Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Information Ethics and Policy Adam D. Moore Information School University of Washington Information Ethics and Policy Ethical Theory, Policy, Law Intellectual Property Privacy Free Speech Security Ethical IT design Hacking and Hacktivism Net neutrality Etc. Can you think of any ethical problems or issues related to this picture? …or more recently the Craig's list experiment? Group work #1 http://www.aclu.org/pizza/ 1. Form groups of 3 or 4 students. Write your names at the top of a piece of paper. Pick a group spokesperson. 2. Discuss the ACLU “pizza ordering case” or the Vietnam napalm case: write down what you take to be the 3 most important ethical worries or policy issues that come up. 3. For 2 of these issues describe how you would you use technology or policy to “fix” the worry. . .be prepared to defend your solutions. 4. Turn in your work. . .at the end of class Ethical Theory A Theory of Moral Value: What is moral value? What is good or bad? What has value in the realm of human experience? Hedonsim, eudaimonism, desire satisfaction A Theory of Moral Obligation: What makes an action right or wrong? Where do rights come from? Consequentialism, deontology, virtue ethics? Two test cases: Trapped in an Underwater Sea-Cave, The Case of Reluctant Donation Intellectual Property What is IP? Copyright, patent, trademark, trade secret TRIPS agreement The Justification of IP rights? Incentives-based social progress argument Deontological arguments Personality-based arguments Case: Making an Extra Back-up Copy With two youngsters running about the house it is difficult for you to keep track of all legitimately purchased CD’s and DVD’s in your possession. In fact, before you can make a legally sanctioned back-up copy of your CD’s and DVD’s your kids have scratched them beyond repair. In an effort to obtain undamaged copies you go online and download replacements via your favorite file sharing program. Shortly thereafter, new trouble comes your way – the RIAA is suing you for copyright infringement. Have you done anything illegal or immoral? Privacy Defining privacy The value of privacy Justifying privacy rights Privacy protections in the law. 4th Amendment, torts, etc. WikiLeaks 1. Why not trade privacy for security? Allowing the government to monitor our daily activities need not be a burden…technology makes it easy. 2. Power tends to corrupt….absolute power corrupts absolutely… Question: how should we balance privacy and security? Free Speech Justifications for Freedom of Speech Check on power (government and corporations “truth” discovery Personal growth and individuality Anonymity protects privacy Necessary for stable democratic institutions Accuracy – “I just said ‘thanks but no thanks to that bridge to no-where” Spin – bias Yale cultural cognition project (more info does not help…an individual’s world/cultural views largely determines what she believes….individualist, hierarchist, solidarist/communitarian, egalitarian) Freedom of Speech Mill “ … there are many who consider as an injury to themselves any conduct which they have a distaste for and resent it as an outrage to their feelings." We should not allow such views to limit speech! But what about hate speech, obscene porn, sexual harassment, speech that violates privacy or IP? Tensions with Speech and IP Privacy v. Free Speech If individuals have informational privacy rights then these rights may restrict freedom of speech and freedom of the press. Privacy v. Intellectual Property If individuals have informational privacy rights then these rights may limit intellectual property rights. Discussion Case: Intellectual property v. Privacy v. Free Speech Cape Publications, Inc. v. Bridges, Florida 1982: A women is kidnapped, taken to an apartment, stripped, and terrorized. The police — and the media — surround the apartment. The police eventually overcome the kidnapper and rush the woman, who clutches a dish towel in a futile attempt to conceal her nudity, to safety. A photograph of her escape is published in the next day's newspaper. She sued for invasion of privacy and eventually lost the case. Government and Corporate control of information Controlling data… • Choice Point, Axicom • Event Data Recorders (EDRs) • GPS, employee tracking • Google Search • Facial recognition technology • bio-implants, RIFDs • store loyalty cards • video surveillance Radio-frequency identification Ethical Dimension: Imposed or Chosen? http://www.aclu.org/pizza/ Government Surveillance: The USA Patriot Act FISA Courts Administrative subpoenas TIA – Total Info Awareness TIPS --Terrorism Information and Prevention System Secret wire-taps Government transparency Case: Wearing an Anti-Disclosure Suit Suppose that Fred creates and wears an anti-disclosure suit that shields him in public spaces entirely. All that his fellows know is that someone is present—they do not know if Fred is old or young, male or female, tall or short, etc. In simply wearing his anti-disclosure suit Fred does nothing wrong. Does this necessarily worsen anyone? In this example to discover much about Fred would require violating his property rights or liberty rights. Alas, the suit and what it shields is his to control. Should wearing an anti-disclosure suits be prohibited? How about masks or disguises? Strong Encryption? Hacking and Security Is hacking ever justified? Suppose you come home and find me sitting on your couch. . .? Hacking and civil disobedience TOR. . .bitcoin