Online Privacy Issues Overview

Download Report

Transcript Online Privacy Issues Overview

Ethics
Week 3 - January 25, 27
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
1
Administrivia
Robert O’Harrow speaking tomorrow, 11
am in the Singleton Room
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Cancelled!
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
2
Why study ethics?
Ethical analysis can provide a structured
way to evaluate an issue and choose a
course of action
Ethical analysis can help illuminate
multiple sides of an issue
Ethical analysis can help produce
persuasive arguments
In your personal and professional life you
will confront difficult decisions
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
3
Quinn 2, Scenario 4
 You are the senior software engineer at start-up
developing software for handheld computers to
help nurses keep track of patients
 Sales force has promised product by next week
 Product still contains many minor bugs
 No major bugs have been found, but QA
recommends another month of testing
 A competitor plans to release a similar product
in a few weeks
 If your product is not first to market your startup will probably go out of business
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
4
Scenario 4
Should you recommend release of the
product next week?
Who will benefit if the company follows
your recommendation?
Who will be harmed if the company
follows your recommendation?
Do you have an obligation to any group of
people that may be affected by your
decision?
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
5
Subjective Relativism
Relativism
No universal norms of right and wrong
One person can say “X is right,” another can
say “X is wrong,” and both can be right
Subjective relativism
Each person decides right and wrong for
himself or herself
“What’s right for you may not be right for
me”
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
6
Subjective relativism evaluation of spam
Spammers say spam is good
Spam brings advertisements to the attention
of some people who want to buy their
products
Spammers make money
Purchasers are happy to buy their products
Most spam recipients and ISPs say spam is
bad
 Spam wastes time and computer resources,
congests networks, slows processing of nonspam email
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
7
Case for Subjective Relativism
Well-meaning and intelligent people
disagree on moral issues
Ethical debates are disagreeable and
pointless
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
8
Case Against Subjective Relativism
Blurs distinction between doing what you
think is right and doing what you want to
do
Makes no moral distinction between the
actions of different people
SR and tolerance are two different things
Decisions may not be based on reason
Not a workable ethical theory
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
9
Cultural Relativism
What is “right” and “wrong” depends upon
a society’s actual moral guidelines
These guidelines vary from place to place
and from time to time
A particular action may be right in one
society at one time and wrong in other
society or at another time
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
10
Case for Cultural Relativism
Different social contexts demand different
moral guidelines
It is arrogant for one society to judge
another
Morality is reflected in actual behavior
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
11
Case Against Cultural Relativism
 Because two societies do have different moral
views doesn’t mean they ought to have
different views
 Doesn’t explain how moral guidelines are
determined
 Doesn’t explain how guidelines evolve
 Provides no way out for cultures in conflict
 Societies do, in fact, share certain core values
 Only indirectly based on reason
 Not a workable ethical theory
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
12
Divine Command Theory
Good actions: those aligned with God’s
will
Bad actions: those contrary to God’s will
Holy books reveal God’s will.
We should holy books as moral decisionmaking guides.
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
13
Case for Divine Command Theory
We owe obedience to our Creator.
God is all-good and all-knowing.
God is the ultimate authority.
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
14
Case Against Divine Command Theory
Different holy books disagree
Society is multicultural, secular
Some moral problems not addressed in
scripture
“The good” ≠ “God”
Based on obedience, not reason
Not a workable theory
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
15
Kantianism
Good will: the desire to do the right thing
Immanuel Kant: Only thing in the world
good without qualification is good will.
Reason should cultivate desire to do right
thing.
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
16
Categorical Imperative (1st Formulation)
Act only from moral rules that you can at the
same time will to be universal moral laws.
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
17
Illustration of 1st Formulation
 Question: Can a person in dire straits make a
promise with the intention of breaking it later?
 Proposed rule: “I may make promises with the
intention of later breaking them.”
 The person in trouble wants his promise to be
believed so he can get what he needs.
 Universalize rule: Everyone may make & break
promises
 Everyone breaking promises would make promises
unbelievable, contradicting desire to have promise
believed
 The rule is flawed. The answer is “No.”
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
18
Categorical Imperative (2nd Formulation)
Act so that you treat both yourself
and other people as ends in themselves
and never only as a means to an end.
This is usually an easier formulation to work
with than the first formulation of the
Categorical Imperative.
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
19
Kantian evaluation of spam (1st formulation)
 Proposed rule:
 I can send advertisements to as many email addresses as I want
 Spammers want people to read their email and buy their
products
 Universalize rule:
 Everyone can send advertisements to as many email addresses as
they want
 Consequence
 If everyone sent advertisements to as many email addresses as
they wanted to, email would be so clogged with spam that it
would no longer be useful and people would stop using it
 The rule is flawed -> spamming is not ethical
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
20
Kantian evaluation of spam (2nd formulation)
 Spammers send ads for a product to many
people, knowing only small number will be
interested
 Most message recipients will waste time and
money
 Spammers do not respect recipients’ time or
money, and are only interested in using spam
recipients to make a profit
 Thus spammers treat recipients as means to an
end
 Conclusion: Spamming is wrong
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
21
Case for Kantianism
Rational
Produces universal moral guidelines
Treats all persons as moral equals
Workable ethical theory
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
22
Case Against Kantianism
Sometimes no rule adequately
characterizes an action.
There is no way to resolve a conflict
between rules.
Kantianism allows no exceptions to moral
laws.
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
23
Utilitarianism
 Jeremy Bentham and John Stuart Mill
 An action is good if it benefits someone
 An action is bad if it harms someone
 Utility: tendency of an object to produce
happiness or prevent unhappiness for an
individual or a community
 Happiness = advantage = benefit = good =
pleasure
 Unhappiness = disadvantage = cost = evil =
pain
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
24
Principle of Utility
(Greatest Happiness Principle)
An action is right (or wrong) to the extent
that it increases (or decreases) the
total happiness of the affected parties.
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
25
Act Utilitarianism
Utilitarianism
Morality of an action has nothing to do with
intent
Focuses on the consequences
A consequentialist theory
Act utilitarianism
Add up change in happiness of all affected
beings
Sum > 0, action is good
Sum < 0, action is bad
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
26
Bentham: Weighing Pleasure/Pain
Intensity
Duration
Certainty
Propinquity
Fecundity
Purity
Extent
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
27
Highway Routing Scenario
State may replace a curvy stretch of
highway
New highway segment 1 mile shorter
150 houses would have to be removed
Some wildlife habitat would be destroyed
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
28
Evaluation
 Costs
$20 million to compensate homeowners
$10 million to construct new highway
Lost wildlife habitat worth $1 million
 Benefits
$39 million savings in automobile driving costs
 Conclusion
Benefits exceed costs
Building highway a good action
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
29
Act utilitarian evaluation of spam
 Spam sent to 100 million people
 1 in 10,000 buy product
 90% of people who buy product are happy with
it, other 10% feel ripped off
 People who don’t buy product waste time and
money, get annoyed, etc. - unhappy
 Spammer makes lots of money and is VERY happy
 9001 happy people, 99,990,000 unhappy people
 Conclusion: 99.991% of people are unhappy, so
spam is wrong
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
30
Case for Act Utilitarianism
Focuses on happiness
Down-to-earth (practical)
Comprehensive
Workable ethical theory
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
31
Case Against Act Utilitarianism
Unclear whom to include in calculations
Too much work
Ignores our innate sense of duty
Susceptible to the problem of moral luck
Sometimes actions do not have
intended consequences - Moral
worth of action is dependent on
consequences that may not be under
control of moral agent
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
32
Rule Utilitarianism
We ought to adopt moral rules which, if
followed by everyone, will lead to the
greatest increase in total happiness
Act utilitarianism applies Principle of
Utility to individual actions
Rule utilitarianism applies Principle of
Utility to moral rules
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
33
Anti-Worm Scenario
August 2003: Blaster worm infected
thousands of Windows computers
Soon after, Nachi worm appeared
Took control of vulnerable computer
Located and destroyed copies of Blaster
Downloaded software patch to fix security
problem
Used computer as launching pad to try to
“infect” other vulnerable PCs
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
34
Evaluation using Rule Utilitarianism
 Proposed rule: If I can write a helpful worm that
removes a harmful worm from infected computers
and shields them from future attacks, I should do so
 Who would benefit
 People who do not keep their systems updated
 Who would be harmed
 People who use networks
 People who’s computers are invaded by buggy anti-worms
 System administrators
 Conclusion: Harm outweighs benefits. Releasing
anti-worm is wrong.
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
35
Case for Rule Utilitarianism
Compared to act utilitarianism, it is easier
to perform the utilitarian calculus.
Not every moral decision requires
performing utilitarian calculus.
Moral rules survive exceptional situations
Avoids the problem of moral luck
Workable ethical theory
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
36
Case Against Utilitarianism in General
All consequences must be measured on a
single scale.
Utilitarianism ignores the problem of an
unjust distribution of good consequences.
Utilitarianism does not mean “the greatest
good of the greatest number”
That requires a principle of justice
What happens when a conflict arises between
the Principle of Utility and a principle of
justice?
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
37
Social Contract Theory
Thomas Hobbes
“State of nature”
We implicitly accept a social contract
• Establishment of moral rules to govern relations
among citizens
• Government capable of enforcing these rules
Jean-Jacques Rousseau
In ideal society, no one above rules
That prevents society from enacting bad rules
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
38
James Rachels’ Definition
“Morality consists in the set of rules,
governing how people are to
treat one another, that rational
people will agree to accept, for their
mutual benefit, on the condition that
others follow those rules as well.”
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
39
People act out of self-interest w/out agreement
Morality is the result of an implicit
agreement among rational beings who
understand that there is a tension
between self-interest and the common
good
The common good is best realized when
everyone cooperates
Cooperation occurs when those acting
selfishly suffer negative consequences
Examples: Recycling, energy conservation
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
40
Kinds of Rights
Negative right: A right that another can
guarantee by leaving you alone
Positive right: A right obligating others to
do something on your behalf
Absolute right: A right guaranteed without
exception
Limited right: A right that may be
restricted based on the circumstances
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
41
John Rawls’s Principles of Justice
Each person may claim a “fully adequate”
number of basic rights and liberties, so
long as these claims are consistent with
everyone else having a claim to the same
rights and liberties
Any social and economic inequalities must
Be associated with positions that everyone
has a fair and equal opportunity to achieve
Be to the greatest benefit of the leastadvantaged members of society (the
difference principle)
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
42
Social contract theory evaluation of spam
 Everyone has right to free speech
You can send email to anyone you want
No requirement that people listen to your speech
People can send you angry replies if they don’t like
your email
 If 99,990,000 people are unhappy with a spam
message, they should be able to send an angry
reply to the spammer, which should have cost to
spammer
 But spammers forge headers so they do not get
angry replies
 This violates social contract, thus spamming is
wrong
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
43
Case for Social Contract Theory
Framed in language of rights
Explains why people act in self-interest
without common agreement
Provides clear analysis of certain
citizen/government problems
Workable ethical theory
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
44
Case Against Social Contract Theory
No one signed contract
Some actions have multiple
characterizations
Conflicting rights problem
May unjustly treat people who cannot
uphold contract
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
45
Objectivism vs. Relativism
Objectivism: Morality has an existence
outside the human mind
Relativism: Morality is a human invention
Kantianism, utilitarianism, and social
contract theory examples of objectivism
Source: Slides for Chapter 2 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
46
Mail Abuse Prevention System
 MAPS is a not-for-profit organization
 Contacts marketers who violate MAPS
standards for bulk email
 Puts marketers who violate standards on a
Realtime Blackhole List (RBL)
 Some mail relays refer to RBL list
Looks up email host name on RBL list
If name on list, the email gets bounced back
 All email from blacklisted hosts gets
bounced, even email from non-spammers
Source: Slides for Chapter 3 of Ethics for the Information Age by Michael J. Quinn. Copyright © 2005 Pearson Addison-Wesley. All rights reserved.
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
47
Was the creation of the RBL ethical?
 Utilitarian evaluation:
 ISP using RBL benefits by getting better network performance,
fewer angry users
 But their users are unable to receive email from innocent users
of blacklisted ISPs, reducing their utility
 Innocent users of blacklisted ISPs unable to communicate with
ISPs that user RBL
 Conclusion depends on magnitude of benefit and ratio of
blacklisted innocent users to total email users
 Kantian evaluation:
 MAPS puts ISPs on RBL with goal of getting innocent users to
complain and pressure ISP to drop spammers
 Innocent users are treated as means to an end
 This violates Categorical imperative -> RBL is unethical
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
48
Research and Communication Skills
Finding info with search engines
General purpose search engines
Google, Yahoo, Altavista, A9, etc.
Clustered searching
Vivisimo, Dogpile
Search CS research literature
http://portal.acm.org
http://citeseer.ist.psu.edu/
http://ieeexplore.ieee.org/
http://scholar.google.com/
When you find a useful
paper, look at its
reference list for other
possibly relevant sources,
also use “cited by”
features in search engines
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
49
Research and Communication Skills
Advanced searching
 Boolean searching
Operators: AND, OR, NOT, NEAR
Implied operators: AND is often implied
Parentheses for grouping
Wildcards
Quotes
 Getting to know the ins and outs of your favorite
search engines
Many search engines do not use pure boolean
searching
Most search engines have some special syntax
Search engines use different algorithms to determine
best match
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
50
Research and Communication Skills
Advanced Googling
 See
http://www.lib.berkeley.edu/TeachingLib/Guides/Intern
et/Google.html
 Ranks results using PageRank algorithm, taking into
account popularity, importance, word proximity
 Special syntax
 intitle, inurl, site, intext, filetype, daterange, numrange
 Boolean operators: OR,  Fuzzy searching: ~, .., *
 Exact phrases: “”
 10-term limit
 Special searches
 Definitions (define), calculator, area codes, flight
searches, and more
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
51
HW1 discussion
http://lorrie.cranor.org/courses/sp05/hw
1.html
Identifying plagiarism
Essay on social or ethical issue related to
computing or the Internet
Interactions with computes
List
Most significant changes if interactions took
place without computers
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
52
Research and Communication Skills
Creating a bibliography and citing sources
Do you know how to create a properly
formatted bibliography?
Why is a list of URLs not a proper
bibliography?
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
53
Research and Communication Skills
Citing sources
 Whenever you take words, images, or ideas from another source you
need to cite that source
 Direct quotes and paraphrases
 Images,photographs, tables, graphs
 Ideas, measurements, computations
 Also use citations as evidence to back up assertions
 If you use somebody else’s words, you must quote them
 Short excerpts appear in quotes
 Long excerpts (3 or more lines) are introduced and then appear as
indented text, often in a smaller font, single spaced
 If you leave out words in the middle use …
 If you leave out words at the end use ….
 If you substitute or add words, put them in square brackets []
 If you add italics say [emphasis added]
 Failure to cite sources = plagiarism
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
54
Research and Communication Skills
Paraphrasing
 Usually paraphrasing ideas is preferable to quoting
unless
 Exact wording is important
 You are quoting famous words
 You are critiquing or comparing specific words rather than ideas
 The original words say what you want to say very well and
succinctly
 Usually paraphrasing lets you convey an idea more
succinctly because you can focus on the part of the idea
most relevant to your paper
 If you end up using some of the original words in your
paraphrase, use quotes around those words
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
55
Research and Communication Skills
Forms of citation
Full bibliographic citation inline
Typically used on a slide
Footnote or endnote
Used in legal writing, many books, some
conferences and journals
Inline short citation with bibliography,
references cited section, or reference list
Used by most technical conferences and
journals, some books, most dissertations
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
56
Research and Communication Skills
Citations in text
 Format depends on style you are using
 Usually a number or author and date, sometimes a page number
reference too
 Citation usually goes at the end of the sentence
 Privacy is not “absolute,” (Westin 1967).
 Privacy is not “absolute,” [3].
 If Author is mentioned, in sentence, name does not
appear in citation
 Westin (1967, p. 7) claims that individuals must balance a desire
for privacy with a desire to participate in society.
 Multiple citations can appear together
 [3, 4, 5]
 (Westin 1967; Cranor 2002)
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
57
Research and Communication Skills
Footnotes
Used heavily in legal writing
Usually used sparingly in technical writing
Each footnote appears only once
If you reference the same source multiple
times you must repeat the reference
information, however you can abbreviate
it on second and subsequent references
and use ibid to indicate same as previous
reference
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
58
Research and Communication Skills
Creating a bibliography
 Similar rules apply to other forms of citation
(footnotes, etc.)
 Pick an appropriate style and use it consistently
throughout your paper
Most conferences and journals have style
requirements
Popular styles: Chicago/Turabian, MLA, APA, APSA
 Complete bibliographic entry includes author,
title, date, publisher, place of publication,
pages, volume number, etc.
 Bibliographic entries should be ordered - usually
either alphabetically or in order referenced in
the text
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
59
Research and Communication Skills
Word processing tools
Microsoft Word
Word has built in support for footnotes and
endnotes
Use cross reference feature for numbered
reference lists
Third party bibliographic add-ons may be
useful
LaTeX
Built in support for footnotes and endnotes
Use Bibtex!
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
60
HW2 discussion
 http://lorrie.cranor.org/courses/sp05/hw2.html
 Under which ethical theory might the quoted
paragraph be used to argue that software piracy
is ethical in third world countries?
Explain argument
 What criticisms might be raised about this
argument?
Use a different ethical theory to argue that software
piracy is not ethical, even in third world countries
 Is it ethical for Singaporean tourists to buy
pirated software or CDs in Malaysia?
Computers and Society • Carnegie Mellon University • Spring 2005 • Lorrie Cranor and Dave Farber • http://lorrie.cranor.org/courses/sp05/
61