CS499: Computers, Ethics, and Society

CS499: Computers, Ethics, and
Society
Syllabus
 BBVista (check for course updates regularly – at least once per
day!)
 Course website:
https://www.cis.uab.edu/cs499/spring2012/1D
 Book
 Computers, Ethics, and Society: Ermann and Shauf, Oxford, ISBN 0-19-514302-7, 2003.
 Recommended Book
 Structure of Scientific Revolutions,T. Kuhn, Chicago, 3/e.
 Wiki Page:
http://en.wikipedia.org/wiki/The_Structure_of_Scientific_Revolutions
 Google Book Review:
 http://books.google.com/books?id=xnjS401VuFMC&sitesec=reviews&rf=st:us

Syllabus (cont.)
 Course Schedule:
 Faculty and guest lecturers will hold class each week.
 The Major Field Test Examination is taken as a required part of the
course.
 Course Objectives:
 A review of key concepts in the undergraduate level study of
computer science. All professors in the department participate in
giving at least one lecture each (under normal circumstances). Some
may lecture more than once.
 A discussion of various aspects of Computer Ethics.
 Discussion of “Scientific Thought” and philosophy.
 Oral and written communication/presentation about Ethics in
Computer Science Required.
Syllabus (cont.)
 Grading:
 The Major Field Test is a requirement, but undergraduates don’t have to
get a specific grade on it to pass CS 499. It is a learning outcomes
measurement.
 Presentation Summaries (10*25 = 250 points)You must turn in ten
or more one-page (200-250 word) summaries of CS499 lectures you have
attended (or departmental lectures, with instructor’s permission to
substitute). These are lectures by the faculty. Faculty lecturing twice (e.g.,
two days lecture) on same subject, you can only use for a single summary.
 Term Paper (225 points total)You must write a five-to-seven page
(approximately 1500-1800 word) essay about computer ethics based on
readings at the end of the term (see below). Additional assignment rules
and intermediate assignments (title abstract, etc.) plus instructions to be
provided. Correct citation, use of sources, strategy, for written and verbal
presentation all count towards the grade.
Syllabus (cont.)
 Grading (cont.)
 Second paper (200 points) A five-page write-up (1250-
1500 words) on “Structure of Scientific Revolutions” or other
pre-approved will be required. Grading will include emphasis
on grammar, style, quality of writing and relevance of
presentation. Due before the Spring Break.
 Presentation of one of your papers (175 points)You
must make a 15-minute presentation on one of your papers.
PowerPoint slides are required. Detailed instructions to be
provided. This is either the ethics paper, or the “other preapproved topic paper.”
 Class Participation (100 points). Attendance and active
participation.
Syllabus (cont.)
 Late Submission:
 All assignments are due as indicated on BBVista. Any assignment
turned in after this deadline is considered late. Late assignments
will lose 10% for every 24-hour period, up to a maximum of
50% (weekends and holidays count as one 24-hour period). Any
assignment submitted after expiration of time supported on
BBVista will receive a score of zero.
 See BBVista for due dates of the reviews of presentations and
the presentation summaries.
 All required assignments must be turned in even if
they are late to pass this course. Failure to submit any
assignments will result in a grade of ‘F’ for the course.
Syllabus (cont.)
 Class Attendance:
 Attendance is mandatory for this course. If you know you will
be absent for a legitimate reason, let the instructor know. If you
are sick bring a doctor's excuse or a written university excuse
to resolve the absence(s). An absence has to be resolved as soon
as possible - otherwise it will not be treated as an excused
absence.
 The Major Field Test information is documented on BBVista.
You must register for the test.
Syllabus (cont.)
 Academic Honesty:
 Any student who violates the university's academic honesty
policy will be reported for academic discipline. All university
and department policies related to students are included here
by implication.
 IMPORTANT: All papers and summaries will be submitted to
Turnitin for comparison against the most comprehensive digital
repository of potentially plagiarizable material in the world!
Cheating will not be tolerated
 You must do your own homework
 It is acceptable to discuss the reading assignments and general
approaches to solving homework problems with your
classmates
 It is not acceptable to discuss detailed homework answers or
to copy homework answers from other students
 Hopefully you already knew this….
Plagiarism includes, but is not
limited to
Failure to indicate the source with quotation
marks or footnotes where appropriate if any of
the following are reproduced in the work
submitted by a student:
1.
2.
3.
4.
5.
A written phrase.
A graphic element.
A proof.
Specific language.
An idea derived from the work, published or
unpublished, of another person.
Avoiding plagiarism
 If you use someone’s specific words, put them in quotes and
cite the source.
 If you use someone’s ideas expressed in your own words, cite
the source.
 If you paraphrase, summarize in your own words, but still
cite source
 Don’t use the same sentence structure with a few word substitutions
 If you use some of the source’s words, put them in quotes.
 When in doubt, put it in quotes and cite the source!
 Good resource on avoiding plagiarism
 http://www.wisc.edu/writing/Handbook/QPA_plagiarism.html
 Includes nice examples of good and bad paraphrasing
11
Syllabus (cont.)
 E-mail:
 Every student will be required to use his/her official email
address that is blazerid@uab.edu. New students must login and
configure their email addresses. For more details on obtaining
blazerid and configuring email please see:
http://www.uab.edu/blazerid.
 Key email communications will be made using this address. You
must regularly log in to BBVista, since emails will also be sent
there and they do not forward. Assignments and information
will appear only there.
Assignment schedule
 Term paper topic due: Mar. 16th
 Term paper due: Apr. 16th
 Second paper due: Mar. 16th
 Second paper topic due: Feb. 17th
 Presentation summary due:
 Feb. 20th: three summaries due
 Mar. 26th: four summaries due
 Apr. 30th: three summaries due
 Term presentations:
 Apr. 23, 25, 27, and 30 (3 presentations in each session)
Why study ethics?
 Ethical analysis can provide a structured way to evaluate an
issue and choose a course of action
 Ethical analysis can help illuminate multiple sides of an issue
 Ethical analysis can help produce persuasive arguments
 In your personal and professional life you will confront
difficult decisions
14
What is computer ethics
 Problems:
 Internet Privacy
 Spyware
 Browser cookies
 Wikileaks …
 Core issues:
 Professional responsibility, intellectual property rights, privacy,
censorship, and the impact of technology in society
 Social responsibility
 No lecture on 13th but you need to do the required readings
 Reading list will be uploaded to BBVista by tonight.
 Lecture schedule for next two weeks:
 Jan. 16: MLK day (no class)
 Jan. 18: Gary Warner (Computer Forensics)
 Jan. 20th: Wei-Bang Chen (Spam Image Mining)
 Jan. 23rd: ACM distinguished lecture – Software Economics
 2:30 – 3:30pm, HUC Auditorium
 Meeting with students (4pm – 4:40pm)
A Sample Scenario
 You are the senior software engineer at start-up





developing software for handheld computers to help
nurses keep track of patients
Sales force has promised product by next week
Product still contains many minor bugs
No major bugs have been found, but QA recommends
another month of testing
A competitor plans to release a similar product in a few
weeks
If your product is not the first to market your start-up
will probably go out of business
 Should you recommend release of the product next week?
 Who will benefit if the company follows your
recommendation?
 Who will be harmed if the company follows your
recommendation?
 Do you have an obligation to any group of people that may be
affected by your decision?
Subjective Relativism
 Relativism
 No universal norms of right and wrong
 One person can say “X is right,” another can say “X is wrong,”
and both can be right
 Subjective relativism
 Each person decides right and wrong for himself or herself
 “What’s right for you may not be right for me”
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.20
Subjective relativism evaluation of spam
 Spammers say spam is good
 Spam brings advertisements to the attention of some people
who want to buy their products
 Spammers make money
 Purchasers are happy to buy their products (true?)
 Most spam recipients and ISPs say spam is bad
 Spam wastes time and computer resources, congests networks,
slows processing of non-spam email
21
Case for Subjective Relativism
 Well-meaning and intelligent people often disagree on moral
issues
 One example is self-plagiarism – a non ending battle
 Ethical debates are often disagreeable and pointless
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.22
Case Against Subjective Relativism
 Blurs distinction between doing what you think is right and




doing what you want to do
Makes no moral distinction between the actions of different
people
SR and tolerance are two different things
Decisions may not be based on reason
Not a workable ethical theory
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.23
Case for Kantianism
 Rational
 Produces universal moral guidelines
 Treats all persons as moral equals
 Workable ethical theory
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.24
Case Against Kantianism
 Sometimes no rule adequately characterizes an action.
 There is no way to resolve a conflict between rules.
 Monogamy vs Polygamy
 Kantianism allows no exceptions to moral laws.
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.25
Utilitarianism
 Jeremy Bentham and John Stuart Mill
 An action is good if it benefits someone
 An action is bad if it harms someone
 Utility: tendency of an object to produce happiness or
prevent unhappiness for an individual or a community
 Happiness = advantage = benefit = good = pleasure
 Unhappiness = disadvantage = cost = evil = pain
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.26
Principle of Utility
(Greatest Happiness Principle)
An action is right (or wrong) to the extent
that it increases (or decreases) the
total happiness of the affected parties.
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.27
Act Utilitarianism
 Utilitarianism
 Morality of an action has nothing to do with intent
 Focuses on the consequences
 A consequentialist theory
 Act utilitarianism
 Add up change in happiness of all affected beings
 Sum > 0, action is good
 Sum < 0, action is bad
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.28
Bentham: Weighing Pleasure/Pain
 Intensity
 Duration
 Certainty
 Propinquity
 Fecundity
 Purity
 Extent
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.29
Highway Routing Scenario
 State may replace a curvy stretch of highway
 New highway segment 1 mile shorter (benefit)
 150 houses would have to be removed (cost)
 Some wildlife habitat would be destroyed (cost)
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.30
Evaluation
 Costs
 $20 million to compensate homeowners
 $10 million to construct new highway
 Lost wildlife habitat worth $1 million
 Benefits
 $39 million savings in automobile driving costs
 Conclusion
 Benefits exceed costs
 Building highway a good action
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.31
Act utilitarian evaluation of spam
 A spammer sent a spam email to 100 million people
 1 in 10,000 buy product
 90% of people who buy product are happy with it, other




10% feel ripped off
People who don’t buy product waste time and money,
get annoyed, etc. - unhappy
Spammer makes lots of money and is VERY happy
9001 happy people, 99,990,000 unhappy people
Conclusion: 99.991% of people are unhappy, so spam is
wrong
32
Case for Act Utilitarianism
 Focuses on happiness
 Down-to-earth (practical)
 Comprehensive (??)
 Workable ethical theory
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.34
Case Against Act Utilitarianism
 Unclear whom to include in calculations
 Too much work
 Ignores our innate sense of duty
 Susceptible to the problem of moral luck
An example:
China's Three Gorges Dam: An
Environmental Catastrophe?
http://www.scientificamerican.com/a
rticle.cfm?id=chinas-three-gorgesdam-disaster
Sometimes actions do not have
intended consequences - Moral
worth of action is dependent on
consequences that may not be under
control of moral agent
35
Rule Utilitarianism
 We ought to adopt moral rules which, if followed by
everyone, will lead to the greatest increase in total happiness
 Act utilitarianism applies Principle of Utility to individual
actions
 Rule utilitarianism applies Principle of Utility to moral rules
36
Anti-Worm Scenario
 August 2003: Blaster worm infected thousands of Windows
computers
 Soon after, Nachi worm appeared
 Took control of vulnerable computers
 Located and destroyed copies of Blaster
 Downloaded software patch to fix security problem
 Used computers as launching pad to try to “infect” other
vulnerable PCs
37
Evaluation using Rule Utilitarianism
 Proposed rule: If I can write a helpful worm that removes a
harmful worm from infected computers and shields them from
future attacks, I should do so ???
 Who would benefit
 People who do not keep their systems updated
 Who would be harmed
 People who use networks
 People who’s computers are invaded by buggy anti-worms
 System administrators
 Conclusion: Harm outweighs benefits. Releasing anti-worm is
wrong.
38
Case for Rule Utilitarianism
 Compared to act utilitarianism, it is easier to perform the




utilitarian calculus.
Not every moral decision requires performing utilitarian
calculus.
Moral rules survive exceptional situations
Avoids the problem of moral luck
Workable ethical theory
39
Case Against Utilitarianism in General
 All consequences must be measured on a single scale.
 Intangible benefits/costs (must be expressed in dollars?)
 Utilitarianism ignores the problem of an unjust distribution
of good consequences.
 Utilitarianism does not mean “the greatest good of the greatest
number”
 That requires a principle of justice
 What happens when a conflict arises between the Principle of
Utility and a principle of justice?
 Greatest amount of good VS distribute the good as widely as possible ?
40
James Rachels’ Definition (Social
Contract Theory)
“Morality consists in the set of rules,
governing how people are to
treat one another, that rational
people will agree to accept, for their
mutual benefit, on the condition that
others follow those rules as well.”
42
People act out of self-interest w/out agreement
 Morality is the result of an implicit agreement among
rational beings who understand that there is a tension
between self-interest and the common good
 The common good is best realized when everyone cooperates
 Cooperation occurs when those acting selfishly suffer
negative consequences
 Examples: Recycling, energy conservation
43
Kinds of Rights
 Negative right: A right that another can guarantee by leaving
you alone
 Positive right: A right obligating others to do something on
your behalf
 Absolute right: A right guaranteed without exception
 Limited right: A right that may be restricted based on the
circumstances
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.44
John Rawls’s Principles of Justice
 Each person may claim a “fully adequate” number of basic
rights and liberties, so long as these claims are consistent
with everyone else having a claim to the same rights and
liberties
 Any social and economic inequalities must
 Be associated with positions that everyone has a fair and equal
opportunity to achieve
 Be to the greatest benefit of the least-advantaged members of
society (the difference principle)
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.45
Social contract theory evaluation of spam
 Everyone has right to free speech
 You can send email to anyone you want
 No requirement that people listen to your speech
 People can send you angry replies if they don’t like your email
 If 99,990,000 people are unhappy with a spam message,
they should be able to send an angry reply to the
spammer, which should have cost to spammer
 But spammers forge headers so they do not get angry
replies
 This violates social contract, thus spamming is wrong
46
http://r20.rs6.net/tn.jsp?llr=tsagrkfab&et=1109194333284&s=1637&e=001cBGW9zAdR_6
M8XJB2Ov-UnxI0gL3WO3HDXrBZdyfNEIWqb63OgG6_8XtK0I3Jkk72K5ya1gXaowwLtTtOSiZ62ARQOBWkA821Lb852LvxI=
Case for Social Contract Theory
 Framed in language of rights
 Principle of Justice
 Explains why people act in self-interest without common
agreement
 Provides clear analysis of certain citizen/government
problems
 E.g., it provides a logical explanation of why it is morally
acceptable to punish someone for a crime.
 Workable ethical theory
48
Case Against Social Contract Theory
 No one signed contract
 Some actions have multiple characterizations
 Conflicting rights problem
 May unjustly treat people who cannot uphold contract
 What about people who, though no fault of their own, are
unable to follow the moral rules?
49
Mail Abuse Prevention System
 MAPS is a not-for-profit organization
 Contacts marketers who violate MAPS standards for
bulk email
 Puts marketers who violate standards on a Realtime
Blackhole List (RBL)
 Some mail relays refer to RBL list
 Looks up email host name on RBL list
 If name on list, the email gets bounced back
 All email from blacklisted hosts gets bounced, even
email from non-spammers
51
Was the creation of the RBL ethical?
 Utilitarian evaluation:
 ISP using RBL benefits by getting better network performance, fewer angry
users
 But their users are unable to receive email from innocent users of blacklisted
ISPs, reducing their utility
 Innocent users of blacklisted ISPs unable to communicate with ISPs that user
RBL
 Conclusion depends on magnitude of benefit and ratio of blacklisted
innocent users to total email users
 Kantian evaluation:
 MAPS puts ISPs on RBL with goal of getting innocent users to complain and
pressure ISP to drop spammers
 Innocent users are treated as means to an end
 This violates Categorical imperative -> RBL is unethical
52
Research and Communication Skills
Creating a bibliography and citing sources
 Do you know how to create a properly formatted
bibliography?
 Why is a list of URLs not a proper bibliography?
57
Research and Communication Skills
Citing sources
 Whenever you take words, images, or ideas from another source you need to
cite that source
 Direct quotes and paraphrases
 Images,photographs, tables, graphs
 Ideas, measurements, computations
 Also use citations as evidence to back up assertions
 If you use somebody else’s words, you must quote them
 Short excerpts appear in quotes
 Long excerpts (3 or more lines) are introduced and then appear as indented text,




often in a smaller font, single spaced
If you leave out words in the middle use …
If you leave out words at the end use ….
If you substitute or add words, put them in square brackets []
If you add italics say [emphasis added]
 Failure to cite sources = plagiarism
58
Research and Communication Skills
Paraphrasing
 Usually paraphrasing ideas is preferable to quoting unless
 Exact wording is important
 You are quoting famous words
 You are critiquing or comparing specific words rather than ideas
 The original words say what you want to say very well and succinctly
 Usually paraphrasing lets you convey an idea more succinctly
because you can focus on the part of the idea most relevant to
your paper
 If you end up using some of the original words in your paraphrase,
use quotes around those words
59
Research and Communication Skills
Forms of citation
 Full bibliographic citation inline
 Typically used on a slide
 Footnote or endnote
 Used in legal writing, many books, some conferences and
journals
 Inline short citation with bibliography, references cited
section, or reference list
 Used by most technical conferences and journals, some books,
most dissertations
60
Research and Communication Skills
Citations in text
 Format depends on style you are using
 Usually a number or author and date, sometimes a page number reference
too
 Citation usually goes at the end of the sentence
 Privacy is not “absolute,” (Westin 1967).
 Privacy is not “absolute,” [3].
 If Author is mentioned, in sentence, name does not appear in
citation
 Westin (1967, p. 7) claims that individuals must balance a desire for privacy
with a desire to participate in society.
 Multiple citations can appear together
 [3, 4, 5]
 (Westin 1967; Cranor 2002)
61
Research and Communication Skills
Footnotes
 Used heavily in legal writing
 Usually used sparingly in technical writing
 Each footnote appears only once
 If you reference the same source multiple times you must
repeat the reference information, however you can abbreviate
it on second and subsequent references and use ibid to
indicate same as previous reference
62
Research and Communication Skills
Creating a bibliography
 Similar rules apply to other forms of citation (footnotes,
etc.)
 Pick an appropriate style and use it consistently
throughout your paper
 Most conferences and journals have style requirements
 Popular styles: Chicago/Turabian, MLA, APA, APSA
 APA: http://www.apastyle.org/
 Complete bibliographic entry includes author, title, date,
publisher, place of publication, pages, volume number,
etc.
 Bibliographic entries should be ordered - usually either
alphabetically or in order referenced in the text
63
Research and Communication Skills
Word processing tools
 Microsoft Word
 Word has built in support for footnotes and endnotes
 Use cross reference feature for numbered reference lists
 Third party bibliographic add-ons may be useful
 LaTeX
 Built in support for footnotes and endnotes
 Use Bibtex!
64
Spam / Regulating Online Speech
66
Bill of Rights
 First Amendment
 Congress shall make no law respecting an establishment of
religion, or prohibiting the free exercise thereof; or abridging
the freedom of speech, or of the press; or the right of the
people peaceably to assemble, and to petition the government
for a redress of grievances.
67
The Internet can’t be censored
“The Net treats censorship as damage and routes around it.”
- John Gillmore
68
Cartoon dogs are anonymous on the Internet
69
Real dogs are anonymous on the Internet too!
70
Actually, none of this is true
 It is easy to adopt a pseudonym or a persona on the Internet,
but it is difficult to be truly anonymous
 Identities can usually be revealed with cooperation of ISP, local
sys-admins, web logs, phone records, etc.
 The Internet can put up a good fight against censorship, but
in the end there is still a lot of Internet censorship
 Repressive governments and intellectual property lawyers have
been pretty successful at getting Internet content removed
Google and Wikipedia Protest Anti-Piracy Bill
http://news.discovery.com/tech/sopa-googlewikipedia-blackout-120118.html
71
Communications Decency Act
 Title V of the Telecommunications Act of 1996
 Prohibited Internet distribution of indecent or patently
offensive material to minors
 Created restrictions for the Internet similar to broadcast
media
 Introduced by Sen. James Exon (D-Nebraska)
 Cited Marty Rimm study
 Immediately challenged in court
 Supreme Court struck down CDA in 1997 (Reno v.
American Civil Liberties Union)
72
Opposition to the CDA
 Over-broad, vague, unenforceable
 CDA includes “indecency standard”
 Obscenity and child pornography are already illegal to distribute (child pornography
is also illegal to possess)
 But indecency is defined in CDA as “any comment, request, suggestion, proposal,
image, or other communications, that, in context, depicts or describes, in terms
patently offensive as measured by contemporary community standards, sexual or
excretory activities or organs.”
 What community do we look at when regulating the Internet?
 Internet should not be regulated like broadcast
 Law would chill free speech
 Internet filters are a better solution
73
Support for the CDA
 Senator James Exon (D-Nebraska), sponsor of Bill: Need to
protect children from online pornography
 Laws that restrict selling porn to children in other media
should apply to the Internet
 Filters are not sufficient
 Parents may not be able to figure out how to use them
 Children may access computers away from home
74
Platform for Internet Content Selection (PICS)
 Developed by the World Wide Web Consortium
 Specification for associating metadata with Internet content
 Supports self-labels and third-party labels
 Supports the development of many rating systems
 Implemented in MS Internet Explorer and other products
76
How technology tools work
Internet
content
Web
Usenet
Email
Chat
Gopher
FTP
Person or
tool classifies
content
For what age
group is it
appropriate?
Is it educational?
Tool takes
an action
Suggest
Search
Inform
Monitor
Warn
Block
Is it fun?
77
Who does the classification?
 Third-party experts
 Automated tools
 Evaluation of safety tools
 SafeFamilies.org
GetNetWise.org
FilterReview.com
 Local administrators
 Content providers
 Survey or vote
78
Classification scheme
Good for kids
Characteristics of
content
Bad for kids
Age suitability
Who created content
79
Rating systems and vocabularies
Math
Science
English
Spelling
History
French
Spanish
Gym
Art
Music
Drama
A
B
B+
DC
AF
A+
BC
B
80
Descriptive versus subjective
Many
variables
Few
variables
complex
simple
Subjective
Descriptive
81
Can’t derive descriptive from subjective
Characters not well developed
Gratuitous sex and violence
?
Bad acting?
Boring plot?
Bad script?
Dull characters?
Unbelievable premise?
Unoriginal?
Too much violence?
Not enough violence?
82
Scope
 Web sites
 FTP, gopher, etc.
 Chat
 Instant messaging
 Newsgroups
 Email
 Telnet
83
Actions
Suggest
Search
Inform
Monitor
Warn
Block
84
Suggest
 Recommend appropriate content for children
Search
 Select content that is appropriate for children and matches a
query
 Google,Yahoo: SafeSearch
86
Inform
 Provide information about the content
87
Warn
 Provide information about content and recommend against
accessing that content before it is displayed
88
Block
 Prevent children from accessing content
 Guiding Children through Information Searches on
the Internet
 http://www.ils.unc.edu/daniel/214/InternetSearchEngines.html
 Awesome Library - K-12 Education Directory
http://www.awesomelibrary.org/
 "Over 14,000 sites have been classified into a directory, specifically
organized for teachers, students and parents. Information can be found by
browsing or searching." --Search EngineWatch
89
Monitor
 Record for later inspection a list of the content accessed or
attempted to be accessed by a user
 E.g., PC Tattletale offers a Internet Monitoring and
Parental Control Software solution.
90
CDA Sequels
 Child Online Protection Act (COPA) - passed in 1998
 Banned commercial distribution of material harmful to minors
 Struck down by Supreme Court in 2004
 Children’s Internet Protection Act (CIPA) passed in
1999
 Requires schools and libraries that receive federal funds for
Internet access to filter out child pornography, obscene
materials, and materials harmful to minors
 Upheld by Supreme Court in 2003
 Many state laws
 Most have been declared unconstitutional
94
Suing Spammers
Partly based on Serge Egelman’s slides
The Spam Epidemic (1/3)
 Spam: Unsolicited, bulk email
 Spam is profitable
 More than 100 times cheaper than “junk mail”
 Profitable even if only 1 in 100,000 buys product
 Amount of email that is spam has ballooned
 8% in 2001
 90% in 2009
1-96
Statistics
http://www.spamhaus.org/statistics/spammers.lasso
Background
 It’s cheap!
$400,000
 Wider audience
$350,000
 Profit guaranteed
$300,000
 Little work involved
$250,000
$370,000
$200,000
$150,000
$100,000
$50,000
$0
$250
Email
USPS
Background
 Address harvesting
 Web pages
 Forums
 USENET
 Dictionary attacks
 Purchased lists
 No way out
Profile of a Spammer
 Alan Ralsky
 20 Computers
 190 Servers
 650,000 messages/hour
 250 millions addresses
 $500 for every million
messages
 Convicted Felon
 1992 Securities fraud
 1994 Insurance fraud
Technical Means
 Text recognition
 Black hole lists
 Statistical modeling
 Neural networks, SVM, etc.
 Cryptography
 Digital signatures
 Payment schemes
 Image spam analysis
Graylisting
 Whitelist maintained
 Other mail temporarily rejected
 Spammers might give up
 Mail delivery delayed
 Spammers will adapt
The Hunt
 Contact Info
 URLs
 Email Addresses
 WHOIS/DNS
 USENET
 news.admin.net-abuse.email
 Databases:
 Spews.org
 Spamhaus.org
 OpenRBL.org
Virginia Laws
 Virginia’s anti-spam criminal section, it states that if “Volume
of SPAM transmitted exceeds 10,000 in any 24 hour time period,
100,000 in any 30-day time period, or 1 million in any 1 year
period, or revenue generated from specific SPAM exceeds $1,000, or
total revenue generated from all SPAM transmitted to any ISP exceeds
$50,000,” the crime will be published as a Felony.
Pennsylvania Laws
 The Unsolicited Telecommunications Advertisement Act (73
§2250)
 Illegal activities:
 Forged addresses
 Misleading information
 Lack of opt-out
 Only enforced by AG and ISPs
 $10/unsolicited message for ISPs
 10% from AG
Small Claims Court
 Court summons: $30-80
 Maximum claim: $8000
 Winning by default because the spammer didn’t bother to
show up: Priceless
Small Claims Court
 Court summons: $30-80
 Maximum claim: $8000
 Winning by default because the spammer didn’t bother to
show up: Priceless