800 likes | 932 Vues
This chapter overview explores the crucial role of networking in enhancing computer utility, discussing how the Internet connects millions of users and the implications for email communication. It examines the spam epidemic, detailing how spam proliferates and its economic impact, as well as ethical evaluations of spamming from various philosophical perspectives. The chapter also addresses the challenge of censorship, freedom of expression, and children's safety on the web, highlighting the need for responsible internet use and the difficulties posed by internet addiction.
E N D
Chapter 3 Networking
Chapter Overview (1/2) • Introduction • Email and spam • Fighting spam • World Wide Web • Ethical perspectives on pornography
Chapter Overview (2/2) • Censorship • Freedom of expression • Children and the Web • Breaking trust on the Internet • Internet addiction
Introduction • Networking increases computer’s utility • Internet connects millions of computers • Powerful computational resource • Distributed computing (SETI, Human Genome) • Even more powerful communication medium • Network utility grows as number of users squared • 10 users 90 sender-receiver combinations • 100 users 9900 sender-receiver combinations
Email and Spam • How email works • The spam epidemic • Ethical evaluations of spamming
How Email Works • Email: Messages embedded in files transferred between computers • Email address: Uniquely identifies cyberspace mailbox • Messages broken into packets • Routers transfer packets from sender’s mail server to receiver’s mail server via intermediate servers (indirect transmission)
The Spam Epidemic (1/3) • Spam: Unsolicited, bulk email • Amount of email that is spam has increased • 8% in 2001 • 40% in 2003 • More than 50% in 2004 • Spam is effective • More than 100 times cheaper than “junk mail” • Profitable even if only 1 in 100,000 buys product
The Spam Epidemic (2/3) • How firms get email addresses • Opt-in lists • Dictionary attacks • Net crawlers • Spoofing • Spammers seek anonymity • Change email and IP addresses to disguise sending machine • Hijack another system as a spam launch pad
The Spam Epidemic (3/3) • Spam blockers • Attempt to screen out spam • Have led to more picture-based spam • AOL blocks 1 billion per day • Hard to control as spammers change email addresses easily and frequently
Ethical Evaluations of Spamming • Kantian evaluation • Act utilitarian evaluation • Rule utilitarian evaluation • Social contract theory evaluation • From all these perspectives, it is wrong to send spam
Ethical Evaluations of Spamming • Kantian Evaluation • Assume that I have a great idea for a product or service • I send unsolicited email to a large list • Some recipients must pay by the message • I am treating recipients as a means to the end of selling my product
Ethical Evaluations of Spamming • Act Utilitarian Evaluation • I send the email to 100 million people • 1 in 100,000 may buy my product • Assume that 90% of customers are happy, 10% unhappy • We have 99,990,000 unhappy people • 9,000 happy customers • 1 happy me
Ethical Evaluations of Spamming • Rule Utilitarian Evaluation • Use the same scenario as before • If everyone were interested, I could not fulfill the orders • People may be inclined to drop or change email to prevent spam • Usefulness of email decreases
Ethical Evaluations of Spamming • Social Contract Theory Evaluation • We each have the right to free speech • That right does not include the requirement that the rest of us have to listen • If email is an invitation to correspond, the sender must identify subject and author
Making Direct Email Moral • Evaluating spam from four perspectives each concludes it is unethical • Can it be made ethical? • Use real address and subject • Send only to those who opt in
Fighting Spam • Mail Abuse Prevention System • Ethical evaluations of blacklisting by MAPS • Proposed solutions to the Spam epidemic • CAN SPAM Act of 2003
Fighting Spam • Mail Abuse Prevention System (MAPS) • http://www.mail-abuse.com/ • Uses a Realtime Blackhole List (RBL) • List of IP addresses that generate or forward spam • Use their own guidelines to determine who should be black listed • http://www.mail-abuse.com/support/pdf/WP_MAPS_RBL_060104.pdf
Fighting Spam • Proper email guidelines • Recipients must have asked to receive email • Must provide recipients with simple way to be removed from the list (including at least one non-email communication method) • Must remove invalid addresses in a timely manner
Fighting Spam • Proper email guidelines • Must disclose how recipient addresses will be used, including frequency and subject of future mailings • When a violation is suspected • MAPS contacts marketer (or ISP) • Warns of potential blacklisting
Fighting Spam • When a violation is suspected • Evaluates response • Makes decision • Those who have been Blockholed may apply for removal
Fighting Spam • Arguments against MAPS • It prevents free speech • If an entire ISP is blocked, innocent individuals may be blocked
Ethical Evaluations of Publishing Blacklist • Social contract theory evaluation • Utilitarian evaluation • Kantian evaluation
Ethical Evaluations of MAPS • Social Contract Theory • MAPS presumes email should be of “direct and equal benefit to the sender and the recipient” • Negates the argument of having a right to have a message delivered • Use of MAPS is by request (and payment) only
Ethical Evaluations of MAPS • Utilitarian Evaluation • ISP’s benefit - decrease in spam = less network traffic and improved performance • ISP’s lose - useful email may be blocked which reduces the value of the net • Innocent senders may be harmed • Must compare net benefit of senders to net benefit of receivers
Ethical Evaluations of MAPS • Kantian Evaluation • Goal of RBL is to improve ISP’s behavior • Customer’s inconvenience may lead to complaints to ISP and suppression of spammers • MAPS is treating customers as a means to an end • This violates the Categorical Imperative
Proposed Solutions to Spam Epidemic • Require an explicit opt-in of subscribers • Require labeling of email advertising • Add a cost to every email that is sent • Ban unsolicited email
CAN SPAM Act of 2003 • Controlling the Assault of Non-Solicited Pornography and Marketing (CAN SPAM) http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=108_cong_bills&docid=f:s877enr.txt.pdf • Divides business email into three categories • Transactional or relational • Message header, sender, organization and transmission information must be correct • Must not disguise ID of the sending computer
CAN SPAM Act of 2003 • Divides business email into three categories • Consensual commercial email • Must inform recipient of option to be removed from list • Must provide internet based removal functional for at least 30 days after the message was sent • Must contain postal address of sender • Unsolicited email
CAN SPAM Act of 2003 • Divides business email into three categories • Unsolicited email • Must contain “clear and conspicuous” notice that it is an advertisement • If sexually explicit, must contain notice in subject line • Prohibits dictionary attacks
CAN SPAM Act of 2003 • Penalties for violations • $250 per message, $2 million max • $6 million max for repeat offenders • Criminal penalties and jail time up to five years if used to further felonies or repeat offenders • Forfeiture of property or equipment used in commission of crime
CAN SPAM Act of 2003 • Critics call it the “You CAN SPAM Act” • Defines and permits unsolicited email • Does not prevent spam at all • Opt out not feasible as it confirms the email address and address can be sold to other spammers • Weaker than some existing state laws • Enforceable only in the US
The World Wide Web • Attributes of the Web • How we use the Web • Too much control or too little?
Attributes of the Web • It is decentralized • Every Web object has a unique address • It is based on the Internet, therefore it is cross platform and accessible to all operating systems
How We Use the Web • Shopping • Promoting business • Learning • Exploring our roots • Playing games • Entering virtual worlds • Paying taxes • Gambling • Blogging • Lots more!
Too Much Control or Too Little? • Not everyone in world has Internet access • Saudi Arabia: centralized control center • Blocks pornography, gambling, non-Islamic religious organizations • Women’s health and sexuality, gay rights, Middle Eastern politics, ways to circumvent filtering
Too Much Control or Too Little? • People’s Republic of China: ISPs sign“self-discipline” agreement • Allows many ISP’s • Each must agree to voluntarily block politically or morally objectionable web pages • Also blocks BBC news, CNN, sites related to Taiwan and Tibet • Can affect Hong Kong which routes through PRC
Too Much Control or Too Little? • Germany: Forbids access to neo-Nazi sites • United States: Repeated efforts to limit access of minors to pornography
Control of theWorld Wide Web • US • Children’s Internet Protection Act upheld • Argument transcript http://www.supremecourtus.gov/oral_arguments/argument_transcripts/02-361.pdf • Opinion http://www.supremecourtus.gov/opinions/02pdf/02-361.pdf
Ethical Perspectiveson Pornography • US government mandates filtering in public libraries that receive federal funding • Should the government restrict access? • Pornography is hard to define • Book’s definition for this discussion
Ethical Perspectives on Pornography • Pornography is immoral • Adult pornography is moral • Commentary
Pornography Is Immoral • Kant • Loved person an object of sexual appetite • Sexual desire focuses on body, not complete person • All sexual gratification outside marriage wrong • Model(s) are used as means to an end • Used as objects, not persons • Violates Categorical Imperative
Pornography if Immoral • Utilitarianism • Pornography reduces dignity of human life, harming everyone • Pornography increases crimes such as rape • Pornography reduces sympathy for rape victims • Pornography is like pollution that poisons the environment • Pornography industry diverts resources from more socially redeeming activities
Adult Pornography Is Moral • Presumes viewers and models are consenting adults • Utilitarianism • Those who produce pornography make money • Consumers of pornography derive physical pleasure • Pornography is a harmless outlet for exploring sexual fantasies
Commentary • Performing utilitarian calculus is difficult • How to deal with contradictory “facts” by “experts?” • How to quantify harms/benefits, such as harm done to people who find pornography offensive?
Censorship • Attempts to suppress or regulate public access to offensive or harmful material • Usually exercised by government or religious institutions • Printing press allowed wider dissemination of material • Made more difficult by divergence of church and state
Censorship • Direct censorship • Self-censorship • Challenges posed by the Internet • Ethical perspectives on censorship
Direct Censorship • Government monopolization • State controls all media • No private radio, TV or newspapers • Made more difficult by computers and internet • Prepublication review • Essential to keep secrets • Generally accepted for national security • Used by totalitarian governments to suppress dissent
Direct Censorship • Licensing and registration • Used to apportion limited bandwidth • Radio, TV frequencies, channels • Allows de facto censorship
Self-censorship • Most common form of censorship • Group decides for itself not to publish • Reasons • Avoid subsequent persecution • Maintain good relations with government officials (sources of information) • Ratings systems • Movies, TVs, CDs, video games • Agreement not to show mature material during prime time
Challenges Posed by the Internet • Many-to-many communication • Dynamic connections • Huge numbers of Web sites • Extends beyond national borders, laws • Can’t determine age of users