Tweeting is a beautiful sound, but not in my backyard: Employer Rights and the ethical issues of a tweet free environment for business.

AUTHOR
Don Gotterbarn

ABSTRACT

The suburbs of the United States once welcomed Canada geese for providing a daily encounter with nature and as symbols of a protected environment. As their number increased so has their destruction of the environment; soil erosion from grass removal, pathogen carried by dropping, and aggressive behavior toward humans. Accordingly, the suburban attraction for these animals has changed to a desire to be rid of them or at least to significantly thin and control their ranks and diminish their negative effects on the environment. There are even websites dedicated to achieving these ends. (GoGeese.Com, GooseBusters, etc.). One of the problems is that these animals are protected by environmental law in the United States.

Effective communication is important to any business and business has encouraged computer communications until the quantity and kind of communication began to impact productivity. In response to this difficulty many corporations developed computer use policies. These policies were primarily focused on email and Internet usage while at work. These policies range from almost draconian restrictions which prohibit any email and Internet use in the work place to policies which encourage personal use of corporate computers during official breaks.

These policies were justified in a variety of ways including claims: that employees should not attend to personal tasks during working hours, not devoting salaried time to the company is a violation of your employment agreement, the organization owns the computers and what was on them and they should not be used for personal communications. Some of these claims have been upheld by court cases and have been used to justify inspection and restriction/censorship of employee email on the corporate machines. One problem with using laws to judge these standards is that technology moves faster than the law; there is a gap between the speed of technological development and changes in the law to help manage the technology. Law always lags behind and we still try to apply old doctrines to new technologies and social changes. Inappropriate employee communication was easily controlled both by employer computer use policy and mechanical restrictions on the computers.

Previous corporate computer use policies were about the use of computers at work and were based on at least two presumptions: the financial agreement between employer and employee and that the computers in question were corporate assets.

Improvements in technology (wireless communication, miniaturization, etc) and the change in our understanding of ways we communicate, generally referred to as ‘social media’, have caused many new and significant problems employers. These changes have contributed to blurring the lines between personal and corporate computer use. Our concepts are further muddied by employees bringing their own computers, in the form of smart phones and other devices, into the work place.

Both the technology and its usage patterns in social media require careful ethical evaluation. Among the problems are: a failure to see that the nature of the medium sometimes significantly distorts the messages, it is wrong to transmit from some locations, the equation of degree of repetition with truth, the failure to understand the impact of messages beyond its video screen representation, and career impacts of widespread digital information.

The technological changes have facilitated radical changes in the acceptable use patterns of technology outside of the work place. Individuals are now almost in continuous contact through social media.

For the individual the new standard of the social media raise some ethical tensions. You are valued by the number of tweets and followers of your every tweet. The new technology has increased your audience; instead of gossip being one on one conversation you can now gossip with a bull horn. Your worth is calculated in the number of ‘friends on your page’ and the more people who listen to you or the higher the number of hits you have the greater your currency. Your importance in social media is not determined by credentials, licenses, or experience but by popularity.

Oddly this generates a tension between your ‘value’ – tweet count or number of friends versus the ‘veracity’ of what is said. Problems with the accuracy and impact of tweets are beginning to be recognized. The new media requires and is developing standards to evaluate the content versus the number of times it has been repeated. There are web sites and standards developed by journalist to help substantiate the content of tweets. The Canadian Association of Journalists has tweeting guidelines. There are recommendations for what and how to re-tweet.

Many people now use Twitter’s 140 characters messaging without thinking how shortening the message may cause the loss of significant information as when the words “is indicated” were deleted from a re-tweet about the occurrence of a second Icelandic volcano. The instantaneous exponential repetition of this tweet added to its credibility and caused a panic.

Sometimes it is inappropriate to tweet from certain locations like a war zones. During the attacks in Mumbai, Twitter was so effective in providing up to date information that there was a concern that the tweeting would reveal critical information to the terrorists.

Unlike the effects of a single Canada goose a human twit can be re-tweeted exponentially increasing its impact, be it negative or positive. A significant repetition increases the credibility of a claim. The original April Fool’s day joke about President Obama’s birth location had the date removed thus significantly changing its information content and was re-circulated. It near infinite recirculation added so much to its credibility that significant numbers of people still believe that he was not born in the USA. No hard evidence like a birth certificate has been strong enough to sway their belief in the repeated message.

Digital dirt can derail an individual’s career. Ninety percent of search firm recruiters look online to find anything that helps draw a complete picture of a job candidate http://www.huffingtonpost.com/robyn-greenspan/dont-let-digital-dirt-der_b_780643.html . The digital information may indicate ethics violations, falsified qualifications, felony convictions and sexual harassment complaints, among other things. Due to the increased comfort with information-sharing and living openly online much of this information is posted by the job candidate. “The challenge to professionals is twofold: create a positive identity and suppress a negative one. In 2010, if there are no Internet references to your success and history of accomplishments, you don’t exist.” http://www.allword-news.co.uk/2010/11/09/dont-let-digital-dirt-derail-your-career/ . It is important to develop and protect your personal image brand.

Just as there is a gap between the speed of technological development and changes in the law to help manage the technology, employers are also in catch up mode with technology. Corporations, like the law lag behind technology and social changes.

Corporation’s computer use policies are inadequate and inappropriate for social media. The basis for managing working time now has to include reference to usage of personal computing devices in the work place, corporate brand and image protection, but this must be done without introducing any new ethical problems.

Some problems arise in part because when individuals use social media there is a blurring of the distinction between public information and private information and between work information and personal information. Notes on LinkedIn, MySpace and Facebook are a blend of private and public information. The major importance for individuals on Facebook is their Personal brand that must be maintained. People talk about what it is that they do but not who it is they work for. Sometimes the media will be used to attack particular employers. For instance there is a claim that Wal-Mart “bullies disabled greeters” on WarmartSucks.org. These attacks on employers can be intensive from multiple directions: web pages, Twitter, Facebook and MySpace accounts.

Business must be concerned with their public image, their brand. Social media is a powerful tool to promote a company, attract new customers and recruit the best talent. As digital dirt can derail a person’s career, it can destroy a company. Employers are being attacked on social media. In order to stay in business it is important for them to protect their brand from being tarnished by a pile of tweets and to keep their corporate image clean. Unfortunately if a brand is tarnished by a flock of tweets, no matter what evidence is provided it will be difficult to fix because social media has shifted trust away from institutions. It is hard to clear a company name.

Employer’s computer use policies need to address new problems generated by social media while minimizing ethical problems. They need to establish internal work related controls for social media to re-focus their employees as they attempted to refocus them with computer use policies. They need to address new issues the technology raises for industrial espionage from within the company. They also need to re-address the way in which employs represent the company and comment on the company on social media when not at work. One of the underlying problems with such policies is that when you place restrictions on the kind of things they can say you also make it difficult for them to be an asset to your brand. There is a need to balance the positive and negative effects of the policy.

Recent attempts to develop such policies have been problematic in a number of ways. Employers want to get the benefits of collaboration but users of social media don’t really draw the lines around the corporation. Corporate social policy needs to address this tension.

In 2010 a company, AMRC, fired an employee who had made untoward remarks about her manager on Facebook. AMRC had a policy which stated that “Employees are prohibited from making disparaging, discriminatory or defamatory comments when discussing the Company or the employee’s superiors, co-workers and/or competitors. “ In the USA, the National Labor Relations Board brought suit for the employee against AMRC to see if this policy violated employee right and violated free speech standards. The National Labor Relations Board was concerned with employee rights and wrongful termination.

In an attempt to address the employers rights and wrongful harm by their employees, some of these polices for social media are examined; identifying some of their ethical problems and making suggestions and providing strategies to reduce those problems.

Countering Online Radicalisation

AUTHOR
Anne Gerdes, Ph.D.

ABSTRACT

In 2008 militant violent jihad web sites were shot down by international authorities, as part of the “war on terror” strategy. But fighting dedicated jihadist websites and forums is not sufficient in order to dam up for online radicalisation. As a consequence of the international banning strategy towards militant homepages, al-Qaeda and jihadist Internet Brigades have increased their presence on global social networking platforms, like YouTube and Facebook. Contrary to an ordinary Web forum, which grows into a mature community by passing through certain developmental stages in establishing critical mass of users and content; Facebook provides a full blown community of friends, in which new groups can easily launch their ideas and foster engagement among friends and related networks of friends. Apart from offering an easy set up framework for groups, Facebook also facilitates a new type of mass interpersonal persuasion, which might sustain radicalisation (Fogg, 2008). Likewise, YouTube provides an accessible platform, motivating participants to contribute by uploading videos or making comments.

Thus, the spread of jihad-promoting content continues, and more over, it now reaches a broader audience besides sworn followers (CTA: Center for Terror Analysis. The Danish Security Intelligence Service, 2010, p. 3), (Bermingham, Conway, McInerney, O’Hare & Smeaton, 2009). Furthermore, the banning-strategy of violent jihad Websites has advanced the transfer of the jihadist online movement, from static Web 1.0 use of the internet – which relay on one-way, typically top-down, communication, focusing on passive acquisition of information – into Web 2.0 use modes, characterized by participation via bottom-up activities and many-to-many communication, in which participants take part in the construction of vivid communities.

In a forthcoming book, Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices, edited by Dudley, Braman and Vincenti, I contribute with a chapter called: “Al-Qaeda on Web 2.0 – Radicalisation and Recruitment Strategies” (Gerdes, 2011). Here, I discuss the al-Qaeda Web and media strategy. A strategy, which makes them stand out from other extremist groups, who in most cases lack an overall approach towards branding and Web communication. Consequently, I illustrate the impact of the al-Qaeda media strategy, which enables al-Qaeda to set the agenda for online global jihadism and cultivate virtual communities of engaged jihobbyists (a term coined by Jarret Brachman: Brachman, 2008, p. 19). Thus, I mainly address issues of radicalisation and recruitment by emphasizing how strategic use of Web 2.0 tools scaffolds jihadist activities. In this paper, I set out to discuss prototypical strategies for fighting online jihadist radicalisation (in the form of top-down controlled strategies versus bottom-up user driven strategies). First, al-Qaeda as a global online social movement is described, stressing their professional media strategy, which enables al-Qaeda to enhance processes of self-radicalisation among young people with extremist attitudes. Within this context, I analyse different strategies for breaking the circle of radicalisation and introduce ethical reflections (Macintyre, 1999, 2000, Løgstrup, 1997, Benkler & Nissenbaum 2006) in order to discuss the potentials of these initiatives.

REFERENCES

Ansar Al-Mujahideen Network (2010). Retrieved August 16, 2010, from http://www.ansar1.info/

Anscombe, E. (1958). Modern Moral Philosophy. Philosophy vol. 33, 1-19.

Bermingham, A., Conway, M., McInerney, L., O’Hare, N. & Smeaton, A. F. (2009). Combining Social Network Analysis and Sentiment Analysis to Explore the Potential for Online Radicalisation. Retrieved August 16, 2010, from http://doras.dcu.ie/4554/

Brachman, J. (2008). Global Jihadism: Theory and Practice. Routledge Press.

Cool, S. & Glasser, S. B. (2005). Terrorists turn to the Web as a base of operation. Washington Post, 7 August, 2005.

Conway, M. & McInerney, L. (2008). Jihadi Video & Auto-Radicalisation: Evidence from an Exploratory YouTube Study. Retrieved August 16, 2010, from http://doras.dcu.ie/2253/

CTA: Center for Terror Analysis. The Danish Security Intelligence Service, 2010 (2010). Youtube.com og Facebook.com – de nye radikaliseringsværktøjer? PET, Center for Terroranalyse. Retrieved August 16, 2010, from http://www.pet.dk/upload/youtube_og_facebook_-_de_nye_radikaliseringsvaerktoejer.pdf.

Fogg, B.J. (2003). Persuasive Technology – Using Computers to Change What We Think and do. San Francisco: Morgan Kaufmann.

Fogg, B.J. (2008). Mass Interpersonal Persuasion: An Early View of a New Phenomenon. In H. O Kukkonen, P. Hasle, M.H.K. Segerståhl, P. Øhrstrøm (Eds.), Proceedings of the 3rd international conference on Persuasive Technology. Oulu, Finland. (pp. 23-35). Berlin: Springer-Verlag.

Foot, P. (1978). Virtues and Vices. In S. Darwall (ed.), Virtue Ethics. Oxford: Blackwell 2003.

Gerdes, A. (2011). Forthcoming: Al-Qaeda on Web 2.0 – Radicalisation and Recruitment Strategies. In: (ed.): A. Dudley, J. Braman, G. Vincenti, Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices. Hersey: IGI Global.

MI5 Security Service. (2010). Al Qaida’s Structure. Retrieved August 16, 2010, from https://www.mi5.gov.uk/output/al-qaidas-structure.html

O’Reilly, T. (2005). What is Web 2.0 Design patterns and business models for the next generation of software. Retrieved August 16, 2010, from http://oreilly.com/Web2/archive/what-is-web-20.html

Seib; P., H. (2008). The Al-Qaeda Media Machine. Military Review, May-June 2008, 74-80.

Shactman, N. (2008). Online Jihadists plan to invade Facebook. Retrieved August 16, 2010, from, http://current.com/1r3i84c

The Danish Counterterrorism Research Lab (2010). Retrieved August 16, 2010 from, http://www.ctrlab.dk/

Weingberg, L., Perliger, A. (2010). How Terrorist Groups End. CTC Sentinel, February 2010, vol. 3(2), 16-18.

THE UNTEACHABLE MOMENT

AUTHOR
William M. Fleischman

ABSTRACT

This paper is a reflection about my experiences of the past thirteen years teaching the course in computer ethics at Villanova University. If I say that this assignment, which was presented to me unexpectedly in the winter of 1998, has proved to be most challenging and rewarding of a long career, it is simply that the responsibility of teaching computer ethics has forced me to be a student on the same level as the young people who – when they display the beautiful good will and generosity of the young – have been my companions in thinking through and sorting out the questions we have encountered and addressed during this eventful period.

My observations here are neither abstract nor general. There is a particular topic to which they are immediately connected – the quite contemporary questions related to the use of robotic agents in warfare. At this historical moment, the use of such robotic weapons has an understandable attraction, especially for students who are technically inclined. Considering the set of advantages these robotic agents possess, the development of automated and, in some cases, autonomous weapons may seem an unavoidable imperative [Singer 2009, Arkin 2009]. Of course, critical consideration of the circumstances of their intended deployment reveals a complementary set of disadvantages that argue against indiscriminate use. [Singer 2009, Gotterbarn 2011] Certainly this is a subject that deserves analytical discussion in a setting in which aspiring hardware and software engineers consider and wrestle with the value choices they will face in professional assignments they undertake after graduation.

But there is a larger and, to my mind, more significant theme that has bearing on my students’ understanding of these issues. This theme has to do with the convergence between what my students conceive to be the nature and limitations of human intelligence, and what they conceive as possible through the simulation of human behavior by means of the techniques of artificial intelligence. Of course, this convergence does not originate with the views of students, nor is it confined only to those who are in the initial stages of their intellectual and professional development. It is a tendency of thought decried by Joseph Weizenbaum in his 1972 essay, “On the Impact of the Computer on Society,” and again in his book, “Computer Power and Human Reason,” [Weizenbaum 1972, 1976].

The issue at the heart of this convergence is the subject of a debate that has, for many years, occupied the attention of influential thinkers and practitioners in computer science. The fundamental question or assertion may be phrased in one of several variant forms. “Is the brain merely a ‘meat machine’?” “The human brain is just a network of 1011 neurons. We’re going to be able to build that soon.” Of course, this is a dream with deep roots in our culture – in literature as well as film. And it constitutes an attractive topic for uncritical treatment in the popular press. Thus, it has many avenues of entrée into the consciousness of young people who eventually gravitate to the study of science and technology.

The first section of this paper will comprise brief remarks about the general approach I take in teaching the course in computer ethics and a more detailed explanation of the unit in which we discuss questions related to the deployment of robotic agents in warfare. In the section that follows, I will take a step back to consider the larger context of the ambitious projects involving the application of artificial intelligence tin the simulation of human behavior. This is a question we explore in the ethics course through readings that begin with the public debate in which Weizenbaum engaged with the influential ideas of Herbert Simon and his followers [Simon, 1969]. This exploration takes us into the realm of “cyborgian” speculation and experiments [Moravec 1998, Warwick, 2000] inspired by Simon’s ideas. In particular, I wish to point out how these speculations and experiments feed the naïve expectation, “We’re going to be able to build this soon,” that many students bring to the topic. And they are at the root of those recurrent moments mentioned in title of this article, which I will illustrate with several examples provided by my students in the course of discussions concerning robotics, cyborgs, and machine simulation of human behavior.

In a sense, the essay, “On the Impact of the Computer on Society,” is the cornerstone of the course on computer ethics as I conceive it. It is a difficult essay for the students to penetrate, in part because of important elements of historical context that, for students born after the fall of the Berlin Wall (to lay down a convenient chronological marker) lie increasingly in the remote and inaccessible past. But it is also a difficult essay because its short form demands of Weizenbaum, the writer, a severe compression of the broad scope of the argument that Weizenbaum, the thinker, wishes to join with those who have asserted or who have internalized a mechanical conception of human history, culture, and intelligence. And finally it is difficult because there are very few instances in the education of my students in which a scientist speaks to them as loftily yet as bluntly as Weizenbaum does of the danger of losing the accumulated wealth of human culture, of undervaluing the full richness of human intelligence. Thus, I will discuss several strategies for unpacking and illustrating Weizenbaum’s argument in a manner that is meaningful to my students. These strategies underscore the exceptional, joyful, and unmechanical nature of human creativity, something against which the world of this moment mounts altogether too many deadening and discouraging counterexamples.

REFERENCES

Arkin, Ronald C. (2009), “Ethical Robots in Warfare,” IEEE Technology and Society Magazine, volume 28, no. 1.

Gotterbarn, Don (2010), “Autonomous Weapon’s Ethical Decisions; “I Am Sorry Dave; I Am Afraid I Cannot Do That.” Proceedings of ETHICOMP 2010, pp. 219-229.

Moravec, Hans (1998), “When Will Computer Hardware Match the Human Brain?” in Journal of Evolution and Technology, vol. 1, available online at http://www.transhumanist.com/volume1/moravec.htm, last accessed 6 February, 2011.

Simon, Herbert A., The Sciences of the Artificial, MIT Press, Cambridge, Massachusetts.

Singer, P. W. (2009), Wired for War, Penguin Press, New York.

Warwick, Kevin (2000), “Cyborg 1.0,” in Wired Magazine, Issue 8.02, February 2000, available at http://www.wired.com/wired/archive/8.02/warwick.html, last accessed 6 February, 2011.

Weizenbaum, Joseph (1972), “On the Impact of the Computer on Society: How Does One Insult a Machine?” Science, vol. 176, no. 4035, pp. 609-614.

Weizenbaum, Joseph (1976), Computer Power and Human Reason: From Judgment to Calculation, W. H. Freeman and Company, New York.

“Ghosty”: An Ethical Internet Resilience Device

AUTHOR
Catherine Flick, Penny Duquenoy and Matt Jones

ABSTRACT

“Ghosty” is a network-enabled monitoring device aimed at encouraging discussion in families about children’s internet use, and/or enabling children to better self-monitor their own internet use, in order to promote and reinforce positive internet use and resilience against online predators. It allows children or other household members to know what types of websites or networks are being visited or used, rather than specifics of particular websites or conversation details. The device can show internet access according to type delineation (such as “homework”, “social”, “email”), or by risk level by varying the colour shown by LEDs within a lamp. It is aimed at being an ethics-centred device, with the child’s privacy paramount in its design.

Online child protection approaches can be split into two parts: the first being prevention of crimes occurring and the second being the finding, arresting, and prosecuting of offenders. The former has traditionally relied on deterrence (from prosecutions), education of children as to their safety online, and monitoring and/or filtering devices for home and school networks. The latter relies on sophisticated software used by law enforcement for tracking paedophile behaviour, such as Peer Precision or the Isis Project, as well as traditional policing methods to identify potential abusers and distributors of child sexual abuse material online.

Although the latter approach is useful in apprehending paedophiles, an approach that helps children avoid child abuse situations in a proactive way is needed. To achieve this, we need methods and mechanisms for prevention of offences, most of which currently centre on supervision of children on the internet, such as parental education (which suggests that computers should be kept in a public part of the house, or that parents should supervise their children on the internet). Monitoring and filtering tools such as Net Nanny have also appeared, allowing parents to set limits on internet use, email them on keywords used during a child’s internet session, or block certain websites or services.

The problems with traditional monitoring and filtering devices are numerous, particularly from an ethical perspective:

  • They can cause distrust in family relationships, when a child rebels against such filtering or monitoring systems;
  • They can trigger false positives and block innocent content;
  • They can lull parents (and children) into a false sense of security about online safety;
  • They can impinge on the privacy of the child, by emailing a parent when a child uses a key word, for example, or simply allowing a parent to view all chat text; and
  • They can cause a child to become more secretive about their behaviour online, to name a few.

Social networking has also come into the spotlight in recent times, to the degree that the UK child protection agency CEOP (Child Exploitation and Online Protection) produced a Facebook “emergency button” application for children worried about others’ behaviour online. The “ClickCEOP” application allows children to report suspicious activity toward them on Facebook as well as learn about safe internet practices.

Recent research has come to light showing that many children are not at all vulnerable to online predators: these young people who are approached are, in this way, “resilient”, telling potential offenders to go away. However, there is a smaller group of young people, the “disinhibited”, who are often willing to interact with offenders and engage with them due to various reasons, such as negative self-esteem, parental problems, difficulties at school, loneliness, tendency to self-harm, or familial sexual abuse. They can, in some cases, use sexual names or actively seek sexual encounters with people online. These are ideal targets for paedophiles seeking relationships with children with the possibility for future contact offences(1).

Although parents might be concerned about their child’s safety online, they may consider the current monitoring software available to be too intrusive on their children’s privacy: instead of intense scrutiny provided by current monitoring software they may wish to engender a stronger trust relationship with their child by allowing the child to self-monitor for risk or the family to “keep an eye on” the lamp colours to have a general idea about what the child is doing in a way that is akin to knowing where a child may be playing but not necessarily what he or she is up to specifically.

More generally, we wish to enable more families to foster a sense of resilience in their children, particularly those who have the potential to become more resilient. Our project also aims to reinforce resilience amongst children who are already resilient, allowing for parents to loosely monitor their internet activity without knowing details, but using this knowledge to spur positive conversation and discussion amongst family members, or allowing children to self-monitor to gauge their level of risk. In this way the device aims to be an ethical monitoring tool used in a very specific way to enable resilience amongst children and allow for greater family bonds which could help prevent disinhibition.

REFERENCES

(1) Davidson, J. Understanding online offending behavior: Preliminary findings from the European Online Grooming Project. Online Child Protection: Future Technologies for Policing the Internet. London (2010) http://european-online-grooming-project.com/

Ethical Tensions of Online Child Protection

AUTHOR
Catherine Flick and Penny Duquenoy

ABSTRACT

Isis is a project with the aim of developing a set of ethical monitoring tools and frameworks to assist law enforcement agencies in policing Internet chat and file-sharing networks in order to protect children from abuse, particularly that of paedophile activity. The tools aim to automatically detect and identify files that depict child abuse, and the communities that distribute and collect these, and to also allow for identification of paedophile “grooming” behaviour in internet chat logs. The latter tool is planned for use on previously captured data by law enforcement (using official channels that are already in place for such data collection) and aimed at simplifying and reducing the workload for tasks currently performed manually by law enforcement agents. It will not be deployed “in the wild”.

With such a sensitive issue as child sexual abuse, it is particularly important for the designers and developers involved to be aware of their responsibilities to society. Thus it is important that the Isis project is developed in a socially accountable and ethical way, with definite boundaries on use, ethical development procedures, stakeholder input, and ethical review. This paper forms part of the ethical assessment of the Isis project.

The Isis project has been presented to several focus group workshops and ethics interest groups for reflection and input on the outcomes and processes of the project from an ethical perspective. It might be assumed that such groups would applaud a project aimed at the protection of children, reducing exposure of law enforcement agents to potentially troubling material, and more efficient processing of data in order for timely interventions. It has instead been met with varying degrees of rejection. In many of these groups, the question of whether the Isis project is needed at all was brought up, citing the severely problematic ethical side effects or dual uses of the technology behind Isis as compelling arguments for such technological developments to not be developed, and asking whether the problem of online child abuse was enough to warrant such a technological response. In this paper, we seek to address this question from an impartial standpoint: is there a significant problem with online child abuse? If so, what sorts of ethical responses are possible?

With the growth of the Internet in recent years has come a shift in the way society operates. Increasing amounts of our time is spent online, and we are now at the point where current generations of children have not known life “without the Internet”. With this growth and increasing ubiquity of the Internet has come a massive increase in the use of social networking and other social interaction tools, such as chat and file-sharing. The Internet has also enabled people with similar interests to connect with each other easily, share information, and chat about their particular interests, where in the physical world it might be difficult to arrange similar sorts of meetings. Although these sorts of groups are, in the majority, innocuous, social networking sites, chat channels, and file sharing networks have also become domains in which child sex offenders can operate in relative anonymity, sharing images of child sexual abuse, or grooming and exploiting children. Historically, child sexual abuse is not a new phenomenon. In more recent times, yet before the Internet was in popular use, child sexual abuse images and movies (often termed “child pornography”) were available, although it required a large effort to obtain and keep such material (finding a distributor, physical storage, etc.) (Taylor & Quayle, 2003). Thus it was mostly left to those who already had a significant sexual interest in children. However, with the increase in computer use, and the ability for people with diverse interests to easily share them online, crimes involving sexual exploitation of children have also increased. Online resources and tools allow for “predatory offenders to electronically creep into the bedrooms of our nation’s youth, where they engage in sexually explicit “chat”, “cybervoyerism”, and “cyberexhibitionism”” (Bourke & Hernandez, 2009).

Given the sensitive nature of this topic, there are large gaps in our knowledge when it comes to the perpetrators and victims of these sorts of crimes (Quayle, 2009). Amidst claims of moral panics, hysteria and media overreaction, there is an all-too-real problem, but this is often lost in the response. It is even, in some ways, somewhat unfashionable to be working for stronger child protection, since “in the present climate, few people would openly acknowledge this”, but “whilst the numbers involved are unknown, sexual interest in children is much more widespread than we might imagine” (Taylor & Quayle, 2003, p. 198).

In this paper, we will establish the background to the questions being asked by looking at the sensitive issues of child pornography and paedophile grooming behaviour, as researched by academics working in the field, to determine whether there is a problem that needs a response. This step allows us to identify the issues from an academic research perspective and to distinguish them from any sort of media reports or “moral panic”. We will then look at the implications of these findings for the Isis project, and discuss its place within such a socially and politically volatile and emotive area.

REFERENCES

Bourke, M. L., & Hernandez, A. E. (2009). The ‘Butner Study’ Redux: A Report of the Incidence of Hands-on Child Victimization by Child Pornography Offenders. J Fam Viol , 24, 183-191.

Quayle, E. (2009). Abuse images of children: identifying gaps in our knowledge. G8 Symposium: Examining the relationship between online and offline offenses and preventing the sexual exploitation of children. UNC Chapel Hill.

Taylor, M., & Quayle, E. (2003). Child Pornography: An Internet Crime. New York: Routledge.

Raising the Standard of Living in Underdeveloped Countries. Can Technology Help?

AUTHOR
Matthew Edwards

ABSTRACT

1. Introduction

This paper is a follow up from Ethicomp 2010 which proposed that there is a core curriculum in technology education, and that industry could find a place within the public school system. This article will pursue an actual tie between industry interests and a State run university in the US. It is poised to have a positive worldwide effect.

There are arguments in education that address whether or not technology in the classroom is a help or a hindrance. For example, using a calculator for math computation in the classroom speeds up a student’s ability to quickly complete rigorous tasks and calculations, yet some argue this creates an unhealthy dependency on technology that will potentially damage the learning process.

From an industry perspective, technology allows those with basic skill sets the ability to accomplish complex tasks. For example, a person can run a cash register with complex transactions using credit cards, cash, or checks, and the cashier may actually have poor computation skills. They can do these tasks with amazing accuracy…most of the time, and as long as the power is up and going.

Using the basic concept that technology can be used to bring individuals to higher performance levels than would otherwise be possible, I will pursue the idea that the economy of underdeveloped countries can be changed for the better by introducing technologies that give illiterate populations the ability to perform tasks that have been heretofore out of their reach.

2. Background

I work as a professor at a university in the western United States. In the summer of 2010 I had an opportunity to pursue answers to an intriguing problem. The problem is the ever present state of poverty and lack of safe and energy efficient housing in underdeveloped countries. I felt that somewhere between modern technology and hard work lie answers to this perplexing dilemma.

I designed an inexpensive, fireproof, hurricane proof, and earthquake resistant residential structure and building system using modern technology, and discovered that I could simplify complex tasks using computer modeling, 3-D printing, and color-coded building plans, to deliver a visual training system that can be understood by illiterate populations.

By creating new innovations that allow the end user to participate without the extensive knowledge base that was once necessary, much of the world’s populations can now take active roles in stimulating the economy of their country. In many of the sub-Saharan countries of Africa the average daily wage of a laborer is less than 3 US dollars. Presently, an illiterate worker only completes tasks that are simple and of no profound effect; digging ditches, carrying materials, and in essence, doing only those tasks that would otherwise be done by basic machinery accept for the monetary savings had by using what is paramount to slave labor.

3. Project and Method

Using students from our CAD/CAM 3-D design department, and pulling a small team of professors including myself, one professor from CAD/CAM, and one from our CIS department, it became apparent that modern technology not only provided design tools, but also created a visual learning environment for the end user in the building industry.

Using university faculty, students, and a couple of individuals from industry, the formula and idea to utilize this new building process to help underdeveloped countries became more focused.

My methodology will focus on utilizing educational studies about adult illiteracy, economic statistics from underdeveloped regions around the world, but especially related to Native Americans in the United States. This phase of the data collection is based on both primary and secondary data which includes high school dropout rates, suicides rates, and the lack of economic development and societal segregation. I will also include research that pursues questions, concerns, answers, and ethical dilemmas surrounding the potential use of modern technology in underdeveloped countries.

4. Current Results, and future potential

So far my findings indicate that we can take modern technological innovations and move those applications into the building industry, bringing the less qualified end user more fully into the equation. As we have witnessed, the building industry is a major player in the world economy. When this industry is not flourishing, thousands of connected industries suffer, and the economy likewise falters. In Africa, there are millions of educated people who live in squalid and filthy conditions because there is no infrastructure supporting a middle class building industry. There are many factors, such as the lack of financing that contributes to this condition. However, there is not a wide gap in living standards between this “middle class” educated society, and the illiterate poor.

Many of these governments have desires to provide housing for their civil servants, professors, and military personnel, but without an infrastructure that can handle such an extensive task, it is not economically feasible. Part of the infrastructure is human ability, and must come from within to be economically sustainable. The other part is an inexpensive system to build structures that will provide safety from natural disasters, and provide privacy and aesthetics that basic dignity requires.

Our building would provide a method to deliver social networking opportunities to underdeveloped countries by facilitating a “safe cyber café” of sorts. This structure provides a somewhat bullet proof environment that is inexpensive.

This paper will expose current world conditions in underdeveloped nations, and will explore how the appropriate use of modern technology may be the answer to turning the tide of poverty. This is a significant contribution in the ethical use of technology in construction management since few studies of this nature reflect this topic.