Section Nine: Legal, moral, ethical and cultural issues Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Chapter 44 – Computing related legislation
Computing related legislation

A

Legislation relating to privacy can be broadly categorised into laws intended to protect personal privacy and those which have been passed in the interests of national security, crime detection or counter-terrorism.
Some laws relate specifically to computing, for example:
- the Data Protection Act (1998) which is designed to ensure that personal data is kept accurate, up-to-date, safe and secure and not used in ways which would harm individuals
- the Computer Misuse Act, which makes it an offence to access or modify computer material without permission
- The Regulation of Investigatory Powers Act 2000 Other laws such as the Copyright, Designs and Patents Act (1988) have a more general application, covering the intellectual property rights of many types of work including books, music, art, computer programs and other original works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Chapter 44 – Computing related legislation
The Data Protection Act 1998

A

The Data Protection Act says that anyone who stores personal details must keep them secure. Companies with computer systems that store any personal data must have processes and security mechanisms designed into the system to meet this requirement.
The act includes a number of principles:
- data must be processed fairly and lawfully
- data must be adequate, relevant and not excessive
- data must be accurate and up to date
- data must not be retained for longer than necessary
- data can only be used for the purpose for which it was collected
- data must be kept secure
- data must be handled in accordance with people’s rights
- data must not be transferred outside the EU without adequate protection
All data users must register with the Data Commissioner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Chapter 44 – Computing related legislation
The Computer Misuse Act 1990

A

The Computer Misuse Act has three main principles, primarily designed to prevent unauthorised access or ‘hacking’ of programs or data.
The Computer Misuse Act (1990) recognised the following new offences:
- Unauthorised access to computer material
- Unauthorised access with intent to commit or facilitate a crime
- Unauthorised modification of computer material
- Making, supplying or obtaining anything which can be used in computer misuse offences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Chapter 44 – Computing related legislation
The Copyright Designs and Patents Act 1988

A

This Act is designed to protect the creators of books, music, video and software from having their work illegally copied.

The Act makes it illegal to use, copy or distribute commercially available software without buying the appropriate licence. When a computer system is designed and implemented, licensing must be considered in terms of which software should be used. If you use commercial software called for example TestSoft to create a series of multiple choice tests called ReviseHistory, it may not be permissible to sell your finished product without paying TestSoft a fee for every copy you sell. Similarly, if your school buys a copy of ReviseHistory, they may not be permitted to install it on more than one computer without buying a multi-user licence for a certain number of users.

If you buy a music CD or pay to download a piece of music, software or a video, it is illegal to
- pass a copy to a friend
- make a copy and then sell it
- use the software on a network, unless the licence allows it
The software industry can take some steps to prevent illegal copying of software:
- The user must enter a unique key before the software is installed
- Some software will only run if the CD is present in the drive
- Some applications will only run if a special piece of hardware called a ‘dongle’ is plugged into a USB port on the computer

However, although a piece of software such as an applications package, game or operating system is protected, algorithms are not eligible for protection. If you come up with a much better sorting algorithm than anyone else, for example, you cannot stop others from using it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Chapter 44 – Computing related legislation
The Copyright Designs and Patents Act 1988

A

This Act is designed to protect the creators of books, music, video and software from having their work illegally copied.

The Act makes it illegal to use, copy or distribute commercially available software without buying the appropriate licence. When a computer system is designed and implemented, licensing must be considered in terms of which software should be used. If you use commercial software called for example TestSoft to create a series of multiple choice tests called ReviseHistory, it may not be permissible to sell your finished product without paying TestSoft a fee for every copy you sell. Similarly, if your school buys a copy of ReviseHistory, they may not be permitted to install it on more than one computer without buying a multi-user licence for a certain number of users.

If you buy a music CD or pay to download a piece of music, software or a video, it is illegal to
- pass a copy to a friend
- make a copy and then sell it
- use the software on a network, unless the licence allows it
The software industry can take some steps to prevent illegal copying of software:
- The user must enter a unique key before the software is installed
- Some software will only run if the CD is present in the drive
- Some applications will only run if a special piece of hardware called a ‘dongle’ is plugged into a USB port on the computer

However, although a piece of software such as an applications package, game or operating system is protected, algorithms are not eligible for protection. If you come up with a much better sorting algorithm than anyone else, for example, you cannot stop others from using it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Chapter 44 – Computing related legislation
The Regulation of Investigatory Powers Act 2000

A

This Act regulates the powers of public bodies to carry out surveillance and investigation, and covers the interception of communications. It was introduced to take account of the growth of technology, the Internet and strong encryption, and additions have been made regularly between 2003 and 2010, with the latest draft bill put before Parliament in November 2015.
The Act:
- enables certain public bodies to demand that an ISP provide access to a customer’s communications in secret
- enables mass surveillance of communications in transit
- enables certain public bodies to demand ISPs fit equipment to facilitate surveillance
- enables certain public bodies to demand that someone hand over keys to protected information
- allows certain public bodies to monitor people’s Internet activities
* prevents the existence of interception warrants and any data collected with them from being revealed
in court

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Chapter 44 – Computing related legislation
Analysing personal information

A

According to the head of a 2006 Royal Academy study into surveillance, Google is within a few years of having sufficient information to be able to track the exact movements and intentions of every individual, via Google Earth and other software they are developing.

It is predicted that small computers will become embedded in everything from clothes to beermats. Consequently, we will be interfacing with computers in everything we do, from meeting chip-wearing strangers to entering smart buildings or sitting on a smart sofa, and each of these interfaces will end up on a Google database.

It is a vision of a world without privacy.

Already, Google collects and stores data about millions of emails every day. Here are some extracts from the information they post on their website, which users must agree to if they wish to use Google software.

Organisations, including governments and security agencies, collect huge amounts of data about private citizens, often supplied by Internet companies such as Google, as well as by telephone companies.

With the aim of detecting terrorist or other illegal activities, the US Government collects, stores and monitors metadata about all electronic communications in the US. Metadata includes information such as the telephone number called, date, time and duration of call.

In one month in 2013, the unit collected data on more than 97 billion emails and 124 billion phone calls from around the world. Edward Snowden is a famous ‘whistle-blower’ who informed the world about these practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Chapter 44 – Computing related legislation
Case Study: Edward Snowden

A

Snowden leaked the details of surveillance being carried out by the US Government, European Governments and Telecommunication companies in June 2013. The material was leaked to the Guardian and Washington Post.

The US Department of Justice sought to charge Snowden with two violations of the Espionage Act and the theft of government property. However, the US have faced significant difficulties in charged Snowden. The US Department of Justice tried to extradite him from Hong Kong where he had fled, but this attempt was denied over inconsistencies in the paper work. From this point, Snowden claimed asylum in Russia where he resides to this day.

Snowden is a divisive figure with some calling him a hero and patriot, whilst others call him a dissident and traitor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Chapter 45 – Ethical, moral and cultural issues
The economic impact of the Internet

A

The Internet has its origins in the 1960s with ARPANET, the first North American wide area network. In 1974, two engineers called Bob Kahn and Vint Cerf devised a protocol for linking up individual networks into what they termed the Internet – the “internetworking of networks”.

In the 1980s Tim Berners-Lee, working for CERN in Geneva, invented, or designed, the World Wide Web. He wrote his initial Web proposal in March 1989 and in 1990 built the first Web browser, called WorldWideWeb. His vision was that “all the bits of information in every computer in CERN, and on the planet, would be available to me and to anyone else. There would be a single global information space.”

Berners-Lee had little interest in money and gave away his technology for nothing, but one of the most significant consequences of his invention was a complete reshaping of the economy throughout the world. Has it created jobs, or simply created the “1% economy” in which the top Internet companies like Amazon, Google, Facebook, Instagram and others have accumulated huge wealth at the expense of
thousands of workers?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Chapter 45 – Ethical, moral and cultural issues
Amazon

A

Amazon started as an online bookstore in 1994 but soon diversified into DVDs, software, video games, toys, furniture, clothes and thousands of other products. In 2013 the company turned over $75 billion in sales, and it now accounts for 65% of all digital purchases of book sales. As a consequence of their domination, in 2015 there were fewer than 1,000 independent bookstores in Britain, one third less than in 2005. Where a bookshop employs 47 people for every $10 million in sales, Amazon employs 14 to
generate the same revenue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Chapter 45 – Ethical, moral and cultural issues
eBay

A

eBay, essentially an electronic platform bringing together buyers and sellers of goods, grew from a user base of 41,000 trading goods worth $7.2 million in 1995, to 162 million users trading goods worth $227.9 billion in 2014.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Chapter 45 – Ethical, moral and cultural issues
Google

A

In 1996, Larry Page and Sergey Brin, two Stanford University Computer Science postgraduate students, created Google. There were already several successful search engines like Yahoo and AltaVista on the market, but Page and Brin came up with a game-changing algorithm, which they called PageRank, for determining the relevance of a Web page based on the number and quality of its incoming links. The idea was that you could estimate the importance of a Web page by the number and status of other web pages that link to it. Every time you make a search, the Google search engine becomes more knowledgeable and thus more useful. Even more valuable to Google is the fact that Google learns more about you every time you search.

By 1998, Google was getting 10,000 queries every day. By 1999, they were getting 70 million daily requests. Their next step was to figure out how to make money out of their free technology, and they came up with AdWords, which enabled advertisers to place keyword-associated ads down the right hand side of the page. The image below shows what comes up when a user in Dorchester searches for “Paintball”, with the nearest companies, sponsored advertisements and a map with their locations appearing on the right of the screen.

By 2014, Google had joined Amazon as a winner-takes-all company, with 1.5 billion daily searches and revenues of $50 billion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Chapter 45 – Ethical, moral and cultural issues
Computers in the workforce

A

A 2013 paper by Carl Benedikt Frey and Michael Osborne entitled “The future of Employment: how susceptible are jobs to computerisation?” estimates that 47% of total US employment is at risk. They examine the impact of future computerisation on more than 700 individual occupations, and note the shifting of labour from middle-income manufacturing jobs to low-income service jobs which are less susceptible to computerisation. At the same time, with falling prices of computing, problem-solving skills are becoming relatively productive, explaining the substantial employment growth in occupations involving cognitive tasks where skilled, well-educated labour has a comparative advantage.

Thus there is a polarization of labour, with growing employment in high-income cognitive jobs and low- income manual labour, and the disappearance of middle-income occupations. Driverless cars developed by Google are an example of how computerisation is no longer confined to routine manufacturing tasks. The possibility of drones delivering your parcels is no longer in the realms of science fiction. In the 10 jobs that have a 99% likelihood of being replaced by software and automation within the next 25 years, the authors include tax preparers, library assistants, clothing factory workers, and photographic process workers.

In fact, jobs in the photographic industry have already all but vanished. In 1989, when Tim Berners-Lee invented the World Wide Web, Kodak employed 145,000 people in research labs, offices and factories in Rochester US and had a market value of $31 billion. In 2013 the company filed for bankruptcy and Rochester became virtually a ghost town.

Meanwhile, in 2010, a young entrepreneur called Kevin Systrom started up Instagram, which enabled users to create photos on their smartphones with filters to give them, for example, a warm, fuzzy glow.

Twenty-five thousand iPhone users downloaded the app when it launched on 6th October 2010. A month later, Systrom’s Instagram had a million members. By early 2012, it had 14 million users and by November, 100 million users, with the app hosting 5 billion photos. But when Systrom sold Instagram to Facebook for a billion dollars in 2012 (less than two years after the startup), Instagram still only had thirteen full-time employees working out of a small office in San Fransisco. It is a good example of a service that is not providing any jobs at all in the winner-takes-all economics of the digital marketplace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Chapter 45 – Ethical, moral and cultural issues
User generated content

A

In his book “The Cult of the Amateur”, Andrew Keen argues that “MySpace and Facebook are creating a youth culture of digital narcissism; open-source knowledge-sharing sites like Wikipedia are undermining the authority of teachers in the classroom, the YouTube generation are more interested in self-expression than in learning about the outside world; the cacophony of anonymous blogs and user-generated content is deafening today’s user to the voices of informed experts and professional journalism; kids are so busy self-broadcasting themselves on social networks that they no longer consume the creative work of professional musicians, novelists, or filmmakers.”

Keen asserts that a thriving music, video and publishing economy is being replaced by the multi-billion dollar monopolist YouTube. The traditional copyright-intensive industries accounted for almost 510 billion euros in the European Union during the period 2008-2010, and generated 3.2% of all jobs, amounting to more than 7 million jobs. What will happen if large numbers of these jobs disappear?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Chapter 45 – Ethical, moral and cultural issues
Algorithms and ethics

A

Computer scientists and software engineers who devise the multitude of algorithms used by YouTube, Facebook, Amazon and Google, and by organisations from banks and Stock Exchanges to the Health Service and the police, have significant power and therefore the responsibility that goes with it. In some US cities, algorithms determine whether you are likely to be stopped and searched on the street. Banks use algorithms to decide whether to consider your application for a mortgage or a loan. Algorithms are applied to decision-making in hiring and firing, healthcare and advertising. It has been reported, for example, that some algorithms which decide what advertisements are shown on your browser screen classify web users into categories which include “probably bipolar”, “daughter killed in car crash”, “rape victim”, and “gullible elderly”. Did the programmer who wrote that algorithm have any qualms about his work?

When algorithms prioritise, they “bring attention to certain things at the expense of others”.

Facebook’s ‘News Feed’ product filters posts, stories and activities undertaken by friends. Content for the Newsfeed is selected or omitted according to a ranking algorithm which Facebook, with its billion-plus user base, continually develops and tests to show users the content they will be most interested in. But it has been suggested that these social interactions may influence people’s emotions and state of mind; the emotions expressed by friends via online social networks may influence our own moods and behaviour. Clearly, then, those who devise the ranking algorithms potentially have the ability to influence the emotional state of people using Facebook. Should computer scientists consider the institutional goals of a prospective employer, or the social worth of what they do, before accepting a job? Phillip Rogway, Professor of Computer Science at the University of California, found that on a Google search of deciding among job offers, not one suggested that this was a factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Chapter 45 – Ethical, moral and cultural issues
Driverless cars

A

The prospect of large numbers of self-driving cars on our roads raises ethical questions about the morality of automated decision making and different algorithms which could be used in the face of causing “unavoidable harm” - who gets harmed and who gets spared.
(a) The car can stay on course and kill several pedestrians, or swerve and kill one passer-by
(b) The car can stay on course and kill one pedestrian, or swerve and kill its passenger
(c) The car can stay on course and kill several pedestrians, or swerve and kill its passenger

The MIT Technology Review asked: “Should different decisions be made when children are on board, since they both have a longer time ahead of them than adults, and had less say in being in the car in the first place? If a manufacturer offers different versions of its moral algorithm, and a buyer knowingly chose one of them, is the buyer to blame for the harmful consequences of the algorithm’s decisions?”

One of the commonly held principles that form a commonly held set of pillars for moral life is the obligation not to inflict harm intentionally; in medical ethics, the physician’s guiding principle is “Do no harm”. Going further, the moral duties of all scientists, including computer scientists, should also include trying to promote the common good.

16
Q

Chapter 45 – Ethical, moral and cultural issues
Artificial intelligence

A

As digital technologies are used in more and more areas of our lives, spreading into our offline environments through the so-called ‘Internet of things’, previously inert objects are expected to become networked and start making decisions for us. Algorithms will allow the refrigerator to decide what food needs replacing, a door will decide who to let in. Should your door call the police if the door is opened by someone without a tracking device? Should your house report a child who screams excessively to the Social Services?

17
Q

Chapter 45 – Ethical, moral and cultural issues
Environmental effects of computers

A

Environmental issues include the carbon footprint and waste products that result from manufacturing computer systems, but this is often outweighed by the positive effects on the environment of using computerised systems to manage processes that might otherwise generate more pollution.
Considerations may include:
- Does a computer system mean that people can work from home and therefore drive less?
- Has computer technology led to a “throw-away society”, with huge waste dumps of unwanted products which are thrown away rather than repaired or upgraded?
- Is working at home more environmentally friendly than everyone working in a big office, in terms of heating and lighting?
- Do computer-managed engines work more efficiently Create less pollution and use less fuel?

18
Q

Chapter 45 – Ethical, moral and cultural issues
Computers and waste

A

The pace of technology is so rapid that computers, mobile phones and handheld-devices that seemed so desirable a few short years ago are now discarded without a thought for the latest must-have piece of equipment. Are they recyclable or are they simply contributing to a huge mountain of waste, containing dangerous chemical elements which leach into water supplies in third world countries?

19
Q

Chapter 46 – Privacy and censorship
Trolls on the Internet

A

Trolls, cyber-bullying and misogyny have become a fact of everyday life on the Internet. It wasn’t supposed to be this way – the Internet was going to inspire a generation to voice a broad diversity of opinion and empower those who traditionally had no voice.

After the 2010-11 Arab Spring, many people argued that the social media networks were helping to overthrow dictatorships and empower the people. But the Arab Spring deteriorated into vicious religious and ethnic civil wars, culminating in the rise of the so-called ISIS, which uses social networks to post atrocities and radicalise impressionable young people.

Feminist writers and journalists, academics like Mary Beard and political campaigner Caroline Criado-Perez, who petitioned the Bank of England to create a bank note featuring Jane Austen’s face, receive hundreds of death threats, rape threats and other offensive communications for no other reason than that they are women who have dared to appear on the media. Thousands of other women and teenage girls are victims of similar trolling on the Internet. Savage bullying on various social networking sites has led to several tragic cases of suicide.

The Internet has brought great benefits, but all of us have a responsibility to use it wisely and well.

20
Q

Chapter 46 – Privacy and censorship
Censorship and the Internet

A

Internet censorship is the control or suppression of what can be accessed, viewed or published on the Internet. It may be carried out by governments or by private organisations in response to government regulators. Individuals and organisations may censor certain websites for moral, religious or business reasons, or from fear of intimidation or legal consequences. For example, websites containing copyright infringements, harassment or obscene material may be censored.

The extent of censorship varies from country to country, and many of the issues associated with Internet censorship are similar to traditional censorship of newspapers, books, films, etc. It is more difficult to censor Internet information in one particular country, since the information can generally be found on websites hosted outside the country. In some countries such as North Korea and Cuba, the government has total control over all Internet-connected computers, and can therefore enforce censorship.

Most people agree that there needs to be some form of censorship on the Internet; in a 2012 Internet Society survey, 71% of respondents agreed that “censorship should exist in some form on the Internet”.

21
Q

Chapter 46 – Privacy and censorship
Case study 1: Online abuse

A

In 2016, comments on the Guardian newspaper website regularly exceeded 70,000 per day. Journalists put their names to all the articles they write, and regular columnists frequently have their photograph accompanying the column. One consequence of this is that gender and race appear to be key factors in attracting abuse. In a study of almost 70 million comments posted on the Guardian website, it was found that eight of the top ten Guardian Opinion writers most likely to attract abusive or off-topic comments below their articles were women, while the other two were black men. As well as the gender and race of the author, other factors appeared to be significant: one of the women was Jewish, one was Muslim and two were lesbian, while one of the two men was gay.

Despite white men forming the majority of Guardian Opinion writers, the 10 columnists attracting the least abuse or off-topic comments were all men (nine of them white).

One female journalist writing about a demonstration outside an abortion clinic was told “You are so ugly that if you got pregnant I would drive you to the abortion clinic myself”. A British Muslim woman writing about Islamophobia was told to “marry an ISIS fighter and then see how you like that!”

As one journalist said, “Even if I tell myself the abuse doesn’t mean anything, it has a toll on me. It has an emotional effect, it takes a physical toll. And over time, it builds up.” Another said “Imagine going to work every day and walking through a gauntlet of 100 people saying “You’re stupid”, “You’re terrible”, “I can’t believe you get paid for this”.

In April 2016 it was reported that Google, Facebook and Twitter were talking to organisations around the world to organise a global counter-speech movement against the violent misogyny, racism, threats, intimidation and abuse that flood social media platforms.

22
Q

Chapter 46 – Privacy and censorship
Case study 2: Monitoring content on the Guardian website

A

Almost every website, whether it be a newspaper or personal blog, has struggled with comments. A really good comment “informs its readers, corrects authors and provides worthwhile insights in a polite and constructive manner”. Other comments fall into the category of rants, bile, insults and trolling.

The majority of comments are civil and productive, and engaging with comments is part of a journalists’ work. Many factors affect the success of commenting at news sites: topic, user anonymity, scale, site culture, moderation, journalists’ engagement and attitudes, and management support.

Newspapers such as The Guardian employ a team of moderators to read comments and block or delete offensive ones. One moderator in April 2016 described how over the past five years he has read millions of comments and blocked tens of thousands. Moderation is about not letting anyone’s agenda ruin the conversation or ranting about irrelevant issues, as well as blocking trolls.

An irony of successful discussion forums is that their success begets their failure. They get too big and attract spammers, scammers and trolls.

23
Q

Chapter 46 – Privacy and censorship
Monitoring behaviour

A

We are all used to our movements and behaviour being caught on camera, in town and on the roads. CCTV cameras are used for security purposes, crime prevention and detection. They are used to record drivers speeding, turning or parking illegally or driving the wrong way up a one-way street.

Employers may monitor employee behaviour on the Internet, recording what sites are visited during working hours and how much time is spent on them.

And, of course, you can use wearable technology to monitor your own behaviour – how many steps you have taken during the day, your heart rate during a run, the time you took to swim 100 metres.

24
Q

Chapter 46 – Privacy and censorship
Layout

A

Most websites are designed based on the US layout containing a linear structure of information with multiple blocks of text that a western reader is likely to skim over. With Japanese websites, for example, the preference is to include less information per page which, as a whole, is easier to absorb without fear of missing something. In the West, where text is read from left to right, menus are commonly placed on the left. In other countries, where Arabic script, for example, is read from right to left, menus and other page features might more logically appear mirrored in comparison with western versions of the same page.

Maps are a good example of the use of cultural or nationalistic bias reflected in layout. A world map is frequently shown with the country where it was created appearing in the centre.

25
Q

Chapter 46 – Privacy and censorship
Colour paradigms

A

Around the world, the way that different cultures see and describe colours varies dramatically. In general, blue is considered the safest colour choice around the world, since it has many positive associations. In North America and Europe, blue represents trust, security, and authority, and is considered to be soothing and peaceful. However, it can also represent depression, loneliness, and sadness (hence having “the blues”).

In Western cultures, green represents luck, nature, freshness, spring, environmental awareness, wealth, inexperience, and jealousy (the “green-eyed monster”). In Indonesia, green has traditionally been forbidden, whereas in Mexico, it’s a national colour that stands for independence. In the Middle East, green represents fertility, luck, and wealth, and it’s considered the traditional colour of Islam. In Eastern cultures, green symbolizes youth, fertility, and new life, but it can also mean infidelity. In fact, in China, green hats for men are taboo because it signals that their wives have committed adultery! In Western cultures, orange represents autumn, harvest, warmth, sunshine. In Hinduism, saffron (a soft orange colour) is considered auspicious and sacred. In Eastern cultures, orange symbolizes love, happiness, humility, and good health.