1 Slide Computer and Information Ethics After Sept. 11, 2001 Office for Information Management Noon...
-
Upload
garey-elliott -
Category
Documents
-
view
215 -
download
1
Transcript of 1 Slide Computer and Information Ethics After Sept. 11, 2001 Office for Information Management Noon...
1Slide
Computer and Information Ethics After
Sept. 11, 2001
Office for Information Management Noon Seminar, held February 13, 2002
Marsha Woodbury, Ph.D.Dept. of Computer ScienceUniversity of IllinoisUrbana-Champaign
3Slide
Maslow’s Hierarchy of Needs
•Physiological Needs
• Safety Needs
• Needs of Love, Affection
and Belongingness
•Needs for Esteem
•Needs for Self-Actualization
4Slide
Maslow’s PyramidWe dropped a notch
• A need is no longer a motivator when it is satisfied. Needs are motivators when they are not met.
• Right now, in Germany, France, the USA, and many other countries with strong rights traditions, many people are feeling that they are at level two, even if they are not near that level.
5Slide
Terrorism
• "The single common denominator is that it is a psychological weapon, intended to erode trust and undermine confidence in our government, its elected officials, institutions or policies…the psychological impact would be enormous, shaking the nation's trust and confidence in its government to its core.” (Cilluffo CSIS, 1998)
• A "photo op" attack is what a terrorist prefers, not the unseen cyber terrorism that we also worry about. The sympathizers who don't train at camps can do major damage online.
6Slide
Ethics is the study of rational decision making toward just action
(Doing what we ought to do in situations where we have time to think!)
We may not be as rational
as we once thought we were.
8Slide
Journalism Ethics Recent Issues
• Bodies falling photos• Self-censorship out of "patriotism" (or is it
fear of economic backlash?—Bill Maher)
9Slide
Business Ethics Recent Issues
• One word, ENRON—• How safe is encryption?• Profiting off stocks rising and falling after
a disaster• Laying off large numbers of workers while
drawing huge CEO salaries • Selling guns to developing countries
10Slide
Computer and Information Ethics
• Big choices right now!
• We have to decide what role we will play in the world after Sept. 11, 2001
• Will our skills be used to end terrorism, merge databases, harass the poor, advance a police state, trace access at libraries, or what?
11Slide
Computer Quotes
• A computer lets you make more mistakes faster than any invention in human history--with the possible exceptions of handguns and tequila.
--Mitch Ratliffe
• A human being is a computer's way of making another computer. Yes, we are their sex organs.
--Solomon Short
12Slide
Along with the power to change the world comes the duty to execute that power responsibly. CPSR
The most likely way for the world to be destroyed, most experts agree, is by accident. That's where we come in; we're computer professionals. We cause accidents. Nathaniel Borenstein
Risks Digest
13Slide
Ethics < > Rules or Laws
Laws
Ethics
Death Penalty?
Marijuana?Encryption?
Taking away human rights
14Slide
About Ethics
• The point is to be somewhat logical, to justify our actions following moral principles
• The struggle is the important part—going through the thinking process
• Guidance from Codes of Ethics (particularly on the social consequences of the program that we are writing or the action we are considering)
15Slide
Before Sept. 11, 2001
• We weigh our obligations (while sitting near the top of the pyramid)– to society (a hard-sell, anti-any
government)– to our families– to our employer (another hard-sell)– to our clients– to our colleagues– to our students
16Slide
After Sept. 11, 2001
• We weigh our obligations (while feeling lower on the pyramid)– to our country (patriotism, need
government for security)– to our families– to our employer– to our clients– to our colleagues– to our students
European Union Statement
17Slide
Cell phones
• Before Sept. 12, 2001:
• After Sept. 12, 2001: Calls from WTC, planes crucial, fear makes mobile phones more acceptable
18Slide
Key Issues in Computer and Information Ethics before Sept. 11
• Privacy (would not link databases)
• Ownership• Security (hackers always there,
encryption battles, web not always reliable)
• Access (who can see what)• Authenticity
19Slide
• Privacy (Biometrics—how far will we go; Will every encrypted message be viewable by government? German concerns.)
• Ownership• Security (the WTC backups showed
responsible use)• Access (Will cell phones work in
emergencies? Web held up after the attacks)
• Authenticity
Key Issues in Computer and Information Ethics after Sept. 11
20Slide
What Is Privacy?
• Freedom to make deliberate decisions about revealing personal information
• Minimize unwanted intrusions• Personal space and time to be ourselves
Lately:• Wanting chips embedded after the unident
ified bodies from WTC.• Keyboard sniffing ruled OK
21Slide
Ethical Concern Prior to Sept. 11, 2001:Ways to Enable Privacy
in Public Spaces
• Privacy cubicles• Polarizing screens• Timed access -- screen dims• Monitor set in desk so you look down
22Slide
After Sept. 11, 2001
• Hijackers used public cyber cafes and libraries to communicate
• Will libraries keep the FBI at arm's length? • Will our past freedom and privacy in such
places be eroded?
23Slide
After Sept. 11, 2001
• Linking databases to catch terrorists
• Long history of opposition to National ID cards is melting
• Big Brother?
24Slide
Worth remembering—from the ALA
…"freedom is not some arbitrary right that is bestowed upon us because of the virtuous nature of our national character. It is a right we must protect and defend in both times of promise and peril if we are to remain in the future what we are in the present -- a free and honorable people."
--Abraham Lincoln
25Slide
Cryptography
• Before Sept. 11, 2001: Cryptography and email were seen as lifelines for oppressed peoples fearing reprisals for open communications.
• After Sept. 11, 2001: Carnivore, back doors, key escrow
26Slide
Freedom of Information
After Sept. 11, 2001
• Right now, in Washington D.C., politicians and public servants are withholding all kinds of information because of "National Security"
28Slide
Biometrics Surveillance Cameras
• The former New York police commissioner recommended the installation of 100 biometric surveillance cameras in Times Square to scan the faces of pedestrians and compare them with a database of suspected terrorists.
October 7, 2001 BEING WATCHEDJeffrey Rosen, NY Times Sunday Mag.
29Slide
British Experience—the unintended consequence of laws
• … rather than thwarting serious crime, the cameras are being used to enforce social conformity in ways that Americans may prefer to avoid.
October 7, 2001 BEING WATCHEDJeffrey Rosen, NY Times Sunday Mag.
30Slide
Anti-Terrorism Act (ATA)Patriot Act
• Allows police to conduct some Internet surveillance without a court order.
• Allows foreign governments to gather information on U.S. citizens and the U.S. can use that information in court.(?)
• Hacking a U.S. government system or breaking into and damaging any Internet-connected computer is a federal crime. (Section 808)
• See breakdown at the ACLU site.
31Slide
Star Wars: SDI now NMD
• Maginot Line in Space
• The NMD software system would be the most complex piece of software ever developed.
32Slide
NMN—software testing problems
Factors that inspire human trust in software include:
• extensive past experience under actual working conditions
• ultimate safeguarding of critical operations by human operators
• a fully specified, predictable, and stable environment for design, testing, and actual operation.
None of these factors will be present in the final NMD system. William Yurcik
33Slide
Censorship on the Web?
• Websites change their content, pull the plug on controversial items.