0% found this document useful (0 votes)
64 views

CSC110 Slides Lecture06

Here are the key differences between cold calling and spamming: - Cold calling involves a live person making a phone call to a specific individual, while spamming involves automated mass distribution of unsolicited messages to many recipients. - Recipients of cold calls can interact with the caller in real-time to ask questions or express disinterest, while spam recipients have no ability to opt-out of individual messages. - Cold calling targets are selected based on publicly available contact information, while spam often uses harvested or guessed email addresses without consent. So in summary, cold calling is considered more acceptable because it allows for direct interaction and targets willing recipients based on publicly listed contact details, while spamming is a non-con

Uploaded by

Ghulam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views

CSC110 Slides Lecture06

Here are the key differences between cold calling and spamming: - Cold calling involves a live person making a phone call to a specific individual, while spamming involves automated mass distribution of unsolicited messages to many recipients. - Recipients of cold calls can interact with the caller in real-time to ask questions or express disinterest, while spam recipients have no ability to opt-out of individual messages. - Cold calling targets are selected based on publicly available contact information, while spam often uses harvested or guessed email addresses without consent. So in summary, cold calling is considered more acceptable because it allows for direct interaction and targets willing recipients based on publicly listed contact details, while spamming is a non-con

Uploaded by

Ghulam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 24

Chapter 3:

Networking

1-1
Chapter Overview

• Spam
• Internet interactions
• Text messaging
• Censorship
• Freedom of expression
• Children and inappropriate content
• Breaking trust
• Internet addiction
1-2
1-2
What is networked communication?

• Using internet for news, information,


donations, socializing, political activities,
promotions, advertising etc.

• The Internet provides new ways to commit


fraud and deceive people

1-3
1-3
Far More People Have Access to Cell
Phones than Electricity or Clean Water

Charles Sturge/Alamy

1-4
1-4
3.2 Spam

1-5
1-5
The Spam Epidemic (1/3)
• The growth of email has been phenomenal —over a billion
people now have email accounts
• Every day about 300 billion email messages are sent.
Unfortunately, a significant percentage of this traffic consists
of spam.
• Spam: Unsolicited, bulk email
• Spam is profitable
– More than 100 times cheaper than “junk mail”
– Profitable even if only 1 in 100,000 buys product
• Amount of email that is spam has ballooned
– 8% in 2001
– 90% in 2009

1-6
1-6
The Spam Epidemic (2/3)

1-7
1-7
The Spam Epidemic (3/3)

• How firms get email addresses


– Web sites, chat-room conversations, newsgroups
– Computer viruses harvest addresses from PC address
books
– Dictionary attacks
– Contests
• Most spam sent out by bot herders who control
huge networks of computers
• Spam filters block most spam before it reaches
users’ inboxes
1-8
1-8
Need for Socio-Technical Solutions

• New technologies sometimes cause new social


situations to emerge
– Calculators  feminization of bookkeeping
– Telephones  blurred work/home boundaries
• Spam an example of this phenomenon
– Email messages practically free
– Profits increase with number of messages sent
– Strong motivation to send more messages
• Internet design allows unfair, one-way
communications
1-9
1-9
Case Study: Ann the Acme Accountant

• Ann: Accountant at Acme Corporation


• She distributes paychecks to all 50 employees
• Ann sends email advertising Girl Scout cookie
sale
• 9 recipients order cookies; average 4 boxes each
• Other 40 recipients unhappy to get email; half
complain to a co-worker
• Did Ann do anything wrong?

1-10
1-10
Kantian Analysis

• We should always respect autonomy of others, treating


them as ends in themselves and never only as the means
to an end (2nd formulation of Categorical Imperative)
• Ann didn’t misrepresent what she was doing
• She didn’t force anyone to read the entire email
• Some who read her email chose to order cookies
• Therefore, she didn’t “use” others, and her action was not
strictly wrong
• However, an “opt in” approach would have been better

1-11
1-11
Act Utilitarian Analysis

• Benefit to Girls Scouts = $108


– $3 profit per box of cookies
– 36 boxes sold
• Harm to company: time wasted
– Orders taken during breaks
– Lost productivity from complaining: $70
• 20 employees ×2 ×5 minutes/employee = 200 minutes
• 3.5 hours ×$20/hour = $70
• Benefits exceed harms, so action good
• Company may create policy against future fundraisers
1-12
1-12
Rule Utilitarian Analysis

• Q: What would be consequences of everyone in


company used email to solicit donations?
• A: Plenty of employee grumbling and lower
morale
• If all doing it, unlikely any one cause would do
well
• Harms greater than benefits, so Ann’s action was
wrong

1-13
1-13
Social Contract Theory Analysis

• Acme Corporation has no prohibition against


using its email system this way
• Ann was exercising her right to express herself
• Some people didn’t appreciate message, but she
didn’t act like a spammer
– She didn’t conceal her identity
– She wasn’t selling a fraudulent product
• Ann did nothing wrong

1-14
1-14
Virtue Ethics Analysis

• As employee, relevant virtues: honesty, fairness, respect


• Ann was honest: her email didn’t mislead anyone
• She wasn’t fair or respectful, and she exercised poor
judgment (as evidenced by larger amount of complaining
by co-workers)
• In her role as parent, she did all work herself and didn’t
find a role for her daughter to play
• Ann should have found a way for her daughter to help,
and she should have found another way to advertise that
respected co-workers
1-15
1-15
Summary

• Analyses reached different conclusions, but Ann


could have taken a less controversial course
• She could have posted a sign-up sheet to identify
those interested in cookie sale
• That way, she would have sent email only to those
interested, avoiding the problems of grumbling
and lost productivity
• She could have found a way to get her daughter
more engaged
1-16
1-16
3.3 Internet Interactions

1-17
1-17
The World Wide Web

• WWW : networked hypertext system


• Stimulated tremendous growth in
popularity of Internet
• Two important attributes
– It is decentralized
– Every Web object has a unique address

1-18
1-18
Rise of the App

• People spending more time on


smartphones and tablets
• Using Web browsers awkward on mobile
devices
• Mobile apps replace Web browsers as way
to access Internet on mobile devices

1-19
1-19
How We Use the Internet
• Shopping
• Socializing (e.g., Facebook)
• Contributing content (e.g., wikis)
• Blogging
• Crowdsourcing
• Learning
• Exploring our roots
• Entering virtual worlds
• Controlling the Internet of Things
• Paying taxes
• Gambling
• Taking humanitarian action
• Lots more!
1-20
1-20
Online Source of Genealogical Information

1-21
1-21
Question:

• Why is “cold calling” considered to be an


acceptable sales practice, but spamming
isn’t?

1-22
1-22
Question:
• Suppose a fee (an electronic version of a
postage stamp) was required in order to
send an email message. How would this
change the behavior of email users?
• Suppose the fee was one cent. Do you
think this would solve the problem of
spam?

1-23
1-23
Question:
• Internet service providers monitor their
chat rooms and expel users who violate
their codes of conduct.
• For example, users can be kicked off for
insulting a person or a group of people
based on their race, religion, or sexual
orientation. Is it wrong for an ISP to expel
someone for hate speech?

1-24
1-24

You might also like