I include two of the main codes of ethics and professional practices for computer professionals in an Appendix. An early reviewer of this book objected to one of the quotes I include at the beginning of many sections.
The Pace of Change
Change and Unexpected Developments 1.3 Themes
Ethics Exercises
Our entry into space was one of the most dramatic achievements of technology in the 20th century. The point is not that I am old; it is the speed and magnitude of the changes.
Change and Unexpected Developments
Amazon.com, founded in 1994, began selling books on the Web and became one of the most popular, trusted, and user-friendly commercial sites. Some free programs and services do not have all the features of the paid versions.).
Themes
Even if you have a strong position on one side of a controversy, it is important to know the arguments on the other side, for several reasons. It may seem strange at first, but arguments about the merits of the proposal – for example that it is a good idea, or is efficient, or is good for business or is useful for consumers – are not good arguments for a law.
Ethics
In the United States, drivers must drive on the right side of the road; in England. For an overview of some of the research, see Robert Lee Hotz, “The Really Smart Phone,” Wall Street Journal, Apr.
Privacy Risks and Principles
The Fourth Amendment, Expectation of Privacy, and Surveillance Technologies
The Business and Social Sectors 2.4 Government Systems
Protecting Privacy: Technology, Markets, Rights, and Laws 2.6 Communications
Concern for privacy can be seen with a suspicious “What do you have to hide?” The desire to keep things private does not mean we are doing anything wrong. People are often unaware that information is being collected about them and their activities. When our computers and phones communicate with websites, they need to provide information about their configuration (for example, the web browser used).
This seems like a classic no-brainer. The vast collection of information on a cell phone is the kind of information the Fourth Amendment is supposed to protect. Will the police use facial recognition systems to track political dissidents, journalists, political opponents of powerful people - the kinds of people who have previously been targeted for illegal or questionable surveillance.
The Business and Social Sectors
Is it the user's responsibility to be aware of the data collection and tracking policies of any site he or she visits? The first incident reminds us that some people don't know or understand enough about how the Internet works to make good decisions about what to post there. The second indicates that some people don't think about it carefully. The chip stores identification data (and possibly other data) and controls the operation of the tag.
The right to remove material, as a legal or ethical right, is called the "right to be forgotten". The wide variety of material that a person might want. The company's use of the data is partly our payment for the free service it provides.
Government Systems
The Information Security and Privacy Advisory Board noted: “The Privacy Act does not adequately cover government use of commercially compiled databases of personal information. It is very likely that the government will find new uses for the data that are not part of the original proposal. The pilots of the approximately 10,000 corporate aircraft in the United States file a flight plan when they fly.
The history of the Citizen Service Number (BSN) illustrates how the use of a national identification system is growing. When SSNs first appeared in 1936, they were intended solely for use by the Social Security program.
Protecting Privacy: Technology, Markets, Rights, and Laws
For decades, most of the cryptographers in the United States worked for the National Security Agency (NSA). For example, mailing lists are not usually sold; they are "rented". The tenant does not receive a copy (electronic or otherwise). In 1890, a seminal article called "The Right to Privacy" by Samuel Warren and Louis Brandeis76 (later a Supreme Court Justice) argued that privacy was separate from other rights and needed more protection.
They see no violation of privacy if someone agrees to the collection and use of the information. For example, regulations that ban broad consent agreements and instead require explicit consent for any secondary use of personal information have a feature that economists call “high transaction costs.” The consent requirement could be so expensive and difficult to implement that it eliminates most secondary uses of information, including those that consumers find desirable.
Communications
When people use call forwarding, the first number called — a number that law enforcement can legally obtain fairly easily (without a search warrant) — gives no information about the actual recipient of the call. Robert Corn-Revere, “The Fourth Amendment and the Internet,” Testimony Before the Subcommittee on the Constitution of the House Judiciary Committee, Apr. In his article “The Right to be Forgotten,” Stanford Law, Jeffrey Rosen discusses many Review, Feb.
Brandeis, "The Right to Privacy," Harvard Law Review, 1890, v. Judith Jarvis Thomson, "The Right to Privacy," in David Schoeman, Philosophical Dimensions of Privacy:. Thomson, “The Right to Privacy,” p. See for example Schoeman, Philosophical Dimensions of Privacy: An Anthology, p. Cases are cited in Prosser, "Privacy".
Communications Paradigms 3.2 Controlling Speech
Posting, Selling, and Leaking Sensitive Material 3.4 Anonymity
The Global Net: Censorship and Political Freedom 3.6 Net Neutrality Regulations or the Market?
Communications Paradigms
Freedom of the press applied to publishers who printed newspapers and books and to 'the lone pamphleteer' who printed and distributed pamphlets expressing unconventional ideas. In a 1978 case challenging the constitutionality of a ban on “indecency,” the Supreme Court upheld the ban. The federal government often proposes requirements to reduce violence on television or expand programming for children, but the government cannot impose such requirements on print book publishers. The First Amendment covers spoken and written words, images, art, and other forms of expression of ideas and opinions.
The First Amendment is a limitation on the power of the government, not individuals or private corporations. In the past, the government has made it illegal to send information through the mail, which is otherwise protected by the First Amendment.
Controlling Speech
The second point - the application of community standards - was a compromise intended to avoid the problem of establishing a national standard of obscenity in such a large and diverse country. The rulings against the CDA determined that "the Internet deserves the highest protection from government interference." The judges also commented: “The government can continue to protect children from Internet pornography through strong enforcement of existing laws criminalizing obscenity and child pornography.”17.
As far back as 1995, within a few weeks of the Oklahoma City federal building bombing, the Senate Subcommittee on Terrorism and Technology held hearings on "The Availability of Bomb-Making Information on the Internet." There are many similarities between the controversy over bomb-making information on the Net and the controversy over pornography. This case illustrates the potential for "gaming" the system by competitors and the disagreements that can arise over who is a spammer.
Posting, Selling, and Leaking Sensitive Material
In the past, much of the material published by WikiLeaks fit reasonable criteria for legitimate or admirable leaks. Some people believe that our assessments of the leaks should not be independent of the issues: If we are against the U.S. In the spirit of the web, leakers can now let the public search through the documents for those of special interest.
The site must have sufficient security to protect the whistleblowers – the people who provide the documents. Verification of the authenticity and validity of leaked documents can be difficult, but it is the responsibility of the website operators.
Anonymity
Suppose law enforcement suspects that a website contains child pornography, terrorist information, material that infringes copyright, or anything else relevant to an investigation. If they visit the site from their department's computers, they may be blocked or see a bland page with nothing illegal. Also, when law enforcement "under-. Many legal issues about anonymity are similar to those in the law enforcement issues we discussed in Chapter 2.
Law enforcement agencies have been able to track down many criminal suspects through the web (including members of the hacking group called Anonymous). Weigh the potential for harm from criminals using anonymity to hide from law enforcement far outweighing the loss of privacy and restriction of freedom of speech for honest people who use anonymity responsibly.
The Global Net: Censorship and Political Freedom
The government blocked both the Chinese- and English-language Wikipedia sites for about a year. What are the trade-offs between providing services to the people and meeting the government's censorship requirements. The Chinese websites of Yahoo and MSN comply with local laws and omit news stories that offend the government.
Yahoo said it had to comply with Chinese law and the company had not been told the reason for the government's request for the information. Thus, the agreement to operate in China and block material the government considers sensitive was a decision that access is better than no access.
Net Neutrality Regulations or the Market?
Proponents of neutral pricing fear that a lack of price regulation will erode the diversity of the Internet. Laws prohibit automakers from selling cars directly to consumers over the Internet. The Progressive Policy Institute estimated that such state laws cost consumers at least $15 billion a year.57 Find a copy of the code developed from this proposal (or another code of conduct for bloggers).
Anthony Lewis, Freedom for the Thought That We Hate: A Biography of the First Amendment, Basic Books, 2008. This book describes in depth the history, rights, limitations and responsibilities of the various communication technologies.
Principles, Laws, and Cases
Responses to Copyright Infringement 4.3 Search Engines and Online Libraries
Patents for Inventions in Software Exercises
How should intellectual property owners respond to new technologies that allow their property to be easily copied and distributed without permission. We begin our exploration of these and other intellectual property questions by explaining the concept of intellectual property and reviewing the principles of intellectual property law. This chapter focuses more on copyright than other forms of intellectual property because digital technology and the Internet have such a profound impact on copyright.
The key to understanding intellectual property protection is to understand that the thing protected is the intangible creative work—not its particular physical form. We don't buy the intellectual property—that is, the plot, the organization of ideas, the presentation, the characters, and the events that form the abstraction that is the intangible.