The Social Context of Computing Foundation Computing Never underestimate the power of human...

28
The Social Context The Social Context of Computing of Computing Foundation Computing Never underestimate the power of human stupidity.

Transcript of The Social Context of Computing Foundation Computing Never underestimate the power of human...

Page 1: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

The Social Context of The Social Context of ComputingComputing

Foundation Computing

Never underestimate the power of human stupidity.

Page 2: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

2 of 28

QuizWhat is the difference between the

internet and the world wide web?

Page 3: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

3 of 28

Quiz (2)Why do we need protocols for

communication between computers?

Page 4: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

4 of 28

Quiz (3)Name the protocol on which all internet

traffic is based.

Page 5: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

5 of 28

Quiz(4)Name the protocol that WWW clients and

servers use.

Page 6: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

6 of 28

Quiz (5)What does the DNS keep a list of

mappings of?

Page 7: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

7 of 28

Quiz (6)What is encryption, and why do we need

it?

Page 8: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

8 of 28

Ethics

What is morality? Informal rules for public interaction What conduct is “good” or “bad”

What is Ethics? Study of moral, social and legal issues Moral rules Social guidelines Law Cyber-ethics: relates to Internet Computer Ethics: general computer use

Page 9: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

9 of 28

Privacy versus Public Protection

People's privacy should be protected: Communications, emails Web sites visited Physical location

But what about: Terrorism and crime Paedophilia Employees misusing facilities Government special powers?

Page 10: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

10 of 28

CensorshipCensorship and the Internet

Pornography Protection of children Filtering of inappropriate Internet traffic - how? Freedom of speech/expression Defamation Criminal activity Internet crosses borders Who is responsible?

Page 11: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

11 of 28

Responsible Use of Information

Business may keep information but only use for intended purpose

Use personal information to deliver product?

Yes

Use personal information to advertise other products?

Maybe

Sell personal information to another business without permission?

No

Page 12: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

12 of 28

SafetySoftware and hardware creators responsible

for safety: Medical equipment Robots

Should they be liable for damages: Pentium Processor Therac-25 Machine Operating system crashes, vulnerabilities

Page 13: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

13 of 28

Computer Security & Privacy LawsPrivacy Act 1988 regulates:

Collection Retention Use Disclosure

Government Data-matching Sharing information between departments Use Tax File Number as key To prevent fraud

Page 14: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

14 of 28

Your Rights?Under the Freedom of Information

Act 1982 people have rights to: View information about themselves Consent to information use for other

purposes Correct erroneous information about

themselves

Secret databases not permitted

Page 15: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

15 of 28

SpamSpam (Unsolicited communications)

Sell (often illegal) items without permission Try to trick you into providing some personal

details, like banking information Deliver damaging software

SPAM Filtering can help, but the problem remains.

Spam examples

Page 16: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

16 of 28

Page 17: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

17 of 28

Page 18: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

18 of 28

Page 19: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

19 of 28

Page 20: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

20 of 28

Page 21: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

21 of 28

Page 22: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

22 of 28

Spam (2)Spam Act of 2003

Unsolicited email must not be sent Commercial emails must include who sent

them Ability to unsubscribe Address harvesting illegal

Page 23: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

23 of 28

Electronic TransactionsElectronic Transactions Act 1999:

Electronic transactions are legal Not allowed to impersonate Not responsible if someone impersonates you

Reality: Reasonably good privacy Slow uptake of authentication technologies There have been cases of identity theft…

Page 24: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

24 of 28

CopyrightWhy have copyright?

Financial rewards Protecting copyright owners Allowing sales

Illegal to copy information that carries a copyright, including: Software Music & Video Others (e-books, photos, web pages etc.)

C

Page 25: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

25 of 28

Copyright (2)

Music

Some say yes, others say it increases sales.

Does illegal sharing damage music industry?

No.Copy music from CD I own?Maybe.Copy legal music to CD?

Yes.Copy legal music to portable player?

No.Share music?If authorised, Yes.Buy and download music?

Page 26: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

26 of 28

Copyright Owners & VendorsCopyright owners are the creators such as

musicians, artists and authorsFor software companies, programmers

usually cede ownership to their employerCopyright vendors such as book

publishers, recording companies, etc. make most of the money!

Page 27: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

27 of 28

Intellectual Property

Patents are like copyright, protect rights of creators, but managed differently

Patents only apply to innovations, copyright applies to any written document, even a compilation

Patents retire after 10-20 years, depending on the type, & the national law

Page 28: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.

28 of 28

ConclusionsRapid technological change has

transformed business and many other aspects of our lives

Rapid change challenges ethical, privacy and legal issues

Laws will probably continue to trail behind the latest technological advances