0% found this document useful (0 votes)
2 views

Chapter03

Chapter 3 discusses various aspects of networking, including email, spam, censorship, and freedom of expression. It highlights the rise of spam in email communication, the ethical implications of online actions, and the challenges posed by censorship in the digital age. The chapter also examines case studies to illustrate the complexities of ethical decision-making in information systems.

Uploaded by

kong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Chapter03

Chapter 3 discusses various aspects of networking, including email, spam, censorship, and freedom of expression. It highlights the rise of spam in email communication, the ethical implications of online actions, and the challenges posed by censorship in the digital age. The chapter also examines case studies to illustrate the complexities of ethical decision-making in information systems.

Uploaded by

kong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 57

Chapter 3:

Networking
ISEC 610:
Information Systems Ethics and
Security

1-1

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-1


Chapter Overview

• Email and spam


• World Wide Web
• Censorship
• Freedom of expression
• Children and inappropriate content
• Breaking trust on the Internet
• Internet addiction
1-2

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-2


3.2 Email and Spam

1-3

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-3


How Email Works

• Email: Messages embedded in files


transferred between computers
• Email address: Uniquely identifies
cyberspace mailbox
• Messages broken into packets
• Routers transfer packets from sender’s
mail server to receiver’s mail server

1-4

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-4


Routers Pass Email from LAN to LAN

1-5

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-5


The Spam Epidemic (1/3)

• Spam: Unsolicited, bulk email


• Spam is profitable
– More than 100 times cheaper than “junk mail”
– Profitable even if only 1 in 100,000 buys product
• Amount of email that is spam has ballooned
– 8% in 2001
– 90% in 2009

1-6

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-6


The Spam Epidemic (2/3)

1-7

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-7


The Spam Epidemic (3/3)

• How firms get email addresses


– Web sites, chat-room conversations, newsgroups
– Computer viruses harvest addresses from PC address
books
– Dictionary attacks
– Contests
• Most spam sent out by bot herders who control
huge networks of computers
• Spam filters block most spam before it reaches
users’ inboxes
1-8

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-8


Need for Socio-Technical Solutions

• New technologies sometimes cause new social


situations to emerge
– Calculators  feminization of bookkeeping
– Telephones  blurred work/home boundaries
• Spam an example of this phenomenon
– Email messages practically free
– Profits increase with number of messages sent
– Strong motivation to send more messages
• Internet design allows unfair, one-way
communications
1-9

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-9


Case Study: Ann the Acme Accountant

• Ann: Accountant at Acme Corporation


• She distributes paychecks to all 50 employees
• Ann sends email advertising Girl Scout cookie
sale
• 9 recipients order cookies; average 4 boxes each
• Other 40 recipients unhappy to get email; half
complain to a co-worker
• Did Ann do anything wrong?

1-10

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-10


Kantian Analysis

• We should always respect autonomy of others, treating


them as ends in themselves and never only as the means
to an end (2nd formulation of Categorical Imperative)
• Ann didn’t misrepresent what she was doing
• She didn’t force anyone to read the entire email
• Some who read her email chose to order cookies
• Therefore, she didn’t “use” others, and her action was not
strictly wrong
• An “opt in” approach would have been better

1-11

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-11


Act Utilitarian Analysis

• Benefit to Girls Scouts = $108


– $3 profit per box of cookies
– 36 boxes sold
• Harm to company: time wasted
– Orders taken during breaks
– Lost productivity from complaining: $70
• 20 employees ×2 ×5 minutes/employee = 200 minutes
• 3.5 hours ×$20/hour = $70
• Benefits exceed harms, so action good
• Company may create policy against future fundraisers

1-12

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-12


Rule Utilitarian Analysis

• Q: What would be consequences of everyone in


company used email to solicit donations?
• A: Plenty of employee grumbling and lower
morale
• If all doing it, unlikely any one cause would do
well
• Harms greater than benefits, so Ann’s action was
wrong

1-13

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-13


Social Contract Theory Analysis

• Acme Corporation has no prohibition against


using its email system this way
• Ann was exercising her right to express herself
• Some people didn’t appreciate message, but she
didn’t act like a spammer
– She didn’t conceal her identity
– She wasn’t selling a fraudulent product
• Ann did nothing wrong

1-14

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-14


Summary

• Analyses reached different conclusions, but Ann


could have taken a less controversial course
• She could have posted a sign-up sheet to
identify those interested in cookie sale
• That way, she would have sent email only to
those interested, avoiding the problems of
grumbling and lost productivity

1-15

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-15


3.3 The World Wide Web

1-16

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-16


Attributes of the Web

• It is decentralized
• Every Web object has a unique address
• It is based on the Internet

1-17

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-17


How We Use the Web
• Shopping
• Socializing (e.g., Facebook)
• Contributing content (e.g., wikis, blogs)
• Blogging
• Learning
• Exploring our roots
• Entering virtual worlds
• Paying taxes
• Gambling
• Taking humanitarian action
• Lots more!
1-18

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-18


Online Source of Genealogical Information

1-19

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-19


Twitter

• More than 200 million users


• Blogging tool
• Business promotion
• Role in Arab Spring uprisings debated
– (+) Social networks lead to politicization
– (-) Ties in social networks too weak for high-
risk activism

1-20

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-20


Governmental Control: Too Much or Too Little?

• Burma (Myanmar), Cuba, North Korea:


Internet virtually inaccessible
• Saudi Arabia: centralized control center
• People’s Republic of China: “one of most
sophisticated filtering systems in the world” as
well as censorship
• Germany: Forbids access to neo-Nazi sites
• United States: Repeated efforts to limit access
of minors to pornography
1-21

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-21


3.4 Censorship

1-22

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-22


Forms of Direct Censorship

• Government monopolization
• Prepublication review
• Licensing and registration

1-23

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-23


Self-censorship

• Most common form of censorship


• Group decides for itself not to publish
• Reasons
– Avoid subsequent persecution
– Maintain good relations with government officials
(sources of information)
• Ratings systems created to advise potential
audience
– Movies, TVs, CDs, video games
– Not the Web
1-24

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-24


Challenges Posed by the Internet

• Many-to-many communications
• Dynamic connections
• Huge numbers of Web sites
• Extends beyond national borders, laws
• Hard to distinguish between minors and
adults

1-25

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-25


Ethical Perspectives on Censorship

• Kant opposed censorship


– Enlightenment thinker
– “Have courage to use your own reason”
• Mill opposed censorship
– No one is infallible
– Any opinion may contain a kernel of truth
– Truth revealed in class of ideas
– Ideas resulting from discourse are more influential

1-26

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-26


Mill’s Principle of Harm

“The only ground on which intervention


is justified is to prevent harm to others;
the individual’s own good is not a
sufficient condition.”

1-27

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-27


3.5 Freedom of Expression

1-28

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-28


Freedom of Expression: History

• De Scandalis Magnatum (England, 1275)


• Court of Star Chamber
• 18th century
– No prior restraints on publication
– People could be punished for sedition or libel
• American states adopted bills of rights
including freedom of expression
• Freedom of expression in 1st amendment to
U.S. Constitution
1-29

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-29


1st Amendment to U.S. Constitution

Congress shall make no law respecting an


establishment of religion, or prohibiting the
free exercise thereof; or abridging the
freedom of speech, or of the press; or the
right of the people peaceably to assemble,
and to petition the government for a
redress of grievances.

1-30

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-30


Freedom of Expression
Not an Absolute Right

• 1st Amendment covers political and


nonpolitical speech
• Right to freedom of expression must be
balanced against the public good
• Various restrictions on freedom of
expression exist

1-31

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-31


Jeremy Jaynes
Jeremy Jaynes was convicted
under Virginia law for sending
millions of spam messages.
His conviction was overturned
by the Supreme Court of
Virginia because the antispam
law was too broad and also
prohibited the anonymous
transmission of unsolicited bulk
emails “containing political,
religious or other speech
protected by the First
Amendment to the United
States Constitution” AP Photo/Loudoun County Sheriff’s office 1-32

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-32


FCC v. Pacifica Foundation et al.

• George Carlin records “Filthy Words”


• WBAI in New York airs “Filthy Words” (1973)
• FCC issues declaratory order to Pacifica
• Pacifica sues
• U.S. Supreme Court ruled FCC did not violate 1 st
Amendment (5-4 decision)
– Broadcast media “uniquely pervasive”
– Broadcasting uniquely accessible to children

1-33

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-33


Case Study: Kate’s Blog

• Kate: Maintains a popular “life on campus” blog


• Jerry: Another student; active in Whig Party
• At private birthday party, someone gives Jerry a Tory
Party T-shirt as a gag, and Jerry puts it on
• Kate uses cell phone to take picture of Jerry when he
isn’t looking, posts it on her blog
• Story read by many people on and off campus
• Jerry confronts Kate and demands she remove photo;
she complies, and they remain friends
• Kate’s blog and Jerry both become more popular
1-34

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-34


Kantian Analysis

• Kate uploaded Jerry’s photo to her blog


without asking his permission
• She treated him as a means to her end of
increasing the readership of her Web site
• Her action was wrong

1-35

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-35


Social Contract Theory Analysis

• Birthday party held in apartment of one of


Jerry’s friends
• Jerry had a reasonable expectation of
privacy
• Kate violated Jerry’s right to privacy
• Kate’s action was wrong

1-36

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-36


Act Utilitarian Analysis

• Benefits
– Popularity of Kate’s blog increased (definitely)
– Jerry become more popular on campus (definitely)
• Harms
– Jerry’s anger at Kate (only temporary)
– Photo could discredit Jerry at some point in future
(unlikely)
• Kate did nothing wrong by posting Jerry’s photo

1-37

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-37


Rule Utilitarian Analysis

• What if everyone were constantly taking photos of people


they encountered and posting them?
• Positive consequences
– People would have more opportunities to keep up with what their
friends are doing
– People might be more reluctant to engage in illegal activities
• Negative consequences
– People would become more self-conscious
– Some relationships would be harmed
• Negative consequences more weighty than positive
consequences, so Kate’s action was bad
1-38

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-38


Summary

• Three out of four analyses: Wrong for Kate to


post the photo without asking Jerry’s permission
• Kate figured it would be better to beg for
forgiveness than ask for permission, but she cut
Jerry out of a decision that affected both of them,
and that’s no way to treat a friend
• Kate should have tried to get Jerry’s consent

1-39

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-39


3.6 Children and Inappropriate
Content

1-40

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-40


Web Filters

• Web filter: Software that prevents display


of certain Web pages
– May be installed on an individual PC
– ISP may provide service for customers
• Methodologies
– Maintain “black list” of objectionable sites
– Examine content for objectionable
words/phrases

1-41

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-41


Calvin and Hobbes, 1990 / © Universal Press Syndicate

1-42

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-42


Child Internet Protection Act

• Libraries receiving federal networking


funds must filter pages containing
obscenity or child pornography
• U.S. Supreme Court ruled CIPA did not
violate 1st Amendment guarantees
(6-3 decision in June 2003)

1-43

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-43


Ethical Evaluations of CIPA

• Kantian evaluation: Children's Internet


Protection Act (CIPA) is wrong
• Act utilitarian evaluation: depends on how
benefits and harms are weighed
• Social contract theory: freedom of
conscience should be given precedence

1-44

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-44


Sexting

• Definition: sexually suggestive text messages or


emails with nude or nearly nude photographs
• In a 2009 survey, 9% of U.S. teenagers admitted
to sending a sext, 17% admitted to receiving a
sext
• Case of Jesse Logan
• Case of Phillip Alpert
• Case of Ting-Yi Oei

1-45

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-45


3.7 Breaking Trust on the Internet

1-46

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-46


Identity Theft (1/2)

• Identity theft: When a person uses another person’s


electronic identity
• Leading form of identity theft is credit card fraud
• Financial institutions contribute to problem by making it
easy to open new accounts
• About 10 million cases of identity theft in U.S. in 2010
• Consumer’s liability for credit card losses limited to $50

1-47

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-47


Identity Theft (2/2)

• Nearly half of cases from lost credit card, checkbook, etc.


• In 20% of cases, credit card number stolen at time of
making purchase (skimmers)
• About 1 million cases of identity theft annually in United
States from online activities
• Phishing: Use of email to attempt to deceive people into
revealing personal information
• Identity theft a federal crime, but only 1 in 700 cases
results in an arrest

1-48

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-48


Chat-Room Predators

• Chat room: Supports real-time discussions


among many people connected to network
• Instant messaging and chat rooms
replacing telephone for many people
• Some pedophiles meeting children through
chat rooms
• Police countering with “sting” operations

1-49

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-49


Ethical Evaluations of “Stings”

• Utilitarian evaluation
• Kantian evaluation
• Social contract theory evaluation

1-50

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-50


False Information

• Quality of Web-based information varies widely


• Other media also have information of varying
quality
– The New York Times v. The National Enquirer
– 60 Minutes v. Conspiracy Theory
• Google attempts to reward quality
– Ranking uses “voting” algorithm
– If many links point to a page, Google search engine
ranks that page higher

1-51

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-51


Cyberbullying

• Cyberbullying: Use of the Internet or phone


system to inflict psychological harm
• In a 2009 survey, 10% admitted to
cyberbullying, and 19% said they had been
cyberbullied
• Case of Ghyslain Raza
• Case of Megan Meier
• Megan Meier Cyberbullying Prevention Act
1-52

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-52


3.8 Internet Addiction

1-53

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-53


Is Internet Addiction Real?

• Some liken compulsive computer use to


pathological gambling
• Traditional definition of addiction:
– Compulsive use of harmful substance or drug
– Knowledge of its long-term harm
• Some people spend 40-80 hours/week on
the Internet, with individual sessions
lasting up to 20 hours

1-54

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-54


Is Internet Addiction Real?
• Kimberly Young created test for Internet addiction
– Sample question: “Have you repeatedly made
unsuccessful efforts to control, cut back, or stop Internet
use?”
– Patients who answer “yes” to at least 5 of 8 questions
may be addicted
• Others disagree, noting
– Computer use is generally considered a positive activity
– Excessive use does not lead to criminal activity
– More accurate to call excessive use a compulsion

1-55

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-55


Contributing Factors

• Social factors
– Peer groups
• Situational factors
– Stress
– Lack of social support and intimacy
– Limited opportunities for productive activity
• Individual factors
– Tendency to pursue activities to excess
– Lack of achievement
– Fear of failure

1-56

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-56


Ethical Evaluation

• Enlightenment view
– Individuals can and should govern their lives
– People are responsible for their choices
• Jeffrey Reiman’s view
– Addict’s behavior makes sense if addict has
no hope for a better future
– Society bears responsibility for putting people
in hopeless situations
1-57

Copyright © 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-57

You might also like