computer ethics & society

advertisement
COMPUTER ETHICS AND
SOCIETY
LECTURER
HENRY O.QUARSHIE
Basic Concepts and Historical Overview
• Computer ethics is a new branch of ethics that is
growing and changing rapidly as computer
technology also grows and develops. The term
"computer ethics" is open to interpretations both
broad and narrow. On the one hand, for
example, computer ethics might be understood
very narrowly as the efforts of professional
philosophers to apply traditional ethical theories
like utilitarianism, Kantianism, or virtue ethics to
issues regarding the use of computer technology
• On the other hand, it is possible to construe
computer ethics in a very broad way to include,
as well, standards of professional practice,
codes of conduct, aspects of computer law,
public policy, corporate ethics--even certain
topics in the sociology and psychology of
computing.
• In the industrialized nations of the world, the
"information revolution" already has significantly
altered many aspects of life -- in banking and
commerce, work and employment, medical care,
national defense, transportation and
entertainment. Consequently, information
technology has begun to affect (in both good
and bad ways) community life, family life, human
relationships, education, freedom, democracy,
and so on.
• Computer ethics in the broadest sense can be
understood as that branch of applied ethics
which studies and analyzes such social and
ethical impacts of information technology.
• In recent years, this robust new field has led to
new university courses, conferences,
workshops, professional organizations,
curriculum materials, books, articles, journals,
and research centers. And in the age of the
world-wide-web, computer ethics is quickly
being transformed into "global information
ethics".
Definition of Computer ethics
• The name “computer ethics” was not commonly
used until the mid-1970s.when Walter Maner
began to use it. He defined this field of study as
one that examines “ethical problems
aggravated, transformed or created by computer
technology.” Some old ethical problems, he said,
were made worse by computers, while others
came into existence because of computer
technology.
He suggested that we should use traditional ethical
theories of philosophers, such as the utilitarian
ethics of the English philosopher Jeremy
Bentham and John Stuart Mill, or the rationalist
ethics of the German philosopher Immanuel
Kant.
• In her book, Computer Ethics (1985), Deborah
Johnson said that computer ethics studies the
way in which computers “pose new versions of
standard moral problems and moral dilemmas,
exacerbating the old problems, and forcing us to
apply ordinary moral norms in uncharted
realms.”
• In his influential article “What Is Computer
Ethics?” (1985), James Moor provided a
definition of computer ethics that is much
broader and more wide-ranging than those of
Maner or Johnson. It is independent of any
specific philosopher’s theory; and it is
compatible with a wide variety of approaches to
ethical problem-solving.
• Since 1985, Moor’s definition has been the most
influential one. He defined computer ethics as a
field concerned with “policy vacuums” and
“conceptual muddles” regarding the social and
ethical use of information technology:
• Ethics is a set of moral principles that govern the
behavior of a group or individual. Therefore,
computer ethics is set of moral principles that
regulate the use of computers. Some common
issues of computer ethics include intellectual
property rights (such as copyrighted electronic
content), privacy concerns, and how computers
affect society.
All of these thinkers and many others address
problems about computing technology and
human values, seeking to
• Understand the impact of computing technology
upon human values
• Minimize the damage that such technology can
do to human values, and
• Identify ways to use computer technology to
advance human values.
Why Study Computer ethics
• Computer ethics questions can be raised and
studied at various “levels.” And each level is vital
to the overall goal of protecting and advancing
human values. On the most basic level,
computer ethics tries to sensitize people to the
fact that computer technology has social and
ethical consequences.
The prospect of a global village in which everyone
on the planet is connected to everyone else
with regard to computing power and
communication is breathtaking. What is difficult
to comprehend is what impact this will have on
human life. Surely, some of the effects will be
quite positive and others quite negative.
• The question is to what extent we can bring
ethics to bear on the computer revolution in
order to guide us to a better world or at least
prevent us from falling into a worse world.
Aspects of the computer revolution will continue
to spring up in unpredictable ways, in some
cases causing us considerable grief. Therefore,
it is extremely important to be alert to what is
happening.
• Because the computer revolution has the
potential to have major effects on how we lead
our lives, the paramount issue of how we should
control computing and the flow of information
needs to be addressed on an ongoing basis in
order to shape the technology to serve us to our
mutual benefit. We must remain vigilant and
proactive so that we don’t pillage the global
village.
• Although almost everyone would agree that
computing is having a significant, if not a
revolutionary, impact on the world, and that
ethical issues about applications of this surging
technology should be raised, there is
disagreement about the nature of computer
ethics.
• Identifying Policy Vacuums: Moor defines
computer ethics as a field concerned with "policy
vacuums" and "conceptual muddles" regarding
the social and ethical use of information
technology. A typical problem in computer ethics
arises because there is a policy vacuum about
how computer technology should be used.
Computers provide us with new capabilities and
these in turn give us new choices for action.
• Often, either no policies for conduct in these
situations exist or existing policies seem
inadequate. A central task of computer ethics is
to determine what we should do in such cases,
that is, formulate policies to guide our actions.
One difficulty is that along with a policy vacuum
there is often a conceptual vacuum.
• Although a problem in computer ethics may
seem clear initially, a little reflection reveals a
conceptual muddle. What is needed in such
cases is an analysis that provides a coherent
conceptual framework within which to formulate
a policy for action.
• Moor says that computer technology is
genuinely revolutionary because it is "logically
malleable":
Computers are logically malleable in that they can
be shaped and molded to do any activity that
can be characterized in terms of inputs, outputs
and connecting logical operations....Because
logic applies everywhere, the potential
applications of computer technology appear
limitless.
• The computer is the nearest thing we have to a
universal tool. Indeed, the limits of computers
are largely the limits of our own creativity.
• International Ethics in Computing:
In our everyday lives, it is important that we
discuss the ethical issues. What is ethical?
Sociologist Raymond Baumhart replies were the
following:
"Ethics has to do with what my feelings tell me is
right or wrong."
"Ethics has to do with my religious beliefs."
"Being ethical is doing what the law requires."
"Ethics consists of the standards of behavior our
society accepts."
• Today, “computing technology is most powerful
and most flexible technology ever devised. It is
well-known that computing is changing
everything, such as voting, military affairs,
medical care, working, studying, shopping, and
making and communicating with friends.
• . As computers and networks are broadly used,
the confine of computer ethical issues have
become apparent across the whole global
network and computer systems rather than
original a lab where own several computers
• Computer ethics which is generated in
globalization and universal computing must be
“global information ethics”. In other words,
computer ethics should not be isolated in
different regions, it should be international ethics.
Therefore, a new and special field of ethical
issues becomes more important and more
controversial.
• The rapid development of computer networks is
amazing. In 2002, ComScore Media Metrix
company reported that there are 694 million
users in the world wide computer network and
the country with most users is America, the one
with the second highest number of users is
China. Obviously, In many computing ethical
standings America and China have consistent
moral rules.
• Clearly, there are many common computer
ethics between two countries. However, those
inconsistent ethical views in computing cannot
be neglected between two countries with
different social environment. For instance, online
pornography is completely illegal in China.
Beating crime of online pornography is an
important work to government. But in America
there is a legitimate market. Although the market
is of course regulated.
Although different communities have different
cultures and history, computer ethics based on
the similar electric society with computing
technology. The issue about similar in ethics
views in international computing becomes more
important. Firstly, we must ask whether there
exists a uniform basic value of ethics in the
whole human society.
TOPICS IN COMPUTER ETHICS
No matter which re-definition of computer
ethics one chooses, the best way to
understand the nature of the field is
through some representative examples of
the issues and problems that have
attracted research and scholarship.
1: Computers in the workplace: There
economic incentive to replace humans
with computerized devices are very high.
In the industrialized world many workers
have already been replaced by computers.
2. Computer Crime: In the this era of
computer crime, it is clear that computer
security is a topic of concern in the field of
computer ethics.
3: Privacy and Anonymity: One of the
earliest topics to arouse public interest
was privacy. The ease and efficiency with
which computers and computer networks
can be used to gather, store, search and
share personal information make the
computer technology especially
threatening to anyone who whish to keep
various kinds of sensitive information.
4. Intellectual Property: One of the more
controversial areas of computer ethics
concerns the intellectual property rights
connected with software ownership.
5. Globalisation: Computer ethics is rapidly
evolving into a broader and even more
important field, which might reasonably be
called “global information ethics”.
6. Global Cyberbusiness: Nations with a
technological infrastructure already in
place will enjoy rapid economic growth
while the rest of the world lags behind.
Economic implications of computer crime or
abuse
• The internet is growing faster than any
preceding technology. It took just 4 years for
internet to reach 50 million people. Whilst,
television 13 years and radio 38 years.
• In Italy, one out of six people are connected to
the internet.( Nua ltd)
• 65% of internet users have an annual household
income above $50,000.
• Traffic on the internet is doubling every two
days.
• 75% of all internet users have attended or
graduated from college.
• In the year 1997 $2.6 billion in sales was done
on the internet. 2000, $100 billion and 2002
$300 billion. 2003,$1.2 trillion and estimated
$4.8 trillion by 2004.(Boston Consulting Group)
• The internet is faster than the traditional selling method,
which take longer time to complete.
• Information about product are readily available.
• Products can be sold or ordered 24 hours a day, 7 days
a week, 365 days a year without the need for support
staff.
• It creates the atmosphere of a global selling place.
• It offers you a wider audience for products and services
TYPES OF ECONOMIC CRIME
• ELECTRONIC THEFT:
Citibank was subjected to over 40 electronic
thefts by a former Russian employee of a St
Petersburg software house.
Together, with a number of accomplices, he
managed to transfer approximately $7.5 million
to Finland, California, Israel, Germany, Holland
& Switzerland
(source:PCB Lawson House U.S.A)
• Police in London foiled a massive bank theft,
17th March 2005,the plan was to steal £220m
from the London offices of the Japanese bank,
Sumitomo Mitsui. They managed to infiltrate the
system with keylogging software.
• CREDIT CARD FRAUD:
An Internet retailer, C. D. Universe Who refused
to pay $100,000 to a Russian hacker, known as
"Maxim" stole 300,000 Credit Card numbers
from their web site. As a result, the hacker
posted some 25,000 credit card details on the
web, for all to see. (source: PCB Lawson House U.S.A)
• ONLINE AUCTION FRAUD: it is the number
one Internet fraud in the U. S. Goods often don’t
arrive, in one case a Russian fraudster ordered
goods using a stolen credit card, then sold them
on an online auction at a low price to United
States citizens, who then wired money to an
untraceable Latvian bank.. (source:PCB Laws- on House
U.S.A}
• Internet auction fraud accounted for 62 percent
of the 97,076 Internet fraud complaints that the
Internet Crime Complaint Center U.S,A. referred
to law-enforcement agencies for investigation in
2005.
• PYRAMID FRAUD
It entices the victim with promises of
extraordinary returns on investment. Those at
the top of the scheme are initially successful, but
subsequent investors loose all the money
invested. .(source: PCB Lawson House U.S.A)
• FRAUDULENT INTERNET BANKING SITES
The Internet allows fraudsters to offer bogus
credible banking services. It is difficult for the
consumer to discern between genuine and
fraudulent Internet banks. The fraudster
does not need to go to great expense to
dress up his site as genuine and will entice
victims with a promise of high interest
rates..(source: PCB Lawson House U.S.A )
• PHISHING:
This attack occurs when a hacker tries to
get people's banking details electronically
and then use the details to rob bank
accounts.
• A phishing email claiming that The National
Australia Bank (NAB) is bankrupt caught more
than 1,000 of the bank's customers in its net.
It claimed that the bank's ATMs were not
working, This caused panic withdrawals. It
invited them to click on a link that will provide
them with more information.
• The link in fact downloads a Trojan onto the
hapless banker's machine. This stole their bank
login details and password when they follow the
rest of the emailed "advice" to go online to check
their balance.
(Source channel Register, June 19,2006)
• The Anti-Phishing Working Group discovered
that almost 50,000 phishing Web sites were
created in 2005.
(Source: Computer crime research center. March 09,2006)
• CYBERTERRORISM:
This is a very real threat in today’s information
age. Cyberterrorists have at their disposal
weapons that can cause severe destruction.
Cyberterrorists, such as Russian cyber gangs
can attack anyone, anywhere, blackmailing
organizations into paying them millions to
prevent the terrorists from destroying their
systems.
• LOTTERY SCAM
These are emails that tells recipient they have
won a sum of money in a lottery. The recipient is
instructed to keep the notice secret and to
contact an agent. After contacting the "agent",
the recipient will be asked to pay money as fees,
but will never receive any lottery payment.
• At the end of 2005, the U.S. Department of
Treasury announced that cybercrime overtook
drug trafficking .Cybercrime cost $180 billion.
(source:Sun-Sentinel.com June 03, 2006)
• While criminal activity via the Internet is still a
fairly new phenomenon, the FBI ranks it just
behind stopping terrorism and
counterintelligence on their list of priorities.
• Nigerian 419 scam stole the most money off
Internet. Americans reported losing an all-time
high of $183 million to Internet fraud in 2005, up
169 percent from $68 million in 2004.
(Source: Internet Crime Complaint Center)
Social Implication of Computer technology
on Children
• The amount of time and the types of activities
that children engage in while using computers
are key factors influencing whether computer
technology has positive or negative effects on
their development.
• Studies on computer use, on children’s
development, learning, and on the effects of
other media, suggest that excessive,
unmonitored use of computers can be harmful.
Effects on Children’s Development
• Obesity in children is linked to excessive time in
front of a television screen, defined as five or
more hours a day.
• The sedentary time spent in front of a computer
screen could pose a similar risk.
• Reports warn that repetitive, strain injuries may
result when children use computer not designed
for them, and that children’s vision may be
harmed from staring too long at a computer
screen.
• Teens who spend more time online,
communicating with strangers in multi-user
domains and chat rooms, have been found to
experience greater declines in social
involvement and increases in their feelings of
loneliness and depression.
• Playing violent computer games, a popular
activity, especially among boys, has been linked
with increased aggression.
• Other studies show, however, that computer use
can have positive effects on children when used
appropriately.
• Interesting and engaging educational software
and nonprofit Web sites offer children
opportunities to explore the world and to create
original works of art and literature.
• Communicating through the Internet can enable
children to keep in touch with friends and family,
and to form online communities with others who
share their interests.
• Children’s use of home computers is linked to slightly
better academic performance.
• Through training in media literacy and “computer
fluency,” children can learn to recognize and seek out
higher-quality software and Web sites, and learn to use
computers in more active ways to create, design, and
invent.
• More systematic studies are needed to understand how
computer use affects children’s development, and to
help parents, teachers, and policymakers refine and
adopt guidelines that maximize the positive effects and
minimize the negative effects of computers in children’s
lives.
Youth Abuse
• The Youth Internet Safety Survey, conducted by
the Crimes against Children Research Center at
the University of New Hampshire, collected
information about incidents of possible online
victimization through telephone interviews with a
national sample of 1,501 youth ages 10 through
17 who used the Internet regularly (at least once
a month for 6 months).
• The survey addressed three main issues: sexual
solicitations and approaches, unwanted
exposure to sexual material, and harassment.
• The survey revealed that many youth are victims of
online sexual solicitations:
• Almost one in five (19 percent) of the young Internet
users surveyed received an unwanted sexual solicitation
in the past year.
• Five percent of the surveyed youth received a
distressing sexual solicitation (i.e., the solicitation made
them feel very or extremely upset or afraid).
Three percent of the youth received an aggressive
solicitation involving offline contact or attempts or
requests for offline contact.
None of the solicitations led to an actual sexual contact or
assault.
• One-third of the surveyed youth who had received a
solicitation were male; two-thirds were female.
The great majority (77 percent) of the victims were 14 to 17
years old; however, almost one quarter were ages 10 to
13. The younger group reported 37 percent of the
distressing solicitations.
Ninety-seven percent of the solicitors were strangers.
According to the youth, adults (age 18 and older) made
24 percent of all solicitations and 34 percent of
aggressive solicitations. Juveniles made 48 percent of all
solicitations and 48 percent of aggressive solicitations.
(The age of the solicitor was unknown in the remaining
incidents.) Two-thirds of all solicitations came from
males. One quarter of aggressive solicitations came from
females.
• The great majority of exposures involved
pictures with nudity; 38 percent showed people
having sex.
• Eight percent included violent images. Twentythree percent of the incidents of unwanted
exposure were described as very or extremely
upsetting; however, most incidents were not
reported to be distressing. Forty-four percent of
incidents were undisclosed.
• Harassment
The survey also revealed that some youth are
victims of online harassment:
Six percent of the young people surveyed
reported harassment incidents (threats, rumors,
or other offensive behavior) during the past year.
Two percent of the surveyed youth reported
episodes of distressing harassment (i.e., the
incident made them feel very or extremely upset
or afraid).
• Overall, few of the solicitations, exposures, and
harassments were reported to authorities (police,
hotlines, Internet service providers, or teachers).
• For example, only 18 percent of even the most serious
incidents, aggressive solicitations, were reported. When
reports were made, it was mostly to Internet service
providers.
• Most of the families with youth who used the Internet
regularly did not use filtering or blocking software. Thirtyeight percent had used such software at some time in
the past year, but 5 percent had discontinued its use.
• Many young people are being subjected to
dangerous and inappropriate experiences on the
Internet.
• The offenses and offenders are diverse, and the
primary vulnerable population is teenagers. The
study yielded a number of recommendations,
including the following:
• Youth and families should be encouraged to
report incidents to Internet service providers
and, when appropriate, to law enforcement.
• Mental health, school, and family counselors
should receive training about the effects of
online hazards on youth.
More understanding is needed about families’
knowledge of, attitudes about, and experiences
with filtering and blocking software.
• Concern about Internet victimization should not
eclipse efforts to combat other forms of youth
victimization
The Effects of Computer Use on the Eye
• The increased use of computers in the workplace has
brought about the development of a number of health
concerns. Many individuals who work at a computer
report a high level of job-related complaints and
symptoms, including visual discomfort, muscular strain
and stress.
• The level of discomfort appears to increase with the
amount of computer use. Visual discomfort and related
symptoms occurring in computer workers must be
recognized as a growing health problem.
• The complex of eye and vision problems related to near
work experienced during computer use has been termed
"computer vision syndrome".
• Many individuals who work at a computer
experience eye-related discomfort and/or visual
problems. However, based on current evidence
it is unlikely that the use of computers causes
permanent changes or damage to the eyes or
visual system.
• This report will review the factors relating to eye
and vision problems associated with computer
work and provide recommendations for
preventing or reducing their development.
• Eye and Vision Related Complaints
Studies have found that the majority of computer workers
experience some eye or vision symptoms.
However, it is unclear whether these problems occur to a
greater extent in computer workers than in workers in
other highly visually demanding occupations.
• A national survey of doctors in the U.S.A. of optometry
found that more than 14% of their patients present with
eye or vision-related symptoms resulting from computer
work. The most common symptoms are eyestrain,
headaches, blurred vision and neck or shoulder pain.
• The extent to which an individual may experience
symptoms is largely dependent upon his/her visual
abilities in relation to the visual demands of the task
being performed.
• These vision problems are not new or unique to
computer use. Many individuals in other highly visually
demanding occupations will experience similar vision
related problems.
• However, the unique characteristics and high visual
demands of computer work make many individuals
susceptible to the development of eye and vision-related
symptoms.
• Uncorrected vision conditions, poor computer design and
workplace ergonomics and a highly demanding visual
task can all contribute to the development of visual
symptoms and complaints.
Computer Workstation Design and
Placement
• Proper ergonomic design and adjustment of the
computer and the work environment can increase
productivity and worker comfort by decreasing the visual
demands of the task. Overall display legibility is an
important factor in visual performance.
• Screen brightness and contrast should be adjusted to
provide balance with room lighting and maximum
visibility.
• Lowering screen brightness will generally reduce
problems related to image stability or character flicker.
• Regular cleaning of the computer screen according to
manufacturers' directions will remove dust and dirt that
may also interfere with screen visibility.
• The color of computer screen characters may
also affect their ease of visibility.
• Adjustment of the workstation to meet the
individual needs of the operator is also important
for overall performance and comfort. Inadequate
viewing distances and angles can impose the
necessity for awkward postures when viewing a
computer screen.
• The appropriate distance from the eyes to the
computer screen is determined, in part, by the
size of the letters on the screen and the
adjustability of the workstation .
THE INTERNET AND PORNOGRAPY
• As at 2003, there were 1.3 million pornographic
websites; 260 million pages (N2H2, 2003).
• The total porn industry revenue for 2006: $13.3
billion in the United States; $97 billion worldwide
(Internet Filter Review).
• Unique worldwide users visiting adult web sites
monthly: 72 million (Internet Filter Review).
• Number of hardcore pornography titles released
in 2005 (U.S.): 13,588 (Internet Filter Review).
• Adults admitting to Internet sexual addiction:
10%; 28% of those are women (internet-filterreview.com).
• More than 70% of men from 18 to 34 visit a
pornographic site in a typical month (comScore Media
Metrix).
• More than 20,000 images of child pornography
posted online every week (National Society for the
Prevention of Cruelty to Children, 10/8/03).
• Approximately 20% of all Internet pornography
involves children (National Center for Mission & Exploited
Children).
• 100,000 websites offer illegal child pornography (U.S.
Customs Service estimate).
• As of December 2005, child pornography was a $3
billion annual industry (internet-filter-review.com).
"At a 2003 meeting of the American Academy of
Matrimonial Lawyers, two thirds of the 350 divorce
lawyers who attended said the Internet played a
significant role in the divorces in the past year, with
excessive interest in online porn contributing to more
than half of such cases. Pornography had an almost
non-existent role in divorce just seven or eight years
ago." (Divorcewizards.com)
• A 1996 Promise Keepers survey at one of their stadium
events revealed that over 50% of the men in attendance
were involved with pornography within one week of
attending the event.
• 51% of pastors say cyber-porn is a possible temptation.
37% say it is a current struggle (Christianity Today,
Leadership Survey, 12/2001).
• Over half of evangelical pastors admits viewing
pornography.
• Roger Charman of Focus on the Family's Pastoral
Ministries reports that approximately 20 percent of the
calls received on their Pastoral Care Line are for help
with issues such as pornography and compulsive sexual
behavior.
• In a 2000 Christianity Today survey, 33% of
clergy admitted to having visited a sexually
explicit Web site. Of those who had visited a
porn site, 53% had visited such sites “a few
times” in the past year, and 18% visit sexually
explicit sites between a couple of times a month
and more than once a week.
• 57% of pastors say that addiction to
pornography is the most sexually damaging
issue to their congregation (Christians and Sex
Leadership Journal Survey, March 2005).
• Statistics on Women with Pornography
Addiction
• 28% those admitting to sexual addiction are
women (internet-filter-review.com).
• 34% of female readers of Today's Christian
Woman's online newsletter admitted to
intentionally accessing Internet porn in a recent
poll and 1 out of every 6 women, including
Christians, struggles with an addiction to
pornography (Today’s Christian Woman, Fall 2003).
• Statistics on Pornography's Effect on
Families and Marriages
• 47% percent of families said pornography is a
problem in their home (Focus on the Family Poll, October
1, 2003).
• The Internet was a significant factor in 2 out of 3
divorces (American Academy of Matrimonial Lawyers
in 2003 - divorcewizards.com).
• Statistics on Child Pornography Use
• 9 out of 10 children aged between the ages of 8
and 16 have viewed pornography on the
Internet, in most cases unintentionally (London
School of Economics January 2002).
• Average age of first Internet exposure to
pornography: 11 years old (internet-filter-review.com).
• Largest consumer of Internet pornography: 12 17 year-old age group (internet-filter-review.com).
• Youth with significant exposure to sexuality in
the media were shown to be 2.2 times more
likely to have had intercourse at ages 14 to 16
(Report in Pediatrics, April, 2006).
"Never before in the history of
telecommunications media in the United States
has so much indecent (and obscene) material
been so easily accessible by so many minors in
so many American homes with so few
restrictions."
EFFECTS OF PORNOGRAPY ON
CHILDREN
1.
Make Children Victims of Sexual Violence
The more pornography these individuals
access, the higher the risk of their acting
out what they see, including sexual
assault, rape, and child molestation.
2:Frequently Results in Sexual Illnesses, Unplanned
Pregnancies, and Sexual Addiction
As more and more children are exposed not only
to soft-core pornography, but also to explicit
deviant sexual material, they are learning an
extremely dangerous message from
pornographers: Sex without responsibility is
acceptable and desirable. Because pornography
encourages sexual expression without
responsibility, it endangers children's health.
3:Incite Children to Act Out Sexually against Other
Children.
Children often imitate what they've seen, read, or heard.
Studies suggest that exposure to pornography can
prompt kids to act out sexually against younger, smaller,
and more vulnerable children.
Experts in the field of childhood sexual abuse report that
any premature sexual activity in children always
suggests two possible stimulants: experience and
exposure. This means that the sexually deviant child
may have been molested or simply exposed to sexuality
through pornography.
4:It Shapes Attitudes and Values.
Ones children are exposed to pornography,
• They began to trivialize rape as a criminal
offense or no longer considered it a crime at all,
developed distorted perceptions about sexuality,
They developed an appetite for more deviant,
bizarre, or violent types of pornography (normal
sex no longer seemed to do the job), and lacked
confidence in marriage as either a viable or
lasting institution.
5:Interferes with a Child's Development and Identity .
During certain critical periods of childhood, a child's brain is
being programmed for sexual orientation. During this
period, the mind appears to be developing a "hardwire"
for what the person will be aroused by or attracted to.
Exposure to healthy sexual norms and attitudes during this
critical period can result in the child developing a healthy
sexual orientation. In contrast, if there is exposure to
pornography during this period, sexual deviance may
become imprinted on the child's "hard drive" and become
a permanent part of his or her sexual orientation
PUBLIC POLICY ON CHILD
PORNOGRAPY
• Just as there are laws to protect young people
up to a certain age from the possible harmful
effects of alcohol and tobacco, so there should
be laws to protect them from the even more
harmful effects of exposure to pornography.
America has the following laws.
• Children's Internet Protection Act of 2000
(CIPA)
CIPA requires public schools and libraries
receiving federal e-rate funds to use a portion of
those funds to filter their Internet access. They
must filter out obscenity on library computer
terminals used by adults and both obscenity and
harmful-to-minors materials on terminals used
by minor children.
• Child Online Protection Act of 1998 (COPA)
COPA makes it a crime for commercial websites
to make pornographic material that is "harmful to
minors" available to juveniles.
The purpose of COPA is to protect children from
instant access to pornographic "teaser images"
on porn syndicate Web pages. This much
needed legislation requires pornographers to
take a credit card number, adult verification
number, or access code to restrict children's
access to pornographic pictures, and allow
access to consenting adults.
• Child Protection and Sexual Predator Punishment
Act of 1998
This law increases protections for children from sexual
predators. This Act has two central provisions: The first
requires Internet Service Providers (ISPs) to report
evidence of child pornography and abuse violations to
law enforcement, and the second establishes a "zerotolerance" policy toward the possession of child
pornography. The possession law allows prosecution for
illegal possession of even one item of child pornography.
Legal Implication
• The legal system must respond to the new
technological environment in an effective
and appropriate way.
• The most fundamental issue in the
determination of the scope of protection in
the digital environment is, how rights are
defined, and what exceptions and
limitations are permitted.
• Other major issues include how rights are
enforced and administered in this
environment and who in the chain of
dissemination of infringing material can be
held legally responsible for the
infringement.
• The potential liability of online service and
access providers for infringements taking place
through their services has been the subject of
intense debate and lawsuits in recent years. The
liability issue has significant international
implications.
• The Internet being a borderless medium, and its
markets are global, it is crucial that the
approaches to the liability issue be compatible
around the world.
• The Global Information Infrastructure
Commission, an independent, non-govern
mental initiative involving communications
related industry leaders from developing
as well as industrialised countries,
identifies and defines seven major areas
to be addressed under the rubric of
consumer protection in electronic
commerce:
1:Truth in Advertising- In the electronic
marketplace, people lack the face-to-face
interaction of the traditional marketplace.
In addition, they cannot hold or test a
product before they buy. As a result, they
must rely on the information presented to
them online. Truth in advertising or
providing accurate information to the
consumer is essential if there is to be a
trust in the digital medium.
2:Electronic Contracting- Different legal
and private sector rules may apply to
business-to-consumer transactions. The
global nature of electronic commerce
poses questions about what requirements
are necessary for writing, carrying out, and
enforcing contracts.
3:Consumer Redress- In order to foster
consumer confidence in the electronic
marketplace, there needs to be an
effective means of resolving consumer
complaints or problems.
4:Online Fraud- The same types of
consumer fraud that exist in the real
marketplace are surfacing online. The
problem is complicated by the transitory
nature of the electronic marketplace and
the ability to maintain anonymity.
5:Privacy Protection- The growth of
electronic commerce and rapid
development of networking technologies
have revolutionized the way in which data
can be stored, accessed, and processed.
Consumers are not likely to participate in
the global marketplace without assurances
that their personal data exchanged during
a transaction will be protected.
6:Authentication and Security- Security
and authentication mechanisms can
provide the means to ensure and maintain
the integrity of information being
exchanged. These technological advances
will help promote trust and confidence in
electronic transactions.
• Consumer Education- As with any type of
commercial transaction, there are risks
associated with electronic commerce that may
not be able to be resolved by an updated
regulatory scheme or with technology.
Consumer education can help provide
consumers the information they need to make
informed decisions and provide information
about the consumers' rights and obligations
when conducting electronic transactions.
CYBERLAW
• Computer crime laws (sometimes referred
to as cyberlaw ) around the world deal with
some of the core issues;
• Unauthorised modification or destruction.
• Discloser of sensitive information
• Unauthorised access
• Use of malicious software (virus, malware
etc )
• Although we usually only think of the
victims and their systems that were
attached during a crime, laws have been
created to combat three categories of
crime.
• 1: Computer-assisted crime, where a
computer was used as a tool to help carry
out a crime.
• 2: Computer-targeted crime, concerns
incidents where a computer was the victim
of an attack crafted to harm it (and its
owners ) specifically ).
• 3: Computer is incidental, this is where a
computer is not necessary the attacker or
• Attackee, but just happened to be involved
when a crime was carried out.
Computer-assisted crimes
• Attacking financial systems to carry out
theft of funds and or sensitive information
• Obtaining military and intelligence material
by attacking military systems
• Carrying out industries spying by attacking
competitors and gathering confidential
business data.
• Carrying out information warfare activities
by attacking critical national infrastructure
systems
• Carrying out hactivism, which is protesting
a government or company’s activities by
attacking their systems and/ or defacing
their web sites.
Computer-targeted crime
• Distributed Denial- of- service(DDos )
attacks.
• Capturing passwords or other sensitive
data
• Installing malware with the intent to cause
destruction
• Installing rootkits and sniffers for malicious
purposes.
• Carrying out a buffer overflow to take
control of a system.
Download