IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 10.

Slides:



Advertisements
Similar presentations
The impact of IT Around the world By Eddie Cole. The positive social impacts of IT Social networking sites are huge now, bringing in hundreds of millions.
Advertisements

IT: Communication and Impacts
All the layers to YOUR citizenship! I wonder what a CITIZEN is?
Internet Online Safety How to have FUN and Stay in Control.
Examples of life goals: 1.Live on my own or with a family of my own. If I have this, I can use my non-working time how I see fit. FREE TIME! 2.Keep a job.
An Endnote on Regulating Cyberspace: Architecture vs Law Author: Graham Greenleaf. Presented by: Oliver Bannatyne, 28 th May 2002.
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
ICT Curriculum Evening – an introduction to Wizkid.
S2 – COMMUNICATIONS UNIT
The impact of ICT on Personal Communications For students in year 11 students at Les Quennevais School. The groups I will look at will be: My Family Disabled.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Behind the Machine “The Good, The Bad, and the Ugly” Copyright © 2008 by Helene G. Kershner.
The Laws of Cyberspace Larry Lessig. Introductory Story Before Russian Revolution Tsar had system of internal passports which marked estate you came from.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
Internet Safety and Kids Ms. Lee’s Classroom Computers are NOT bad Computers can be used to help kids learn and play. They can be used safely, if parents.
Citizen Me! ALL Part One the LAYERS to YOUR CITIZENSHIP.
How Intellectual Property Laws Are Holding Us Back Samantha Spott CIS
 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
P.6.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Improving productivity with online collaboration © 2015 albert-learning.com Improving productivity with online collaboration.
Read to Learn Describe the three basic economic questions each country must answer to make decisions about using their resources.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
Testing New Approaches Delivering CIS through Social Media Channels Martin Ledwick Cancer Research - UK.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
The Free Enterprise System
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Political Spectrum and Ideologies You need to copy the Learning Target and all the notes.
Computer Legislation The need for computer laws Go to Contents.
What it is About  This poster is about The Nine Elements of Digital Citizenship.  It also has a lot of information about Cyber bullying.  There were.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
General Equilibrium and the Efficiency of Perfect Competition
Level 2 IT Users Qualification – Unit 1 Improving Productivity Katie.
Citizen Me! ALL the LAYERS to YOUR CITIZENSHIP Part One.
Online communities 2. Starter: Signing up to an online account: When signing up to a new account you sometimes have to fill in one of these: This is called.
Enforcement Mechanisms IT 801 – Information Law and Policy Professor David E. Sorkin Adj. Professor Leslie Ann Reis November 5/2000.
Level 2 IT Users Qualification – Unit 1 Improving Productivity Chris.
Internet Safety Tips By K. Pisarik. The district’s AUP (Acceptable Use Policy) requires that you: 1.Only log on to computers when a teacher is supervising.
Lessig – Code and the Future of Ideas. Code – Intellectual Property Optimal is mix between public and private spaces Many agents can use cyberspace -
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Power and discipline Foucault, M. (1979): “Discipline and Punish”, chap 3, Vintage Books, New York, Hannemyr, G. (2000): “Foucault I kyberrommet”,
Do pictures always give truthful information? Can publishing it be hurtful??
By: Brenna Langham. Netiquette: Some Basic Rules Be careful of the words chosen when writing a statement for others to read! The other person might misinterpret.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
NETWORK SECURITY. TextBook William Stallings, Cryptography and Network Security: Principles and Practice, ? Edition.
Social Impact of IT Online Shopping Industry How it effects you
Computers in Society Electronic Voting. Team Projects What is your name? Application? Presentation? Copyright The software industry The open source business.
E-voting Bringing the voting process to the technology age.
Code & Other Laws of Cyberspace Reviewed by Thuy Nguyen November 17 th 2005 By Lawrence Lessig.
Welcome!! CyberBullying SkyCast. CyberBullying Today’s Aims: To create a therapeutic ‘online space’ during the SkyCast! To understand more about cyberbullying:
Chapter 8: Search, Privacy, Government, and Evil By: Marissa Gittelman Tuesday, March CPS 49:Google, the Computer Science within and its Impact.
Intermediate Microeconomic Theory Introduction. What is Goal of Microeconomic Theory? The primary goal of this class is to develop a model for understanding.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
Nine Elements of Digital Citizenship Isabella Freijah.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
YOUR TEEN AND SOCIAL MEDIA INFORMATION FOR PARENTS ON SOCIAL MEDIA, INCLUDING SAFETY TIPS AND HOW TO HELP YOUR YOUNG TEEN NAVIGATE THE ONLINE WORLD. A.
Get Secure! Facebook Privacy Tutorial Becky Benishek | November 2013.
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
ISNE101 Dr. Ken Cosh.
– Communication Technology in a Changing World
– Communication Technology in a Changing World
Behind the Machine “The Good, The Bad, and the Ugly”
Presentation transcript:

IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 10

Recap…  Last Week We talked about the future of ICT Ubiquitous Computing  Technology blends into the environment  Technology is pervasive with touchpoints throughout Augmented / Virtual Reality

This Week  Originally the plan was: Politics  And how ICT is impacting on politics But… So instead, Regulation  Regulation in Cyberspace

But First  Briefly, How has ICT affected Politics?  Electronic Voting Machines  Censorship  Connection between politicians and population Tweeting  What else?

Regulation  Lawrence Lessig Professor of Law and Harvard Law School (previously at Stanford) Author of  Free Culture  The Future of Ideas  Code and the other Laws of Cyberspace

The Laws of Cyberspace  Lessig argues… The world is regulated by four constraints  Law  Social Norm  Market  Architecture

Law  Law regulates by sanctions ex-post Don’t pay tax -> Go to jail Steal my car -> Go to jail  But while Law is an obvious regulator, it is not the only regulator. You don’t always go to jail for not paying taxes.

Social Norms  Regulate behaviour by “what I ought to do” I ought to wear a shirt (& tie), rather than a dress You ought to sit and listen to me for a while

The Market  Markets through the mechanism of ‘price’ regulates opportunities Price dictates what I can afford The price also dictates what I can charge for various abilities  People would spend less on “The greatest hits of Dr. Ken” than they would on “Madonna’s greatest hits”

Architecture  The architecture of the world regulates our abilities We can’t see through walls We can’t come to class if we are in a wheelchair We can’t fly…

4 Regulators  The ‘real world’ is regulated by a combination of these 4 regulators  As we consider regulating the cyberspace world, the same 4 regulators have an impact

Laws in Cyberspace  Laws exist in cyberspace, and are punishable Copyright law Defamation law Sexual harrassment law  Behaviour is constrained by law, just as in the real world.

Social Norms in Cyberspace  Social norms also constrain cyberspace Forum rules Banning / Kicking from chat rooms

Market in Cyberspace  Prices in cyberspace also constrain that world. We can access a wider market, but the price still constrains us.

Architecture in Cyberspace  It exists, but is different from the architecture of the real world Hardware / Software Protocols Password to gain access Encryption Tracking transactions  We can’t choose whether to obey the architecture (just as in the real world) Unless we are a hacker…

Regulating Cyberspace  Cyberspace then is regulated with the same 4 regulators Law Social Norm Market Architecture

Lets think about ‘Porn’  A lot of people have raised a lot of concerns about the amount of porn available on the web. And how easy it is to access it Moreover how easy it is for minors to access it  But there is plenty of porn in the ‘real world’ too How is it regulated?

Real World Porn  Law: It is against the law for distributors to sell porn to minors.  Social Norm: Generally society looks down on distributing porn to minors.  Market: Porn is priced such that minors can’t really afford it.  All of these also apply to the cyberspace world. So what about architecture?

Architecture  In the real world. Fake moustache? Stilts? Deep voice?  In Cyberspace Default anonymity

The Architecture  Because the architecture of cyberspace is different from the real world, regulation of cyberspace is different But there is no one single architecture of the web Organisations / Governments have choices about what architecture to use

Choice of Architecture  What happens when you try to surf the web at Payap? How is it different from my old university?  If I encrypt a message, is it truly encrypted? Or could the government read it anyway?  What happens if I go to a website considered ‘detrimental to society’ in Thailand?

Choice of Architecture  Can I host my porn site in the US? Or my gambling site?  Can anyone see my drunken tagged photos on facebook? Can I control who can see them?

Control vs Freedom  Traditionally the web is considered a free space  But there is a choice of architectures allowing control over that space Controlling Access Controlling Use Controlling Privacy

The Constitution  A nation’s constitution then often guides the architecture Architecture of Control Architecture of Freedom  Consider the architecture used in the US vs Burma vs China…

Encryption Software  We’ll come back to discuss encryption again later, but The ability to (or not to) be completely anonymous in cyberspace is a big issue.  It affects the regulability of cyberspace The ability for governments to regulate our activities online.  It also affects basic human rights Freedom of Speech Right to Privacy

Back to the “Real World”  We have passports Travel is restricted based on passports Movements are tracked by passports Criminals are identified by passports  In some countries the burden of passports is greater than others Government policies to stop peasants from flooding cities during famines

Cyberworld ID  Consider having online passports  Great! Catch the criminals with minimal burden on the innocent  Awful! Loss of freedom – complete government control  What do you think?