • If the law makes this clearly illegal, does that change your answer? Scenario III (continued) • Hacking for “good” cause Some hackers attempt to make the case that as long as they are not hurting anyone and their motives are “good”, then they have not done anything wrong However, they may be missing the fact that by cheating their way to scholarship eligibility, they may be taking money away from students that actually earned it This kind of hacking is absolutely illegal Scenario IV • Consider the following question: You are working on a paper for a class and you find a very similar paper on the internet. You want to use significant parts of the paper in your paper but you are unsure how much is too much. What do you do? • • • • It is on the internet so it is fair game, copy it! Since you don’t know how much is too much, don’t use any of it? Use appropriate excerpts and quotes but with proper citation. They are only saying what you would have said anyway, so what is the harm in using it. Scenario IV (continued) Copyright and Fair Use Lets get some basics out of the way: • All creative works are covered by Copyright law from the moment they are created • Copyrights can be registered with the federal government but do not have to be registered to be enforced as long as the authorship can be determined • Plagiarism – claiming someone else’s work as your own – is simply wrong – period! • There are exceptions to copyright and most of these are in the Doctrine of Fair Use Scenario IV (continued) Fair Use The Doctrine of Fair Use provides limited exceptions to copyright: • The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes • The nature of the copyrighted work • The amount and substantiality of the portion used in relation to the copyrighted work as a whole • The effect of the use upon the potential market for, or value of, the copyrighted work Scenario IV (continued) The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes This means two things: • You can use work covered by copyright for nonprofit educational purposes, but • You cannot deprive the copyright holder from the right to profit from the copyright This means, for example, that a professor may be able to share an excerpt from work but they cannot simply copy an entire textbook and given it to their students. Scenario IV (continued) The nature of the copyrighted work While some may interpret this as referring to the subjective quality of a creative work, it actually refers primarily to the distinction between facts and expression. For example, the fact that the Normandy D-Day invasion took place on June 6, 1944 is a fact and is not covered by copyright. However, an expression of that fact such as the book, and the movie, “The Longest Day’, is covered by copyright. Scenario IV (continued) The amount and substantiality of the portion used in relation to the copyrighted work as a whole An example of this would be copying a particular chart, graph, or algorithm out of a book as opposed to copy the entire book. While there is no set limit on the number of characters, words, or pages that is safe to copy, the legal threshold falls back upon whether you may be depriving the copyright holder from the right to profit. Thus if you copy an entire magazine article and distribute it to your friends, you are most likely in violation. However, quoting a line or two with proper citation is likely acceptable. Scenario IV (continued) The effect of the use upon the potential market for, or value of, the copyrighted work This is the standard of do not deprive the copyright holder of the right to profit from their copyright. However, there are some exceptions even to this. For example, a movie critic may blast a movie causing a lot of people to not pay to see it. While this deprives the copyright holder, parody and critique are expressly allowed under copyright law. Scenario IV (continued) Fair Use Examples As reported in the 1961 Report of the Register of Copyrights on the General Revision of the U.S. Copyright Law here are some typical examples of “fair use” exceptions to copyright: “quotation of excerpts in a review or criticism for purposes of illustration or comment; quotation of short passages in a scholarly or technical work, for illustration or clarification of the author’s observations; use in a parody of some of the content of the work parodied; summary of an address or article, with brief quotations, in a news report; reproduction by a library of a portion of a work to replace part of a damaged copy; reproduction by a teacher or student of a small part of a work to illustrate a lesson; reproduction of a work in legislative or judicial proceedings or reports; incidental and fortuitous reproduction, in a newsreel or broadcast, of a work located in the scene of an event being reported.” More Information For more information: • Copyright and Fair Use • http://www.copyright.gov/fls/fl102.html • http://en.wikipedia.org/wiki/Fair_use • Terms and Definitions related to cyber-security and cyberethics • http://niccs.us-cert.gov/glossary • http://www.sans.org/security-resources/glossary-of-terms/ • Cyberethics • http://en.wikipedia.org/wiki/Cyberethics • Recommendations on best practices • http://www.microsoft.com/security/online-privacy/cyberethics-practice.aspx