'&$%CSE 303:Concepts and Tools for Software DevelopmentDan GrossmanSpring 2007Lecture 10— Societal Implications: Web-Site DataDan Grossman CSE303 Spring 2007, Lecture 10 1'&$%Why are we doing this?An educated computer-scientist should think about the broaderimplications of what they do.Conversely, people not trained in computer-science may not beequipped to make ethical / practical decisions about relevanttechnology.There are a million topics we could pick; we b data seems particularlyinteresting given “We b 2.0” (and Web 1.0).10% of your grade: a short paper on topic(s) we discuss; m oreinformation later.Dan Grossman CSE303 Spring 2007, Lecture 10 2'&$%The planI’ll share 5–10 minutes of thoughts, overview, examples, and questions.We’ll divide into groups of 5–8 for 20 m inutes.• Discuss questions of interest• Bring up new e xamples (preferred) or discuss existing ones• Pick a speaker to report back (1 minute)We’ll reconve ne for whole-class discussion• (1-minute presentations will guide us)Dan Grossman CSE303 Spring 2007, Lecture 10 3'&$%A file systemFor sake of comparison, c onsider attu.• You have file s and permissions on them. By default, nobodychecks for appropriateness.• You c an look at other people’s files, but you usually don’t.• The department (i.e., the government) owns the disk.• turnin lets you put whateve r you want in a place that “belongs”to the TAs.• Most actions are not logged; system actions are to diagnoseproblems and detect intrusions (simple example: last login)This worked pretty well for 30 years.The Web has 1e9 users instead of 1e3.Dan Grossman CSE303 Spring 2007, Lecture 10 4'&$%Simple (?) Questions• What data should be publicly available?• What should be stored about where users web-surf?• Who should be to blame when the wrong data / surf-historiesbecome known?Dan Grossman CSE303 Spring 2007, Lecture 10 5'&$%Data Content• Is it clear “who c ontrols” a web-site? Should it be ?• My homepage, but on a government site.• Search engines copy other possibly illegal (in what country?) sites.• YouTube, Facebook, Flickr, ... post strangers’ content.• What if gmail or Google Calendar “got hacked”?A universal dilem ma: replication increase s rec overy (backups) anddecreases security.Anachronistic laws? Is “who owns the hard-drive” the point? If not,then what is?Dan Grossman CSE303 Spring 2007, Lecture 10 6'&$%Surfing / Search-query privacy• Search for “drug rehab”, “domestic-violence s helter” or “how tomake a bomb”, “child pornography”• Jealous ex-S.O. snooping IM or parent snooping 8-year-old’s IM• Amazon s uggesting “similar products” or totalitarian regimefinding buyers of “banned books”• Search-query personalization (jaguar the car) or like a securitycamera (everything you se arch for)• Employers have right to ensure productivity and network-securityor employees have right to “close the door”.A universal dilem ma: data can improve user-experience, but oncecollected can be used for other purposes.Is there a “best answer” for all/most web-sites or networks? How cana user / site prote ct him/he r/itself?Dan Grossman CSE303 Spring 2007, Lecture 10 7'&$%Questions1. How res ponsible is the “e quipment owner” for content?2. Does a “big site” have greater obligations than a “small site”?3. What bounds should there be on “terms of service” for web sites?Should you read them?4. Do technical solutions (passwords, log-dele tion, ...) help or is this“just” a legal/ethical issue?5. How long should search logs be kept? Who should dec ide that?6. How m uch privacy would you give up for “something really cool”?7. What web-privacy ethical iss ues have gott en more complicated inthe last 5-ish ye ars?8. ...Dan Grossman CSE303 Spring 2007, Lecture 10
View Full Document