The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott –...
-
date post
15-Jan-2016 -
Category
Documents
-
view
221 -
download
0
Transcript of The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott –...
The Social Context of The Social Context of Computing Computing
Group 1Group 1
The Social Context of Computing The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computingKyle Lippencott – Introduction to the Social Implications of computing
Laura Thurber – Social Implications of Networked CommunicationsLaura Thurber – Social Implications of Networked Communications
Douglas Camin – Growth of, Control of and Access to the InternetDouglas Camin – Growth of, Control of and Access to the Internet
Christopher Conway – Gender related Issues of ComputingChristopher Conway – Gender related Issues of Computing
Matthew Dietz – International IssuesMatthew Dietz – International Issues
Robert Host – Computer CrimeRobert Host – Computer Crime
Social Implications of Social Implications of ComputingComputingBy: Kyle LippincottBy: Kyle Lippincott
Primary IssuesPrimary Issues
Interpersonal RelationsInterpersonal Relations Privacy and AnonymityPrivacy and Anonymity Segregation and StereotypingSegregation and Stereotyping Education and WorkEducation and Work ReliabilityReliability
Interpersonal RelationsInterpersonal Relations
Always-OnAlways-On Cell PhonesCell Phones EmailEmail Instant MessagingInstant Messaging
EfficientEfficient ImpersonalImpersonal
Privacy and AnonymityPrivacy and Anonymity
Data MiningData Mining Identifiable TrailsIdentifiable Trails
Cookies/HistoryCookies/History Email Inbox/Chat LogsEmail Inbox/Chat Logs
Unique Identifiers and Alternate IdentitiesUnique Identifiers and Alternate Identities Anonymizer ServicesAnonymizer Services Information/Identity TheftInformation/Identity Theft
Segregation and StereotypingSegregation and Stereotyping
Digital DivideDigital Divide StereotypingStereotyping
GenderGender RaceRace Social ClassSocial Class ElitismElitism CliquesCliques
Education and WorkEducation and Work
Computers in the ClassroomComputers in the Classroom Student AttentionStudent Attention Access ControlAccess Control
Changes in WorkflowChanges in Workflow Digital MeetingsDigital Meetings
ReliabilityReliability
Physical ReliabilityPhysical Reliability Always-OnAlways-On
Alwayson=!You.place.equals(bing);Alwayson=!You.place.equals(bing); UptimeUptime
Data IntegrityData Integrity Compromised DataCompromised Data Flawed ProgrammingFlawed Programming
Social Implications of Social Implications of Networked Networked
Communications Communications By: Laura ThurberBy: Laura Thurber
Social Implications of Networked Social Implications of Networked ComputingComputing
The everyday effect of networks on our livesThe everyday effect of networks on our lives BenefitsBenefits MisusesMisuses What values has society adopted from this What values has society adopted from this
widespread internet culture?widespread internet culture? The social impact of these networks has The social impact of these networks has
changed our lives to a degree probably changed our lives to a degree probably unimagined 10 or 15 years ago.unimagined 10 or 15 years ago.
Benefits of NetworksBenefits of Networks
What can networks do for the average user?What can networks do for the average user? -The normal stuff-The normal stuff
ChattingChatting EmailEmail Simple research, i.e. News, health, gamesSimple research, i.e. News, health, games
However...However...
There are other uses for a networkThere are other uses for a network The Center for Children and Technology and The Center for Children and Technology and
Lexington School for the DeafLexington School for the Deaf Using a network for basic communicationUsing a network for basic communication
Chatting to perform lessonsChatting to perform lessons Improve basic language skillsImprove basic language skills Dramatic improvement in communication and Dramatic improvement in communication and
understandingunderstanding Classes became much more fun!Classes became much more fun!
The ProblemsThe Problems
However, networks can also create problemsHowever, networks can also create problems Viruses, worms, trojansViruses, worms, trojans Scams and hoaxesScams and hoaxes
The Good Times “virus”The Good Times “virus” Threatened to erase all files on the computer, scare the dog, kill Threatened to erase all files on the computer, scare the dog, kill
the cat, overheat the stove, and turn off the freezer so that your the cat, overheat the stove, and turn off the freezer so that your ice cream goes all melty.ice cream goes all melty.
Physically impossible to executePhysically impossible to execute Nevertheless captured the imagination/attention of the nationNevertheless captured the imagination/attention of the nation Major companies shut down – AT&T, NASA, DoD, FCC, TIMajor companies shut down – AT&T, NASA, DoD, FCC, TI The effect it had on the populaceThe effect it had on the populace
The Overall ImpactThe Overall Impact
The level of integrationThe level of integration SchoolsSchools
Reports typed, online sources encouragedReports typed, online sources encouraged PharmaciesPharmacies
Records no longer accepted in hard copyRecords no longer accepted in hard copy Banks Banks
Moving away from passbook accountsMoving away from passbook accounts Business Offices, Newspapers, dental officesBusiness Offices, Newspapers, dental offices
Have we progressed to dependance?Have we progressed to dependance? Entire industries are spawned from our Entire industries are spawned from our
dependance on these machinesdependance on these machines Interaction accomplished online, rather than in Interaction accomplished online, rather than in
personperson Email, instant messaging and online shopping Email, instant messaging and online shopping
replace standing in line at the grocery storereplace standing in line at the grocery store Good or bad?Good or bad?
Implication: Technology has so changed our Implication: Technology has so changed our lives that it would be difficult to regress, even lives that it would be difficult to regress, even given an impetus to.given an impetus to.
Growth of, Control of Growth of, Control of and Access to the Internet and Access to the Internet
By: Douglass CaminBy: Douglass Camin
Humble Beginnings - 1969Humble Beginnings - 1969
ARPANet: precursor of ARPANet: precursor of today’s Internettoday’s Internet
4 Nodes: 4 Nodes: StanfordStanford UC Santa BarbaraUC Santa Barbara UCLAUCLA University of UtahUniversity of Utah
Sponsored by Sponsored by Department of DefenseDepartment of Defense
The Internet, circa 1969The Internet, circa 1969
Innovations – 1970’sInnovations – 1970’s
15 Nodes (1971) – 188 nodes (1979)15 Nodes (1971) – 188 nodes (1979) First e-mail program created (1971)First e-mail program created (1971) Telnet specification created (1972)Telnet specification created (1972) Ethernet proposal by Metcalfe (1973)Ethernet proposal by Metcalfe (1973) TCP Specification by Cerf and Kahn (1974)TCP Specification by Cerf and Kahn (1974) ARPA established the Internet Configuration Control ARPA established the Internet Configuration Control
Board (ICCB) (1979)Board (ICCB) (1979)
Years of Transition – 1980’sYears of Transition – 1980’s
213 Hosts (1981) – ~159,000 (1989)213 Hosts (1981) – ~159,000 (1989) Phrase “Internet” came to be popularPhrase “Internet” came to be popular DNS created (1984)DNS created (1984) NSF creates five “supercomputing” sites as backbone NSF creates five “supercomputing” sites as backbone
to handle growing load (1986):to handle growing load (1986): Princeton (NJ)Princeton (NJ) Pittsburgh (PA)Pittsburgh (PA) UC – San DiegoUC – San Diego Cornell (NY)Cornell (NY)
Number of new connections grows logarithmicallyNumber of new connections grows logarithmically
In the Mainstream – 1990’sIn the Mainstream – 1990’s
313,000 hosts (1990) – 56.2 million (1999)313,000 hosts (1990) – 56.2 million (1999) Original ARPANet removed from service and Original ARPANet removed from service and
transferred to NSF (1990)transferred to NSF (1990) First commercial dial-up Internet service: The World First commercial dial-up Internet service: The World
(1990)(1990) NSF increases backbone speed to T3 (44.736Mbps) NSF increases backbone speed to T3 (44.736Mbps)
(1991)(1991) World Wide Web protocols and software released by World Wide Web protocols and software released by
CERN (1991)CERN (1991)
In the Mainstream (cont) – 1990’sIn the Mainstream (cont) – 1990’s
Government agencies begin to have presence on the Government agencies begin to have presence on the Internet – White House, UN (1993)Internet – White House, UN (1993)
Web browsing becomes an immediate hit with the Web browsing becomes an immediate hit with the release of the Mosaic browser (1993)release of the Mosaic browser (1993)
Businesses begin to see Internet as a viable commerce Businesses begin to see Internet as a viable commerce tool. First web advertisements are served (1994)tool. First web advertisements are served (1994)
NSF turns support of backbone over to private NSF turns support of backbone over to private enterprise (1995)enterprise (1995)
Private commercial dial-up services such as America Private commercial dial-up services such as America Online and CompuServe connect users to the InternetOnline and CompuServe connect users to the Internet
In the Mainstream (cont) – 1990’sIn the Mainstream (cont) – 1990’s
MCI increases backbone speed from 155Mbps to MCI increases backbone speed from 155Mbps to 622Mbps (1996)622Mbps (1996)
DNS turned over to ICANN, a quasi-private enterpriseDNS turned over to ICANN, a quasi-private enterprise MCI increases backbone capacity again, to 2.5Gbps MCI increases backbone capacity again, to 2.5Gbps
(1999)(1999) ““Internet Mania” takes hold – shaky business plans Internet Mania” takes hold – shaky business plans
lead to rush of technology investment (1999)lead to rush of technology investment (1999)
New Millennium – 2000’sNew Millennium – 2000’s
Internet mania (or Internet bubble) ends – many Internet mania (or Internet bubble) ends – many online businesses fail (2000-2001)online businesses fail (2000-2001)
Connections of new users to Internet continues to Connections of new users to Internet continues to grow exponentiallygrow exponentially
Many other countries catching the United States in Many other countries catching the United States in terms of percentage of population accessing Internetterms of percentage of population accessing Internet
Security & ControlSecurity & Control
Early security concerns stemmed primarily from intruder Early security concerns stemmed primarily from intruder access (1970’s)access (1970’s)
As network grew, concerns changed to malicious code As network grew, concerns changed to malicious code and viruses (1980’s)and viruses (1980’s)
““Morris” worm spreads and shuts down most of Internet Morris” worm spreads and shuts down most of Internet (1988) – CERT created in response(1988) – CERT created in response
As Internet technology spreads into the mainstream, and As Internet technology spreads into the mainstream, and web pages become prevalent, who can view content web pages become prevalent, who can view content becomes most important (1990’s)becomes most important (1990’s)
Privacy and rights (copyrights) are large issues with Privacy and rights (copyrights) are large issues with advent of high-speed data connections to homes (2000’s)advent of high-speed data connections to homes (2000’s)
Security & ControlSecurity & Control
Some governments imposed more strict limits on users’ Some governments imposed more strict limits on users’ ability to access the Internet:ability to access the Internet: China – All users and service providers must first register with China – All users and service providers must first register with
the governmentthe government Germany – Asked service providers to block content the Germany – Asked service providers to block content the
government deemed offensive to it’s citizensgovernment deemed offensive to it’s citizens France – Asked Yahoo to block objectionable items from France – Asked Yahoo to block objectionable items from
online auction sites it felt violated decency laws.online auction sites it felt violated decency laws.
Sociological ImplicationsSociological Implications
Who has access to the Internet has become an Who has access to the Internet has become an important social issue recentlyimportant social issue recently
Many governments and private enterprises work hard Many governments and private enterprises work hard to provide internet access to poor, rural, or otherwise to provide internet access to poor, rural, or otherwise disadvantaged peopledisadvantaged people
Many social advocates believe the Internet will, over Many social advocates believe the Internet will, over the long term, help foster better communication and the long term, help foster better communication and interconnection between various societies in the worldinterconnection between various societies in the world
Gender Related Issues Gender Related Issues of Computingof ComputingBy: Christopher ConwayBy: Christopher Conway
Decrease in female ParticipationDecrease in female Participation
In 1986, 36% of bachelor degrees were given In 1986, 36% of bachelor degrees were given to females.to females.
In 1996, 27% of bachelor and master’s degrees In 1996, 27% of bachelor and master’s degrees were given to females.were given to females.
““Pipeline Shrinkage”Pipeline Shrinkage”
The process of a gradual decline in the The process of a gradual decline in the participation of women as they advance along participation of women as they advance along the academic pipeline.the academic pipeline.
3 major factors3 major factors Lack of self esteemLack of self esteem Gender DiscriminationGender Discrimination Balancing of a career and family ResponsibilitiesBalancing of a career and family Responsibilities
Self EsteemSelf Esteem
Study by American Association for the Study by American Association for the Advancement of Science Advancement of Science 30% vs. 15% questioned ability to do work30% vs. 15% questioned ability to do work 27% vs. 12% criticism hard to handle27% vs. 12% criticism hard to handle 30% vs. 57% confident in class30% vs. 57% confident in class 33% vs. 9% fear speaking33% vs. 9% fear speaking
Dealing with Success and FailureDealing with Success and Failure Lack of strategy vs. Lack of competenceLack of strategy vs. Lack of competence Reproductive strategy vs. Constructive strategyReproductive strategy vs. Constructive strategy
Gender DiscriminationGender Discrimination
Patronizing behaviorPatronizing behavior Male dominated preconceptionMale dominated preconception
““The early stereotyping of toys for boys and girls: The early stereotyping of toys for boys and girls: Transformers for boys and Barbie for girls.”Transformers for boys and Barbie for girls.”
Aggressive metaphors in softwareAggressive metaphors in software
Career vs. Family Career vs. Family
Tenure vs. Childbearing Tenure vs. Childbearing Effects males and femalesEffects males and females Possible SolutionsPossible Solutions
Quality childcareQuality childcare Increased amount of time to earn tenureIncreased amount of time to earn tenure
International IssuesInternational Issues
By: Matthew DietzBy: Matthew Dietz
Digital DivideDigital Divide
Separation of the Rich from the PoorSeparation of the Rich from the Poor Eastern Europe, monopolizing phone Eastern Europe, monopolizing phone
companiescompanies The Internet moves citizens to participate in The Internet moves citizens to participate in
SocietySociety ““Information Poverty”Information Poverty”
2001- less than 25% online lived outside of 2001- less than 25% online lived outside of U.S.U.S.
Non-Western CultureNon-Western Culture
IranIran Requires Internet users to sign waivers agreeing to Requires Internet users to sign waivers agreeing to
not access non-Islamic sitesnot access non-Islamic sites IsraelIsrael
Accepts the internet openlyAccepts the internet openly Uses internet as propaganda toolUses internet as propaganda tool
Middle East Peace ProcessMiddle East Peace Process
Security and PrivacySecurity and Privacy
Computer TerrorismComputer Terrorism NYC BlackoutNYC Blackout
Not caused by a computer, but takes almost nothing to Not caused by a computer, but takes almost nothing to cripple 2 million peoplecripple 2 million people
Raises concern over how easily terrorists could destroy Raises concern over how easily terrorists could destroy communications, banking, or morecommunications, banking, or more
SecuritySecurity IsraelIsrael
Head of Secret Service name revealed publicly in Head of Secret Service name revealed publicly in Washington PostWashington Post
Security and Privacy Cont…Security and Privacy Cont…
Ban on encryptionBan on encryption U.S. bans export of encryption strong than 40 bitU.S. bans export of encryption strong than 40 bit
International fears of secret information being cracked International fears of secret information being cracked using own productsusing own products
Causes other nations to question usefulness vs Causes other nations to question usefulness vs security concernssecurity concerns
Total dependence on computers, likely a weakness?Total dependence on computers, likely a weakness?
H1-B and L-1H1-B and L-1
VisasVisas Allow the import of foreign workers and Allow the import of foreign workers and
executivesexecutives Cheaper labor, often equally skilledCheaper labor, often equally skilled Workers often paid significantly lessWorkers often paid significantly less Factor in many developed nations, not just U.S.Factor in many developed nations, not just U.S. Some lose jobs, but others able to feed and clothe Some lose jobs, but others able to feed and clothe
familiesfamilies Raises many moral issuesRaises many moral issues 1999 – 40% of foreign visa workers to fill computer-1999 – 40% of foreign visa workers to fill computer-
related positionsrelated positions
OutsourcingOutsourcing
Act of sending workload of common practices Act of sending workload of common practices to other, often cheaper companiesto other, often cheaper companies India primary receiver of outsourced laborIndia primary receiver of outsourced labor Beneficial to some, detrimental to others.Beneficial to some, detrimental to others. IndiaIndia
Some make as little as $11,000/yrSome make as little as $11,000/yr Actually 22 times more than average salary in IndiaActually 22 times more than average salary in India
Outsourcing cont…Outsourcing cont…
Outsourcing cont…Outsourcing cont…
Issue of great controversyIssue of great controversy Is it fair to export work when there are job-less Is it fair to export work when there are job-less
domestically?domestically?
International IssuesInternational Issues
Computers have proven to be both good and Computers have proven to be both good and badbad Flow of information to new places every dayFlow of information to new places every day People can benefit from improved medical care, People can benefit from improved medical care,
education, etc.education, etc. Causes conflict in terms of what’s considered Causes conflict in terms of what’s considered
moralmoral Important part of the future of the world.Important part of the future of the world.
Computer CrimeComputer Crime
By: Robert HostBy: Robert Host
IntroductionIntroduction
Rise of the internetRise of the internet The Good:The Good:
New medium for communication and businessNew medium for communication and business The Bad:The Bad:
Identity TheftIdentity Theft Peer to Peer programsPeer to Peer programs
Identity TheftIdentity Theft
One of the fastest growing crimes in AmericaOne of the fastest growing crimes in America Methods:Methods:
““Shoulder Surfing”Shoulder Surfing” MailMail Email hoaxesEmail hoaxes
VictimsVictims ConsumersConsumers CompaniesCompanies
A brief comparison…A brief comparison…
Peer to PeerPeer to Peer
““Come and get it…FREE!”Come and get it…FREE!” Napster is made and people use it to swap Napster is made and people use it to swap
music files illegally.music files illegally. Recording Industry Association of America Recording Industry Association of America
(RIAA) to the rescue!(RIAA) to the rescue! Kazaa, Morpheus, BittorentKazaa, Morpheus, Bittorent US District Court rules in favor of P2P US District Court rules in favor of P2P
programsprograms Not totally illegal, some practical applicationsNot totally illegal, some practical applications