Download S. Asadorian and J. Brunelle

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Networking
Sevak Asadorian & James Brunelle
1
Topics








Introduction
Email & Spam (how to fight spam)
The World Wide Web
Ethical Perspectives on Pornography
Censorship
Freedom of Expression
Children and the Web
Internet Addiction
2
Introduction


Computer’s utility increases tremendously when
it is connected to a network.
Shared resources
Storage
 Printers / Scanners
 Files

3
Introduction

Internet
Connects millions of computers
 Surf the web

Information
 Products
 Services


Send e-mail to anyone in the world
4
10 Most Common Subject Lines










We carry the most popular medications
You’ve been sent an Insta-Kiss!
You have 17 new pictures
STEAMY HOT LESBIAN ACTION LIVE ON CAMERA
All orders are shipped from authorized locations
2005 Digital Cable Filters
F R E E * 30 second Pre-Qualification MORTGAGE
Application
HURRY HURRY Hot Stock on the RISE
Sale PRICES ARE BEST ONLINE!
Breaking news on the TOP Pick stock
Top 10 Spam Subject Lines with the last 24 hours!
5
Email & Spam



Messages embedded in files transferred from on
computer to another via a telecommunication
system.
Everyone has an email address which is a unique
mailbox in cyberspace
Email address
1st part: Individual user name
 2nd part: Domain name

6
Email & Spam




Billions of e-mails are exchanged daily
2000 – 8% spam
2003 – 40% spam
Spammers disguise themselves
Change e-mail and IP addresses to disguise sending
machine
 Use an innocent person’s computer as a launch pad
for a spam attack

7
Email & Spam

How do they get your e-mail address?
Opt-In Lists
 Dictionary attacks


Spammers buy spam-screening software to help
themselves in improving their msg. quality.
8
Email & Spam


Spam costs companies $500 - $2000 to hire an
Internet marketing firm to send an
advertisement to millions
Using USPS to send out the same
advertisement:
$40,000 – mailing list
 $190,000 – bulk-rate postage
 Not including the brochures


Email ad is 100 times cheaper than traditional
flyer sent out in the mail
9
Email & Spam

Is spamming wrong?






Kantian Evaluation……………………………..Yes
Act Utilitarian Evaluation………………………Yes
Rule Utilitarian Evaluation……………………...Yes
Social Contract Theory Evaluation……………...Yes
Conclusion: Sending spam is wrong & immoral.
E-mail address of marketers sending the spam is not
correct, and subject lines of the messages are
misleading.
10
Email & Spam

How should we fight spam?
Subscribers need to be on a email lists to receive ads
 Require labeling of email advertising (“ADV”)
 Add cost to every email that is sent
 Ban unsolicited email completely

11
Email & Spam

M.A.P.S. (Mail Abuse Prevention System)
RBL (Realtime Blackhole List)
 Set of Guidelines (have to comply)

Company must prove recipient is on their e-mail list
 They must provide subscribers with simple ways to
terminate their subscription
 Must remove invalid e-mail addresses in a timely manner
 Must take care not to overwhelm individual hosts or
LANs
 Must disclose subscribers how their addresses will be used

12
Email & Spam

M.A.P.S. – Is It Ethical?
Social Contract Theory Evaluation – YES
 Kantian Evaluation -- NO

13
The World Wide Web

How do we use the web?









Shopping
Business
Information
Explore our roots
Games
Virtual Worlds
Taxes
Gamble
Blog
14
The World Wide Web

Internet access is limited in some countries
Saudi Arabia – no access to pornography, gambling
sites, and pages that are deemed to be offensive to
Islam
 Germany – forbids access to any neo-Nazi Websites
 United States – FULL ACCESS

15
The World Wide Web

Types of Censorship

Direct Censorship
Government Monopolization
 Prepublication Review
 Licensing and Registration


Self Censorship

A group deciding for itself not to publish material
16
The World Wide Web

Problems the Internet poses for Censorship
Many to many vs. 1 to many
 The internet is dynamic
 The internet is huge
 The internet is global
 No age verification

17
The World Wide Web

Freedom of Expression
First Amendment to the U.S. Constitution
 Freedom of Expression is not an absolute right

U.S. law prohibits advertising cigarettes on T.V.
 FCC vs. Pacifica Foundation et al


George Carlin’s “Filthy Words”
18
Ethical Perspectives on Pornography

According to Dictionary.com,
“Pornography is sexually explicit pictures,
writings, or other material whose primary
purpose is to cause sexual arousal.”
19
Ethical Perspectives on Pornography

Some Utilitarians conclude that pornography is wrong
based on five harmful consequences it has on society:





1.) Pornography reduces the dignity of human life.
2.) Creates an environment where true victims of sexual
abuse are less likely to be dealt with sympathetically by the
justice system.
3.) People imitate crimes that they have seen portrayed in
pornography.
4.) Offends most people.
5.) Existence of the pornography industry diverts resources
from activities that would have more redeeming social value.
20
Ethical Perspectives on Pornography



Some say adult pornography is moral
Some Utilitarians conclude it is moral for adults
to view pornography
Three beneficial consequences of pornography:
1.) Make money
 2.) Physical pleasure
 3.) provides the costumer with harmless outlet for
exploring sexual fantasies

21
Children and the Web



Many parents want what's best for their children.
Many parents believe they ought to protect their
children from exposure to pornography and
violent material on the web.
Using Web Filters can help prevent certain web
pages from being displayed in your browser.
22
Internet Addiction



According to Joseph Weizenbaum the reason
why programmers are attracted to their
machines is the feeling of freedom and power.
Computer program whatever your heart desires.
The resulting thrill causes programmers to have
a “compulsion to program.”
23
Q&A
24