Presentation is loading. Please wait.

Presentation is loading. Please wait.

An Ethical Framework: Mechanisms For User-Enabled Choice and Normative Claims Marshall Conley, Christina Patterson, Carolyn Watters & Michael Shepherd.

Similar presentations


Presentation on theme: "An Ethical Framework: Mechanisms For User-Enabled Choice and Normative Claims Marshall Conley, Christina Patterson, Carolyn Watters & Michael Shepherd."— Presentation transcript:

1 An Ethical Framework: Mechanisms For User-Enabled Choice and Normative Claims Marshall Conley, Christina Patterson, Carolyn Watters & Michael Shepherd InfoEthics 2000 Paris November 13-15

2 Universal Declaration of Human Rights  UNESCO has human rights competence in a number of areas, including:  Article 19 of the Universal Declaration of Human Rights stresses the right to information, including freedom of opinion and expression  This right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers  Article 12 refers to arbitrary interference with privacy …

3 UNESCO and the Information Highway: The Balance Between Control and Access  The Web is increasingly important for the exchange of knowledge, information & experience  UNESCO's INFO-ethics Programme stresses the importance of universal access to information in the public domain

4 UNESCO’S INFO-ethics Programme Encourages international co-operation in promotion of:  the principles of equality, justice and mutual respect in the emerging Information Society  the identification of major ethical issues in the production, access, dissemination, preservation and use of information in the electronic environment  the provision of assistance to Member States in the formulation of strategies and policies on these issues

5 Ethical Frameworks and User-Enabled choice There are no unified authorities, only multiple stakeholders with complex and contradictory agendas  This decentralized participation results in the individual user adding new content and tools to the system as a whole  The unified operating authority is replaced by a contradictory, and even chaotic form of control  Structural and systemic elements, such as web-filtering systems, represent ‘acknowledged conditions’ to uphold freedom of expression through ‘choice mechanisms’

6 The Good, the Bad and the Illegal Like other communication technologies, the Internet carries a potentially harmful or illegal content and can be misused as a vehicle for criminal activities  However, there exist a number of different legal regimes at the national and international level to deal with this:  National security – instructions for bomb making, illegal drug production, etc  Protection of minors – violence, pornography, abusive forms of marketing  Protection of human dignity – incitement to racial hatred or racial discrimination

7 Ethical Considerations } normative orientation and public dialogue  Internet Service Providers (ISPs) have the option to provide users with the choice to control the content delivered to users over the Internet  Rather than retrieving items from the Web, filtering systems are used to selectively restrict access to materials on the Web

8 Control?  The deployment of content control should be a reflection of individual, community and social policies and preferences  We can use systems which ‘filter out’ Web sites or Web pages that contain material that is objectionable to a community of users  Two principles must be considered:  Communication Principle: The right of communications as a fundamental human right  Free Expression Principle

9 Codes of Conduct?  The important questions:  Whose strategy?  Whose choice?  During this time of process innovation, codes of conduct, the realities, significance, and consequences of barriers to access, whether publicly or privately created, must be explored

10 Mechanisms for Realization of these Policies  We feel that a combination of mechanisms is required:  Normative Codes of Conduct developed by UNESCO  Industry self-regulation  Facilitation of end-user choice through technology  Technology by itself is not the solution

11 A Caveat  By early July 2000 a new Internet model began to evolve – ‘peer-to-peer’  Peer-to-peer communications takes away the ISP as the middleman. This means that you and I can communicate directly as long as we both have IP addresses and know each other’s address  The importance is that government will not be able to impose filtering at the ISP level

12 The Problem: the Web  1 billion documents (April 2000)  Average query is 2 words (e.g., sara name)  Continual explosive growth  Balance global indexing and access and unintentional access to inappropriate material

13 What were we doing pre-Web?  Channel access  Deny access  Check for age

14 Internet opens new Channels  E-mail  ftp  telnet  List servers  Bulletin boards  Discussion groups  Chat rooms  Instant messaging  Web pages

15 Filtering label base Web doc URL lists keywords ratings URLs

16 What have we got to work with?

17 Page Filtering Application Types  Client-side: Special purpose browser applications  e.g., SurfMonkey  Server-side: Child friendly portals  e.g.,Yahoo, Lycos  Proxies  Black and white lists  Keyword profiles  Labels

18 Browser Application: www.surfmonkey.com

19 Server-Side: Public Portals

20 Sneaky!!

21 Proxy level (hidden)

22 Labels: Collaborative Filtering Search Engine Web Site Label Bureau A Label Bureau B Rating Service Labels Author Labels

23 What works well?

24 What’s the problem? Site Labels Trust Who does the labels? Are the labels authentic? Has the source document changed? Scale - A billion docs? Black and White lists Ditto Text analysis of page contents Poor results

25 Other Filtering Application Types  Authorized Access to Adult material  e.g., Australian plan  credit card proof of age  Anonymity protection  ZeroKnowledge  Non-Http Filters  Email, etc.  Activity Monitors  privacy

26 Authorization: What’s the point?

27 Protecting Anonymity

28 Recommendations Based on Current Technology  Technologies have to be used in combinations  Layer Cake Model –proposal for a rating system  Balkin, Noveck and Roosevelt. Filtering the Internet – A Best Practices Model

29 The Layer Cake Model

30 On-going Issues to be addressed  Freedom of Expression  Protection of Minors

31 Summary  A combination of mechanisms is required:  Normative Codes of Conduct developed by UNESCO  Industry self-regulation  Facilitation of end-user choice through technology  End-user must know what is being filtered, when it is being filtered, and why it is being filtered  Technology by itself is not the solution

32 More Info on Filtering  Industry Canada report  Content Filtering Technologies and Internet Service Providers: Enabling User Choice  http://strategis.ic.gc.ca/internet http://strategis.ic.gc.ca/internet  European Commission – Info. Society Website  http://www.ispo.cec.be/iap http://www.ispo.cec.be/iap  Web information filtering lab: http://www.cs.dal.ca/wiflhttp://www.cs.dal.ca/wifl  {shepherd | watters}@cs.dal.ca  Marshall.Conley@knowledgehouse.net

33 Filtering applies to E-Comm Balance of users right to privacy and business’s desire for access to market Building trust Guaranteeing digital content Building community values/profiles Building service layers on the web Restricting access Users rights to access/transparency of filters


Download ppt "An Ethical Framework: Mechanisms For User-Enabled Choice and Normative Claims Marshall Conley, Christina Patterson, Carolyn Watters & Michael Shepherd."

Similar presentations


Ads by Google