+ All Categories
Home > Documents > Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Date post: 11-Jan-2016
Category:
Upload: abraham-watkins
View: 214 times
Download: 0 times
Share this document with a friend
35
Toysmart: Key Concepts William J. Frey College of Business Administration UPRM
Transcript
Page 1: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Toysmart: Key Concepts

William J. FreyCollege of Business Administration

UPRM

Page 2: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Acknowledgment

• Much of this material is taken from a summary of intermediate moral concepts provided by Dr. Chuck Huff, St. Olaf College.

Page 3: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Intermediate Moral/Non-Moral Concepts in Toysmart

PrivacyPropertyDot.coms

Page 4: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

There are different kinds of privacy

• Accessibility Privacy– Access to your person– Camera

• Decision Privacy– Some decisions (certainly not all) are private– Roe vs Wade: government cannot interfere in your right to decide

whether or not to have an abortion

• Information Privacy– Control over information about the person– Genetic/Health

Page 5: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Privacy: Associated Concepts

• Normative vs. Natural– Whether you in fact have exclusive control over your

information (=natural)– Whether you ought to have exclusive control over your

information (=normative)

• Reasonable Expectation– Relationship between normative and natural privacy– If there is a reasonable expectation of privacy, then violating

this is prima facie wrong – Planning a crime in a phone booth; growing marijuana in

your house; as opposed to leaving your door open.• First two imply a reasonable expectation. But first was defensible

privacy, the second not.

Page 6: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Privacy Distinctions• Non-Public-Private Information

– Non-public: what happens in the privacy of your home

• Public-Private Information– What you buy at the supermarket is public, but we have some

expectation of privacy about it

• Why are we concerned about public private information?– Broadcasting picture of you across the internet?– Marketing specialists assembling publically available data about you

to develop a profile and target specific advertising toward you. (Data Mining)

• The computer instruments human action– Digitalizing your public private information allows it to be copied

(easily), disseminated (worldwide), and compiled (combined with other data)

Page 7: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Is Privacy a Right• Moral Right = an essential (to autonomy)

capacity of action others are obliged to recognize and respect.

• Legal Right– Privacy is legal right that is based on an agreement among

people. It can be revoked only when those people decide to change the terms of that agreement.

• Respect Based– Privacy is essential to recognizing and respecting the autonomy

of the individual. It is a capacity of action essential to the exercise of individual autonomy.

Page 8: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Privacy may not a right but still protected

• Property Model– Privacy is a transferable product. Commercial entitles want to treat information

you give them as a product with first sale rights. But they want to license that information to others

• Relational Model (See Triangle of Privacy)– Privacy is about a relation among individuals and information. X has control

over whether Y can access information about X. The nature the relationship between X and Y will determine what information they must share to establish or maintain that relationship

– Reformulate privacy “in context” by identifying the context(s) in which information flows, the key stakeholders and their roles in this context(s), and the norms that have traditionally regulated this flow

• Public Good– The consequential argument that privacy is a public good that should be

protected– Privacy implies control over sharing information. Sharing information both

builds trust and differentiates relationships.

Page 9: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Information is publicwhen directly relevant

to relation between A and B

A:Person with Information

B: Person Who

Wants Information

C: Information

InContext

Privacy TriangleWhen information is not

private. Relevance to social relations and

context is crucial

Page 10: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Relational Model• Triangle of Privacy – About a relation among individuals and information. – X has control over whether Y can access information about

X. – The nature the relationship between X and Y will

determine what information they must share to establish or maintain that relationship

• Privacy “in context” (Helen Nissenbaum)– Turns to STS description to understand privacy– Reformulate as conditions under which information flows

between different contexts– Examines how traditionally how that information flow is

regulated• What are the contexts• Who are the key stakeholders and what are their roles?• What norms traditionally regulated this flow

Page 11: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Property

With Emphasis on Intellectual Property, Its Legal Protections, and

“Propertizing” Information

Page 12: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Labor Theory of Property• John Locke. Second Treatise on Civil Government.

• Property is a natural extension of the body and the body is the paradigm of ownership– “1. A person has exclusive rights over, ‘owns,’ his own body and its labor.– 2. Land, in its natural state is unowned; that is, no one individual can rightfully claim

exclusive control of it.– 3. Therefore, when someone’s labor, which is owned, comes to be ‘mixed’ with land that

is unowned, the exclusive rights over his or her labor are transferred to the land. That person comes to own the land.”

• I own that with which I mix my labor. Or I own that which I transform through my labor or work. (I take a stretch of unoccupied land, clear it off, and plant corn. I tend the corn and when it ripens I am entitled to harvest and eat the food.)

• Center argument for labor theory of property quoted from Des Jardins, (1993) Environmental Ethics: An Introduction to Environmental Philosophy 1st Edition, Wadsworth, 36

Page 13: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Not everybody is happy with this• Rousseau: Discourse on the Origin of Inequality (Hackett edition, 60)

– “The first person who, having enclosed a plot of land, took it into his head to say this is mine and found people simple enough to believe him was the true founder of civil society.”

• He goes on to say…– “What crimes, wars, murders, what miseries and horrors would the human race

have been spared, had someone pulled up the stakes or filled in the ditch and cried out to his fellow men: ‘Do not listen to this imposter. You are lost if you forget that the fruits of the earth belong to all and the earth to on one!’”

• Rousseau doesn’t like property—it is not natural to humankind. But, as he emphasizes in this and other things, we can’t go back, we have to go forward.

• Or Proudhon: property = theft– What do you think this means?

Page 14: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Locke’s theory is criticized

• Problematic in many ways (Huff).– If we assume property, it helps us to understand our intuition

about it.– But this argument fails to establish property as a necessary

natural right.

• Consider Nozick’s argument:– When we mix our labor with X we could be said to own X

because we own our labor– But isn’t this also compatible with the position that we

dissipate our labor just as a drop of blue dye is dispersed, diluted, and lost when dropped in to the ocean?

Page 15: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Bundle “Theory” of Property

• Des Jardins characterizes property, not as a single right, but as a “bundle of associated rights.” These include the right to…– “possess, control, use, benefit from, dispose of, and exclude

others” from one’s property– This gets a bit tricky when the property in question is intellectual

property such as an idea or even music that has been digitalized on a CD.

• The bundle is assembled according to the context in question.– We possess DVDs. But this ownership is limited. There are limits

to how we can use them and how much we control them. (Can’t collect money for a public showing and can’t copy them.)

– Joseph Des Jardins. (1993) Environmental Ethics: An Introduction to Environmental Philosophy, 1st edition. Wadsworth: 37

Page 16: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Consequentialist Theory of Property

• Found in the U.S. Constitution

• Negative Argument: not protecting property results in undesirable consequences. (No incentive to invent and innovate)

• Positive Argument: protecting property results in desirable consequences (With incentives, talented individuals invent and innovate)

• Constitution seeks balance by protecting property to maximize positive consequences and minimize bad consequences.

• It protects intellectual property as…– Copyright– Patents– Trade Secrets

Page 17: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Social Role Theory of (Intellectual) Property

• Lessig, Benkler, and “Copy Left”

• Information wants to be shared.

• It is in the nature of information that it is shared.

• Control over sharing is essential as is provision for sharing

• Sharing leads to an “intellectual commons.”

Page 18: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Support from Jefferson• Thomas Jefferson

– If nature has made any one thing less susceptible than all others of exclusive property, it is the action of the thinking power called an idea, which an individual may exclusively possess as long as he keeps it to himself;

– but the moment it is divulged, it forces itself into the possession of every one, and the receiver cannot dispossess himself of it.

• Ideas are non-rivalrous. – He who receives an idea from me, receives instruction himself

without lessening mine; as he who lites his taper at mine, receives light without darkening me.

• Ideas are non-exclusive – when she [nature] made them, like fire, expansible over all space,

without lessening their density at any point, – and like the aire in which we breathe, move, and have our physical

being, incapable of confinement or exclusive appropriation. Inventions then cannot, in nature, be a subject of property. (Quoted by Lessig in Code, 132)

Page 19: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Unpacking Jefferson’s Metaphor• Intellectual Property is non-rivalrous

– My having an idea does not prevent you from having the same idea– Lighting your candle from my candle, extends the flame but does

not diminish mine.

• Intellectual property is non-excludable– Like the air it expands and cannot be contained in a limited,

controlled region.

• These two characteristics make intellectual property both essential to and useful for developing an intellectual commons– Intellectual commons = a repository of the collected ideas of our

culture and civilization– we all have access to these ideas which we use as raw material to

build new culture

Page 20: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Copyright, Patents, and Trade Secrets

Next three slides are quoted from "Glossary" Online Ethics Center for Engineering 1/31/2006 6:57:46 PM National Academy of Engineering

Accessed: Thursday, December 13, 2007 www.onlineethics.org/CMS/glossary.aspx”

Page 21: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Copyright

• Legal right (usually of the author or composer or publisher of a work) to the exclusive publication, production, sale, or distribution of some work for a specified period.

• What is protected by the copyright is the “expression,” not the idea.

• Notice that taking another’s idea without attribution may be plagiarism, so copyrights are not the equivalent of legal prohibition of plagiarism.– Most acts of plagiarism violate copyright but not all copyright

violations are plagiarisms. Copyright is the broader category.

Page 22: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Patent• (special, alienable, prima facie) legal right granted by the

government to use, or at least (in the cases where other patents that such use would infringe) to bar others from using a device, design, or type of plant that one has created.

• In the United States restriction s last for 17 years for useful devices, and 14 years for designs.

• Specific provisions of the U.S. patent law may soon change to bring it into conformity with the provisions of other technologically developed countries.

• To patent a device one must prove that it is useful, original,, and not obvious.

• Patents are subject to challenge in court and may be upheld or overturned.

Page 23: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Trade Secret• Device, method, or formula that gives one an

advantage over the competition, and which must therefore be kept secret if it is to be of special value

• It is legal to use reverse engineering to learn a competitor’s secret.

• “Know how” concerning research procedures may function as something like a trade secret.

Page 24: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

The Shrinking Intellectual Commons• There is a social value in having a common “space” where

information is shared.

• Unrestricted exercise of intellectual property rights may cause damage to the intellectual commons.– Extension of copyright terms prevents material from entering the

commons. (Turns off the tap)

• Commons = repository of ideas and source of creativity– We need it to continually “reinvent” our culture

• Extension of metaphor of mixing.– As with Locke, I mix my thought and work with existing content.– This value added builds new culture and transforms the existing

culture– But this source of creativity is stopped if we overly exercise the rights

of copyright, patent, and trade secrets

Page 25: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

The shrinking intellectual commons

• 1998 was a watershed year for the intellectual commons with the commercialization of the net, DMCA, SBCTA, the NET act, were all passed.

– Digital Millennium Copyright Act– Sonny Bono Copyright Term Extension Act

• The NSF turned domain naming over to ICANN (Internet Corporation for Assigned Names and Numbers)

Page 26: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Exchanging Information on the Internet

• What is needed, that is, is a machine-to-machine protocol for negotiating privacy protections. The user sets her preferences once—specifies how she would negotiate privacy and what she is willing to give up—and from that moment on, when she enters a site, the site and her machine negotiate. Only if the machines can agree will the site be able to obtain her personal data.

• The kernel to this architecture is a project sponsored by the World Wide Web Consortium. Dubbed P3P, the project’s aim is to facilitate an architecture within which users can express their preferences and negotiate the use of data about them.

• Quoted from Lessig, Code, 160 (Schwartz calls this “Cyber Jeeves”)

Page 27: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Can we develop an information market?

• Convert privacy (as control over self-generated information) into property

• Information Exchange Market– People who want information and are willing to pay for it– People who have information and are willing to sell it

• All of this can be handled through code– P3P, W3C, XML– Cyber Jeeves

• Paul M. Schwartz, “Beyond Lessig’s Code for Internet Privacy: Cyberspace Filters, Privacy-Control, and Fair Information Practices” Wisconsin Law Review 2000 Wis. L. Rev. 743

Page 28: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Why information markets may not work

• Criticism of Privacy Market

– Information asymmetries (Blinking Twelve)– Collective action (leaves individuals out)– Bounded rationality (leaves out important

considerations)– Limits on exits (What if I don’t want to sell my

information and have no exit?)

• Constitutive view of privacy (Advocated by Schwartz)– Not control view

• Paul M. Schwartz, “Beyond Lessig’s Code for Internet Privacy: Cyberspace Filters, Privacy-Control, and Fair Information Practices” Wisconsin Law Review 2000 Wis. L. Rev. 743

Page 29: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Non-market Reasons for Privacy

• Intrusion upon one´s seclusion

• Public disclosure of private facts

• Publicity that places one in a false light before the public (Defamation—Biomatrix)

• Appropriation of one’s name or likeness without permission

• Paul M. Schwartz, “Beyond Lessig’s Code for Internet Privacy: Cyberspace Filters, Privacy-Control, and Fair Information Practices” Wisconsin Law Review 2000 Wis. L. Rev. 743

Page 30: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

IMC—Privacy

• FTPs (Fair Information Practices)– 1. The creation of defined obligations, often statutory in nature,

with respect to the use of personal information

– 2. the maintenance of processing systems that are understandable to the concerned individual

– 3. the assignment of limited procedural and substantive rights to the individual

– 4. the establishment of effective oversight of data use, whether through individual litigation (self-help), government and private scrutiny (external oversight), or some combination of these approaches.

• Paul M. Schwartz, “Beyond Lessig’s Code for Internet Privacy: Cyberspace Filters, Privacy-Control, and Fair Information Practices” Wisconsin Law Review 2000 Wis. L. Rev. 743

Page 31: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Privacy and Property Issues Raised in Toysmart

• Toysmart creditors wish to sell customer data base. – Does this violate their privacy?

• Toysmart customers shared PII only under strict privacy promises. – Do Toysmart promises pass over to the creditors after

bankruptcy?

• Is PII convertible into property?

• If so, who owns it? – The individual who generates it?– The individual who adds value to it? (The one who transforms it

into something useful and important.)

Page 32: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Pivots to the Present

Other Privacy and Property Cases

Page 33: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Recent Decision Concerning Facebook• http://www.npr.org/templates/story/story.php?storyId=133575667

– Associated Press story accessed through National Public Radio– See also Steve Greenhouse, “Company Accused of Firing Over

Facebook Post”, New York Times, February 8, 2010 http://www.nytimes.com/2010/11/09/business/09facebook.html?_r=1&scp=2&sq=Facebook+Connecticut+ambulance+company&st=nyt

• Employee fired for criticizing her boss on Facebook

• National Labor Relations Board successfully sues Connecticut ambulance company– Workers can discuss with co-workers issues such as wages,

hours, and working conditions– Compared to a conversation next to the water cooler– Is it a “concerted protected activity” (See Greenhouse article)

Page 34: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Related Privacy Cases

• Wire tapping phone booth used by mob figure

• Using infra-red detectors to determine if suspect is growing marijuana inside house

• Major corporation secretly installs cameras in bathrooms to find who is damaging them

• Facebook: Supervisor finds negative comments about him posted by employee in Facebook. Fires employee

• Carnivore: FBI tries to force OSPs to install packet filter to identify terrorists who are using Internet

Page 35: Toysmart: Key Concepts William J. Frey College of Business Administration UPRM.

Related Property Cases

• Disney works to extend copyright term limits yet makes use of fairy tales that are part of public domain

• Are aggressive RIAA measures to stop pirating CDs and DVDs justified?– Recently, choose universities, send students letter telling to

confess or face legal action

• Lawrence Lessig discusses Eric Eldred case in Free Culture– Eldred wanted to develop online library to post classical authors

and works– But Sony Bono Copyright Term Extension Act blocked this in the

case of poems by Robert Frost as well as others– Sued unsuccessfully to get permission to include these works in

library


Recommended