An Ethical Framework: Mechanisms For User-Enabled Choice and Normative Claims Marshall Conley, Christina Patterson, Carolyn Watters & Michael Shepherd.

Slides:



Advertisements
Similar presentations
Presentation to WTO/CTD Seminar on e-commerce Richard Bourassa Director, International Policy Director, International Policy Electronic Commerce Branch.
Advertisements

The IFLA Internet Manifesto Alex Byrne Chair Committee on Free Access to Information and Freedom of Expression International Federation of Library Associations.
4 th Meeting of the EC International Dialogue on Bioethics Copenhagen, June 19 th, 2012 Large research and medical databases in clinical and research multi-centred.
Principles of Information Technology
Tri-Council Policy Statement 2010 Ethical Conduct for Research Involving Humans.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Minding Your Own Business The Platform for Privacy Preferences Project and Privacy Minder Lorrie Faith Cranor AT&T Labs-Research
Riverside Community School District
Human Rights in the Digital Era Conference Net Neutrality Policy in the UK & the Citizen’s Interest in Neutral Networks Giles Moss Institute of Communications.
1 Freedom of Expression Prepared By Joseph Leung.
Learning Goals Be able to identify the major forces shaping the new digital age. Understand how companies have responded to the Internet with e-business.
MEDIA LAW Copenhagen University SESSION 10 Dirk VOORHOOF Ghent University (->contact)
STRATEGIES. Non-Technical Measures to Protect Kids Online.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
E-commerce E-commerce is defined "as the process of buying, selling, or exchanging products, services, or information via computer networks, including.
Chapter 5 Freedom of Expression
FREEDOM OF EXPRESSION Salanieta Tamanikaiwaimaro (Sala T) - FIJI Controversy Conflict Who determines the balance??? Ethics.
CHAPTER THE INTERNET, THE WEB, AND ELECTRONIC COMMERCE 22.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
ICTS and VIOLENCE AGAINST CHILDREN: MINIMISING RISKS AND RELEASING POTENTIAL EXPERT CONSULTATION Costa Rica, 9-10 June 2014 Renato Leite Monteiro Council.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Turkey IDA Info-Day PM Session, September 25, 2003 CIRCA 1 CIRCA : The IDA Collaborative Software Tool Grzegorz Ambroziewicz European Commission - DG Enterprise.
THE POTENTIAL FOR EFFECTIVE WEB CONTENT CONTROL BASED ON CURRENT TECHNOLOGY Carolyn Watters and Michael Shepherd Web Information Filtering Lab Faculty.
1 Empowering Persons with Disabilities through ICTs Mr Abdul Waheed Khan Assistant Director-General for Communication and Information UNESCO Open Source.
Proxy Servers 2 What Is a Proxy Server? Intermediary server between clients and the actual server Proxy processes request Proxy processes response Intranet.
Marketing Ethics and Social Responsibility
University of Murcia 8 June 2011 IPv6 in Europe Jacques Babot European Commission - DG INFSO Directorate, Emerging Technologies and Infrastructures.
The Caribbean Knowledge Management Portal Knowledge Management for the Caribbean Information Society.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
CSO Development Effectiveness and Promotion of an Enabling Environment
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Use of Electronic and Internet advertising options Standard 3.4.
IFAP Special Event: Information and Knowledge for All, Emerging Trends and Challenges Information Preservation 4000 Years of Traditions Challenged by Digital.
LEEDS HIGH SCHOOL Internet Use Policies. Leeds High School Library Media Center “It is the goal of the LMC to help people of all ages make the most of.
Introducing HingX now with Capacity Development Network.
1 Freedom of expression and freedom of the media INFORMATION SOCIETY Federal Ministry for Foreign Affairs of Austria.
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy This multimedia product and its contents are protected.
Shelter Cluster Coordinating humanitarian shelter Update from the Global Shelter Cluster Shelter Centre meeting Geneva, 25 May 2012.
INTERNET. Objectives Explain the origin of the Internet and describe how the Internet works. Explain the difference between the World Wide Web and the.
Use of information technology in the educational system in Bulgaria State policy of implementing security and safety measures of pupils in network.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Freedom of Expression in the Information Society : Some Current Issues & Development Dr. A.K. Chakravarti * Adviser Department of Information Technology.
Internet Architecture and Governance
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
National Informatics Centre  A Government of India organization  Promoting usage of IT in India since 1975  Engaged in consultancy, network services.
Ensuring Participation in Legislative Processes: European Principles and Practical Considerations Katerina Hadzi-Miceva European Center for Not-for-Profit.
What vulnerabilities do you face in cyberspace?  Cyberbullying  Cyberstalking  Racial hatred  Exposure to violent, disturbing and/or illegal material.
Website that support online communities 1. Wikis 2. Blogs 3. Forums 4. Social networking sites.
IP RIGHTS and USER NEEDS in a DIGITAL ENVIRONMENT A Publishing view by Hugh Jones Copyright Counsel to The Publishers Association and International STM.
COPYRIGHT, CULTURAL DIVERSITY AND THE WTO Professor Fiona Macmillan Birkbeck, University of London.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Government of Nepal Ministry of Education National Center for Educational Development.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
Knowledge Societies and IFAP 1 Building Knowledge Societies IFAP’s Mandate and Functions Building Knowledge Societies Mandate and Functions of UNESCO's.
winter 2001C.Watters1 Proxy Servers winter 2001C.Watters2 What is a Proxy Server? Intermediary server between clients and the actual server Proxy processes.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
Ministry of Education & Religious Affairs, Culture & Civilisation Greek School Network nternet-safety.sch.gr.
© Fundació Catalana per a la Recerca, Campanya "Internet segura", 2001 CONTROL TOOLS Seminar “The Protection of Consumers and Children on the Internet”
1 Belfast, Horst Forster European Commission Belfast,
Concerns of Noncommercial Users Constituency Privacy Conference November 29, 2005 Kathryn A. Kleiman, Esq. Internet Law and Policy Specialist, McLeod,
World summit on the information society 1 WSIS: Building the Information Society: a global challenge in the new Millennium Tim Kelly, Claudia Sarrocco.
©Ofcom REGULATING THE MEDIA: WHAT ROLE FOR THE EU? European Parliament 17 October 2006 Chris Banatvala Director of Standards Ofcom.
E-Safety Briefing
What are human rights?.
Marshall Conley, Christina Patterson,
Computer Literacy – Grade 8
Use of Electronic and Internet advertising options
Computer Literacy – Grade 8
Unit# 5: Internet and Worldwide Web
The activity of Art. 29. Working Party György Halmos
Presentation transcript:

An Ethical Framework: Mechanisms For User-Enabled Choice and Normative Claims Marshall Conley, Christina Patterson, Carolyn Watters & Michael Shepherd InfoEthics 2000 Paris November 13-15

Universal Declaration of Human Rights  UNESCO has human rights competence in a number of areas, including:  Article 19 of the Universal Declaration of Human Rights stresses the right to information, including freedom of opinion and expression  This right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers  Article 12 refers to arbitrary interference with privacy …

UNESCO and the Information Highway: The Balance Between Control and Access  The Web is increasingly important for the exchange of knowledge, information & experience  UNESCO's INFO-ethics Programme stresses the importance of universal access to information in the public domain

UNESCO’S INFO-ethics Programme Encourages international co-operation in promotion of:  the principles of equality, justice and mutual respect in the emerging Information Society  the identification of major ethical issues in the production, access, dissemination, preservation and use of information in the electronic environment  the provision of assistance to Member States in the formulation of strategies and policies on these issues

Ethical Frameworks and User-Enabled choice There are no unified authorities, only multiple stakeholders with complex and contradictory agendas  This decentralized participation results in the individual user adding new content and tools to the system as a whole  The unified operating authority is replaced by a contradictory, and even chaotic form of control  Structural and systemic elements, such as web-filtering systems, represent ‘acknowledged conditions’ to uphold freedom of expression through ‘choice mechanisms’

The Good, the Bad and the Illegal Like other communication technologies, the Internet carries a potentially harmful or illegal content and can be misused as a vehicle for criminal activities  However, there exist a number of different legal regimes at the national and international level to deal with this:  National security – instructions for bomb making, illegal drug production, etc  Protection of minors – violence, pornography, abusive forms of marketing  Protection of human dignity – incitement to racial hatred or racial discrimination

Ethical Considerations } normative orientation and public dialogue  Internet Service Providers (ISPs) have the option to provide users with the choice to control the content delivered to users over the Internet  Rather than retrieving items from the Web, filtering systems are used to selectively restrict access to materials on the Web

Control?  The deployment of content control should be a reflection of individual, community and social policies and preferences  We can use systems which ‘filter out’ Web sites or Web pages that contain material that is objectionable to a community of users  Two principles must be considered:  Communication Principle: The right of communications as a fundamental human right  Free Expression Principle

Codes of Conduct?  The important questions:  Whose strategy?  Whose choice?  During this time of process innovation, codes of conduct, the realities, significance, and consequences of barriers to access, whether publicly or privately created, must be explored

Mechanisms for Realization of these Policies  We feel that a combination of mechanisms is required:  Normative Codes of Conduct developed by UNESCO  Industry self-regulation  Facilitation of end-user choice through technology  Technology by itself is not the solution

A Caveat  By early July 2000 a new Internet model began to evolve – ‘peer-to-peer’  Peer-to-peer communications takes away the ISP as the middleman. This means that you and I can communicate directly as long as we both have IP addresses and know each other’s address  The importance is that government will not be able to impose filtering at the ISP level

The Problem: the Web  1 billion documents (April 2000)  Average query is 2 words (e.g., sara name)  Continual explosive growth  Balance global indexing and access and unintentional access to inappropriate material

What were we doing pre-Web?  Channel access  Deny access  Check for age

Internet opens new Channels   ftp  telnet  List servers  Bulletin boards  Discussion groups  Chat rooms  Instant messaging  Web pages

Filtering label base Web doc URL lists keywords ratings URLs

What have we got to work with?

Page Filtering Application Types  Client-side: Special purpose browser applications  e.g., SurfMonkey  Server-side: Child friendly portals  e.g.,Yahoo, Lycos  Proxies  Black and white lists  Keyword profiles  Labels

Browser Application:

Server-Side: Public Portals

Sneaky!!

Proxy level (hidden)

Labels: Collaborative Filtering Search Engine Web Site Label Bureau A Label Bureau B Rating Service Labels Author Labels

What works well?

What’s the problem? Site Labels Trust Who does the labels? Are the labels authentic? Has the source document changed? Scale - A billion docs? Black and White lists Ditto Text analysis of page contents Poor results

Other Filtering Application Types  Authorized Access to Adult material  e.g., Australian plan  credit card proof of age  Anonymity protection  ZeroKnowledge  Non-Http Filters  , etc.  Activity Monitors  privacy

Authorization: What’s the point?

Protecting Anonymity

Recommendations Based on Current Technology  Technologies have to be used in combinations  Layer Cake Model –proposal for a rating system  Balkin, Noveck and Roosevelt. Filtering the Internet – A Best Practices Model

The Layer Cake Model

On-going Issues to be addressed  Freedom of Expression  Protection of Minors

Summary  A combination of mechanisms is required:  Normative Codes of Conduct developed by UNESCO  Industry self-regulation  Facilitation of end-user choice through technology  End-user must know what is being filtered, when it is being filtered, and why it is being filtered  Technology by itself is not the solution

More Info on Filtering  Industry Canada report  Content Filtering Technologies and Internet Service Providers: Enabling User Choice   European Commission – Info. Society Website   Web information filtering lab:  {shepherd | 

Filtering applies to E-Comm Balance of users right to privacy and business’s desire for access to market Building trust Guaranteeing digital content Building community values/profiles Building service layers on the web Restricting access Users rights to access/transparency of filters