computer ethics. 2 networking * the internet is a network of networks that uses two protocols, known...

18
Computer Ethics

Upload: joel-barnett

Post on 12-Jan-2016

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

Computer Ethics

Page 2: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

2

Networking

* The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. 

* The first part of an email address (before the@ sign) identifies a particular computer user. The second part of an email address (after the @ sign) contains a domain name.

Page 3: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

• Spam is unsolicited, bulk email.

• Amount of email that is spam has increased– 8% in 2001– 40% in 2003– More than 50% in 2004

• Spam is effective– Cheap – Profitable even if only 1 in 100,000 buys

product

Page 4: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

• How firms get email addresses– Opt-in lists– Dictionary attacks

• Spammers seek anonymity– Change email and IP addresses to disguise

sending machine– Hijack another system as a spam launch pad

• Spam blockers– Attempt to screen out spam– Have led to more picture-based spam

Page 5: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

• A spam blocker attempts to keep spam from reaching someone’s mailbox by identifying and discarding (or routing to a special folder) emails that appear to be spam.

• Mail Abuse Protection System (MAPS) maintains a list of networks that either forward spam or allow spam to be created. The list is called the Realtime Blackhole List. Some Internet service providers refuse to accept email sent from hosts on the Realtime Blackhole List.

Page 6: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

• MAPS is a not-for-profit organization

• Contacts marketers who violate MAPS standards for bulk email

• Puts marketers who violate standards on a Realtime Blackhole List (RBL)

• Some mail relays refer to RBL list– Looks up email host name on RBL list– If name on list, the email gets bounced back

• All email from blacklisted hosts gets bounced, even email from non-spammers

Page 7: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

• Ethical Evaluation of Spamming

• Kantian evaluation

• Act utilitarian evaluation

• Rule utilitarian evaluation

• Social contract theory evaluation

• From all these perspectives, it is wrong to send spam

Page 8: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

• Attributes of the Web:

• It is decentralized

• Every Web object has a unique address

• It is based on the Internet

Page 9: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

Oher uses of the Web:

• (a) We sell stuff in on-line auctions (such as eBay).

• (b) We seek medical information from on-line special interest groups of people suffering from particular diseases.

• (c) We learn about the weather.

• (d) We find out about current traffic conditions before deciding whether to leave work.

.

Page 10: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

Controlling The Web:

• Not everyone in world has Internet access

• Sudan: centralized control center

• People’s Republic of China: ISPs sign“self-discipline” agreement

• Germany: Forbids access to neo-Nazi sites

• United States: Repeated efforts to limit access of minors to pornography

Page 11: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

• Censorship : Is the attempt to suppress or regulate public access to material considered offensive or harmful.

• Direct censorship– Government monopolization– Prepublication review– Licensing and registration

• Self-censorship – Most common form of censorship– Group decides for itself not to publish

materials

Page 12: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

• Censorship is difficult on the Internet because:

• (a) The Internet supports many-to-many communication. The Internet has far more information outlets than television or radio.

• (b) The Internet is dynamic. Millions of computers are being added to the Internet every year.

• (c) The Web is huge, containing billions of pages. Nobody can keep track of everything published on the Web.

Page 13: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

• (d) The Internet is global. Laws passed in one nation may have no effect outside that nation’s borders.

• (e) It is hard to distinguish between children and adults on the Internet.

Page 14: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

• Challenges Posed by the Internet

• Internet supports many-to-many communication

• Internet is dynamic

• Internet is huge

• Internet is global

• Difficulty distinguishing between children and adults online

Page 15: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

Children and the Web

• Many parents believe they ought to protect their children from exposure (display) to pornographic and violent materials on the web.

• Child Internet Protection Act (CIPA)– Libraries receiving federal networking funds

must filter pages containing obscenity or child pornography.

Page 16: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

Web filters

• Web filter: software that prevents display of certain Web pages– May be installed on an individual PC– ISP may provide service for customers

• Methodologies– Maintain “black list” of objectionable sites– Examine content for objectionable

words/phrases

16

Page 17: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

Ethical evaluations of CIPA

– Kantian evaluation: CIPA is wrong– Act utilitarian evaluation: depends on how

benefits and harms are weighed– Social contract theory: freedom of conscience

should be given precedence

17

Page 18: Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The

Identity theft

– when a person uses another person’s electronic identity

– Two-thirds of cases begin with an email solicitation

– Many victims are experienced computer users comfortable with typing credit card number online

18