herbert g. mayer, psu cs status 7/29/2012 slides derived from prof. wu-chang feng

41
1 CS 305 Social, Ethical, and Legal Implications of Computing Chapter 3 WWW to Wireless Communication Herbert G. Mayer, PSU CS Herbert G. Mayer, PSU CS Status 7/29/2012 Status 7/29/2012 Slides derived from prof. Wu-Chang Feng Slides derived from prof. Wu-Chang Feng

Upload: yeva

Post on 26-Jan-2016

39 views

Category:

Documents


1 download

DESCRIPTION

Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng. CS 305 Social, Ethical, and Legal Implications of Computing Chapter 3 WWW to Wireless Communication. Syllabus. Spam Electronic Mail Why Spam? How Done? Spam and Ethics CAN Spam Class Exercise - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

1

CS 305Social, Ethical, and LegalImplications of Computing

Chapter 3WWW to Wireless Communication

Herbert G. Mayer, PSU CSHerbert G. Mayer, PSU CSStatus 7/29/2012Status 7/29/2012

Slides derived from prof. Wu-Chang Feng Slides derived from prof. Wu-Chang Feng

Page 2: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

2

Syllabus Spam Electronic Mail Why Spam? How Done? Spam and Ethics CAN Spam Class Exercise Solutions to Spam World-Wide Web Censorship Freedom of Expression Discussions in Class

Page 3: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

3

Spam SPAM? No: Spam! Spam is not an acronym Spam is unsolicited bulk information sent indiscriminately

Possibly derived as a second meaning of derided product: Spam from Hormel Corp. known as SPiced hAM

Spam is one of email’s not so desired side-effects SPIT is Spam over Internet Telephony In 2000 Spam accounted for 8% of all email In 2003 Spam accounted for 40% of all email In 2009 Spam accounted for 90% of all email In 2011 Spam is estimated to account for ~7 Trillion emails

In my last year working at Intel, I received ~200 emails a day on average; a week of vacation turned into an email disaster; I treated some like SPAM: Delete! Delete! Delete!

Page 4: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

4

Electronic Mail

Three major components: Three major components: user agents mail servers Simple Mail Transfer Protocol: SMTP

User AgentUser Agenta.k.a. “mail reader”composing, editing, reading mail messages

e.g., Eudora, Outlook, elm, Mozilla Thunderbird

outgoing, incoming messages stored on server

user mailbox

outgoing message queue

mailserver

useragent

useragent

useragent

mailserver

useragent

useragent

mailserver

useragent

SMTP

SMTP

SMTP

Page 5: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

5

Electronic Mail: Mail Servers

Mail Servers Mail Servers mailbox contains incoming messages for user

message queue of outgoing (to be sent) mail messages

e.g. sendmail, postfix, Exchange

SMTP protocol SMTP protocol Between mail servers to send email messages

Mail servers are both clients and servers

mailserver

useragent

useragent

useragent

mailserver

useragent

useragent

mailserver

useragent

SMTP

SMTP

SMTP

Page 6: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

6

Electronic Mail: SMTP [RFC 821]

Uses Uses Transmission Control Protocol Transmission Control Protocol (TCP) to (TCP) to reliably transfer message from client to reliably transfer message from client to server, port 25server, port 25 User agent to sending server (sometimes) Sending server to receiving server (always)

Command-Response interactionCommand-Response interaction commands: composing, reading, sending, sending with acknowledgment, replying, replying to all …

response: status code and phrase

Page 7: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

7

Alice emails Bob1) Alice uses UA to compose message, “to” [email protected]

2) Alice’s UA sends message to her mail server; message placed in message queue

3) Client side of SMTP opens TCP connection with Bob’s mail server

4) SMTP client sends Alice’s message over the TCP connection

5) Bob’s mail server places the message in Bob’s mailbox

6) Bob invokes his user agent to read message

7) More complex scenarios with ACK possible

useragent

mailserver

mailserver user

agent

1

2 3 4 56

Page 8: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

8

Spam TodayBy the end of 2011, the majority of all email received is By the end of 2011, the majority of all email received is

unwantedunwanted

Unwanted email can meanUnwanted email can mean Informative for our genuine interests, and thus be enjoyed A bother, since the subject is not of interest Some topics even can be strongly offensive

First level protection:First level protection: Have tools to re-direct spam to junk mail boxes Error-prone, and places some good mail into junk boxes Happened to this instructor with this CS class’s homework; but also due to computer change: MS->Apple

How do we achieve real protection?How do we achieve real protection? Through laws? Then they need enforcement By tools? They need to be strongly refined

spammers will find ways around the tools, and around the spammers will find ways around the tools, and around the laws laws

Page 9: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

9

Why Spam?

Let’s say I want to send an advertisement Let’s say I want to send an advertisement to 1,000,000 “targeted” peopleto 1,000,000 “targeted” people

To send by regular bulk mail, this will cost ~$200-300 k

To send by email, it will cost ~$1 k, i.e. the cost to buy a list of email addresses from an Internet company

email addresses harvested from web sites, mailing lists, chat rooms, and newsgroups, then sold to Spammers

Dictionary attackstrying lots of plausible address combinationskeeping the ones not bouncing backThus putting added strain (bandwidth) to the network

Page 10: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

10

How Done?Run their own server farms for sending SpamRun their own server farms for sending Spam

Typically located off-shore Use ISPs that do not care about Spam Less effective now

with proliferation of blacklists With efforts to shut down rogue ISPs

Locate open mail proxies and bounce Spam through themLocate open mail proxies and bounce Spam through them Less effective

Use networks of compromised machines (botnets)Use networks of compromised machines (botnets) Single, most popular use for a botnet Monetization of botnet to send Spam drives malware effort

Some steps taken to prevent (i.e. ISPs allowing direct port 25 access only to their own mail servers)

Page 11: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

11

How Done?

Definition: Phishing is fraudulent Definition: Phishing is fraudulent acquisition of sensitive (e.g. acquisition of sensitive (e.g. confidential) information thru internetconfidential) information thru internet

Phishing accountsPhishing accounts Trick legitimate user to give up username/password

Send as the user (reputation hijacking) to avoid blacklisting based on IP addresses

Creating bogus webmail accountsCreating bogus webmail accounts Rely on good reputation of popular webmail services such as Gmail and Yahoo! Mail, to avoid blacklisting based on IP addresses

Page 12: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

12

Spam and Ethics

Kantian evaluation of SpamKantian evaluation of Spam Act guided by moral principles that can at the same time be used as base for a universal code of law

A simple legal way of saying this: Act in good faith!However, every simple phrase invites mis-interpreters!

Another way of saying this: Act so that you treat yourself as well as others as ends in themselves; never purely as means to another end

Scenario: Suppose I have a great new product I wish to advertise. I send an unsolicited email to a large group of people knowing that only a tiny fraction is interested

Is that ethical under Kant’s CI? Students discuss in class 7/17/2012

Page 13: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

13

Spam and Ethics

Act Utilitarian evaluation of SpamAct Utilitarian evaluation of Spam An action is right (or wrong) to the extent that it increases (or decreases) the total happiness of the affected parties.

Scenario: A product that costs $10 to make, is sold for $25, purchasers value at $30 (i.e. their derived happiness)

100 million bulk messages being sent costs lost time and bandwidth for those, who receive it and are not interested

As a result each of those has $0.01 of unhappiness (time wasted)

10,000 customers purchase product and get full happiness

Is that ethical under Act Utilitarianism? Students discuss … and compute amount of satisfaction, here AKA happiness

Page 14: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

14

Spam and EthicsRule Utilitarian evaluation of SpamRule Utilitarian evaluation of Spam

We should adopt moral rules which, if followed by everyone, will lead to greatest increase in overall happiness

Scenario: Products being advertised, where only a small fraction of targets is known to be interested

What if only 1% of all small businesses in the US What if only 1% of all small businesses in the US email you 1 Spam advertisement per year?email you 1 Spam advertisement per year? There are 24,000,000 small businesses in America 1% => 240,000 emails per year 240,000 / 365 = 657 emails per day for each person You are one of these persons! Do you feel happy about 657 unwanted emails every day?

Is sending Spam ethical under Rule Is sending Spam ethical under Rule Utilitarianism?Utilitarianism? Students discuss … and assess overall happiness again!

Page 15: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

15

Spam and Ethics

Social Contract Theory evaluation of SpamSocial Contract Theory evaluation of Spam Morality is the set of rules, governing how people are to treat one another, rules that rational people will agree to accept, for their mutual benefit, on the condition that others follow those rules as well

Right to free speech as applied to mass communication

Is sending Spam ethical under Social Contract Theory?

Students discuss … also think of enforcement! And why we have Spam in our current society?

Page 16: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

16

CAN Spam of 2003 Federal LawCControlling ontrolling AAssault of ssault of NNon-Solicited Pornography & on-Solicited Pornography &

MarketingMarketing

Largely unenforcedLargely unenforced Difficult, time-consuming, and resource intensive to track the sources of Spam

Some successes Greco (2/2004), Goodin (1/2006) JumpStart (3/2006) $900k judgment

But largely ignored Spam 75% of all messages in 2006, more AND larger percentage today in 2012

0.27% of Spam was compliant with guidelines for Spam

Divides email into 3 categories; Spam should adhere to Divides email into 3 categories; Spam should adhere to guidelines of these 3 categories, to be:guidelines of these 3 categories, to be: 1. Transactional, 2. commercial, 3. unsolicited advertisement

Page 17: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

17

CAN Spam1. Transactional1. Transactional

Sender and receiver have an established business or personal relationship

Header, sender, and organization must be correct Can’t disguise identity of the sender from which message was sent

2. Commercial2. Commercial Commercial email messages to which user has consented to receive

Same as above and must provide option to remove from list Mechanism to opt-out must include an Internet based method i.e. not an 800 number of the kind: “Your call is important to us!”

Unsubscribe must be effective almost immediately, not in weeks Must contain the postal address of sender

3. Unsolicited Advertisement3. Unsolicited Advertisement Must meet requirements of category 1 and 2 and: Must include clear and conspicuous evidence that the message is an advertisement

Page 18: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

18

CAN SpamCritics call this the “You can” Spam ActCritics call this the “You can” Spam Act

You get one free shot at a user’s Inbox Does not prevent sending of Spam, but forces such messages into complying with defined rules

Unsolicited messages must comply with all 3 types of Unsolicited messages must comply with all 3 types of rulesrules Unsubscribe compliance

Visible, operable opt-out (unsubscribe) mechanism for all types of messages with requests honored within 10 days

Content compliance Accurate “From:” lines with relevant “Subject:” lines Legitimate physical address of publisher/advertiser If applicable, a label is present for adult content

Sending behavior compliance No sending through open relays –i.e. server that blindly pass on/through email messages

No sending via harvested email No deceiving, false headers

Page 19: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

19

CAN SpamExemptionsExemptions

Religious messages Political messages Content that complies with lawful marketing mechanisms

National security messages Transactional or relationship messages from companies to existing customers

Overrides state lawOverrides state law Rushed passage to supercede a tougher California law

Prohibits recipients from suing senders Prohibits recipients from suing senders directly!!directly!!

PenaltiesPenalties Misdemeanor to send with falsified header

Page 20: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

20

CAN SpamProblems with the “opt out” provision in CAN Problems with the “opt out” provision in CAN

Spam?Spam? For illegal email sender, your opting out means they know you exist; so they can and will send you more email

May unsubscribe you, and send Spam from a different entity!

Time provisions on length of unsubscriptionAllowable delay in unsubscriptionCreate many LLCs to keep user receiving Spam??

What about a legitimate company? Is there a potential problem with opting out?

Can they then sell your email address to another company?Is your email address your possession or theirs to use?

What about non-US Spammers?

Page 21: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

21

Class Exercise

Step 1: Select a discussion leader in class room! How do you suggest to solve the problem of Spam in an ethical manner?

Students propose a practical, legal method of curbing Spam, in a way that the Internet remains usable!

Discuss Pros Discuss Cons Enforceable? Would this be an improvement over current situation?

Page 22: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

22

Solutions to Spam

1. Require explicit opt-in to email lists

2. Require labeling of email advertising, e.g. “AAA subscription” in the subject line

3. Add a cost to every email that is sent

4. Ban all unsolicited email

5. 1991 – Telephone consumer protection act, included a provision against junk faxes

6. Provide fast method of unsubscribing: not 10 days!

Do you see problems with these methods? All? Do you see problems with these methods? All? Any?Any?

Page 23: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

23

Ethics & World-Wide Web

Page 24: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

24

World-Wide Web Invented by Timothy Berners-Lee Invented by Timothy Berners-Lee

Proposed 1989, published 1991 Co-invented with Robert Cailliau Ref: http://en.wikipedia.org/wiki/Tim_Berners-Lee

Hypertext system that isHypertext system that is Decentralized Uniquely addressable (via URLs) Ubiquitous, internet based

ApplicationsApplications E-commerce Social networks Content creation (wikis, blogs) News, Advertise Distance learning Pay taxes, shop at Amazon, Gamble, …

Page 25: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

25

WWW & CensorshipShould the Internet be filtered/censored?Should the Internet be filtered/censored?

In our times, access to the internet is tightly controlled in some countries: e.g. North Korea, Cuba, China, Myanmar

In others the content is tightly controlled, e.g.: Saudi Arabia (centralized control center in Riyadh blocks pornography, gambling, and sites offensive to Islam, government, royal family)

China’s Great Firewall (human censors who perform similar functions)

Special interesting cases of censorship: Germany:

» Bans neo-Nazi web sites

» Bans message denying Holocaust; denial illegal in 16 EU countries

USA:

» Controls pornography (Children’s Internet Protection Act)

Page 26: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

26

Censorship During HistoryDirect censorshipDirect censorship

Since the 4th century, the Catholic Church banned reading and possession of certain books

List of books named Index, short for “Index Librorum Prohibitorum” List officially maintained by the Vatican, later by those cardinals who were “Inquisition Officials”

Maintained until the mid 20th century --NOT a typo!! http://en.wikipedia.org/wiki/Index_Librorum_Prohibitorum

During history: State execution, Church control, University responsibility for “Index” enforcement

Catholic church did not have the executive arm in most countries to enforce that all books on “Index” be collected and burnt

Was the duty of catholic states, delegated generally to the universities

Last issue of “Index” was in the 1960s! Seriously, the 20th century!

Today the Caßtholic church has no such official list

Autocratic states like Saudi Arabia, North Korea, Myanmar, Autocratic states like Saudi Arabia, North Korea, Myanmar, etc. today maintain similar prohibited lists of select etc. today maintain similar prohibited lists of select Internet sitesInternet sites

Page 27: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

27

CensorshipDirect censorshipDirect censorship

Government information monopoly enables censorship Government controls all means of communication e.g. Soviet television stations, radio, etc. Hard to do with Internet; but being attempted!

Prepublication review Sensitive classified documents must go through process to become declassified and publishable

Licensing and registration Controlling who gets access (i.e. television stations being granted electromagnetic spectrum in exchange for something)

Note that “selling frequencies” is a huge source of tax/income potential

Self censorshipSelf censorship Suppressing information as a means to an end

CNN suppressed negative government info in Iraq to retain its office in Baghdad

Voluntary rating systems so users can avoid certain content

What is “voluntary?”

Page 28: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

28

Practical Censorship IssuesMany-to-many communicationMany-to-many communication

Prevents governments from controlling the content Gutenberg’s printing press invention raised difficulty of

controlling books Note: printing was known in China before Gutenberg

DynamicDynamic New web sites opened and content continuously published New site-names created and deleted constantly

SizeSize Millions of sites, numerous pieces of information, mirror sites See WikiLeaks: shows Department of State content: ¼ million files, 1

event

GlobalGlobal Limited authority for any government to restrict activities around

the world Many countries have server farms; impossible to shut all down!

IdentityIdentity Difficult to distinguish children from adults, criminals from bona-

fide users

Page 29: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

29

Censorship & EthicsWhere does censorship leave “freedom of Where does censorship leave “freedom of

expression”?expression”? Kant

Censorship is clearly a backwards stepPrevents people from getting information they need to make their own decisions

John Stuart Mill, 1806 – 1873, British philosopher:

None of us is infallible and knows the whole truth. Censorship may be silencing the voice of truth

Majority opinion is not necessarily the whole truthMust allow others to express their opinions to get a better sense of truth

Majority opinion must be tested and validated. Otherwise it is prejudice

Page 30: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

30

Censorship & EthicsIs censorship of books, films, internet, Is censorship of books, films, internet,

posters practiced in the USA?posters practiced in the USA?

Aside from limiting a.) pornography at Aside from limiting a.) pornography at internet sites, b.) offensive language, and internet sites, b.) offensive language, and c.) libel, there seems to be no censorship; c.) libel, there seems to be no censorship; see freedom of expression below!see freedom of expression below!

Page 31: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

31

Freedom of ExpressionMill’s Principle of HarmMill’s Principle of Harm

The only ground on which intervention is justified is to prevent harm to others; the individual’s own good is not a sufficient condition

Students: How does this apply to drug users who destroy themselves?

How applicable to people, who wish to commit suicide? What ethical framework does Mill’s principle follow? Explains positions of most western democratic governments with regard to pornography

Adults viewing hurt mostly themselves by doing so. as opposed to harming others

But, what is your position, regarding the creators and publishers of pornography? Do they hurt themselves? Others?

Note exception for children

Page 32: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

32

Freedom of Expression in US

Not an absolute right in eyes of the US Supreme Not an absolute right in eyes of the US Supreme CourtCourt See Supreme Court Justice Clarence Thomas’ dissentions

Right is balanced against the public goodRight is balanced against the public good Abuse of such freedom when harming the public can be punishable

Libel, reckless or calculated lies, slander, misrepresentation, perjury, false advertising, obscenity and profanity, solicitation of crime, and personal abuse

Example: Cigarette advertising on televisionHow many cigarette ads have you seen recently?Ethical argument for why it should not be allowed:Student opinons?

Page 33: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

33

FCC v. Pacifica FoundationRadio broadcast of George Carlin’s performance Radio broadcast of George Carlin’s performance

“Filthy Words” in 1973, preceded by warning of “Filthy Words” in 1973, preceded by warning of sensitive languagesensitive language

A man had heard “filthy words” on car radio while A man had heard “filthy words” on car radio while driving with his young son; he complained to FCCdriving with his young son; he complained to FCC

FCC informed Pacifica Foundation: further FCC informed Pacifica Foundation: further complaints would lead to sanctionscomplaints would lead to sanctions

Pacifica sued FCC, but FCC won in a 5/4 Supreme Pacifica sued FCC, but FCC won in a 5/4 Supreme Court decision of 1978Court decision of 1978

Note: limitations only for public radio and TV, not Note: limitations only for public radio and TV, not for cable and other subscriber programsfor cable and other subscriber programs

Ref: http://en.wikipedia.org/wiki/Seven_dirty_wordsRef: http://en.wikipedia.org/wiki/Seven_dirty_words

Page 34: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

34

FCC vs. Pacifica FoundationBroadcast media are uniquely pervasive and Broadcast media are uniquely pervasive and

invasiveinvasive Indecent material broadcast into privacy of homes People can turn it on-off at any time, making the warning ineffective

Damage is done as soon as it is heard, i.e. can not undo its harm by turning off devices retroactively

Uniquely accessible to childrenUniquely accessible to children Can restrict access in bookstores and movie theaters Time of day is an important consideration, however, for broadcast radio/television

Students debate and exerciseStudents debate and exercise: Ethics analysis!: Ethics analysis! Kant’s CI, Act U., Rule U., Social Contract

Page 35: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

35

Censorship and Children

Child Internet Protection Act (CIPA)Child Internet Protection Act (CIPA) Government requirement for installing anti-pornography filters before receiving federal funds for Internet access

Argument for: Libraries do already abstain from offering X-rated magazines or movies

So they should not be obliged to filter Internet pornography

Argument against: Filters restrict freedom of speech

Upheld by U.S. Supreme Court in 2003It is not the role and function of libraries to provide a public forum for free speech; can be exercised elsewhere

Page 36: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

36

Is CIPA Ethical?Kantian evaluation of protecting children from harm using Kantian evaluation of protecting children from harm using

filtersfilters Assumption is that some non-pornographic web pages are filtered Filters treat creators of non-offensive, blocked pages as a means to the end for restricting children’s access to pornographic materials

Act utilitarian evaluationAct utilitarian evaluation Up to each of us Enacting CIPA results in fewer children being exposed Some legitimate sites will be filtered accidentally Stigma, discomfort for legitimate users getting sites unfiltered

Social contract theory evaluationSocial contract theory evaluation Private viewing of pornography does not make social living impossible

Public libraries offer arguments on both sides (assumption is that filters block some useful sites)

Page 37: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

37

Catch Chat-Room PredatorsPolice sting operations to lure pedophilesPolice sting operations to lure pedophiles

Ethical? Kantian analysis

Is the will leading to the sting action OK? Yes and no: Overall goal is good; but that is not of prime interest to CI

Deceptiveness is always wrong to a Kantian! Utilitarian analysis

Result is public benefit (OK to harm one pedophile so society benefits)

Publicity may deter other pedophiles What is the impact on chat rooms as an effective medium for communication if one knows one is being “watched”?

Social contract theory analysis Misrepresentation by pedophile should be punished Police are also misrepresenting themselves Not a clear cut argument under Social Contract theory

Page 38: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

38

Discussions

Suppose 99% of all email from country X is Suppose 99% of all email from country X is SpamSpam

Discuss the ethics behind blacklisting all Discuss the ethics behind blacklisting all email from country X:email from country X: Kantian Act Utilitarianism Rule Utilitarianism Social Contract

Page 39: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

39

Discussions

Definition MMORPG: Massively Multiplayer Definition MMORPG: Massively Multiplayer Online Role-Playing Game Online Role-Playing Game

Discuss the ethics behind a rule in China, Discuss the ethics behind a rule in China, mandating a time-limit for playing mandating a time-limit for playing MMORPGs. Is this law moral? What would MMORPGs. Is this law moral? What would the judgment depend upon?the judgment depend upon? Kantian Act Utilitarianism Rule Utilitarianism Social contract theory

Page 40: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

40

Discussions

Discuss the ethics of posting photos on-line Discuss the ethics of posting photos on-line without the permission of those who appear without the permission of those who appear in themin them Are there situations when it would be unethical? If so, what are they?

Kantian Act Utilitarianism Rule Utilitarianism Social contract theory

Page 41: Herbert G. Mayer, PSU CS Status 7/29/2012 Slides derived from prof. Wu-Chang Feng

41

References Spam: http://www.etymonline.com/index.php?Spam: http://www.etymonline.com/index.php?

search=spam&searchmode=nonesearch=spam&searchmode=none File Transfer Protocol: http://tools.ietf.org/html/rfc821File Transfer Protocol: http://tools.ietf.org/html/rfc821 SMTP: http://www.smtp2go.com/articles/smtp-protocol.htmlSMTP: http://www.smtp2go.com/articles/smtp-protocol.html Mill’s utilitarianism: Mill’s utilitarianism:

http://en.wikipedia.org/wiki/John_Stuart_Millhttp://en.wikipedia.org/wiki/John_Stuart_Mill Clarence Thomas supreme court dissentions: Clarence Thomas supreme court dissentions:

http://blog.beliefnet.com/watchwomanonthewall/2011/06/court-http://blog.beliefnet.com/watchwomanonthewall/2011/06/court-rules-against-parents-justice-thomas%E2%80%99-dissent-protects-rules-against-parents-justice-thomas%E2%80%99-dissent-protects-children-by-steve-birn.html children-by-steve-birn.html

MMORGPG: MMORGPG: http://en.wikipedia.org/wiki/Massively_multiplayer_online_role-http://en.wikipedia.org/wiki/Massively_multiplayer_online_role-playing_gameplaying_game

FCC vs. Pacifica: FCC vs. Pacifica: http://www.bc.edu/bc_org/avp/cas/comm/free_speech/pacifica.htmlhttp://www.bc.edu/bc_org/avp/cas/comm/free_speech/pacifica.html

Phishing at Microsoft: Phishing at Microsoft: http://www.microsoft.com/security/resources/phishing-whatis.aspx http://www.microsoft.com/security/resources/phishing-whatis.aspx

Phishtank: http://www.phishtank.com/what_is_phishing.php Phishtank: http://www.phishtank.com/what_is_phishing.php Index of Prohibited books: http://www.aloha.net/~mikesch/ILP-Index of Prohibited books: http://www.aloha.net/~mikesch/ILP-

1559.htm1559.htm Holocaust denial: Holocaust denial:

http://www.jewishvirtuallibrary.org/jsource/Holocaust/denial.htmlhttp://www.jewishvirtuallibrary.org/jsource/Holocaust/denial.html