Computer Ethics

Author's output of IS201 - Computer Ethics Course taken at the University of the Philippines Open University.

Thursday, October 13, 2005

Enemy of the State Film Review



Enemy of the State Film Synopsis:

Robert Clayton Dean is a lawyer whose happy family life is turned upside down after meeting his college buddy at a lingerie shop by chance. Along with their swift conversation, his buddy cleverly slips a self-taken videotape assassination of a congressman into his bag. Unknown to Robert, his life begins to turn sour when he became the eye of a ruthless group of National Security Agents commanded by a belligerently ambitious Jon Voight, a high-ranking State Department official of the famed National Security Agency. Using sophisticated surveillance from snooping devices, every digital footprint left by Robert becomes a source of invasion to his private life as the villains tried every possible means to regain the video which is in Robert's possession.

What were the ethical (or moral) dilemmas in the movie? List four.

Dilemma 1 - The use of state of the art intelligence surveillance system effectively address terror threats and those activities that are hostile to the national security. The use of advance microchips, powerful computers and mass data storage devices has opened possibilities to keep track movements of people as well. Along with this development, there is so much power in the use of this technology as it offers vulnerability to infringe the rights of individual privacy. Privacy versus Security is the primary dilemma very obvious in this film.

Dilemma 2 - When all law enforcers are out to capture Robert, he has no other way to regain back his normal life but to face and outwit his detractors. Upon losing the incriminating video tape Robert have in possession, he lost a perfectly good chance to clear his name with all the so-called invented bad reputation induced into his character. The dilemma here is, Robert has nothing to prove about his innocence.

Dilemma 3 - Two of the major characters in the film(Robert's friend and the congressman) were murdered by National Security operatives because of self-serving motives. Where is justice? The dilemma here is that the victims didn't get justice especially if those who perpetuated the crime are ironically the crime busters themselves.

Dilemma 4 - There may be ongoing use of high-end surveillance gadgets that somehow need legal intervention on its appropriate use as in the case of this film, yet no body had to bring this issue into the judicial spotlight for further ethical scrutiny. The NSA's use of such surveillance gadgets are in fact of no legal basis and therefore intrusive and infringes privacy. The dilemma here is- who will expose such corrupt and exploitative operations, when all teams of the NSA department (in the film) are involved in the conspiracy of doing illegal activity. This is an issue probably true in real life situation as in the case of human-cloning where certain clinics clandestinely operate in secret laboratories.

How do the ethical theories apply to these dilemmas? You can choose just one theory for all of the dilemmas, or use different theories for each.

Privacy vs Security

The use of intelligence and surveillance system is undoubtedly a state of the art way to detect suspicious and potentially terrorist-related activity. The cost of this breakthrough would mean vulnerability to infringe privacy. On the other hand, because employing its use significantly helps save lives, there is societal tolerance on certain privacy given up in selected areas as evidently seen in most public places such as grocery stores, airports and transport stations. It is a perceivable trend in the future, that more and more surveillance gadgets will soon be installed as far as invading our homes. Man, in his moral and intellectual capacity, to some certain degree, favor security at the expense of privacy because of his moral obligation to mankind to prevent acts of terrorism by using technology as his weapon. This is a problem of moral obligation where privacy and security are the two conflicting issues that pose challenging solution. Additionally, the use of "security" as an issue, becomes a susceptible reason to mask real egoistic intentions which is most likely to personally intrude others. Transvaluation of values suggests that altruism is merely a particular form of egoism. With security favored over privacy, we shall expect that in the future, our privacy will be in the hands of those who operate surveillance systems and that without proper legal measures to govern its use, there is a likelihood that our lives will be threatened by the terrors that unscrupulous crime busters themselves breed.

Abuse of Position

In our quest to uphold moral ascendancy by following laws that govern our daily operation in life, there are cases when proving our innocence seems too elusive. There are so many orchestrated crime scenes and conspiracy to implicate the innocent and cover the real personalities that commit the actual crime. This is especially true when the conspirers are those who are in the influential government position. The use of surveillance electronic gadgets is one area in which our private lives can be altered instantaneously by some self-serving extremists as in the case of Robert. This is an example of pure greed; a reflection of a self-serving utilitarianist who are so obsessed about their own happiness and their indifference to other people's interests. They take advantage of their influence and position to feed on their egoistic motives.

Integrity of Work

Ethical principles are guiding precepts that are foundations of our laws. Those men who hold vital information including privates ones are ought to be morally and lawfully responsible in the conduct of their duty. The problem with the story is that men in the NSA are fueled with greed of power whose real intentions are covered up by the so-called national interests. It should be a moral duty of the higher appointing offices to carefully discern who will be the competent individuals to best fit to the positions in the NSA.

How were the dilemmas resolved in the movie? If you were the one facing the dilemma, what would you do?

Dilemmas of the abuse of position and Integrity of work as discussed above were not particularly resolved in the story. The story writer opted to point the focus on how the justice could possibly be achieved along with the animosity caused by intruding personal lives. Robert, being a lawyer, finally gets his retribution when he find his way to clash these ruthless NSA agents who are desperately recovering the assassination video from him and a group of mobster who is incidentally keeping with them a different video tape that will incriminate them. When the two groups hanged to their conflicting interests, they end up shooting each other. This illustrates a situation where commission of crimes has chained down so long that fair and just means of resolving the dilemma seems too impossible to achieve realistically. As I result, the protagonist tried to resolve his ordeal by playing exactly the same game as his enemies'. Although such resolution doesn't clearly adhere to the ethical principles in computing, it was a situation of moral problem that was finally solved by using the enemy's motivational purpose that results to a fair and square resolution.

If I am into the same situation, I would probably do the same strategy. Although Robert was too lucky to establish a point of common conflicting interest between the mob and the NSA operatives, this is a too good to happen in a real life scenario. With this, I still vow to uphold lawful and ethical principles in proving my innocence should this happen to me by soliciting assistance to higher authorities in the government.

Friday, September 30, 2005

Computer Crimes (Activity 12-1)

What constitutes a computer crime?

According to the Encarta, crime is the commission of an act or act of omission that violates the law and is punishable by the state. The commission or omission of such act escorts itself with the malice intention to abuse an individual, institution or property for purposes of personal gain, advantage or satisfaction. When the use of computers becomes the major factor in committing these acts, it is a computer crime. There can be several ways where the use of computers is involved in a crime. Computer may be the primary target of the offense for the purpose of stealing classified information or simply causing damage or alteration to the computer. Another one is the use of computer as a tool to commit a criminal offense.

Laws on computer crimes are results of the legislative efforts in order to curb down the abusive use of computer technology. These abusive actions may involve the following:

• computer network intrusions
• network integrity violations
• privacy violations
• industrial espionage
• pirated computer software
• child pornography
• E-mail bombings
• password sniffers
• Spoofing
• Credit card fraud

Because of the diverse cultures in one country to another, not all countries have the necessary applicable laws that control abusive actions related to the above list. However, it is clear that what constitutes a computer crime requires the human act and use or intervention of computer resources which in turn violates existing laws imposed by the state.

Three examples of computer crimes.

1. Human trafficking and exploitation thru electronic means - Although web services like chatting and Mail order bride are not illegal, law that cater to these area should be well formulated to protect the welfare of its contituents most especially women and children. These services can be alternative means to exploit young children which is why government intervention is highly required. Unscrupulous people capitalizing on mail order brides and facilities of similar operation in order to satisfy there abusive intentions constitutes a computer crime.

2. Electronic Money Laundering

Money laundering is defined as the conversion or transfer of property, knowing that such property is derived from criminal activity, for the purpose of concealing the illicit nature and origin of the property from government authorities. Money laundering is considered a very serious offense because it undermines the normal movement of financial resources of the country which has a significant impact on the economy. It is always directly linked with criminal activities such as drug syndicates, smuggling and trafficking prohibited goods because of the significant profit derived from these illegal activities. With the advent of new technologies such as the e-commerce, money laundering using electronic means has escalated to newer heights. Since every country have their respective money laundering laws, the strengthening of existing laws is called for, to address this new modes of laundering financial resources.

3. Software cracking.

Software piracy comes in so many different ways. In order for pirated copies to flourish in the black market, there should be means to access original copies of it. Although cracking per se may be not considered a crime in some countries, software cracking is the prevalent mode of producing pirated copies of the original software. Answer.com defines software cracking as the modification of a software, to remove the encoded copy prevention which is most often done by software reverse engineering. Software cracking therefore is an act that infringes the copyrights of the original author. However, because the idea of reverse engineering alone is not a crime, whether it is a criminal act or not, remains to be an unanswered question.
This is the case that happens on DVD piracy. The motion picture industry negotiated an encryption standard for digital video discs (DVD). This standard allowed regionalized use of DVDs so that only certain DVD players can play DVDs restricted to a particular region. There are 7 regions standard set worldwide including region 0 where the latter is supposed to play in all regions. Along with this development, a small group of Norwegian hackers recently released a program, called DeCSS, that breaks the encryption on almost any DVD disk. DeCSS program quickly spawned to the internet and opportunists immediately make use of this discovery. As a result, DVD players that virtually run in any region-encrypted DVDs come out so fast in the black market. In addition, modified copies or pirated version of DVD software are easily set to region 0 thereby disabling the DVD encryption. The question that remains in this case is the legal dispute that would dictate whether publishing links of certain materials online such as the DeCSS program is legal or not.

Social Justice Issues (Activity 9-1)

Resolving Gender Equity

Gender issue awareness especially in computing have long been recognized globally. First world countries like USA have initiated programs that address the delimma in gender equity. General strategies adopted in most countries can be summarized by the following:

1. The development of educators in the academe to adapt methods that address gender equity in computing

2. Implementing programs such as seminar, symposia series in the academe that features women's role in industries.

3. Individual efforts by private sector, community organizations and the parents to encourage women's participation in the field of computing and enhancing personal their development to open doors for themselves in working with computer technology.

4. Highlighting women's achievements in computing. An example of which is Grace Hopper's contribution in early compilers and languages. Her significant role in the Nav'y standardization of COBOL programming languages is an indication that women have great contributions to the field of computing.

5. In schools, Infusing comprehensive strategies that encourage equal participation of both men and women is class room activities.

6. Role modeling by faculty, parents, lecturers on gatherings

The gender equity issue in Philippines has been likewise recognized. However, gender stereotyping still continues and different fields of work. Technical computer stuff is a job that has always been attributed as a men's work. This stereotyping is evidently manifested in most organizations both the private and public sector. I believe resolving the gender equity issue can be resolve thru substantial strong advocacy and compain initiated at the grassroots level such as the academic level and the community level.

Privacy Issues (SAQ 8-1)

Example of a Violation of Privacy

There may be several ways to violate the individual privacy in computing. Usually, it is the confidentiality of information stored in the computer which is intruded. However, privacy can also be intruded with the aide of technologies in computing. Eavesdropping private conversation for example is an act of that violates privacy. It is very prevalent most especially to conversions of the leaders in political parties and the military.

Computer Abuses (SAQ 7-1)

Example of Computer Abuses

In an internet café, some students are resourceful enough making way for themselves run download manager software. Doing this enables them to download huge files such as free music and videos surreptitiously even when they are away. By the time they visit back the station, the software being downloaded is most likely finished. This is a typical scenario that illustrates denial of service. Bandwidth size of internet line is obviously limited, with continuous bandwidth congestion resulting from download manager software operating in the background, it is in effect slowing down bandwidth utilization among ordinary users doing research. Similarly, the proliferation of worms clogging down local area networks is unmistakably an exploitation of scare resources. These are programs running unnecessarily behind the scene that practically consumes limited hardware resources.

Every normal human is equipped with rational thinking. We have the ability to discern what is good or bad. The above example exemplifies a pure egoism. These people are only looking for their own selfish motives disregarding others who share internet resources with them. When download managers eats out the bandwidth utilization, others are left with very scarse bandwidth resource or in worst case denial of service. Because this is unfair and unjust practice, this is an act that go against moral principles in computing.

Thursday, August 04, 2005

Ethics in Computing (SAQ 6-1)

Self Assessment Questions 6-1

Three precepts on computer use

Precept: Thou shalt not use a computer to steal

Stealing according to Webster's dictionary is to take the property of another wrongfully. Reading all the ethical concepts as well as the ethical theories presented, Stealing may be in congruent with the idea of utilitarianism as far as the agent is concerned however stealing for its own sake or as a mean toward other ends would generally violate moral principle and norms in computing even to the point where stealing is performed with the will in mind to extend moral duty. This precept therefore, it formulated to ensure that our works in computing would be harmonious and orderly, not because stealing is judgmentally immoral but it is a principle to most likely to put things in order. My own interpretation with of act of stealing can be viewed as unethical because an agent fails to consider his capacity to reason in accordance with his moral and intellectual virtue.

Precept: Thou shalt think about the social consequences of the program you write

Writing program with the social consequences in mind is an act that illustrates human rationality of what is good or bad. When we weigh the outcomes and impact of an our planned actions to others or the society in general, then we are simply exercising our moral and intellectual virtue which according to Aristotle what separates us from other beings. A moral agent who makes a program without violating moral principles in computing and he knows it is for the welfare of society makes an act of moral worth.

Precept: Thou shalt use a computer in ways that show consideration and respect

I think this precept almost encompass directly or indirectly every other precept mentioned. In respecting others interest , one would should refrain to use computers with intent to harm others; to snoop other person's privacy; to infringe other people's output and the like.

Ethical issues in computing and their ethical in nature.

Café operators allowing minors to surf freely the internet.

This is a computing issue that raises multiple questions of morality on a worldwide scale. Free access to internet resource exposes children to the world with borderless boundaries and limits. While undoubtedly, the internet is the power resource for useful information, chat rooms and similar services has also been the avenue for unscrupulous individuals who exploit and young especially women. To mention few of the immoral conducts resulting from this computer issue are child trafficking, rape, pornography, child abuse and the like. This is an issue that can not be resolve easily without interventions among the players involved. Again coming up with a resolution can be difficult since the players involved may have contradicting views of morality. Each has their own ends and priorities pursued.

Software piracy

It is defined as the unauthorized use of another's production, invention, or conception especially in infringement of a copyright. In the Philippines, software piracy of any media is very rampant. While everyone seems to condemn piracy as results our previous survey showed, it seemed we lack the actions that justify our denouncement of piracy. In my opinion, this is a play between man's desiring elements against our tendency to obey our capacity to rationalize to what we ought to do. We succumb to follow the desiring elements which is to avail cheap software because we rationalize that the enforcement of our laws is very loose. This is an ethical issue simply because people seem not to put value on the protection of intellectual property rights. Worst is the case in China were government as an institution almost silently condone piracy.

Legislation governing computer use

I am favor for a legislation that will govern everything that relates to computing. However, this legislation must take into account the welfare of the general populace. This is a legislation that should not be left by a few group people in legislative sector but as a result of continuous consensus among different sectors involves in the use of computers. I suppose this is not one step process but constant consultation among the concerned parties because the realms of ethical issues in computing is continually changing as new technologies come out. The ethics of computing which acccording to Kocikowska and Johnson, will disappear as a mere branch of ethics. It will eventually break up from the usual notion of ethics because of the ever-growing issues that arise for every new technology introduced and thus a continuous work of advocacy/consultation.

Wednesday, August 03, 2005

Finalist Theories (SAQ 4-1)

Self Assessment Question 4-1

Most Appealing Finalist Theory

It is the Nicomachean Ethics of Aristotle which appeal to me most. This is because his theory was able to cover some points raised from the other 2 theories presented. His idea of virtue asserted by rationality and irrationality of human soul essentially captures our quest for what is good and what is bad. We are turned between choosing decisions that brings rationality and those that are not. Our experiences, the environment and the people that contribute to the moral principles we put value usually help the discernment of the decisions we make.

Most Pre-dominant Theory

Few people today act in accordance with that they believe with what is virtuous. Most of us are defeated by the elements of desires that dispute our rationality of what is supposedly right. I believe that there is a majority who seem to advocate the theory of utilitarianism. This is perhaps the principle that predominate the world of computing even in outside areas of computing. I take for example a computer science student of wishes to be adept in programming. The only way he could spend extra effort to become a good programmer is to practice at home. Since he does not have licensed software at home and he can not afford to buy licensed one, he buys pirated ones. This is the only way he can attain the greater happiness he has in mind which is to become a skillful programmer. He focuses on his happiness and disregarding the idea that buying pirated software is illegal. This is case that is almost prevalent in every private computer user in this country. More so in other areas of computing where we usually put higher value on what we believe best for us

Tuesday, August 02, 2005

Ethics and the Law (SAQ 2-1)

Self Assessment Question 2-1

What relevance, if any, does the study of the concept of law, in general, have in computing and your study of computer ethics?

The study of the concept of the law allows us to understand potential ethical issues that arise particularly in the field of computing. It is in knowing these concepts that are able to identify which human actions require moral discernment to determine the scope of the study of computer ethics. Natural law, for instance provides principle of righteousness, justice, equity and fairness. Knowing these philosophies guide us which actions in computing adhere to these precepts. General concepts of the law are fundamentals relevant to the study of ethics and computer ethics in particular.

List down two laws governing computer use and explain what types of non-jural law seem to underpin these two laws.

Mail-order bride law is one of the laws that should govern computer use. Our existing policies on mail-order bride may be vague since it did not mention about computers, but it is promulgated for reasons that support the principle of natural laws - ensuring justice and righteousness by protecting women. The way in which this law is written is not an exemption to condone the idea that women can be a commodity since natural laws according to Plato are absolute.

The issue of computer security has been an age-old issue that still baffles the field of computing. Malicious codes such as a virus spawned across networks on a global scale has yet and issue remained unresolved. The scope that the internet covers left existing laws among various countries, hanging and remained unenforced. How can we possibly prosecute an offender whose country don't have laws that deal with such crime? The I love you virus is an example of a malicious code the wreak havoc in major computer systems worldwide. Those countries who have been affected, admittedly have difficulties filing lawsuit to offenders.

This could an situation attributed to concepts of the Moral Law. Every person on the planet must take responsibility to mankind which is generally to do good and not harm regardless of whether there is a law pertaining to privacy and security in a particular country.