60
The Social Context of Computing Group 1

The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

  • View
    229

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

The Social Context of ComputingGroup 1

Page 2: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Introduction to the Social Implications of Computing

John Basias

Page 3: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

History of computing

The first fully functioning electronic digital computer was Colossus (1943)

'first generation' computers

weighed 30 tons and contained 18,000 electronic valves

Page 4: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Second generation Computing Transistor was invented in 1947

'Second Generation' and computers made their debut the late 1950s and early 1960s

still bulky and strictly the domain of Universities and governments

Page 5: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

'Third and Fourth Generation' computing the great leap foward

Jack St. Claire Kilby's invention of the integrated circuit or microchip in the 1950’s

1963 technology was integrated creating the first 3rd generation computers

Smaller more efficient were used by smaller businesses

Still unavailable or affordable at the individual level

Page 6: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

'Third and Fourth Generation' computing the great leap forward (cont.)

November 15th, 1971, Intel released the 4004, the world's first commercial microprocessor and the RAM chip

Dawn of the fourth and latest generation of computing

Page 7: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Effects Drive toward improvement and applicability

The creation of operating systems in the 1980’s that directly translated conceptual action into computer code

Cheap affordable computing became possible to a much larger audience

Revolutionized the job market restructured the inner operations of many businesses. Outdated a lot of technology.

The emergence of hacking and viruses as threats

Page 8: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

The Dawn of the Internet Origionally ARPANET started by the US Dept. of Defense for

research into networking sometime in 1969

Became an object of interest by the 1970’s to large companies and Universities

It wasn’t until 1980’s that technology advanced far enough for there to be any use of this network

DNS – 1984 replacing IP addressing

HTTP and was invented in 1989 by Tim Berners-Lee

Graphical interface and web browsers appeared in the early 1990’s

Page 9: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Effects

Great shift in social status and social boundaries over the net

individual have the liberty to exchange, view ideas and information anonymously

How do we define boundaries? Ethical and moral issues

Page 10: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Effects (cont.)

New Age of Hacking - everyone is at greater risk - viruses are potentially more destructive - spyware

Priavacy

Internet policing and enforcement and regulation of the netwok - the development of software and hardware to protect against hacking firewalls virus protection

Page 11: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Social Implications of Networked CommunicationsMatt Berger

Page 12: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Networked Communications

Take many forms.E-mail, message boards, IRC.

Primary advantage: convenience factor. Social Implications

Community, local and global.Social Skills.The future of computer-mediated

communication.

Page 13: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Community

Beneficial EffectsStudy has shown that networked communications

increase both local and global community involvement.

Not intuitive – would expect less local involvement.

Anonymity fosters a global community. Discrimination is now not a factor. Potential for this to spread into real life

interaction.

Page 14: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Community

Detrimental Effects Internet communities are not situated

anywhere. Creates a certain level of unease and

mistrust.Transition from group-based societies to

network-based societies. Internet communities contain a very

weak level of connectivity.

Page 15: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Social Skills

Advantages of AnonymityThe freedom a person has.

One can gain confidence in using an Internet persona.

Advantageous to normally anti-social people.

Easier for them to express their thoughts – could extend to real life interactions.

Page 16: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Social Skills

Disadvantages of AnonymityUndergoing an Internet persona to insult

others. Freedom of Internet communication

encourages this.Constant level of distrust.

Obstructs the possibility of developing healthy relationships.

Computer-mediated communication is simply a poor substitute for physical interaction.

Page 17: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Future of Networked Communications Advances under a matter of convenience. Should always be aware of the social

consequences.For instance – recent controversy of using

web logs as valid information sources. Ultimately, will never be a substitute for

standard person-to-person communication.

Page 18: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Growth of, Control of, and Access to the Internet

Luis M. Callejo

Page 19: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Growth of the Internet

Trends of Growth Adaption into

Society Growing Ethical

Considerations Cyber ethics

Growth of Applications

Website vs. Peer to Peer

Page 20: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Control of the Internet

Autonomous SystemPeeringBorder Gateway Protocol

Concerns about security

Page 21: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Access to the Internet

Access to Information Cyberethics

Presentation of InformationDirectoriesAutomation

Page 22: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Conclusion

What will determine the future of the Internet?Development of CyberethicsDemands on Architecture

Page 23: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Gender Related Issues of Computing

NickNick CavuotoCavuoto

Page 24: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

History of Women in History of Women in ComputingComputing Ada Byron Edith Clarke Grace Murray Hopper World War II opened the door

Page 25: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Traditionally

Math and Math and Technology = MenTechnology = Men

Humanities = Humanities = WomenWomen

Video Games also Video Games also are a factorare a factor

Page 26: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

At the Job

Stereotypes in the work place Sex appeal Corporations with women at the helm are

more successful

Page 27: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

What to do?

AWC (Association for Women in Computing)

Parents Teachers

Page 28: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

International Issue

Kefei Chen

Page 29: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Informational Technology (IT) and National Culture Comparing the different approaches for

managing IT between Japanese Culture and Western Culture.

Page 30: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Informational Technology (IT) and National Culture How do they decide what are their business needs?

strategic alignment vs. strategic instinct How will they know whether IT investments are worthwhile?

value for money vs. performance improvement When they are trying to improve a business process, how does

technology fit into their thinking? technology solutions vs. appropriate technology

How should IT users and IT specialists connect in their organization? IT user relations vs. organizational bonding

How can they design systems that improve organizational performance? system design vs. human design

Page 31: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

IT and Economy

IT consumers and IT producers in Asia

Page 32: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

IT and Economy Japan Model of IT Industrial

Development

Page 33: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Internet Users

Page 34: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Internet Users

Key factors that determine the use of information technologies on an international basis: IncomeCost of connection MonthlyEducation GenderAgeLanguage

Page 35: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Internet Users

Example: An African country: ZambiaReasons of low internet usage:

High Cost of the internet Low Computer Penetration Shortage of Trained Personnel Lack of Awareness of Information

Technology

Page 36: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Computer Crime

Hodan Egal

Page 37: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Computer Crime

Computer Crime is defined as any illegal act where special knowledge of computer is essential for its perpetration, investigation, or persecution.

Page 38: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Types of Attacks

Military and Intelligence attacks Business Attacks Financial Attacks Terrorist Attacks Grudge Attacks Fun Attacks

Page 39: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Military and Intelligence Attacks Computer store information ranging from the

positioning of Air Force satellites to plans for troop deployment throughout the world.

In June 1988, computer cracker Kevin Mitnick (code-named “Condor”) broke in remotely to a defense Department network. He allegedly stole a pre-release version of Digital Equipment Corporations VMS V5.0 operating system software and temporarily stored on a Navy computer at the Patuxent Naval Air Station.

Page 40: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Business Attacks

Business are increasingly the target of both competitors and the curious, although most business crimes are still committed by employees.e.g. In December 1987, apple found a virus in its electronic mail system. The virus succeeded in shutting down the system and erasing all Apple’s voice-mail.

Page 41: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Financial Attacks

Banks are always a tempting target for computer criminals.

e.g. Back 1998, seven criminals hatched a plot against the First National Bank of Chicago. The group used a wire transfer scheme to move &25.37 million belonging to Merrill Lynch and Co, $25 million belonging to United Airlines and $19.75 million belonging to the Brown-Forman Corporation to a New York bank and then to two separate banks in Vienna.

Page 42: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Terrorist Attacks

Even terrorist have gone high-tech. Terrorist were striking at thecomputer industry, but not for the firsttime

Page 43: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Grudge & Fun Attacks

Not all computers criminals areseeking information.Some simplywant to wreak damage anddestruction.At one extreme, computer crime canbe much more profitable than otherforms of fraud and terrorism.

Page 44: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Federal Approaches

This section explores the major federalstatutes, enforcement strategies andconstitutional issues regarding computerrelated crimes.

Federal Criminal Code Enforcement Strategies

Page 45: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Prevention of Computer CrimeThere are many approaches to protect

computer system from attack. Identifying Risks Physical Security Personal Security Communication Security Operations Security

Page 46: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Conclusion

Computer Crime will increasingly be a challenge faced by all industrialized nations.Solutions that rely solely on internationalcoordination to investigate and prosecutecomputer criminals will not work.

Page 47: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Computer Crime Prevention

Sean Egan

Page 48: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Preventing Computer Crime Use secure software Have a sane password policy Understand how computer crime works

Page 49: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Use Secure Software

Regardless of how safe you are, using insecure software puts you at risk

Don't use buggy softwareMicrosoft Windows/IE/Outlook/etc. suck

Even bug-free software is dangerous if poorly designedTelnet vs. SSH

Page 50: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Have a Sane Password Policy Passwords are often the only thing keeping

intruders out of your system Choose good passwords

Consider passphrases Handle with care

Change passwords oftenKeep passwords secret

Page 51: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Understand How Computer Crime Works Keep informed about software vulnerabilities

BugTraq mailing listOperating system announcementsAutomatic updates

HoneypotsUsed to safely monitor illicit activity in the

wildNot limited just to single computers

Page 52: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Conclusion

Be responsible computer users Make smart choices about software Exhibit responsible behavior about

password usage Educate yourself

Page 53: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Diversity in the Workplace

Philip Fong

Page 54: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Diversity

Acknowledging, understanding, accepting, valuing, and celebrating differences among people with respect to age, class, ethnicity, gender, physical and mental ability, race, sexual orientation, spiritual practice, and public assistance status

Page 55: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Affirmative Action

Established by Kennedy Administration Counteract racial discrimination “Reverse Discrimination” Now nearly obsolete

Page 56: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Glass Ceiling

Barrier that inhibits women and minorities from top-tier job positions

The result of conscious and unconscious stereotyping and discrimination

Page 57: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Gender Roles

Imposed by tradition and society Men – “Power suit, power tie, power

steering.” Women – 50 times more likely to stay at

home to take care of children

Page 58: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Age

Elderly employees are paid more with lucrative benefit packages

More expensive to keep in the work force Older employees are more educated –

important to country’s productivity growth

Page 59: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Diversity is the Future

Monochrome work force will not survive into the future

Diverse work force promotes creativity, productivity, and competitiveness

Diversity reinforces that employees are hired based on skill and talent, not on demographic differences

Page 60: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias

Diversity is the Future (cont.) Projected that women will eventually make

up 50% of the entire labor force 85% of new workers in 2005 include

women and minorities Human resource departments

– trained to manage diverse workplace– trained to hire the best talent