Ethics and Policy Issues in Computing Spring 2008 - PowerPoint PPT Presentation

Ethics and policy issues in computing spring 2008 l.jpg
Download
1 / 53

Ethics and Policy Issues in Computing Spring 2008 Introduction - January 15, 17 A 25 year old woman had this picture and title on her MySpace page She was subsequently denied her nursing degree Anyone know the Drunken Pirate? What is this Course About? a.k.a. What we hope you’ll go away with

Related searches for Ethics and Policy Issues in Computing Spring 2008

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.

Download Presentation

Ethics and Policy Issues in Computing Spring 2008

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Ethics and policy issues in computing spring 2008 l.jpg

Ethics and Policy Issues in ComputingSpring 2008

Introduction - January 15, 17


Anyone know the drunken pirate l.jpg

A 25 year old woman had this picture and title on her MySpace page

She was subsequently denied her nursing degree

Anyone know the Drunken Pirate?


What is this course about l.jpg

What is this Course About?

  • a.k.a. What we hope you’ll go away with

    • Computers aren’t perfect

    • They can create new problems

    • They highlight and exacerbate old problems

    • They could lead to new solutions to societal issues

    • There are Legal, Policy, and Moral issues

    • Often are linked to Non-computing issues and precedents

    • Global in scope

      • Limits what we can do legally

    • Linkages between topics and underlying issues,

      • E.g., economics and net neutrality; open vs. closed systems and the iPod

    • Multidisciplinary and Interdisciplinary


Challenges can be very serious l.jpg

Challenges can be very serious

  • 13 year old girl committed suicide after the supposed 16 year old boy she met on MySpace turned out wasn’t

  • It was actually the mother of another girl, whose child had been slighted

  • Was this fraud?

  • Was she culpable?

  • Reaction: Laws proposed mandating honesty in online information

  • Subtle Q: Should the punishment have been different if the girl hadn’t died?


What you can do l.jpg

What you can do

  • Think ahead (technology is evolving)

  • Think differently (no, this is not an ad for Apple);

    • SOLUTIONS - design

    • At least don’t come up with really stupid solutions

      • Won’t work

      • Won’t scale

      • Hard to implement

      • Unfair

      • Create new (and often worse) problems


Research l.jpg

Research

  • No Exams

  • “Re-search”

    • Plagiarism vs. bad citations

    • Good citations help you

    • Good sources are important

  • Final Paper - Something that interests you

  • How to do research

  • Push you to be explicit, transparent, consistent, and articulate.

  • Tools, methodologies, frameworks


Neat stuff l.jpg

Neat stuff!

  • Computing technology can be really cool!

    (DEMO – XO/OLPC)

    (Might also call this Information and Communications Technology, or ICT)


Logistics l.jpg

Logistics

  • Waitlist

  • Discussions

  • Participation

  • Quizzes

  • HW

  • Debates

    • Not just adversarial

  • Project

  • Links to materials; IP addresses

  • Readings on Quinn (apologies if don’t know it COLD)

  • 4th iteration; broad topics, I am an “expert” in only some of these

  • Blackboard (?)

    • Vote

  • Webpage

  • Mailings


Course topics l.jpg

Course topics

  • Syllabus (slight changes possible)

    • Website will be the best location

    • Find it through my own COS homepage

    • (May use blackboard (??))


Syllabus l.jpg

Syllabus


Plagiarism l.jpg

Plagiarism


Cheating will not be tolerated l.jpg

Cheating will not be tolerated

  • You must do your own homework

  • It is acceptable to discuss the reading assignments and general approaches to solving homework problems with your classmates

  • It is not acceptable to discuss detailed homework answers or to copy homework answers from other students

  • Hopefully you already knew this….


Cmu policy on cheating and plagiarism l.jpg

Research and Communication Skills

CMU Policy on Cheating and Plagiarism

CMU Policy*:

Plagiarism includes, but is not limited to, failure to indicate the source with quotation marks or footnotes where appropriate if any of the following are reproduced in the work submitted by a student:

  • A phrase, written or musical.

  • A graphic element.

  • A proof.

  • Specific language.

  • An idea derived from the work, published or unpublished, of another person.

    *http://www.cmu.edu/policies/documents/Cheating.html


This is serious l.jpg

Research and Communication Skills

This is serious

  • Consequences of plagiarism in this class range from zero credit for entire assignment to failing the course to recommendation of university disciplinary action

  • Publishers and professional societies have plagiarism policies too

  • The Internet makes it easy to plagiarize

    • Students are frequently cutting and pasting off the Internet without proper quotation and/or citations

    • Students are buying papers off the Internet

  • The Internet also makes it easy to catch plagiarizing


Avoiding plagiarism l.jpg

Research and Communication Skills

Avoiding plagiarism

  • If you use someone’s specific words, put them in quotes and cite the source

  • If you use someone’s ideas expressed in your own words, cite the source

  • If you paraphrase, summarize in your own words, but still cite source

    • Don’t use same sentence structure with a few word substitutions

    • If you use some of the source’s words, put them in quotes

  • When in doubt, put it in quotes and cite the source!


Misuse of sources l.jpg

Research and Communication Skills

Misuse of sources

  • Quinn (Appendix A) distinguishes between deliberate and non-deliberate attempts “to conceal the source of the words or ideas”

    • Deliberate = plagiarism

    • Non-deliberate = misuse of sources

  • If you are accused of plagiarism, it may be difficult to convince people that what you did wasn’t deliberate

    • In this class we are warning you about plagiarism and misuse of sources and will therefore assume that if we see something that looks like plagiarism, it is deliberate

  • So… be careful not to misuse sources

    • It is not sufficient to simply cite a source when you copy material verbatim - you must put the words in quotes!


Good resource on avoiding plagiarism l.jpg

Research and Communication Skills

Good resource on avoiding plagiarism

  • http://www.wisc.edu/writing/Handbook/QPA_plagiarism.html

  • Includes nice examples of good and bad paraphrasing


Take the test l.jpg

Take the Test

  • http://education.indiana.edu/%7Efrick/plagiarism/

  • This is your first Quiz

    • Few minutes long

    • Only one you can redo (if required)

  • Finish before Jan 22


Introductions l.jpg

Introductions

  • My Own background

    • ICTD – ICT and Development

    • Digital Divide

    • Infrastructure

    • EPP/EE (geek but can’t code)

    • Biases

      • You’ll see them here and there but these should be separate from scholarly (neutral) analysis

        • Solution is often transparency (assumptions, funding sources, etc.)


Discussion q a l.jpg

Discussion / Q&A


What is ict l.jpg

What is ICT?

  • “Information and Communications Technology”

    • Largely a non-US term

    • IT and Telecom = US parlance

  • Can be as broad or as narrow as one defines

    • What are the departments within SCS?

  • How important is ICT?

    • GDP – non-trivial but modest share

      • Measurements are difficult

    • Major component of economic growth (productivity)

      • Measurements are even more difficult

    • Is information a source of competitive advantage?

      • “Knowledge Economy”


Components of ict 4cs l.jpg

Components of ICT: 4Cs

  • Computers

    • All devices part of a computing system

    • More than PCs

  • Connectivity

    • More than just the Internet

  • Content

    • Inputs and/or outputs;

    • Software and embedded software

  • (human) Capacity

    • Ability to use ICTs

    • Includes literacy, e-Literacy, etc.


Which is a computer l.jpg

Which is a Computer?

Husqvarna Viking Sewing Machine

Aprilaire Thermostat


What is a computer l.jpg

What is a Computer?

  • Many definitions…

  • E.g.,

    Any device that applies a set of rules to systematically and consistently perform calculations or operations (“algorithms”) on any chosen set of data or information to produce an output or lead to a defined state

  • Many devices are computers, e.g., calculators, cell phones, etc.

    • Is a remote car opener a computer?

  • Computers per se are not very intelligent


Computers are everywhere l.jpg

Computers are EVERYWHERE

  • Don’t need to be digital…

  • Don’t need external software…

  • Can be part of a larger device that is ostensibly not about the computing

    • Cars – more value to the computing components than the steel

  • Are humans computers?

    • We have aspects of computers in us

      • Adding up number of students in this class

      • Cellular automata and genetic material?


Why do we care about the definition l.jpg

Why do we Care About the Definition?


Why do we care about the definition27 l.jpg

Why do we Care About the Definition?

  • We might end up with a controversy like the Uniform Computer Information Transactions Act

    • Attempted to standardize Computer Information transactions like the Uniform Consumer Code for goods (Article 2)

      • UCC has high consumer protections

      • So, if a washing machine breaks down could a UCITA-like law apply?

        • Isn’t a washing machine with a microprocessor like a computer?

    • Other controversies had to do with shrink-wrap licensing, public comment limitations, etc.


Selecting a research topic l.jpg

Brainstorm

What are you interested in?

What would you like to learn more about?

What topics might be relevant to your thesis?

What topics might be relevant to your future career?

Select a small number of candidate topics

Read

How much information seems to be available?

Is this topic over done?

What open questions or points of conflict are there?

Do you still find this topic interesting?

Do you have the skills necessary to pursue this topic?

Focus

Select a topic

Define a focused research question

Read some more

Conduct a “literature review”

Adjust your topic as needed

Research and Communication Skills

Selecting a research topic

Feel free to discuss with professors or course assistant

Paper topic due March 4

Outline and bibliography due April 1


Current issue analysis of security vulnerabilities in the movie production and distribution process l.jpg

Current Issue:Analysis of Security Vulnerabilities in the Movie Production and Distribution Process

Lorrie Cranor

Joint work with Simon Byers, Dave Korman, Patrick McDaniel, Eric Cronin


Unauthorized copying of movies l.jpg

Unauthorized copying of movies

  • Estimated annual global revenue losses due to unauthorized copying of movies (2005)

    • For US majors

      • Via physical media: $3.8 billion

      • Via Internet: $2.3 billion

    • Global supply chain losses (incl. theaters, rental, etc.) estimated at $18.2 billion!

  • Arguably, these estimates are high

    • Why?

  • Even so, a lot of money at stake and problem is growing


Focus of mpaa s public discussion l.jpg

Focus of MPAA’s public discussion

  • Shutting down mass production and distribution of pirated movies

    • Relatively easy, non-controversial

  • Schemes to prevent consumer copying

    • Broadcast flag

    • Digital rights management

    • Trusted computing


Concerns about drm proposals l.jpg

Concerns about DRM proposals

  • May restrict reasonable uses, including uses falling under “fair use”

  • May chill innovation

  • Some industry proposals would restrict functionality of general purpose computers


Broadcast flag l.jpg

Broadcast flag

  • November 2003 FCC ruling would have made it illegal as of July 2005 to manufacture or sell devices that receive over-the-air digital TV broadcasts unless they contain certain copy protection technologies

  • Many consumer and industry groups raised concerns

  • Court of Appeals ruled that FCC did not have the right to regulate this


New security measures l.jpg

New security measures

  • In spring and summer of 2003, movie industry began acknowledging publicly need for stronger security measures

    • Industry insiders publicly critical of security practices

    • Security measures at pre-release screenings

      • Security guards with night vision goggles

      • Metal detectors

      • No cell phones

    • No pre-release screenings for some movies

    • Compressed release time frames for some movies


Slide35 l.jpg

That didn’t prevent The Hulk from showing up on the Internet two weeks before its theater release date


Maybe helped find source of leak l.jpg

Maybe helped find source of leak

  • Copy on Internet had obliterated water mark

    • Not clear whether this was actually used to find source of leak

  • Arrest was made within 3 weeks of leak

    • Kerry Gonzalez pleaded guilty to a single count of felony copyright infringement

    • Fined $5K + $2K damages and 6 months house arrest

    • Obtained pre-release video tape of “work print” from friend, who got it from employee of print advertising firm


Where do copies come from l.jpg

Where do copies come from?

  • Press reported some anecdotes, but no publicly available data

  • This data could be useful for improving security and for more informed policy debates

  • Research approach:

    • Understand movie production and distribution process

      • Interviews with insiders and experts

    • Gather data about unauthorized copies of movies on the Internet

      • Empirical study

    • Analyze security vulnerabilities in movie production and distribution process


Many opportunities for leaks l.jpg

Many opportunities for “leaks”

  • Leak = first unauthorized copy or use

  • Insider (thousands of potential attackers):

    • Editing room

    • Marketing

    • Projectionist

    • DVD factory

    • Retail employee

    • Oscar screeners

  • Outsider (millions of potential attackers):

    • Camera in cinema

    • Consumer copying videos, DVDs, broadcast


Many opportunities for leaks39 l.jpg

Many opportunities for “leaks”

  • Leak = first unauthorized copy

  • Insider (thousands of potential attackers):

    • Editing room

    • Marketing

    • Projectionist

    • DVD factory

    • Retail employee

    • Oscar screeners

  • Outsider (millions of potential attackers):

    • Camera in cinema

    • Consumer copying videos, DVDs, broadcast

Usually not good quality

Usually not fresh


Empirical study l.jpg

Empirical study

  • Identify every movie in box office top 50 from January 2002 to June 2003

  • Find fingerprints (checksums) and posting dates from Content Verification Site

  • Download 5% of each movie clip

  • Watch them, identify quality and source

    • TTA, VHS, DVD

    • Insider vs. outsider


Identify box office top 50 l.jpg

Identify box office top 50

http://www.rottentomatoes.com/movies/box_office.php?rank_id=362

We used perl scripts to crawl Rottentomatoes and gather top 50 data for 18 month period

409 movies

312 first released in US


Find fingerprints and post dates l.jpg

Find fingerprints and post dates

We used perl scripts to search ShareReactor for films

Some fine tuning was necessary to get data on the correct films

Found 183/312 movies, some with multiple samples


Fetch small bit of each movie l.jpg

Fetch small bit of each movie

  • MLDonkey

    • Open source peer-to-peer client

    • Content divided into blocks, client downloads multiple blocks simultaneously from different sources, can stop and resume downloads

  • Used perl script to download 8% of one file for each movie (some movies stored in multiple files) - usually resulted in a complete block from beginning and end of movie

  • 285 viewable samples of 183 movies

    • 18 gigabytes of data

    • 200 MHz computer and cable modem

    • Took one week to download


Classification l.jpg

Classification

  • Insider if:

    • Appeared prior to cinema release

    • Editing room artifacts

    • Industry related text or overt watermarks

    • Good through-air video capture but apparently direct captured audio and appeared prior to DVD/VHS release date

    • DVD quality and appeared prior to DVD release date

  • Otherwise outsider or unknown


Insider editing room artifacts l.jpg

Insider: editing room artifacts


Insider watermarks text l.jpg

Insider: Watermarks/Text


Outsider l.jpg

Outsider

  • Through the air video


Findings l.jpg

Findings

  • 183 of 312 movies found on Internet (59%)

  • 285 different rips

  • 77% were insiders

  • 78% DVD quality


When do movies appear online l.jpg

2.2% movies appear before theater

5% movies appear after DVD

When do movies appear online?

Theater release

DVD release


Our paper l.jpg

Our paper

  • Published in DRM03 workshop

  • Presented at TPRC

  • Covered in NYTimes, CNN, Wired, Hollywood Reporter, and elsewhere

  • Quoted in Congressional and FCC hearings

    http://lorrie.cranor.org/pubs/drm03.html


Implications l.jpg

Implications

  • High rate of insider leaks and timing suggests that consumer copying is a relatively minor problem (at time of study)

  • Opponents of broadcast flag and other MPAA proposals have cited our study to argue that the movie industry should clean up its own act before imposing restrictions on consumers

  • MPAA called our study “flawed”


But two weeks later l.jpg

But two weeks later


Coming back to p2p l.jpg

Coming back to p2p…

  • Assuming the insider problem can be solved, unauthorized copying of consumer DVDs likely to increase

  • Unauthorized copies of movies, music, software, etc. are continuing to propagate over p2p networks

  • Anonymous p2p networks may make it very difficult to identify source

  • What should be done?

    • Make p2p illegal

    • Make online anonymity illegal

    • Mandate DRM


  • Login