A Gift of Fire Third edition Sara Baase

1 A Gift of Fire Third edition Sara BaaseChapter 1: Unwra...
Author: Christal Lucas
0 downloads 0 Views

1 A Gift of Fire Third edition Sara BaaseChapter 1: Unwrapping the Gift Slides prepared by Cyndi Chie and Sarah Frye

2 What We Will Cover Rapid Pace of ChangeNew Developments and Dramatic Impacts Issues and Themes Ethics

3 Rapid Pace of Change 1940s: The first computer is built1956: First hard-disk drive weighed a ton and stored five megabytes 1991: Space shuttle had a one-megahertz computer 2006: Pocket devices hold a terabyte (one trillion bytes) of data 2006: Automobiles can have 100-megahertz computers

4 Rapid Pace of Change: Discussion QuestionWhat devices are now computerized that were not originally? Think back 10, 20, 50 years ago. In addition to automobiles you can prompt the class with the following: TVs Clocks and watches Phones Cash registers Cameras Ovens Etc.

5 New Developments Blogs (Word made up from ‘web log’):Began as outlets for amateurs who want to express ideas or creativity Appealing because present personal views, are funny and creative, and present a quirky perspective on current events

6 New Developments (cont.)Blogs (cont.): Now used as alternatives to mainstream news and for business public relations Popular blogs have 100,000 to 500,000 readers per day and can peak at several million views per day

7 New Developments (cont.)Video Sharing: Rise of amateur videos on the web Boom of websites like Youtube and Myspace Many videos on the web can infringe copyrights owned by entertainment companies

8 New Developments (cont.)Cell Phones: Can now be used for travel, last minute planning, taking pictures and downloading music Talking on cell phones while driving is a problem Cell phones can interfere with solitude, quiet and concentration Cameras in cell phones and privacy issues Some states have passed laws prohibiting use of hand-held devices. Recent studies show hands-free devices, while freeing up the hands, do not reduce distractions, particularly among young adult and teenage drivers who often text message while driving. Cameras in cell phones threaten privacy. Where is the line between capturing news events and evidence of crimes, and voyeurism?

9 New Developments (cont.)Social Networking: First online social networking site was in 1995 Myspace, founded in 2003 had roughly 100 million member profiles by 2006 Facebook was started at Harvard as an online version of student directories Sites like Second Life (www.secondlife.com) combine many of the features of social networking sites with the 3-D aspects of video games. What new problems/benefits arise when a person can take on a physical persona (an avatar) that may be completely different from who they are in real life? Some people with physical disabilities can interact with others without revealing their handicap.

10 New Developments (cont.)Collaboration: Wikipedia, the online, collaborative encyclopedia Open Directory Project (ODP) Collaboration between scientists in different states or countries Watch-dogs on the Web Wikipedia’s reliability was brought into question when a major contributor was found to be a 14 year-old boy instead of a scientist with a PhD and years of experience. He got most of his information from other Web sources. Web Watch-dog sites are controversial. A web site where a woman can publish the names and pictures of men who other women should watch out for has made the news recently.

11 New Developments (cont.)E-commerce and Free Stuff: Free stuff on the web: , books, newspapers, games, etc. started in 1994 and 10 years later annual sales reached $8.5 billion TV show episodes are available to view on the Web

12 New Developments (cont.)Artificial Intelligence (AI), Robotics, and Motion: AI suited to narrow, specialized skills Robotic devices often special-purpose devices, and may require AI to function Motion sensing devices are used to give robots the ability to walk, trigger airbags in a crash and cushion laptops when dropped

13 New Developments (cont.)Tools for Disabled People: Restoration of abilities, productivity and independence Screen readers and scanners Speech recognition Prosthetics and motion sensors

14 New Developments (cont.)What’s Next? Medical records on chips attached to medical bracelets Biological and computer sciences will combine new ways to insert micro-processors or controlled devices on human bodies

15 New Developments (cont.) Discussion QuestionWhat changes and new developments do you expect in the next 50 years? How will life be different than it is today? Some ideas to add to the discussion: Wearable computers Enhanced intelligence (via instant communications and/or direct computer interface)

16 Issues and Themes Issues: Unemployment Alienation and customer serviceCrime Loss of privacy Errors

17 Issues and Themes (cont.)Old problems in a new context: crime, pornography, violent fiction Adapting to new technology: thinking in a new way Varied sources of solutions to problems: natural part of change and life

18 Issues and Themes (cont.)Global reach of net: ease of communication with distant countries Trade-offs and controversy: increasing security means reducing convenience Difference between personal choices, business policies, and law

19 Ethics What is Ethics: Study of what it means to “do the right thing”Assumes people are rational and make free choices Rules to follow in our interactions and our actions that affect others

20 Ethics (cont.) Ethical Views: Deontological UtilitarianismNatural rights No simple answers Do organizations (businesses) have ethics?

21 Ethics (cont.) Important Distinctions: Right, wrong and okayNegative rights (liberties) The right to act without interference Positive rights (claim-rights) An obligation of some people to provide certain things for others

22 Ethics (cont.) Important Distinctions (cont.):Difference between wrong and harm Personal preference and ethics Law and Ethics

23 Ethics Discussion QuestionCan you think of examples of liberties (negative rights) and claim-rights (positive rights) that are at opposition to each other? This question is the foundation for many issues and controversies discussed in later chapters. One example you can introduce here is the right to freedom of speech versus the need to protect children from materials that are inappropriate for them. Have the class identify who the affected parties are. What are the negative and positive rights for the different parties? Note: the laws pertaining to this issue are discussed in chapter three.

24 A Gift of Fire Third edition Sara BaaseChapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye

25 What We Will Cover Privacy and Computer Technology“Big Brother is Watching You” Privacy Topics Protecting Privacy Communications

26 Privacy and Computer TechnologyKey Aspects of Privacy: Freedom from intrusion (being left alone) Control of information about oneself Freedom from surveillance (being tracked, followed, watched)

27 Privacy and Computer Technology (cont.)New Technology, New Risks: Government and private databases Sophisticated tools for surveillance and data analysis Vulnerability of data

28 Privacy and Computer Technology (cont.)Terminology: Invisible information gathering - collection of personal information about someone without the person’s knowledge Secondary use - use of personal information for a purpose other than the one it was provided for

29 Privacy and Computer Technology (cont.)Terminology (cont.): Data mining - searching and analyzing masses of data to find patterns and develop new information or knowledge Computer matching - combining and comparing information from different databases (using social security number, for example, to match records)

30 Privacy and Computer Technology (cont.)Terminology (cont.): Computer profiling - analyzing data in computer files to determine characteristics of people most likely to engage in certain behavior

31 Privacy and Computer Technology (cont.)Principles for Data Collection and Use: Informed consent Opt-in and opt-out policies Fair Information Principles (or Practices) Data retention

32 Privacy and Computer Technology Discussion QuestionsHave you seen opt-in and opt-out choices? Where? How were they worded? Were any of them deceptive? What are some common elements of privacy policies you have read? If the class doesn't mention it, make sure to mention that online opt-in choices may be pre-checked and require you un-checking the box to avoid opting in. Be sure to mention the "subject to change without notice" clause found in most privacy policies.

33 "Big Brother is Watching You"Databases: Government Accountability Office (GAO) - monitors government's privacy policies Burden of proof and "fishing expeditions" Data mining and computer matching to fight terrorism

34 "Big Brother is Watching You" (cont.)The Fourth Amendment, Expectation of Privacy and Surveillance Technologies: Weakening the Fourth Amendment Supreme Court decisions and expectation of privacy Modern surveillance techniques are redefining expectation of privacy

35 "Big Brother is Watching You" (cont.)The Fourth Amendment, Expectation of Privacy and Surveillance Technologies (cont.): The USA Patriot Act and national security letters No court order or court oversight needed report found "widespread and serious misuse" of the FBIs national security letter authorities

36 "Big Brother is Watching You" (cont.)Video Surveillance: Security cameras Increased security Decreased privacy

37 "Big Brother is Watching You" (cont.) Discussion QuestionsWhat data does the government have about you? Who has access to the data? How is your data protected? Use the list in Fig. 2.2 (page 58) to start the conversation. Probe for what concerns the class may have about the data that is collected.

38 Diverse Privacy TopicsMarketing, Personalization and Consumer Dossiers: Targeted marketing Data mining Paying for consumer information Data firms and consumer profiles Credit records

39 Diverse Privacy Topics (cont.)Location Tracking: Global Positioning Systems (GPS) -computer or communication services that know exactly where a person is at a particular time Cell phones and other devices are used for location tracking Pros and cons

40 Diverse Privacy Topics (cont.)Stolen and Lost Data: Hackers Physical theft (laptops, thumb-drives, etc.) Requesting information under false pretenses Bribery of employees who have access Except for hackers, these are not new to computer technology. Before computers, files were stolen, receipts were stolen, information was requested under false pretenses and employees were bribed. But, with computers, the extent and impact have grown.

41 Diverse Privacy Topics (cont.)What We Do Ourselves: Personal information in blogs and online profiles Pictures of ourselves and our families File sharing and storing Is privacy old-fashioned? Young people put less value on privacy than previous generations May not understand the risks

42 Diverse Privacy Topics (cont.)Public Records: Access vs. Privacy: Public Records - records available to general public (bankruptcy, property, and arrest records, salaries of government employees, etc.) Identity theft can arise when public records are accessed How should we control access to sensitive public records?

43 Diverse Privacy Topics (cont.)National ID System: Social Security Numbers Too widely used Easy to falsify

44 Diverse Privacy Topics (cont.)National ID System (Cont.): A new national ID system - Pros would require the card harder to forge have to carry only one card A new national ID system - Cons Threat to freedom and privacy Increased potential for abuse

45 Diverse Privacy Topics (cont.)Children: The Internet Not able to make decisions on when to provide information Vulnerable to online predators Parental monitoring Software to monitor Web usage Web cams to monitor children while parents are at work GPS tracking via cell phones or RFID

46 Diverse Privacy Topics Discussion QuestionsIs there information that you have posted to the Web that you later removed? Why did you remove it? Were there consequences to posting the information? Have you seen information that others have posted about themselves that you would not reveal about yourself?

47 Protecting Privacy Technology and Markets:Privacy enhancing-technologies for consumers Encryption Public-key cryptography Business tools and policies for protecting data

48 Protecting Privacy (cont.)Rights and laws: Theories Warren and Brandeis Thomson Transactions Ownership of personal data Regulation Health Insurance Portability and Accountability Act (HIPAA)

49 Protecting Privacy (cont.)Rights and laws: Contrasting Viewpoints: Free Market View Freedom of consumers to make voluntary agreements Diversity of individual tastes and values Response of the market to consumer preferences Usefulness of contracts Flaws of regulatory solutions

50 Protecting Privacy (cont.)Rights and laws: Contrasting Viewpoints (cont.): Consumer Protection View Uses of personal information Costly and disruptive results of errors in databases Ease with which personal information leaks out Consumers need protection from their own lack of knowledge, judgment, or interest

51 Protecting Privacy (cont.)Privacy Regulations in the European Union (EU): Data Protection Directive More strict than U.S. regulations Abuses still occur Puts requirements on businesses outside the EU

52 Protecting Privacy Discussion QuestionHow would the free-market view and the consumer protection view differ on errors in Credit Bureau databases? Who is the consumer in this situation?

53 Communication Wiretapping and E-mail Protection: Telephone1934 Communications Act prohibited interception of messages 1968 Omnibus Crime Control and Safe Streets Act allowed wiretapping and electronic surveillance by law-enforcement (with court order) and other new communications Electronic Communications Privacy Act of 1986 (ECPA) extended the 1968 wiretapping laws to include electronic communications, restricts government access to The meaning of pen register has changed over time. It originally referred to a device that recorded the numbers called from a phone. Now it also refers to logs phone companies keep of all numbers called, including time and duration.

54 Communication (cont.) Designing Communications Systems for Interception: Communications Assistance for Law Enforcement Act of 1994 (CALEA) Telecommunications equipment must be designed to ensure government can intercept telephone calls Rules and requirements written by Federal Communications Commission (FCC)

55 Communication (cont.) Secret Intelligence Gathering:The National Security Agency (NSA) Foreign Intelligence Surveillance Act (FISA) established oversight rules for the NSA Secret access to communications records

56 Communication (cont.) Encryption Policy:Government ban on export of strong encryption software in the 1990s (removed in 2000) Pretty Good Privacy (PGP)

57 Communication Discussion QuestionsWhat types of communication exist today that did not exist in 1968 when wiretapping was finally approved for law-enforcement agencies? What type of electronic communications do you use on a regular basis?

58 A Gift of Fire Third edition Sara BaaseChapter 3: Freedom of Speech Slides prepared by Cyndi Chie and Sarah Frye

59 What We Will Cover Changing Communication ParadigmsControlling Offensive Speech Censorship on the Global Net Political Campaign Regulations in Cyberspace Anonymity Protecting Access and Innovation: Net Neutrality or De-regulation?

60 Changing Communication ParadigmsRegulating Communications Media: First Amendment protection and government regulation Print media (newspapers, magazines, books) Broadcast (television, radio) Common carries (telephones, postal system) Print: Has strongest first amendment protection Trend toward fewer government restraints on printed words Broadcast: Government regulates structure of industry and content of programs Government grants broadcast licenses Federal Communication Commission (FCC) is the regulating body Common carriers: Provide medium of communication and make service available to everyone

61 Changing Communication Paradigms (cont.)Telecommunication Act of 1996: Changed regulatory structure and removed artificial legal divisions of service areas and restrictions on services that telephone companies can provide No provider or user of interactive computer service shall be treated as a publisher of any information provided by another information- content provider

62 Changing Communication Paradigms (cont.)Free-speech Principles: Written for offensive and/or controversial speech and ideas Restriction on the power of government, not individuals or private businesses

63 Changing Communication Paradigms (cont.)Free-speech Principles (cont.): Supreme Court principles and guidelines Advocating illegal acts is legal Does not protect libel and direct, specific threats Inciting violence is illegal Allows some restrictions on advertising Protect anonymous speech

64 Controlling Offensive SpeechWhat is it? What is illegal? Answer depends on who you are Many efforts to censor the Internet with a focus on child pornography or sexually explicit material

65 Controlling Offensive Speech (cont.)What was already illegal? Obscenity Depicts a sexual act against state law Depicts these acts in a patently offensive manner that appeals to prurient interest as judged by a reasonable person using community standards Lacks literary, artistic, social, political or scientific value

66 Controlling Offensive Speech (cont.)Internet Censorship Laws & Alternatives: Communication Decency Act (CDA) Federal judge stated that the Internet is the most participatory form of mass communication Attempted to avoid conflict with first amendment by focusing on children The Internet deserves the highest protection from government intrusion

67 Controlling Offensive Speech (cont.)Internet Censorship Laws & Alternatives (cont.): Communication Decency Act (CDA) (cont.) Found to be unconstitutional: The worst material threatening children was already illegal It was too vague and broad It did not use the least restrictive means of accomplishing the goal of protecting children

68 Controlling Offensive Speech (cont.)Internet Censorship Laws & Alternatives (cont.): Child Online Protection Act of 1998 (COPA): Federal crime for commercial web sites to make available to minors harmful material by FCC standards Found to be unconstitutional: Government did not show that COPA was necessary to protect children Child Online Protection Commission concluded that less restrictive means, filtering, was superior to COPA

69 Controlling Offensive Speech (cont.)Internet Censorship Laws & Alternatives (cont.): Children's Internet Protection Act of 2000 (CIPA): Requires schools and libraries that participate in certain federal programs to install filtering software Upheld in court: Does not violate First Amendment since it does not require the use of filters, impose jail or fines It sets a condition for receipt of certain federal funds

70 Controlling Offensive Speech (cont.)Internet Censorship Laws & Alternatives (cont.): Filters Blocks sites with specific words, phrases or images Parental control for sex and violence Updated frequently but may still screen out too much or too little Not possible to eliminate all errors What should be blocked?

71 Controlling Offensive Speech (cont.)Spam: What’s the problem? Loosely described as unsolicited bulk Mostly commercial advertisement Angers people because content and the way it’s sent Free speech issues Spam imposes a cost on others not protected by free speech Spam filters do not violate free speech (free speech does not require anyone to listen)

72 Controlling Offensive Speech (cont.)Spam (cont.): Anti-spam Laws Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM Act) Targets commercial spam Criticized for not banning all spam, legitimized commercial spam

73 Controlling Offensive Speech Discussion QuestionsWhy is ‘least restrictive means’ important? Do you consider the Internet an appropriate tool for young children? Why or why not?

74 Censorship on the Global NetGlobal Impact of Censorship Global nature of the Internet protects against censorship (banned in one country, move to another) May impose more restrictive censorship (block everything in an attempt to block one thing) Yahoo and French censorship Yahoo, eBay and others make decisions to comply with foreign laws for business reasons

75 Censorship on the Global Net (cont.)Censorship in Other Nations: Attempts to limit the flow of information on the Internet similar to earlier attempts to place limits on other communications media Some countries own the Internet backbone within their countries, block at the border specific sites and content Some countries ban all or certain types of access to the Internet

76 Censorship on the Global Net (cont.)Aiding Foreign Censors: Companies who do business in countries that control Internet access must comply with the local laws Google argued that some access is better than no access

77 Censorship on the Global Net Discussion QuestionsWhat impact does the global net have on free speech? Does censorship in other countries have an impact on free speech in the U.S.? How does free speech in ‘free countries’ impact more restrictive countries?

78 Political Campaign Regulations in CyberspaceCampaign Laws and the Internet: Bipartisan Campaign Reform Act of 2002 (BCRA) Prohibits corporations, unions and other organizations from paying for ads that show a candidate's name or face close to an election (60 days for elections, 30 days for primaries or conventions)

79 Political Campaign Regulations . . . (cont.)Campaign Laws and the Internet (cont.): Federal Election Commission (FEC) administers election laws Covers content placed on the Internet for a fee Unpaid individuals may put political content on their Web site, send s, blog, create or host a campaign-related Web site and provide links to campaign sites Media exemption applies to traditional news media and those whose only presence is on the Web

80 Anonymity Common Sense and the Internet:Anonymity protected by the First Amendment Services available to send anonymous (Anonymizer.com) Anonymizing services used by individuals, businesses, law enforcement agencies, and government intelligence services

81 Anonymity (cont.) Is Anonymity Protected?FEC exempted individuals and organizations that are not compensated from election laws that restrict anonymity Supreme Court has overturned state laws that restrict anonymity SLAPP, a Strategic Lawsuit Against Public Participation - lawsuits filed (generally libel) used to obtain the identities (via subpoena) of those expressing critical or dissenting opinions

82 Anonymity (cont.) Against Anonymity: FearsIt hides crime or protects criminals Glowing reviews (such as those posted on eBay or Amazon.com) may actually be from the author, publisher, seller, or their friends U.S. and European countries working on laws that require ISPs to maintain records of the true identity of each user and maintain records of online activity for potential use in criminal investigations

83 Anonymity Discussion QuestionsWhere (if anywhere) is anonymity appropriate on the Internet? What are some kinds of Web sites that should prohibit anonymity? Where (if anywhere) should laws prohibit anonymity on the Internet?

84 Protecting Access and InnovationNet Neutrality or De-regulation? FCC eliminated line-sharing requirements ( ) Should companies be permitted to exclude or give special treatment to content transmitted based on the content itself or on the company that provides it? Should companies be permitted to provide different levels of speed at different prices?

85 Protecting Access and Innovation (cont.)Net Neutrality or De-regulation? (cont.) Net Neutrality Argue for equal treatment of all customers De-regulation Flexibility and market incentives will benefit customers

86 Discussion Questions What are the pros and cons to anonymity on the Internet? The First-Amendment was created to protect political and offensive speech. Anonymity is key to that protection. Should the free speech principles of the First Amendment apply to the Internet, even to speech outside the U.S.?

87 A Gift of Fire Third edition Sara BaaseChapter 4: Intellectual Property Slides prepared by Cyndi Chie and Sarah Frye

88 What We Will Cover Intellectual Property and Changing TechnologyCopyright Law and Significant Cases Copying and Sharing Search Engines and Online Libraries Free-Speech Issues Free Software Issues for Software Developers

89 Intellectual Property and Changing TechnologyWhat is Intellectual Property? The intangible creative work, not its particular physical form Value of intelligence and artistic work comes from creativity, ideas, research, skills, labor, non-material efforts and attributes the creator provides Protected by copyright and patent law

90 Intellectual Property and Changing Technology (cont.)What is Intellectual Property? (cont.) Copyright holders have exclusive rights: To make copies To produce derivative works, such as translations into other languages or movies based on books To distribute copies To perform the work in public (e.g. music, plays) To display the work in public (e.g. artwork, movies, computer games, video on a Web site)

91 Intellectual Property and Changing Technology (cont.)Challenges of New Technology: Digital technology and the internet has made copyright infringement easier and cheaper New compression technologies have made copying large files (e.g. graphics, video and audio files) feasible New tools allow us to modify graphics, video and audio files to make derivative works Scanners allow us to change the media of a copyrighted work, converting printed text, photos, and artwork to electronic form

92 Intellectual Property and Changing Technology Discussion QuestionsHow is intellectual property like physical property? How is intellectual property different than physical property? Do you agree with the idea that someone can "own" intellectual property?

93 Copyright Law and Significant CasesA bit of history: 1790 first copyright law passed 1909 Copyright Act of 1909 defined an unauthorized copy as a form that could be seen and read visually 1976 and 1980 copyright law revised to include software and databases that exhibit "authorship" (original expression of ideas), included the "Fair Use Doctrine" 1982 high-volume copying became a felony 1992 making multiple copies for commercial advantage and private gain became a felony

94 Copyright Law and Significant Cases (cont.)A bit of History (cont.): 1997 No Electronic Theft Act made it a felony to willfully infringe copyright by reproducing or distributing one or more copies of copyrighted work with a total value of more than $1,000 within a six-month period 1998 Digital Millennium Copyright Act (DMCA) prohibits making, distributing or using tools to circumvent technological copyright protection systems and included protection from some copyright lawsuits for Web sites where users post material 2005 Congress made it a felony to record a movie in a movie theater

95 Copyright Law and Significant Cases (cont.)Fair Use Doctrine: Four factors considered Purpose and nature of use – commercial (less likely) or non-profit purposes Nature of the copyrighted work Amount of significance or portion used Effect of use on potential market or value of the copyright work (will it reduce sales of work?) No single factor alone determines Not all factors given equal weight, varies by circumstance

96 Copyright Law and Significant Cases (cont.)Sony v. Universal City Studios (1984) Supreme Court decided that the makers of a device with legitimate uses should not be penalized because some people may use it to infringe on copyright Supreme Court decided copying movies for later viewing was fair use Arguments against fair use People copied the entire work Movies are creative, not factual

97 Copyright Law and Significant Cases (cont.)Sony v. Universal City Studios (1984) (cont.) Arguments for fair use The copy was for private, noncommercial use and generally was not kept after viewing The movie studios could not demonstrate that they suffered any harm The studios had received a substantial fee for broadcasting movies on TV, and the fee depends on having a large audience who view for free

98 Copyright Law and Significant Cases (cont.)Reverse engineering: game machines Sega Enterprises Ltd. v. Accolade Inc. (1992) Atari Games v. Nintendo (1992) Sony Computer Entertainment, Inc. v. Connectix Corporation (2000) Courts ruled that reverse engineering does not violate copyright if the intention is to make new creative works (video games), not copy the original work (the game systems)

99 Copyright Law and Significant Cases (cont.)Sharing music: the Napster case Was the sharing of music via Napster fair use? Napster's arguments for fair use The Sony decision allowed for entertainment use to be considered fair use Did not hurt industry sales because users sampled the music on Napster and bought the CD if they liked it

100 Copyright Law and Significant Cases (cont.)Sharing music: the Napster case (cont.) RIAA's (Recording Industry Association of America) arguments against fair use "Personal" meant very limited use, not trading with thousands of strangers Songs and music are creative works and users were copying whole songs Claimed Napster severely hurt sales Court ruled sharing music via copied MP3 files violated copyright

101 Copyright Law and Significant Cases (cont.)Sharing music: the Napster case (cont.) Was Napster responsible for the actions of its users? Napster's arguments It was the same as a search engine, which is protected under the DMCA They did not store any of the MP3 files Their technology had substantial legitimate uses

102 Copyright Law and Significant Cases (cont.)Sharing music: the Napster case (cont.) RIAA's arguments Companies are required to make an effort to prevent copyright violations and Napster did not take sufficient steps Napster was not a device or new technology and the RIAA was not seeking to ban the technology Court ruled Napster liable because they had the right and ability to supervise the system, including copyright infringing activities

103 Copyright Law and Significant Cases (cont.)File sharing: MGM v. Grokster Grokster, Gnutella, Morpheus, Kazaa, and others provided peer-to-peer (P2P) file sharing services The companies did not provide a central service or lists of songs P2P file transfer programs have legitimate uses Lower Courts ruled that P2P does have legitimate uses Supreme Court ruled that intellectual property owners could sue the companies for encouraging copyright infringement

104 Copyright Law and Significant Cases Discussion QuestionWhat do you think the impact would be on creative industries, such as music, movies and fiction novels, if copyright laws did not protect their intellectual property?

105 Copying and Sharing Responses from the Content Industries:Ideas from the software industries Expiration dates within the software Dongles (a device that must be plugged into a computer port) Copy protection that prevents copying Activation or registration codes Obtained court orders to shut down Internet bulletin boards and Web sites

106 Copying and Sharing (cont.)Responses from the Content Industries (cont.): Banning, suing and taxing Ban or delay technology via lawsuits CD-recording devices Digital Audio Tapes (DAT) DVD players Portable MP3 players Require that new technology include copyright protections Tax digital media to compensate the industry for expected losses

107 Copying and Sharing (cont.)Digital Rights Management : Collection of techniques that control uses of intellectual property in digital formats Includes hardware and software schemes using encryption The producer of a file has flexibility to specify what a user may do with it Apple, Microsoft and Sony all use different schemes of DRM

108 Copying and Sharing (cont.)The DMCA vs. Fair Use, Freedom of Speech, and Innovation: Lawsuits have been filed to ban new technologies U.S. courts have banned technologies such as DeCSS even though it has legitimate uses, while courts in other countries have not. Protesters published the code as part of creative works (in haiku, songs, short movies, a computer game and art) U.S. courts eventually allowed publishing of DeCSS, but prohibited manufacturers of DVD players from including it in their products

109 Copying and Sharing (cont.)Video Sharing: Conflict and Solutions: Industry issues "take down" notices per the DMCA As long as sites like YouTube and MySpace comply with take down notices they are not in violation Take down notices may violate fair use, some have been issued against small portions of video being used for educational purposes

110 Copying and Sharing (cont.)New Business Models and Constructive Solutions: Organizations set up to collect and distribute royalty fees (e.g. the Copyright Clearance Center), users don't have to search out individual copyright holders Sites such as iTunes and the new Napster provide legal means for obtaining inexpensive music and generate revenue for the industry and artists Revenue sharing allows content-sharing sites to allow the posting of content and share their ad revenues with content owners in compensation

111 Copying and Sharing (cont.)New Business Models and Constructive Solutions (cont.): The industry imbeds advertising in files that it then posts to the P2P sites, the advertiser gets its message out and the industry gets its fees Fan fiction is generally not seen as a threat, the writers are also the customers for the original works

112 Copying and Sharing (cont.)Ethical Arguments About Copying: Unlike physical property, copying or distributing a song, video, or computer program does not decrease the use or enjoyment by another person Copying can decrease the economic value of creative work produced for sale The fair use guidelines are useful ethical guidelines There are many arguments for and against unauthorized copying

113 Copying and Sharing (cont.)International Piracy: Some countries do not recognize or protect intellectual property Countries that have high piracy rates often do not have a significant software industry Many countries that have a high amount of piracy are exporting the pirated copies to countries with strict copyright laws Economic sanctions often penalize legitimate businesses, not those they seek to target

114 Copying and Sharing Discussion QuestionSome have argued that copyright lawsuits have been used to stifle innovation, do you agree? Why or why not?

115 Search Engines and Online LibrariesCaching and displaying small excerpts is fair use Creating and displaying thumbnail images is fair use Court ordered Google to remove links to pages that infringe copyright; Google is appealing

116 Search Engines and Online LibrariesBooks Online Project Guttenberg digitizes books in the public domain Microsoft scanned millions of public domain books in University of California's library Google has scanned millions of books that are in the public domain and that are not; they display only excerpts from those still copyrighted Some court rulings favor search engines and information access; some favor content producers

117 Free-Speech Issues Domain Names:Domain names may be used to criticize or protest (e.g. XYZIsJunk.org) Companies sue under trademark violation, but most cases dismissed Some companies buy numerous domain names containing their name so others cannot use them

118 Free-Speech Issues Posting Documents for Criticism:Documents that are copyrighted and trade secrets have been posted as a form of criticism Organizations have sued to have the documents removed from the Web In some cases courts have ruled that it is a copyright violation and the documents must be removed In one judgment against the Church of Scientology, the court ruled that the church’s primary motivation was "to stifle criticism of Scientology in general and to harass its critics"

119 Free Software Free software - idea, an ethic, advocated and supported by large, loose-knit group of computer programmers who allow people to copy, use, and modify their software Free means freedom of use, not necessarily lack of cost Open source - software distributed or made public in source code (readable and modifiable) Proprietary software - (commercial) sold in object code (obscure, not modifiable) (E.g.: Microsoft Office)

120 Free Software Should All Software Be Free?Would there be sufficient incentives to produce the huge quantity of consumer software available now? Would the current funding methods for free software be sufficient to support all software development? Should software be covered under copyright law? Concepts such as copyleft and the GNU Public License provide alternatives to proprietary software within today's current legal framework

121 Issues for Software DevelopersPatents for Software? Patents protect inventions of new things or processes The Supreme Court said that software could not be patented; however a machine that included software could Patents are not supposed to be given for things that are obvious or are already in common use The Patent Office has made mistakes

122 Issues for Software Developers (cont.)Patents on Web Technologies: Amazon agreed to pay IBM who holds patents for online catalogs and targeted advertising Microsoft was fined $1.5 billion for violating MP3 patents. The decision was voided; the case continues. Friendster applied for a patent on its social-networking Web techniques. While the patent was pending, sites such as MySpace sprang up. Friendster's patent was granted and it may now charge licensing fees to businesses using the technology.

123 A Gift of Fire Third edition Sara BaaseChapter 5: Crime Slides prepared by Cyndi Chie and Sarah Frye

124 What We Will Cover Hacking Identity Theft and Credit Card FraudScams and Forgery Crime Fighting Versus Privacy and Civil Liberties Laws That Rule the Web

125 Hacking Hacking – currently defined as to gain illegal or unauthorized access to a file, computer, or network The term has changed over time Phase 1: early 1960s to 1970s It was a positive term A "hacker" was a creative programmer who wrote elegant or clever code A "hack" was an especially clever piece of code

126 Hacking (cont.) Phase 2: 1970s to mid 1990sHacking took on negative connotations Breaking into computers for which the hacker does not have authorized access Still primarily individuals Includes the spreading of computer worms and viruses and ‘phone phreaking’ Companies began using hackers to analyze and improve security

127 Hacking (cont.) Phase 3: beginning with the mid 1990sThe growth of the Web changed hacking; viruses and worms could be spread rapidly Political hacking (Hacktivism) surfaced Denial-of-service (DoS) attacks used to shut down Web sites Large scale theft of personal and financial information

128 Hacking (cont.) Hacktivism, or Political Hacking:Use of hacking to promote a political cause Disagreement about whether it is a form of civil disobedience and how (whether) it should be punished Some use the appearance of hacktivism to hide other criminal activities How do you determine whether something is hacktivism or simple vandalism?

129 Hacking (cont.) The Law: Catching and Punishing Hackers:1986 Congress passed the Computer Fraud and Abuse Act (CFAA) Covers government computers, financial and medical systems, and activities that involve computers in more than one state, including computers connected to the Internet The USA Patriot Act expanded the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems

130 Hacking (cont.) The Law: Catching and Punishing Hackers (cont.):A variety of methods for catching hackers Law enforcement agents read hacker newsletters and participate in chat rooms undercover They can often track a handle by looking through newsgroup archives Security professionals set up ‘honey pots’ which are Web sites that attract hackers, to record and study Computer forensics is used to retrieve evidence from computers

131 Hacking (cont.) The Law: Catching and Punishing Hackers (cont.):Penalties for young hackers Many young hackers have matured and gone on to productive and responsible careers Temptation to over or under punish Sentencing depends on intent and damage done Most young hackers receive probation, community service, and/or fines Not until 2000 did a young hacker receive time in juvenile detention

132 Hacking (cont.) The Law: Catching and Punishing Hackers (cont.):Security Internet started with open access as a means of sharing information for research Attitudes about security were slow to catch up with the risks Firewalls are used to monitor and filter out communication from untrusted sites or that fit a profile of suspicious activity Security is often playing catch-up to hackers as new vulnerabilities are discovered and exploited

133 Hacking (cont.) The Law: Catching and Punishing Hackers (cont.):Responsibility for Security Developers have a responsibility to develop with security as a goal Businesses have a responsibility to use security tools and monitor their systems to prevent attacks from succeeding Home users have a responsibility to ask questions and educate themselves on the tools to maintain security (personal firewalls, anti-virus and anti-spyware)

134 Hacking Discussion QuestionsIs hacking that does no direct damage or theft a victimless crime? Do you think hiring former hackers to enhance security is a good idea or a bad idea? Why?

135 Identity Theft and Credit Card FraudStealing Identities: Identity Theft –various crimes in which a criminal or large group uses the identity of an unknowing, innocent person Use credit/debit card numbers, personal information, and social security numbers 18-29 year-olds are the most common victims because they use the web most and are unaware of risks E-commerce has made it easier to steal card numbers and use without having the physical card

136 Identity Theft and Credit Card Fraud (cont.)Stealing Identities (cont.): Techniques used to steal personal and financial information Phishing - fishing for personal and financial information disguised as legitimate business Pharming - false Web sites that fish for personal and financial information by planting false URLs in Domain Name Servers Online resumes and job hunting sites may reveal SSNs, work history, birth dates and other information that can be used in identity theft

137 Identity Theft and Credit Card Fraud (cont.)Stealing Identities (cont.): Techniques used to protect personal and financial information Activation for new credit cards Retailers do not print the full card number and expiration date on receipts Software detects unusual spending activities and will prompt retailers to ask for identifying information Services, like PayPal, act as third party allowing a customer to make a purchase without revealing their credit card information to a stranger

138 Identity Theft and Credit Card Fraud (cont.)Responses to Identity Theft: Authentication of and Web sites Use of encryption to securely store data, so it is useless if stolen Authenticating customers to prevent use of stolen numbers, may trade convenience for security In the event information is stolen, a fraud alert can flag your credit report; some businesses will cover the cost of a credit report if your information has been stolen

139 Identity Theft and Credit Card Fraud (cont.)Biometrics: Biological characteristics unique to an individual No external item (card, keys, etc.) to be stolen Used in areas where security needs to be high, such as identifying airport personnel Biometrics can be fooled, but more difficult to do so, especially as more sophisticated systems are developed

140 Identity Theft and Credit Card Fraud Discussion QuestionsWhat steps can you take to protect yourself from identity theft and credit card fraud? How can you distinguish between an that is a phishing attempt and an from a legitimate business?

141 Scams and Forgery Auctions:FTC reports that online auction sites are one of the top sources of fraud complaints Some sellers do not send items or send inferior products Shill bidding is used to artificially raise prices Sellers give themselves or friends glowing reviews to garner consumer trust Auction sites use various techniques to counter dishonest sellers

142 Scams and Forgery (cont.)Click fraud - repeated clicking on an ad to either increase a site’s revenue or to use up a competitor's advertising budget Stock fraud - most common method is to buy a stock low, send out s urging others to buy, and then sell when the price goes up, usually only for a short time Digital Forgery - new technologies (scanners and high quality printers) are used to create fake checks, passports, visas, birth certificates, etc., with little skill and investment

143 Crime Fighting Versus Privacy and Civil LibertiesSearch and Seizure of Computers: Requires a warrant to search and seize a computer Court rulings inconclusive about whether information found on computers, but not covered by a warrant, is considered in ‘plain view’ Automated searches Can monitor constantly and less likely to miss suspicious activity Can be programmed to only look for what is covered in a warrant

144 Crime Fighting Versus Privacy and . . . (cont.)The Issue of Venue: Charges are generally filed where the crime occurs Laws differ between states and countries Where charges are filed may have significant impact if community standards apply The FBI usually files in the state where the crime was discovered and the investigation began

145 Crime Fighting Versus Privacy and . . . (cont.)Cybercrime Treaty: International agreement to foster international cooperation among law enforcement agencies of different countries in fighting copyright violations, pornography, fraud, hacking and other online fraud Treaty sets common standards or ways to resolve international cases

146 Whose Laws Rule the Web When Digital Actions Cross Borders:Laws vary from country to country Corporations that do business in multiple countries must comply with the laws of all the countries involved Someone whose actions are legal in their own country may face prosecution in another country where their actions are illegal

147 Whose Laws Rule the Web (Cont.)Arresting Foreign Visitors: A Russian citizen was arrested for violating the DMCA when he visited the U.S. to present a paper at a conference; his software was not illegal in Russia An executive of a British online gambling site was arrested as he transferred planes in Dallas (online sports betting is not illegal in Britain)

148 Whose Laws Rule the Web (Cont.)Libel, Speech and Commercial Law: Even if something is illegal in both countries, the exact law and associated penalties may vary Where a trial is held is important not just for differences in the law, but also the costs associated with travel between the countries; cases can take some time to come to trial and may require numerous trips Freedom of speech suffers if businesses follow laws of the most restrictive countries

149 Whose Laws Rule the Web Discussion QuestionsWhat suggestions do you have for resolving the issues created by differences in laws between different countries? What do you think would work, and what do you think would not?

150 A Gift of Fire Third edition Sara BaaseChapter 6: Work Slides prepared by Cyndi Chie and Sarah Frye

151 What We Will Cover Fears and Questions The Impact on EmploymentThe Work Environment Employee Crime Employee Monitoring

152 Fears and Questions The introduction of computers in the workplace generated many fears Mass unemployment due to increased efficiency The need for increased skill and training widens the earning gap New trends still generating fears Offshoring of jobs will lead to mass unemployment Employers use of technology to monitor their employees

153 The Impact on EmploymentJob Creation and destruction: A successful technology eliminates or reduces some jobs but creates others Reduced the need for telephone operators, meter readers, mid-level managers New industries arise Internet Cellular communications Lower prices increase demand and create jobs Music industry changed from serving the wealthy to serving the masses, employing more than just musicians

154 The Impact on Employment (cont.)Job Creation and destruction: Unemployment rates fluctuate Growth of computers has been steady, while unemployment has fluctuated widely Are we earning less? Since the 1970s, wages decreased but fringe benefits increased People work fewer hours since the Industrial Revolution Decrease in take-home pay may be due to other factors (e.g. increased taxes) Purchasing power increases as prices fall

155 The Impact on Employment (cont.)Changing Skill Levels: The new jobs created from computers are different from the jobs eliminated New jobs such as computer engineer and system analyst jobs require a college degree, where jobs such as bank tellers, customer service representatives and clerks do not Companies are more willing to hire people without specific skills when they can train new people quickly and use automated support systems

156 The Impact on Employment (cont.)A Global Workforce: Outsourcing - phenomenon where a company pays another company to build parts for its products or services instead of performing those tasks itself Offshoring - the practice of moving business processes or services to another country, especially overseas, to reduce costs Inshoring - when another company employs thousands of people in the U.S. (e.g. offshoring for a German company means inshoring for U.S.) Almost 5% of U.S. workers are employed by foreign companies

157 The Impact on Employment (cont.)A Global Workforce (cont.): Problems and side effects of offshoring: Consumers complain about customer service representatives, because accents are difficult to understand Employees in U.S. companies need new job skills (e.g., managing, working with foreign colleagues) Increased demand for high-skill workers in other countries forces salaries up

158 The Impact on Employment (cont.)Getting a Job: Learning about jobs and companies Online company histories and annual reports Job search and resume sites Online training Learning about applicants and employees Search online newsgroups and social networks Hire data-collection agencies such as ChoicePoint Prospective employees may craft an online profile and presence geared towards the job they want

159 The Impact on Employment Discussion QuestionsWhat jobs have been eliminated due to technology? What jobs that were once considered high-skill jobs are now low-skill due to technology? What new jobs have been created because of technology?

160 The Work Environment Job Dispersal and Telecommuting: TelecommutingWorking at home using a computer electronically linked to one's place of employment Mobile office using a laptop, working out of your car or at customer locations Fulltime and part-time telecommuting

161 The Work Environment (cont.)Job Dispersal and Telecommuting (cont.): Benefits Reduces overhead for employers Reduces need for large offices Employees are more productive, satisfied, and loyal Reduces traffic congestion, pollution, gasoline use, and stress Reduces expenses for commuting and money spent on work clothes Allows work to continue after blizzards, hurricanes, etc.

162 The Work Environment (cont.)Job Dispersal and Telecommuting (cont.): Problems Employers see resentment from those who have to work at the office For some telecommuting employees, corporation loyalty weakens Odd work hours Cost for office space has shifted to the employee Security risks when work and personal activities reside on the same computer

163 The Work Environment (cont.)Changing Structure of Business: Increase in smaller businesses and independent consultants (‘information entrepreneurs’) ‘Mom and pop multi-nationals’, small businesses on the Web Growth of large, multi-national corporations Not all changes due to technology

164 The Work Environment Discussion QuestionsWould you want to telecommute? Why or why not? How has technology made entrepreneurship easier? Harder?

165 Employee Crime Embezzlement - fraudulent appropriation of property by a person to whom it has been entrusted Trusted employees have stolen millions of dollars Angry fired employees sabotage company systems Logic bomb - software that destroys critical files (payroll and inventory records) after employee leaves

166 Employee Monitoring Background: Monitoring is not newEarly monitoring was mostly ‘blue-collar’ (factory) and ‘pink-collar’ (telephone and clerical) jobs Time-clocks and logs Output counts at the end of the day Bosses patrolled the aisles watching workers

167 Employee Monitoring (cont.)Data Entry, Phone Work, and Retail: Data entry Key stroke quotas Encourage competition Beep when workers pause Phone work Number and duration of calls Idle time between calls Randomly listen in on calls Retail Surveillance to reduce theft by employees

168 Employee Monitoring (cont.)Location Monitoring: Cards and badges used as electronic keys increase security but track employee movements GPS tracks an employee's location Used in some hospitals to track nurse locations for emergency purposes, also shows where they are at lunch or when they use the bathroom Used to track long-haul trucks to reduce theft and optimize delivery schedules, also detects driving speeds and duration of rest breaks Employees often complain of loss of privacy

169 Employee Monitoring (cont.), Blogging, and Web Use: and voice mail at work Employees often assume passwords mean they are private Roughly half of major companies in the U.S. monitor or search employee , voice mail, or computer files Most companies monitor infrequently, some routinely intercept all

170 Employee Monitoring (cont.), Blogging, and Web Use (cont.): Law and cases Electronic Communications Privacy Act (ECPA) prohibits interception of and reading stored without a court order, but makes an exception for business systems Courts put heavy weight on the fact that computers, mail, and phone systems are owned by the employer who provides them for business purposes

171 Employee Monitoring (cont.), Blogging, and Web Use (cont.): Law and cases (cont.) Courts have ruled against monitoring done to snoop on personal and union activities or to track down whistle blowers Many employers have privacy policies regarding and voice mail The National Labor Relation Board (NLRB) sets rules and decides cases about worker-employer relations

172 Employee Monitoring (cont.), Blogging, and Web Use (cont.): Some companies block specific sites (e.g. adult content, sports sites, job search sites, social-network sites) Employees spend time on non-work activities on the Web Concerns over security threats such as viruses and other malicious software Concerns about inappropriate activities by employees (e.g., harassment, unprofessional comment)

173 Employee Monitoring Discussion QuestionsHow much privacy is reasonable for an employee to expect in the workplace? Under what circumstances is it appropriate for an employer to read an employee's ?

174 A Gift of Fire Third edition Sara BaaseChapter 7: Evaluating and Controlling Technology Slides prepared by Cyndi Chie and Sarah Frye

175 What We Will Cover Information, Knowledge, and JudgmentComputers and Community The ‘Digital Divide’ Evaluations of the Impact of Computer Technology Making Decisions About Technology

176 Information, Knowledge, and JudgmentEvaluating Information on the Web: Expert information or ‘wisdom of the crowd’? Daunting amount of information on the web, much of this information is not correct Search engines are replacing librarians, but Web sites are ranked by popularity, not by expert evaluation Wisdom of the crowd - ratings by public of website If millions participate, the results will be useful

177 Information, Knowledge, and Judgment (cont.)Evaluating Information on the Web (cont.): Wikipedia: Written by volunteers, some posts are biased and not accurate Although anyone can write, most people do not Those that do typically are educated and experts

178 Information, Knowledge, and Judgment (cont.)Evaluating Information on the Web (cont.): Wisdom of the crowd Problems of unreliable information are not new The Web magnifies the problems Rating systems are easy to manipulate Vulnerable viewers Less educated individuals Children Responsibilities of site operators Should identify user-supplied content Make clear which information has been verified

179 Information, Knowledge, and Judgment (cont.)Evaluating Information on the Web (cont.): Manipulation of images: Movies and videos use special effects to add creativity and enjoyment of entertainment People can use technology for deception and fraud Ease with which we can modify digital images and video Should news agencies modify images and videos? Faking photos is not a new phenomenon; more people can do it now because it’s easy

180 Information, Knowledge, and Judgment (cont.)Writing, Thinking and Deciding: New tools have displaced skills that were once important Abdicating responsibility People willing to let computers do their thinking Reliance on computer systems over human judgment may become institutionalized Fear of having to defend your own judgment if something goes wrong

181 Information, Knowledge, and Judgment (cont.)Computer Models: Evaluating Models How well do the modelers understand the underlying science or theory? Models necessarily involve assumptions and simplifications of reality How closely do the results or predictions correspond with the results from physical experiments or real experience?

182 Information, Knowledge, and Judgment (cont.)Computer Models (cont.): Why models may not be accurate We might not have complete knowledge of the system we are modeling The data describing current conditions or characteristics may be incomplete of inaccurate Computing power may be inadequate for the complexity of the model It is difficult, if not impossible, to numerically quantify variables that represent human values and choices

183 Information, Knowledge, and Judgment Discussion QuestionsHow do you evaluate the reliability of information you find on the Web? How do your evaluation methods compare to the way you evaluate information from other sources? Some computer models are better than others. What types of models work well? What types don't? Why?

184 Computers and CommunityIt is human nature to form associations based on common interests Some feared early technologies, such as telephones, thinking communication would be de-humanized Computers and the Internet were blamed for the decline in community involvement and memberships in clubs and organizations The Internet provides communities focused on specialized interests or problems

185 Computers and Community (cont.)The Internet brings people together from all over the world and the Internet provide convenient and cheap ways for families and friends to stay in contact New trends include social-networking sites such as MySpace and virtual environments such as Second Life

186 Computers and Community Discussion QuestionsHow convincing is the argument that electronic commerce threatens small (“brick and mortar”) community businesses and thus the health of small communities? Do you think that communicating by text messaging and via social-networking sites depersonalizes or dehumanizes your relationships with friends?

187 The "Digital Divide" Trends in Computer Access:New technologies only available to the wealthy The time it takes for new technology to make its way into common use is decreasing Cost is not the only factor; ease of use plays a role Entrepreneurs provide low cost options for people who cannot otherwise afford something Government funds technology in schools As technology becomes more prevalent, the issues shift from the haves and have-nots to level of service

188 The "Digital Divide" (cont.)The Global Divide and the Next Billion Users: Approximately one billion people worldwide have access to the Web; approximately five billion do not Non-profit organizations and huge computer companies are spreading computer access to people in developing countries Bringing new technology to poor countries is not just a matter of money to buy equipment; PCs and laptops must work in extreme environments Some people actively working to shrink the digital divide emphasize the need to provide access in ways appropriate to the local culture

189 Evaluations of the Impact of Computer TechnologyThe Neo-Luddite View of Computers, Technology, and Human Needs: Computers cause massive unemployment No real need (We use technologies because they are there, not because they satisfy real needs) Computers cause social inequity Benefit big business and the government Do little or nothing to solve real problems Computers separate humans from nature and destroy the environment

190 Evaluations of the Impact of Computer Technology (cont.)Accomplishments of Technology: Prices of food are down and raw materials are abundant Real buying power is up Food supplies and GDP are growing faster than the population Dramatic impact on life expectancy Assistive technologies benefit those with disabilities

191 Making Decisions About Technology (cont.)The Difficulty of Prediction: Each new technology finds new and unexpected uses The history of technology is full of wildly wrong predictions Weizenbaum argued against developing speech recognition technology Mistaken expectations of costs and benefits Should we decline a technology because of potential abuse and ignore the benefits? New technologies are often expensive, but costs drop as the technology advances and the demand increases

192 Making Decisions About Technology (cont.)Intelligent Machines and Super-intelligent Humans - Or the End of the Human Race? Technological Singularity - point at which artificial intelligence or some combined human-machine intelligence advances so far that we cannot comprehend what lies on the other side We cannot prepare for aftermath, but prepare for more gradual developments Select a decision making process most likely to produce what people want

193 Making Decisions About Technology Discussion QuestionsIf you could decide what technologies should be developed, what would you develop? Why? Does the prospect of super-intelligent robots scare you?

194 A Gift of Fire Third edition Sara BaaseChapter 8: Errors, Failures, and Risks Slides prepared by Cyndi Chie and Sarah Frye

195 What We Will Cover Failures and Errors in Computer SystemsCase Study: The Therac-25 Increasing Reliability and Safety Dependence, Risk, and Progress

196 Failures and Errors in Computer SystemsMost computer applications are so complex it is virtually impossible to produce programs with no errors The cause of failure is often more than one factor Computer professionals must study failures to learn how to avoid them Computer professionals must study failures to understand the impacts of poor work

197 Failures and Errors in Computer Systems (cont.)Individual Problems: Billing errors Inaccurate and misinterpreted data in databases Large population where people may share names Automated processing may not be able to recognize special cases Overconfidence in the accuracy of data Errors in data entry Lack of accountability for errors

198 Failures and Errors in Computer Systems (cont.)System Failures: AT&T, Amtrak, NASDAQ Businesses have gone bankrupt after spending huge amounts on computer systems that failed Voting system in 2000 presidential election Denver Airport Ariane 5 Rocket

199 Failures and Errors in Computer Systems (cont.)Denver Airport: Baggage system failed due to real world problems, problems in other systems and software errors Main causes: Time allowed for development was insufficient Denver made significant changes in specifications after the project began

200 Failures and Errors in Computer Systems (cont.)High-level Causes of Computer-System Failures: Lack of clear, well thought out goals and specifications Poor management and poor communication among customers, designers, programmers, etc. Pressures that encourage unrealistically low bids, low budget requests, and underestimates of time requirements Use of very new technology, with unknown reliability and problems Refusal to recognize or admit a project is in trouble

201 Failures and Errors in Computer Systems (cont.)Safety-Critical Applications: A-320: "fly-by-the-wire" airplanes (many systems are controlled by computers and not directly by the pilots) Between four planes crashed Air traffic control is extremely complex, and includes computers on the ground at airports, devices in thousands of airplanes, radar, databases, communications, and so on - all of which must work in real time, tracking airplanes that move very fast In spite of problems, computers and other technologies have made air travel safer

202 Case Study: The Therac-25Therac-25 Radiation Overdoses: Massive overdoses of radiation were given; the machine said no dose had been administered at all Caused severe and painful injuries and the death of three patients Important to study to avoid repeating errors Manufacturer, computer programmer, and hospitals/clinics all have some responsibility

203 Case Study: The Therac-25 (cont.)Software and Design problems: Re-used software from older systems, unaware of bugs in previous software Weaknesses in design of operator interface Inadequate test plan Bugs in software Allowed beam to deploy when table not in proper position Ignored changes and corrections operators made at console

204 Case Study: The Therac-25 (cont.)Why So Many Incidents? Hospitals had never seen such massive overdoses before, were unsure of the cause Manufacturer said the machine could not have caused the overdoses and no other incidents had been reported (which was untrue) The manufacturer made changes to the turntable and claimed they had improved safety after the second accident. The changes did not correct any of the causes identified later

205 Case Study: The Therac-25 (cont.)Why So Many Incidents? (cont.) Recommendations were made for further changes to enhance safety; the manufacturer did not implement them The FDA declared the machine defective after the fifth accident The sixth accident occurred while the FDA was negotiating with the manufacturer on what changes were needed

206 Case Study: The Therac-25 (cont.)Observations and Perspective: Minor design and implementation errors usually occur in complex systems; they are to be expected The problems in the Therac-25 case were not minor and suggest irresponsibility Accidents occurred on other radiation treatment equipment without computer controls when the technicians: Left a patient after treatment started to attend a party Did not properly measure the radioactive drugs Confused micro-curies and milli-curies

207 Case Study: The Therac-25 Discussion QuestionIf you were a judge who had to assign responsibility in this case, how much responsibility would you assign to the programmer, the manufacturer, and the hospital or clinic using the machine?

208 Increasing Reliability and SafetyWhat goes Wrong? Design and development problems Management and use problems Misrepresentation, hiding problems and inadequate response to reported problems Insufficient market or legal incentives to do a better job Re-use of software without sufficiently understanding the code and testing it Failure to update or maintain a database

209 Increasing Reliability and Safety (cont.)Professional techniques: Importance of good software engineering and professional responsibility User interfaces and human factors Feedback Should behave as an experienced user expects Workload that is too low can lead to mistakes Redundancy and self-checking Testing Include real world testing with real users

210 Increasing Reliability and Safety (cont.)Law, Regulation and Markets: Criminal and civil penalties Provide incentives to produce good systems, but shouldn't inhibit innovation Warranties for consumer software Most are sold ‘as-is’ Regulation for safety-critical applications Professional licensing Arguments for and against Taking responsibility

211 Dependence, Risk, and ProgressAre We Too Dependent on Computers? Computers are tools They are not the only dependence Electricity Risk and Progress Many new technologies were not very safe when they were first developed We develop and improve new technologies in response to accidents and disasters We should compare the risks of using computers with the risks of other methods and the benefits to be gained

212 Dependence, Risk, and Progress Discussion QuestionsDo you believe we are too dependent on computers? Why or why not? In what ways are we safer due to new technologies?

213 A Gift of Fire Third edition Sara BaaseChapter 9: Professional Ethics and Responsibilities Slides prepared by Cyndi Chie and Sarah Frye

214 What We Will Cover What is Professional Ethics?Ethical Guidelines for Computer Professionals Scenarios

215 What is "Professional Ethics"?Professional ethics includes relationships with and responsibilities toward customers, clients, coworkers, employees, employers, others who use one’s products and services, and others whom they affect A professional has a responsibility to act ethically. Many professions have a code of ethics that professionals are expected to abide by Medical doctors Lawyers and judges Accountants

216 What is "Professional Ethics"? (cont.)There are special aspects to making ethical decisions in a professional context Honesty is one of the most fundamental ethical values; however, many ethical problems are more subtle than the choice of being honest or dishonest Some ethical issues are controversial

217 Ethical Guidelines for Computer ProfessionalsGuidelines and Professional Responsibilities: Understand what success means Include users (such as medical staff, technicians, pilots, office workers) in the design and testing stages to provide safe and useful systems Do a thorough, careful job when planning and scheduling a project and when writing bids or contracts Design for real users

218 Ethical Guidelines for Computer . . . (cont.)Guidelines and Professional Responsibilities (cont.): Don’t assume existing software is safe or correct; review and test it Be open and honest about capabilities, safety, and limitations of software Require a convincing case for safety Pay attention to defaults Develop communication skills

219 Scenarios Methodology: Brainstorming phase:List all the people and organizations affected (the stakeholders) List risks, issues, problems, and consequences List benefits. Identify who gets each benefit In cases where there is no simple yes or no decision, but rather one has to choose some action, list possible actions

220 Scenarios (cont.) Methodology: Analysis phaseIdentify responsibilities of the decision maker Identify rights of stakeholders Consider the impact of the options on the stakeholders (consequences, risks, benefits, harms, costs) Categorize each potential action as ethically obligatory, prohibited, or acceptable When there are multiple options, select one, considering the ethical merits of each, courtesy to others, practicality, self-interest, personal preferences, etc.

221 Scenarios Scenario 1: Your company is developing a free service that will include targeted advertising based on the content of the messages (similar to Google’s Gmail). You are part of the team designing the system. What are your ethical responsibilities? Have the class analyze the scenario using the brainstorming and analysis methodology.

222 Scenarios Scenario 2: You are a relatively junior programmer working on modules that collect data from loan application forms and convert them to formats required by the parts of the program that evaluate the applications. You find that some demographic data are missing from some forms, particularly race and age. What should your program do? What should you do? Have the class analyze the scenario using the brainstorming and analysis methodology.

223 Scenarios Scenario 3: Your company has 25 licenses for a computer program, but you discover that it has been copied onto 80 computers. Have the class analyze the scenario using the brainstorming and analysis methodology.

224 Scenarios Scenario 4: Suppose you are a member of a team working on a computer-controlled crash avoidance system for automobiles. You think the system has a flaw that could endanger people. The project manager does not seem concerned and expects to announce completion of the project soon. Do you have an ethical obligation to do something? Have the class analyze the scenario using the brainstorming and analysis methodology.

225 Scenarios Scenario 5: You work for the IRS, the Social Security Administration, a movie-rental company, or an Internet service provider. Someone asks you to get a copy of records about a particular person. He will pay you $500. Have the class analyze the scenario using the brainstorming and analysis methodology.

226 Scenarios Scenario 6: You have a small consulting business. The CyberStuff company plans to buy software to run a new collaborative content-sharing Web site. CyberStuff wants to hire you to evaluate bids from vendors. Your spouse works for NetWorkx and did most of the work in writing the bid that NetWorkx plans to submit. You read the bid while your spouse was working on it and you think it is excellent. Do you tell CyberStuff about your spouse’s connection with NetWorkx? Have the class analyze the scenario using the brainstorming and analysis methodology.

227 Scenarios Scenario 7: A team of programmers is developing a communications system for firefighters to use when fighting a fire. Firefighters will be able to communicate with each other, with supervisors near the scene, and with other emergency personnel. The programmers will test the system in a field near the company office. Have the class analyze the scenario using the brainstorming and analysis methodology.

228 Scenarios Scenario 8: You are the computer system administrator for a mid-sized company. You can monitor the company network from home, and you frequently work from home. Your niece, a college student, is visiting for a week. She asks to use your computer to check her . Sure, you say. You are being a gracious host. What is the ethical problem? Have the class analyze the scenario using the brainstorming and analysis methodology.