You are on page 1of 5

Computer Security and Human Values Interact

Keith W. Miller
Dept. of Computer Science
University of Illinois at Springfield
Springfield, IL 62794

Abstract – Computer security is technically challenging; it facilitates discussions among students, faculty, and outside
is also an area with ethical, legal, and sociological experts. Valuable (and relatively scarce) classroom time can
implications. When we teach computer security (as well as be used almost exclusively on group oriented activities.
other technical content), we should provoke students to The author has used case studies in different courses,
think about the human values involved in making technical some exclusively for computer science majors, others for
decisions. This paper develops teaching ideas for two issues more general audiences. Both graduate and undergraduate
in computer security: WWW cookies and public access to students were involved in these classes. The two case
government databases. studies presented in this paper were used in a class that
included graduates and undergraduates from many different
INTRODUCTION majors, some of them computer science.
Although the author is not aware of any formal survey
As computing saturates our lives, computer security has of teaching methods in computer security ethics, textbooks
become a core concern. The economic, strategic, and on computer ethics often include case studies. (For example,
political consequences of security breaches are widely see [2] and [3].) There are collections of fictional computer
discussed. A less explored issue is the interaction of ethics cases (such as [4]) and non-fictional cases (such as
computer security and human values. In this paper we [5]). In addition to these print sources, there are many case
discuss this interaction, and examine how it can be studies available on-line; for an example of engineering
presented in an engineering classroom. ethics cases, see [6].
Technical decisions influence human lives; human For a scholarly discussion of the strengths and
values influence technical decisions. The fundamental weaknesses of case studies in teaching applied ethics, see
organization of digital communications reflects both of [7]. It is the author’s experience, supported by discussions
these principals. As computer security concerns are with other teachers of computer ethics, that the case study
discussed, and as these concerns motivate new policies and method is useful in illustrating how ethical theory applies to
technologies, it is important that we, as computer questions involving technology. Case studies seem to
professionals, as well as our students, consider the potential engage students in a way that lectures do not. Students
impact on people and what they hold dear. Privacy, mention class discussions about cases as their favorite part
convenience, cost, community, freedom of expression, and of the course.
economic factors are only a few of the facets that must be
considered both by our students and by all computer WEB COOKIES CASE
professionals.
In this paper we examine two computer security issues The World Wide Web delivers information from diverse
in some detail: security concerns about Web "cookies," and sources in a medium accessible to people who do not have a
the security of government databases. We will examine great deal of technical expertise. The point and click
each of these issues from three perspectives: using a interface and the availability of search engines has made
consequentialist criterion: the greatest good for the greatest reading the Web easy for most. Furthermore, making Web
number; using a deontological criterion: fulfill the most pages is simple enough for school-children (with a little
important duties; and using a Rawlsian negotiation: arguing help from a systems administrator) to share information
for a just solution, regardless of social position of the electronically with the world.
stakeholders. [1] A Web browser provides reading access to the Web. A
The presentation of these topics includes examples of browser is an applications package that executes Web
how engineering students can participate in an examination pages and allows options for users to set colors, send mail,
of the issues. It is convenient to use the Web for transfer files, play movies, and more. A browser engages in
distributing reading materials and encouraging students to a dialog with the server that owns the Web page being
find new sources on the topics. An electronic bulletin board accessed, and this dialog results in what the user perceives.
In the rest of this paper, we'll discuss Web readers requests notification (and permission). Thus, naive readers
(accessing Web pages or "sites"), Web writers (who author will get cookies and not know it. Cookies were used
Web pages and make them available via a server), and routinely by developers before their use was known
browser developers (who write the applications obtained by generally.
readers to access the Web). In the next three sections, we describe three approaches
When a browser reads Web pages, it must also write to thinking about cookies. The first section talks about
information to the reader's memory (both ram and maximizing the common good, the second discusses duties,
secondary). This writing is essentially invisible to a naive and the third describes a solution that might be a
user, but the technology is well known among computer compromise between the parties.
professionals. As the browser executes the commands of the
remote Web page, via the remote server, security questions THE GOODNESS OF COOKIES
about the user's machine arise. Might the browser do
something to the reader's machine that the reader doesn't Cookies are a Web innovation that lets servers (under the
want? Unwanted actions could be malicious (e.g., planting direction of Web writers) store information about readers on
a virus) or accidental (e.g., accidentally overwriting one of the reader’s hard drive. This allows writers to tailor their
the reader's data files). As Web pages become more and presentations to individual readers. Browsers enable the
more elaborate, they require more resources of the reader's storing and retrieving of the cookies for the servers. When
machine. Attempts to restrict the browser's access to readers get services they desire because of cookies, and
machine resources (as a security measure) conflict with the writers get information they want about readers, mutual
desire to enhance the browser's capabilities. good occurs. The browser developers reap good will from
The technical issues of Web browser security are both readers and writers.
intertwined with human values. Users want their browsers There are costs and vulnerabilities introduced by
to be efficient and secure; but they also want them to be cookies: cookies require machine resources of readers, extra
inexpensive and fully-featured. Legitimate Web page development costs for Web writers and browser developers.
authors want to create with a full palette of effects, and Since the cookies record information about Web sites a
therefore want the use of reader machine resources; they reader visits, there could be privacy concerns for readers.
also want their Web source documents to be easy to Finally, the default design of the browsers require that
produce, store, and transmit from their server. These cookies be either automatically accepted or individually
competing concerns require tradeoffs. examined, which requires inconvenience to reject them at
In this paper we will not dwell on technical and all. (There may be advanced methods for blocking cookies
economic issues of Web browser design and automatically, but this is not offered as a menu option in
implementation. Instead, we discuss some broad current browsers. [9]
considerations that will be involved in any discussion of Web writers have the option to use or not use cookies,
how competing interests can be reasonably argued. We and can make individual judgments about the costs and
identify three major stakeholders in these arguments: Web benefits to their enterprise. Many readers do not know
authors, Web readers, and browser authors. These groups about cookies at all, or they don’t realize there any options
overlap (are there any Web authors that aren't Web concerning them. Once faced with the decision to accept or
readers?), but this naming identifies distinct interests in our individually examine each cookie offered, they can make
discussion. To illustrate how this grouping can facilitate choices based on their weighing of the concerns of privacy,
discussions about browser security, consider the question of convenience, and machine resources. The most responsible
"cookies." moral agents are the browser producers. Acting as the
interface between readers and writers, the browser
WEB COOKIES developers gave explicit information to developers, but
chose not to emphasize reader choices. (For example, you
Web cookies are encoded information that go from an can't check off a box that says "Always reject cookies," and
accessed Web page, through the browser, to the hard drive the default is to silently accept them.) The goodness of
of the reader's machine. Each cookie has a limited size, and cookies is in benefits of their functionality; but their biggest
the browser mediates the reading and writing of these cost may be due to how they have been presented (or NOT
cookies by accessed Web sites. Cookies need not be presented) to Web readers.
comprehensible to the human reader. Cookies were
designed to let accessed Web sites store information about a DUTIES OF THE COOKIE BAKERS
reader for use in subsequent visits to that site. [8]
The two popular browsers store cookies without Browser developers have two sets of customers: Web
notification to the reader unless the reader specifically readers who obtain information from the browser, and Web
writers who obtain readers for their information. For the the browser developer; someone who dislikes cookies
benefit of both sets of customers the browser developers should play the reader; someone who likes cookies
should produce software that is reliable, efficient, should play the writer. After each of these players has
convenient, and well documented. Together, the developers established a position, ask them to keep their bias (for,
and writers should maintain the integrity of machines that against, or neutral) and switch roles, continuing the
download Web pages, and should respect the privacy of discussion. Alternatively, ask them to keep the same
Web readers. role but switch positions. (For example, a Web writer
might say "I don't want the bother of cookies, but the
In so far as cookies are restricted to well defined local competition is using them so I have to; ban the cookies
files, the integrity of the reader machines is not violated and simplify my development costs.")
(unless too many cookies fill up a disk). The fundamental
idea of cookies does introduce privacy concerns. Since 2. Have students research the history of Web cookies.
machine resources and privacy are both issues some (if not Then trace the motivations they can discern for each
most) readers care about, it would seem reasonable to give decision in that process. For example, why are they
readers an informed choice about whether or not to have called cookies? Who had the idea first? What
cookies put onto their machines. percentage of Web sites now offer cookies? Is there a
pattern of which sites offer cookies and which don't?
A CONFERENCE ABOUT COOKIES Have students share discoveries on a web site. Have the
web site offer the students a cookie.
Imagine a meeting of a Web reader, a Web writer, and a
browser developer. These representatives are meeting to 3. Have students imagine an analogy to cookies in other
decide about Web cookies. Imagine this meeting takes types of transactions in their lives. Technological
place before cookies are introduced into any browsers. convenience makes Web cookies a real issue, but if it
Using the same arguments in the previous sections, were convenient to keep track what you "visited" in a
writers and browser developers want to use cookies to newspaper, would that be a good idea? How about
enhance the capabilities of Web sites and to facilitate the when you watch television? What would be analogous
collection of information about how individuals use the to a cookie when you make a phone call? When you
browser and sites. used an automatic teller machine? Have students
The reader acknowledges that some sites (the reader's discuss their analogies in small groups, and have each
favorites) could give improved service with a system of small group report their favorite to the class.
cookies. But the reader insists that browsers give three
options during the installation of the browser: accept all A SECOND EXAMPLE: GOVERNMENT
cookies without interaction, reject all cookies without DATABASES
interaction, and ask for permission each time a cookie is
"offered." These choices should be available on the In the discussion above we described a distributed group of
configuration menu as well. The default option should be to shareholders with economic and communication ties to each
ask, since this option will demonstrate the extent to which other: readers (from all over), writers (from all over), and a
cookies are used, and will help readers make an informed few browser developers. In that situation, information gives
choice. The configuration menu should also include power, especially when some know the information and
information about the bytes allotted to each cookie and the some do not. In the next issue we look at a different kind of
maximum number of cookies that the browser can store at power distribution: the U.S. government and individual
any time. It is possible these desires could be met by citizens.
browser developers without doing undue harm to writers or Consider the information available in IRS databases.
the developers. We'll examine four stakeholders interested in the security of
this information: the IRS (and the government of which it is
CLASSROOM ACTIVITIES ABOUT COOKIES a part), the citizens as a whole, individual citizens, and
people who want to intrude on this information. Again,
The discussions above are examples of how someone might these groups may overlap.
think through the issue of Web cookies. Here are three to
encourage student participation. LOSSES AND GAINS IN SECURING IRS
INFORMATION
1. Role play the conference described above. The
instructor should recruit advocates from the class.
Someone who thinks cookies are harmless should play
The IRS must expend money to increase the security of its Citizens are expected to obey the law unless overriding
records, and this money comes from the citizens. Citizens moral concerns compel them to do otherwise, and there are
(both as a whole and as individuals) will pay higher taxes laws against database intrusion. Crackers who claim the
and perhaps receive slower service when security moral high ground as guardians against governmental
procedures are invoked. wrongdoing can validate that claim only by demonstrating
The IRS and its citizens could lose money if IRS their dedication to the common good. Recreational
records are tampered with. Intruders lose access if security cracking is not justified by governmental excess. Civil
measures are effective; the IRS database loses integrity if disobedience includes taking the (presumably unjust)
they are not. Intruders gain information and power when punishment until justice prevails.
they can circumvent security. The government retains
control when security succeeds. Citizens and the IRS gain When any government agency treats its citizens as
when they both share in the benefits of confidential records; merely means to its organizational goals, it violates its
citizens could gain if intrusions uncover dubious IRS reason for existence. When individual citizens disregard
practices that would otherwise go undetected. the rights of others, they violate their responsibilities to the
community. The intent of the IRS and the intent of hackers
WHOSE GREATER GOOD? become important in this analysis.

We focus on the good of citizens, both individually and A VERY IMAGINARY NEGOTIATION
collectively, in this analysis. We assume that the
government in general, and the IRS in particular, should It’s hard to imagine crackers, citizens, and the IRS
serve the common good of citizens. The integrity of the IRS negotiating a creative common approach to database
information is important to taxpayers. Individually, a security, but the mental exercise may bear fruit. The least
taxpayer does not want an error (or malicious tampering) to advantaged in this situation seem to be most citizens, who
increase her/his share of the tax burden. Collectively, are vulnerable to both IRS's organizational power, to the
taxpayers want fairness and sufficient revenues to maintain capricious (and perhaps malicious) whims of crackers, and
services. Furthermore, the benefit of privacy for sensitive the vagaries of data corrupted by neglect. Maximizing
financial information is enhanced by increased security. protection for the citizens would suggest increased security
If the IRS is perceived as a threat to citizens, intrusion and increased monitoring. Even recreational hackers might
could benefit citizens. Uncovering wrong-doing could help welcome this as a greater challenge. Perhaps all parties
correct problems with the IRS that it might be unwilling to could agree that the IRS submit to periodic outside auditing.
reveal otherwise. Security that defends a powerful agency
may be abused; defeating that security then becomes a good STUDENT EXERCISES ABOUT DATABASE
that supersedes the potential harms of intrusion. SECURITY
Weighing the goods and harms of IRS database security
depends heavily on one's belief in the relative benevolence 1. Have students find as much information about
of the IRS and crackers. Another consideration is how to themselves (or the professor) using publicly available
compare the costs of increased security on all citizens versus information. Have this information printed out with
the protection of perhaps a relatively few citizens who annotations about its accuracy.
would be affected by intrusions into the database.
2. Have students interview a data processing manager
RESPONSIBILITIES OF FINDERS AND KEEPERS who is responsible for data security, and seek out
specific costs incurred. (One such manager is the
The IRS collects information with the presumption that it systems manager of the campus Internet system, but
will be kept private, and must make a good faith effort to students should be encouraged to go outside the campus
protect the information. The IRS is pledged to fairness, and as well.) These interviews can be done via email or
this requires the integrity of the database. These duties talk. They should ask if the manager can be candid
would seem to supersede any responsibilities to be "user about any intrusions. If not, see if the policy of non-
friendly," if convenience would compromise security. If the disclosure is written. If the manager will tell you about
IRS as an organization knows or suspects that the data intrusions, ask about their impact. Enter the costs
include irregularities, it should not hide its deficiencies gathered by the students into a spreadsheet, and
behind security precautions, but should make public its publicize the results on the class Web page.
problems without compromising individual citizens'
privacy. 3. Discuss your own methods of securing the class's
grades during the semester. Have students comment on
a Web bulletin board possible methods of storing and 8) Cookies. http://www.cookiecentral.com/cookie.html
distributing grades during the semester. Include paper (March 28, 1997).
methods as well as electronic in the discussions.
9) Magic Cookies in Netscape/Internet Explorer.
4. Organize a debate between you and the rest of the class http://www.cookiecentral.com/magic.htm (March 28,
where you take the position the following position: 1997).
"Privacy is dead. All government information should be
public. Security is accomplished by keeping records off- 10) W. R. Collins and K. Miller. A paramedic method for
line, and having mirrored copies available, read only, computing professionals. Journal of Systems and
on the Internet." During the debate, one student at a Software (January, 1992), 47-84.
time stands at a podium, and you stand on another.
Anyone in the class can replace the student debating
against you until they are replaced. If things go well,
eventually students will decide they need to replace you
and argue your side more skillfully.

CONCLUSIONS

Computer science students, like other engineering students,


enjoy solving problems. The application of theoretical
concepts to challenging situations is commonplace to them.
By examining questions about human values in technical
decisions, and approaching these questions in a logical,
ordered fashion, we can help students grow into responsible
professionals. [10]

REFERENCES

1) D. Johnson and K. Miller. Ethical issues for computer


scientists and engineers. In The Computer Science and
Engineering Handbook, A. Tucker, Ed. CRC Press
(1997), 16-26.

2) D. Johnson. Computer Ethics, 2nd Edition. Prentice Hall


(1994).

3) S. Baase. A Gift of Fire: Social, Legal, and Ethical


Issues in Computing. Prentice Hall (1997).

4) R. Epstein. The Case of the Killer Robot. John Wiley


and Sons (1997).

5) K. Schellenberg, Ed. Computers in Society, 6th Edition.


Dushkin Publishing Group (1996).

6) Engineering Ethics Cases Section of the Ethics Center


for Engineering & Science.
http://www.mit.edu/ethics/www/engcases.html (April
1, 1997).

7) The Hastings Center. The Teaching of Ethics in Higher


Education. The Hastings Center (1980).

You might also like