Download Information Ethics

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
Transcript
Information Ethics
and Policy
Adam D. Moore
Information School
University of Washington
Information Ethics and Policy

Ethical Theory, Policy, Law
 Intellectual
Property
 Privacy
 Free
Speech
 Security
 Ethical IT design
 Hacking and Hacktivism
 Net neutrality
 Etc.
Can you think of
any ethical
problems or
issues related to
this picture?
 …or more
recently the
Craig's list
experiment?

Group work #1
http://www.aclu.org/pizza/
1.
Form groups of 3 or 4 students. Write your
names at the top of a piece of paper. Pick a
group spokesperson.
2.
Discuss the ACLU “pizza ordering case” or the
Vietnam napalm case: write down what you
take to be the 3 most important ethical worries
or policy issues that come up.
3.
For 2 of these issues describe how you would
you use technology or policy to “fix” the worry. .
.be prepared to defend your solutions.
4.
Turn in your work. . .at the end of class
Ethical Theory

A Theory of Moral Value: What is moral
value? What is good or bad? What has
value in the realm of human experience?


Hedonsim, eudaimonism, desire satisfaction
A Theory of Moral Obligation: What makes
an action right or wrong? Where do rights
come from?

Consequentialism, deontology, virtue ethics?

Two test cases: Trapped in an Underwater Sea-Cave, The Case of Reluctant Donation
Intellectual Property

What is IP?
 Copyright,
patent, trademark, trade secret
 TRIPS agreement

The Justification of IP rights?
 Incentives-based
social progress argument
 Deontological arguments
 Personality-based arguments
Case: Making an Extra Back-up Copy
With two youngsters running about the house it is difficult
for you to keep track of all legitimately purchased CD’s
and DVD’s in your possession. In fact, before you can
make a legally sanctioned back-up copy of your CD’s
and DVD’s your kids have scratched them beyond
repair. In an effort to obtain undamaged copies you go
online and download replacements via your favorite file
sharing program. Shortly thereafter, new trouble comes
your way – the RIAA is suing you for copyright
infringement. Have you done anything illegal or
immoral?
Privacy

Defining privacy

The value of privacy

Justifying privacy rights

Privacy protections in the
law. 4th Amendment,
torts, etc.
WikiLeaks
1.
Why not trade privacy for
security? Allowing the
government to monitor our
daily activities need not be a
burden…technology makes it
easy.
2.
Power tends to
corrupt….absolute power
corrupts absolutely…
Question: how should we
balance privacy and security?
Free Speech

Justifications for Freedom of Speech





Check on power (government and corporations
“truth” discovery
Personal growth and individuality
Anonymity protects privacy
Necessary for stable democratic institutions
Accuracy – “I just said ‘thanks but no thanks
to that bridge to no-where”
 Spin – bias
 Yale cultural cognition project

(more info does not help…an
individual’s world/cultural views largely determines what she believes….individualist, hierarchist, solidarist/communitarian,
egalitarian)
Freedom of Speech
Mill “ … there are many who consider as an
injury to themselves any conduct which they
have a distaste for and resent it as an outrage to
their feelings."
 We should not allow such views to limit
speech!

 But
what about hate speech, obscene porn,
sexual harassment, speech that violates
privacy or IP?
Tensions with Speech and IP

Privacy v. Free Speech
 If
individuals have
informational privacy rights
then these rights may restrict
freedom of speech and
freedom of the press.

Privacy v. Intellectual
Property
 If
individuals have
informational privacy rights
then these rights may limit
intellectual property rights.
Discussion Case: Intellectual property
v. Privacy v. Free Speech
Cape Publications, Inc. v. Bridges, Florida 1982: A
women is kidnapped, taken to an apartment,
stripped, and terrorized. The police — and the
media — surround the apartment. The police
eventually overcome the kidnapper and rush the
woman, who clutches a dish towel in a futile
attempt to conceal her nudity, to safety. A
photograph of her escape is published in the next
day's newspaper. She sued for invasion of
privacy and eventually lost the case.
Government and Corporate control
of information
Controlling data…
• Choice Point, Axicom
• Event Data Recorders (EDRs)
• GPS, employee tracking
• Google Search
• Facial recognition technology
• bio-implants, RIFDs
• store loyalty cards
• video surveillance
Radio-frequency identification
Ethical Dimension: Imposed or
Chosen?
http://www.aclu.org/pizza/
Government Surveillance:
The USA Patriot Act






FISA Courts
Administrative subpoenas
TIA – Total Info Awareness
TIPS --Terrorism Information
and Prevention System
Secret wire-taps
Government
transparency

Case: Wearing an Anti-Disclosure Suit
Suppose that Fred creates and wears an anti-disclosure
suit that shields him in public spaces entirely. All that his
fellows know is that someone is present—they do not
know if Fred is old or young, male or female, tall or short,
etc. In simply wearing his anti-disclosure suit Fred does
nothing wrong. Does this necessarily worsen anyone? In
this example to discover much about Fred would require
violating his property rights or liberty rights. Alas, the suit
and what it shields is his to control. Should wearing an
anti-disclosure suits be prohibited? How about masks or
disguises?

Strong Encryption?
Hacking and Security
Is hacking ever justified?
 Suppose you come home and find me
sitting on your couch. . .?
 Hacking and civil disobedience
 TOR. . .bitcoin
