0% found this document useful (0 votes)
38 views26 pages

Networking

The document discusses various aspects of networking, including the rise of email and spam, the structure and utility of the World Wide Web, and ethical considerations surrounding censorship and pornography. It highlights the challenges posed by the Internet, such as identity theft, the spread of misinformation, and the implications of Internet addiction. Additionally, it examines the balance between freedom of expression and the need for regulation to protect users, particularly children.

Uploaded by

ojkbrown
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views26 pages

Networking

The document discusses various aspects of networking, including the rise of email and spam, the structure and utility of the World Wide Web, and ethical considerations surrounding censorship and pornography. It highlights the challenges posed by the Internet, such as identity theft, the spread of misinformation, and the implications of Internet addiction. Additionally, it examines the balance between freedom of expression and the need for regulation to protect users, particularly children.

Uploaded by

ojkbrown
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

NETWORKING

Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley


Chapter Overview (1/2)
• Introduction
• Email and spam
• Fighting spam
• World Wide Web
• Ethical perspectives on pornography

2
Chapter Overview (2/2)
• Censorship
• Freedom of expression
• Children and the Web
• Breaking trust on the Internet
• Internet addiction

3
Introduction
• Networking increases computer’s utility
– In addition to Word processing, Excel, …etc, you can share
printers, extra storage, exchange data, e-mail.

• Internet connects millions of computers


– Powerful computational resource
• E-mail, surfing www, promoting your company.
– Even more powerful communication medium

• Network utility grows as number of users squared


– 10 users → 90 sender-receiver combinations
– 100 users → 9900 sender-receiver combinations

• As people grows
– Network may suffer overload
– people may act irresponsibly 4
How Email Works
• Email: Messages embedded in files
transferred between computers
• Email address: Uniquely identifies
cyberspace mailbox (2-parts User….@ Domain....)
• Messages broken into packets
• Routers transfer packets from sender’s mail
server to receiver’s mail server

5
The Spam Epidemic (1/2)
• Spam: Unsolicited, bulk email
• Amount of email that is spam has increased
– 8% in 2001
– 40% in 2003
– 75% in 2007
– 90% in 2009
• Spam is effective (Cheap way for Ads. $500 - $2000)
– A company hires an internet marketing firm to send
thousands of emails
– More than 100 times cheaper than “Junk mail”
– Profitable even if only 1 in 100,000 buys product

6
The Spam Epidemic (2/2)
• How firms get email addresses
– Opt-in lists
– Dictionary attacks (made-up email addresses to ISP that bounce back)
• Spammers seek anonymity
– Change email and IP addresses to disguise sending
machine
– Hijack another insecure system as a spam launch pad
• Spam blockers
– Attempt to screen out spam (spam filters) by blocking
suspicious subject lines.
– Have led to more picture-based spam

7
Attributes of the Web
• It is decentralized
– No need for central authority
– BUT it becomes difficult to control the Web
• Every Web object has a unique address
– URL. Every Web page has a unique URL
• It is based on the Internet
– It needs browsers, media for storage, SW for
retrieving data, ftp, OSs…etc.

8
How We Use the Web
• Shopping
• Contributing content (wikis, blogs)
– A wiki is a website that allows the easy creation and editing of any number of interlinked web pages

via a web browser using a simplified markup language. Collaborative site – many authors
– Blogs are usually maintained by an individual with regular entries of commentary. Personal site (Ex:

online journal)

• Promoting business
• Learning
• Exploring our roots
• Entering virtual worlds
• Paying taxes
• Gambling
• Lots more!
9
Too Much Control or Too Little?
• Not everyone in the world has Internet
access
• Saudi Arabia: centralized control center
• People’s Republic of China: ISPs sign
“self-discipline” agreement
• Germany: Forbids access to neo-Nazi sites
• United States: Repeated efforts to limit
access of minors to pornography
– like child pornography
10
Pornography Is Immoral
• Kant
– Loved person an object of sexual appetite
– Sexual desire focuses on body, not complete person
– All sexual gratification outside marriage wrong

• Utilitarianism
– Pornography reduces dignity of human life
– Pornography increases crimes such as rape
– Pornography reduces sympathy for rape victims
– Pornography is like pollution
– Pornography industry diverts resources from more
socially redeeming activities

11
Adult Pornography Is Moral
• Utilitarianism
– Those who produce pornography make money
– Consumers of pornography derive physical
pleasure
– Pornography is a harmless outlet for exploring
sexual fantasies

12
Commentary
• Performing utilitarian calculus on pornography
is difficult
• How to quantify harms/benefits, such as harm
done to people who find pornography
offensive?
• How to deal with contradictory “facts” by
“experts?”
– Harmless outlet AGAINST more likely to commit rape

13
Direct Censorship
• Government monopolization
– TV and radio stations
• Prepublication review
– To monitor government secrets (Nuclear
weapons)
• Licensing and registration
– To control media with limited bandwidth.
(Freqencies)

14
Self-censorship
• Most common form of censorship
• Group decides for itself not to publish
• Reasons
– Avoid subsequent persecution (CNN in Iraq)
– Maintain good relations with government officials (if
the offend government they loose their official sources
of information)
• Ratings systems
– Movies, TVs, CDs, video games
– Not the Web (some may have warning– and ask for
agree to enter a site)

15
Challenges Posed by the Internet
• Many-to-many communication
– It is easy to close a radio station BUT difficult to do so for a
Web page (millions can post pages)
• Dynamic connections
– Millions of PCs are connected to internet yearly
• Huge numbers of Web sites
– No way to monitor them all.
• Extends beyond national borders, laws
• Can’t determine age of users
– an adult Web site can not confirm the age of a user

16
Ethical Perspectives on Censorship

• Kant opposed censorship


– Enlightenment thinker
– “Have courage to use your own reason”
• Think for yourself
• Mill opposed censorship
– No one is infallible
– Any opinion (not the majority opinion) may
contain a kernel of truth (a part of the whole
truth)

17
Mill’s Principle of Harm

“The only ground on which intervention


is justified is to prevent harm to others;
the individual’s own good is not a
sufficient condition.”

When individual’s act harms others


the government must intervene.

18
Freedom of Expression: History
• 18th century
– England and the colonies: No prior restraints
on publication
– People could be punished for sedition or libel
• American states adopted bills of rights
including freedom of expression
• Freedom of expression in 1st amendment
to U.S. Constitution addressed this issue.

19
Freedom of Expression
Not an Absolute Right
• 1st Amendment covers political and
nonpolitical speech
• Right to freedom of expression must be
balanced against the public good
• Various restrictions on freedom of
expression exist
– prohibition of cigarette advertising on TV

20
Children and the Web: Web Filters

• Web filter: software that prevents display of


certain Web pages
– May be installed on an individual PC
– ISP may provide service for customers
• Methodologies
– Maintain “black list” of objectionable sites
– Before downloading a page, examine content for
objectionable words/phrases
• Child Internet Protection Acts started to arise
21
Breaking trust on the Internet:
Identity Theft
• Identity theft: when a person uses another
person’s electronic identity
• More than 1 million Americans were
victims of identity theft in 2008 due to their
online activities
• Phishing: use of email or Web pages to
attempt to deceive people into revealing
personal information
22
Chat Room Predators
• Chat room: supports real-time discussions
among many people connected to network
• Instant messaging (IM) and chat rooms
(which is similar to IM) replacing telephone
for many people
• Some pedophiles meeting children through
chat rooms
• Police countering with “sting” operations
– Policemen enter chat rooms to lure pedophiles.

23
False Information

• Quality of Web-based information varies


widely
– Moon landings
– Holocaust
• Google attempts to reward quality
– Keeps a DB of 8 million web pages.
– Ranking Web pages uses “voting” algorithm
– If many links point to a page, Google search
engine ranks that page higher
24
Is Internet Addiction Real?
• Some liken compulsive computer use to
pathological gambling
• Traditional definition of addiction:
– Compulsive use of harmful substance or drug
– Knowledge of its long-term harm (misuse)
• Kimberly Young created test for Internet
addiction
– (8 questions on gambling on the Net)
– (5 “yes” ------- means addiction)
• Her test is controversial
25
Contributing Factors to Computer Addiction

• Social factors
– Peer groups
• Situational factors
– Stress
– Lack of social support and intimacy
– Limited opportunities for productive activity
• Individual factors
– Tendency to pursue activities to excess
– Lack of achievement
– Fear of failure
– Feeling of alienation

26

You might also like