Computer Ethics, Spring 2022
Online, Tuesdays 4:15-6:45
Class 1 Readings
Read the first three sections of Baase chapter 1 and at least the first
section of chapter 4, especially:
Video sharing in §1.2.1
Cellphone case-study in §1.2.2
What is intellectual property?: §4.1.1
Before class 2, finish reading chapter 1 and read the first three sections
of chapter 4.
The main course notes are in the Notes Organized by Topic
section on the main web page. Reading assignments, comments on the class
discussion and occasional special notices are in these week-by-week notes.
Assignments
There will be three papers. For the first paper, you will be given an
opportunity to rewrite it.
Plagiarism rules: be sure ALL
quotations are marked as such, and also cited.
When you write, be sure you organize your points clearly and address the
question. Grammar and style count for MUCH less!
You will each participate in one or two "debates". I will publish a list of
topics soon, and create a sign-up site. Topics will be in the form of
declarative sentences; topics based on the examples above might be
- We need a strong DMCA takedown process to protect copyright holders
- Mass communications monitoring should be abolished; no government
agency should be able to access even communications metadata without a
finding of probable cause.
At the start of class on the designated day, you'll present either the for
position or the against position. Your presentation should
take 3 to 5 minutes. Someone else will then take the opposing position.
The catch is that you won't know which position you'll have until the actual
start, so you'll have to think about both sides.
You may use notes. At the end of the debate the rest of the class will vote
as to the winner; your goal should be to try to convince your classmates.
We will not have exams.
Goals:
- understanding traditional ethical theories in the context of computing
technology
- understanding legal theories of computing & information
- understanding some of the social consequences of computing technology
- understanding some of the consequences of seeking technological
solutions for social problems
Example: is file-sharing stealing, if
nobody lost anything?
- Should we still use the word "stealing"
- Is it as bad as physical theft?
Some topics for discussion
1. Filesharing: is it stealing? If it is not, then what is it? If it is,
why do people do it who would never steal anyone's physical possession?
Legally speaking, filesharing is copyright infringment.
A few special cases:
- Accidental background music in YouTube videos
- Music sampling: file-sharing involving (often) very small snippets
- Sci-Hub: sharing scientific papers in a way that does not interfere
with the author incentive created by copyright.
News item (1/18/2022): eyeo.com/eyeo-wins-copyright-court-case.
Note how hard a line Big Content is taking here; they were arguing that an
ad-blocker was copyright infringement.
2. The Apple App Store
To run an app on an iPhone, it pretty much has to be in the Apple App
Store. Apple's stated reason for this is security, and they have indeed
been extremely successful at keeping malware and spyware off of iPhones.
But they charge 30% of an app's fees (special rules apply to continuing
subscriptions, like Spotify, and no fee is charged to free apps that sell
non-app merchandise, like Amazon).
Game vendor Epic, maker of Fortnite, got itself kicked off the App Store
for changing their rules on in-app purchases. They sued Apple for
antitrust violations; they mostly lost, although Apple may have
to end up opening up their payment system to "others".
What do you think?
3. Last fall, Apple proposed scanning iPhone photos that are uploaded to
iCloud for child pornography. Specifically, they will compare a special
hash of the photo with hashes of a database of known child pornography
from the National Center for Missing and Exploited Children.
- Is that something that will make children safer?
- Is this the first step to loss of privacy? The 58th step?
- Will this lead to further erosion of privacy? Will iPhones five years
from now report their owners for illegal parking?
4. In 2020, and sometimes in 2021, some schools did weird things with
Covid. Albion College (Michigan) made students install a real-time GPS
tracker that was very poorly secured. See twitter.com/doctorow/status/1296248163653660672.
Students who left campus for any reason could be expelled. Oklahoma State
used their Wi-Fi system to track each students' use of each access point.
They have cameras too, and card swipes (nbcnews.com/news/us-news/oklahoma-state-university-students-steps-are-tracked-stop-coronavirus-n1237525).
(Loyola's own Health App has this proviso in its terms of service:
THE LICENSED APPLICATION AND ANY SERVICES PERFORMED OR PROVIDED BY THE
LICENSED APPLICATION ("SERVICES") ARE PROVIDED "AS IS" AND "AS AVAILABLE",
WITHALL FAULTS AND WITHOUT WARRANTY OF ANY KIND, AND LICENSOR AND
APPLICATION PROVIDER HEREBY DISCLAIM ALL WARRANTIES AND CONDITIONS WITH
RESPECT TO THELICENSED APPLICATION AND ANY SERVICES, EITHER EXPRESS,
IMPLIED OR STATUTORY, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES AND/OR CONDITIONS OFMERCHANTABILITY, OF SATISFACTORY QUALITY,
OF FITNESS FOR A PARTICULAR PURPOSE, OF ACCURACY, OF QUIET ENJOYMENT, AND
NON-INFRINGEMENT OF THIRD PARTY RIGHTS.
This
would suggest that there is no guarantee of privacy.)
Do you have any rights in a pandemic? How do these approaches
compare with the Apple/Google model, in which your app would record other
phones that came within six feet, and log them only on the phone,
and periodically you could check to see if any of those people came down
with Covid19 (though you wouldn't get their names).
Overview of some of the issues we will discuss this semester:
- copyright (ch 4)
- whether there is such a thing as "intellectual property"
- DMCA: Digital Millennium Copyright Act
- privacy (ch 2)
- matching / fraud prevention
- personal profiles
- web tracking
- from employers
- from copyright holders (RIAA lawsuits, ISP actions)
- per-use content management
- software patents (ch
4)
- what is the purpose of
software patents? To enforce ownership rights, or to improve
technology?
- computer crime
(ch 5)
- hacking
- felony
prosecution
- software licensing
- legal issues regarding "click" contracts
- trust and the web
- security: phishing, certificates, etc
- antitrust issues
- professional issues
- responsibilities and liabilities
- talking to your supervisor
Michael Eisner's June
2000 statement to Congress (edited, from Halbert & Ingulli 2004).