We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byGloria Spivey
Modified about 1 year ago
© Brian Whitworth 20021 Legitimate by Design Towards trusted social systems Reference: Whitworth, B. & de Moor, A. (2002). Legitimate by design: Towards trusted virtual community environments. Hawaii International Conference for the System Sciences, Hawaii. Organizational Systems and Technology – Community Informatics mini-track Web: www.cis.njit.edu/~bwhitworth
© Brian Whitworth 2002, firstname.lastname@example.org Traditional vs Social IS Traditional IS - tools –We use a spreadsheet Social IS - social environments –We exist within a chat room CMSS = Computer-Mediated Social Systems (mediate social interaction) Social-technical gap: social requirements vs technical performance
© Brian Whitworth 2002, email@example.com Social-Technical Gap Social-technical gap is the main problem of groupware today* Hardware System Software System Social System Support Support Social- Technical Gap *Ackerman, M.S., The intellectual challenge of CSCW: The gap between social requirements and technical feasibility. Human Computer Interaction, 2000,15: p179-203. SIS IS IT
© Brian Whitworth 2002, firstname.lastname@example.org Example Privacy: Social right to control the display of information about oneself –Privacy is a public good (Regan, 1995) Software Industry Attitude: –'You have zero privacy anyway.' Sun Microsystems' CEO Scot McNealy said last year. 'Get over it.' –PC magazine comment - “He's right on the facts, wrong on the attitude.“ Social requirement IS performance
© Brian Whitworth 2002, email@example.com Social Systems Elements are people who exchange meaning (cf nodes exchanging information) Aggregations are not social systems –Gold rush (physical environment) –Information rush (information environment) –Economic value is in the environment Social systems: –Generate social value (as social capital from social interaction) –Reduce social cost of interaction
© Brian Whitworth 2002, firstname.lastname@example.org Conflict - A Social Cost When people in a common environment, seek incompatible actions on the same object(s) there can be conflict Conflict is a social interaction cost Example: two cars at an intersection –Both proceed and crash - both lose (group loses) –One gives way - one wins, one loses (group wins) For groups/communities internal conflict is always a loss –“A group divided cannot stand”
© Brian Whitworth 2002, email@example.com Social Trust Trusted things behave as expected (i.e. low risk) Social environment trust - low risk of conflict with other people –We trust others on the road will behave as expected –Otherwise traffic would grind to a halt! Trust of the social environment derives from social meaning and is the key to community economic productivity
© Brian Whitworth 2002, firstname.lastname@example.org Legitimacy Social perception of what actions are “right” or “fair” in conflict situations –Includes: privacy, copyright, censorship, trespass, intellectual property, libel, etc –Resolve action conflicts by right not might Implemented by: –law, sanctions, police, judiciary, education, norms, ethics, barriers, signs.. Varies with culture/country, but is a basis for social trust (cf personal trust, or physical trust)
© Brian Whitworth 2002, email@example.com Law Law formally states legitimacy concepts –We use legitimacy concepts to make precedent decisions or interpret the law –Legality Legitimacy (a bad law) –ILLegitimacy ILLegality (if no law yet) –Laws without legitimacy inspire revolutions! Security => system is used as intended –Passwords to do things Legitimacy defines that intent –Who has what rights?
© Brian Whitworth 2002, firstname.lastname@example.org Example Concept: One has a natural right to the fruits of one’s labor by virtue of that labor (Locke, 1690) –Gardeners make effort to grow flowers –Other people pass by, and pick them –Gardeners no longer grow flowers, or come into conflict with Pickers –Social group loses as there are no flowers (for Gardeners or Pickers), or there is conflict A social system that implements legitimacy via laws reduces social risks, becomes trusted, and increases community productivity (Gardeners grow and trade flowers)
© Brian Whitworth 2002, email@example.com Creating social trust Common Environment Risk of Conflict Legitimacy Concepts Law, sanctions, judiciary, police Trusted Social System Stability & Prosperity
© Brian Whitworth 2002, firstname.lastname@example.org Virtual Physical –Therefore laws must be reinvented from base legitimacy concepts Virtual 2 Virtual 1 –New s/w creates new situations that also require new laws, e.g. cookies Virtual environments can be the law –Any “right” (good or bad) can be imposed or nullified by the software design (Lessig, 1999) –e.g. Anonymous interaction means no accountability Jurisdiction: Whose law is the law? Implementing Cyber-Law
© Brian Whitworth 2002, email@example.com Code is Law Traditional social methods of creating law are becoming –Often inapplicable (new situations) –Usually out of date (new software) –Easily bypassed (by software creators) Solution: Accommodate legitimacy requirements before the environment is created (as well as after) Legitimacy is now important in system design
© Brian Whitworth 2002, firstname.lastname@example.org Creating online trust Common Environment Action Conflict Legitimacy Concepts Law, sanctions, judiciary, police Trusted Virtual Social System Design/Develop Legitimate CMSS
© Brian Whitworth 2002, email@example.com Example - Luke vs Attila Attila, a kindly bulletin board controller, says an item added by Luke is offensive What can happen? What should happen? –Nothing - Luke can say anything he likes –Attila can delete the item forthwith –Attila can ban Luke from adding any items –Attila can refuse Luke entry to the BB –Attila can alter Luke’s name to “Bad-Luke” –Luke can rejoin as a new person and do it again –Attila can delete Luke and all his items –Luke can start a “revolution” and usurp Attila What if this occurs in a sub-board controlled by Ghengis, who likes Luke’s item?
© Brian Whitworth 2002, firstname.lastname@example.org No Rules vs Dictatorship No Rules: –Everyone can view or delete Luke’s item –But if one person deletes it, the others have lost their right to view it! –“Might is right” becomes “first in first served” Dictatorship: –Attila has all rights to the item, Luke has none –History suggests this solution will not endure (because it seems unfair, i.e. is illegitimate)
© Brian Whitworth 2002, email@example.com IS Rights An IS right is an allowed action, by an actor, upon or with an information object, or any part of it Since an information system is fully defined,all rights must be defined –If ownership implies rights to IS actions (add, delete, edit, view, move etc) –then all changeable IS objects must be owned (by one or more people)
© Brian Whitworth 2002, firstname.lastname@example.org Creation & Delegation Axiomatic Right: The creator of an object initially owns it (by virtue of their effort of creation) Rights can be voluntarily transferred –Full transfer includes the right to transfer –Delegation of all rights except to transfer The delegatee cannot further delegate The delegator can take the right back Ownership Possession
© Brian Whitworth 2002, email@example.com Persona Persona - IS object representing a person Axiomatic Right: Only the person represented can own a persona –“Own” => rights to delete, view, change, etc –This right supercedes creation rights –“Freedom” is a legitimate social right in cyberspace –Slavery is not legitimate (e.g. the “virtual rape” by Mr Bungle)
© Brian Whitworth 2002, firstname.lastname@example.org Space Space - IS object that contains other objects –Every object must exist in a space (system environment is the first space) –Spaces can limit visibility and presence Creating an object in a space changes that space, so is an action upon the space –Axiomatic Right: The space owner (SO) has the original right to create objects in that space –SO can’t transfer the right to create Transfer would mean they no longer own the space –SO delegates the right to create (in whole or part) –SO delegate/transfers the right to enter a space
© Brian Whitworth 2002, email@example.com Attila vs Luke Who owns created items? –If Attila delegates creation rights, Luke owns the items he created Cannot both delegate and not delegate –Mailbox fallacy - that who owns the space (mailbox) owns the items in it (mail) Attila the bulletin board owner: –Cannot edit Luke’s submitted items –Cannot alter or delete Luke’s persona –Can withdraw right to create from Luke –Can refuse Luke entry rights to the space
© Brian Whitworth 2002, firstname.lastname@example.org Display Display - is an action with one object upon the space around it –Hence the space owner and the item owner jointly own the right to display –Attila can Reject the item (refuse to display it) - but Luke still sees it –Luke can Withdraw the item from public display - but Attila still sees it –C.f. Putting a notice on a board in a supermarket
© Brian Whitworth 2002, email@example.com Legitimacy benefits Luke –Still sees his item, marked “rejected”, and has not lost his effort (can still print and copy it) –Does not think it was accidentally deleted and re-submit it –Can modify the item and resubmit it –Knows adding item again can result in exclusion –Luke’s other “good” items remain valid Advantage: Sharing rights in legitimate ways allows Attila and Luke to agree on how the social environment operates
© Brian Whitworth 2002, firstname.lastname@example.org Spaces within Spaces Can Attila give Ghengis the right to create a sub-board (list, chat, MUD etc) ? –No - to do so would in effect mean Attila no longer owns the main board –Attila must create (and own) the sub-board, then delegate it to Ghengis Can Attila reject items in a sub-board delegated to Ghengis? –No, Attila can take back the sub-board, then reject the items (but Ghengis might be offended) Legitimate rights define a space of allowable actions between Attila and Ghengis
© Brian Whitworth 2002, email@example.com Further issues Dependent items (comments) Targeted items (Mail) Linked items (chat/email conversations) Autonomous groups (voting democracies) View rights to (e.g. censorship as the right not to view) Stewardship
© Brian Whitworth 2002, firstname.lastname@example.org Conclusion SIS builders must represent social requirements in system design –Most future IS will have a social aspect –For an SIS, the community is the “user”, and legitimacy is its “requirement” –Common sense & trial and error are not enough –Future designers, our students, should learn legitimacy analysis in system design courses Virtual social environments should be legitimate by design
1 Polite Computing Software that respects the user Brian Whitworth © 2002, Presented at “Etiquette for Human-Computer Work”, AAAI Fall.
“Ethics Online” Shaping social behavior online takes more than new laws and modified edicts. Deborah G. Johnson Communications of the ACM Vol. 40, No.
CS CS 5150: Software Engineering Lecture 5 Legal Aspects of Software Engineering 1.
Copyright in Cyberspace Copyright Law Larry Lessig David Post Eugene Volokh
In most countries of the world, the “information revolution” has altered many aspects of life significantly: commerce, employment, medicine, security,
Riverside Community School District Acceptable Internet/Network Use Policy.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Legal Issues.
What is Copyright? Copyright is a form of intellectual property protection granted under Indian law to the creators of original works of authorship such.
Ethics CS351. What are ethics? Dictionary: –1. A system or set of moral principles. –2. The rules of conduct recognized in respect to a particular class.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Kaplan University LS 512 Unit 7 Town Hall John P. Gray.
Computers and Society Lecture 1: administrative details and an introduction to the class Professor: Evan Korth New York University.
“10 Big Myths about copyright” Presented By: Brenton Barnes Summer 06.
SYSTEMS IMPLEMENTATION TECHNIQUES TRANSACTION PROCESSING DATABASE RECOVERY DATABASE SECURITY CONCURRENCY CONTROL.
Mrs. Stern Computer Applications II. What is Computer Crime? Criminals Can Operate Anonymously Over the Computer Networks. Be careful about talking.
Transaction. A transaction is an event which occurs on the database. Generally a transaction reads a value from the database or writes a value to the.
Murabahah. Murabahah: “Murabahah” is a term of Islamic Fiqh and it refers to a particular kind of sale having nothing to do with financing in its original.
1 Introduction to Computer Ethics Learning Outcomes: Define and explain why the study of computer ethics is important. List and explain the three.
CHAPTER Section 5.1 Ethical Business Behavior Section 5.2 Socially Responsible Business & Philanthropy Ethics & Social Responsibility.
area of law that deals with protecting the rights of those who create original works Also called as confidential information. It is called “intellectual”
New copyright challenges for the users digital works Dragutin Nemec Library of the Faculty of law in Zagreb LIBRARIES IN THE DIGITAL AGE (LIDA) 2007.
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
CS 350 – Software Design The Object Paradigm – Chapter 1 If you were tasked to write code to access a description of shapes that were stored in a database.
The Crisis of Liberal Democracy Poli 110DA 05 Jus belli.
1 CS 501 Spring 2004 CS 501: Software Engineering Lecture 5 Legal Aspects of Software Engineering I.
1 Book Cover Here Copyright © 2010, Elsevier Inc. All rights Reserved Chapter 7 Offenses Against Property— Destruction and Intrusion Offenses Criminal.
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
Ethical and Social Issues. Ethics Principles of right and wrong used by individuals as free moral agents to guide behavior.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. 9 Net Present Value and Other Investment Criteria.
The Freedom of Information Act (FOIA) is a law that gives you the right to access information from the federal government. It is often described as the.
Who’s holding the stakes ? Contextualisation of the stakeholder-theory in ethical dilemmas concerning historical human remains Part 1 Contextualisation.
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
Assumptions of Pure Monopoly Single Seller (Many Buyers) Heterogeneous good Perfect Information Barriers to Entry.
Chris Reed Professor of Electronic Commerce Law. The perceived problem “If I put my information in the Cloud then I lose all my rights to it” But is this.
Open Access and Open Source LIS-505 Introduction to Library & Information Studies March 22, 2010.
1 Software Development Configuration management. \ 2 Software Configuration Items that comprise all information produced as part of the software development.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Copyright: How to make use of it Created by: Maria D. Martinez.
Supporting further and higher education Digital Preservation: Legal Issues Chinese National Academy of Sciences July04 Neil Beagrie, BL/JISC Partnership.
P.V. VISWANATH FOR A FIRST COURSE IN FINANCE 1. 2 Decision Criteria NPV The Payback Rule Accounting Rate of Return IRR Mutually Exclusive Projects The.
Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever- changing medium where anyone and everyone can voice their opinions,
Security Vulnerabilities in A Virtual Environment Seminar of Virtual Machine course Mojtaba Asadollahpour Instructor: Hadi Salimi 6 January 2010.
Chapter 9 Workplace EthicsSucceeding in the World of Work Ethical Behavior 9.2 SECTION OPENER / CLOSER INSERT BOOK COVER ART Section 9.2 Ethical Behavior.
Computers, the law and ethics Lesson Objective: Understand some of the legal & ethical issues in developing computer systems Learning Outcome: Know.
INTERNET- A BOON OR A CURSE AYUSHI PRADHAN. WHAT IS IT? Internet or INTERnational NETwork is a network of networks that crisscrosses the globe and even.
Business Law Chapter 3: The Legal Concept of Acceptance.
The Paperless Classroom with Google Docs Eric Curts - North Canton City Schools ericcurts.com - - gplus.to/ericcurts.
Chapter McGraw-Hill Ryerson © 2013 McGraw-Hill Ryerson Limited 9 Prepared by Anne Inglis Net Present Value and Other Investment Criteria.
@ulccwww.ulcc.ac.uk IRMS Cymru October 2015 From EDRMS to digital archive: a wish-list for ways to preserve digital records.
Copyright for Book Artists Ariadni Athanassiadis Kyma Professional Corporation CBBAG, Ottawa December 11, 2013.
© 2017 SlidePlayer.com Inc. All rights reserved.