Download presentation
Presentation is loading. Please wait.
1
The Social Context of Computing
2
The Social Context of Computing What is it? Appropriate vs. Inappropriate Appropriate vs. Inappropriate –Proper Credit vs. Plagiarism Codes of ethics for computer users and professionals, ex. ACM Code of Ethics Codes of ethics for computer users and professionals, ex. ACM Code of Ethics Protection of Privacy and Civil Liberties Protection of Privacy and Civil Liberties
3
Group 1 – Topics Introduction to the Social Implications of Computing Introduction to the Social Implications of Computing Social Implications of Networked Communication Social Implications of Networked Communication Growth of, Control of and Access to the Internet Growth of, Control of and Access to the Internet Gender related Issues of Computing Gender related Issues of Computing International Issues International Issues Computer Crime Computer Crime Computer Crime Prevention Computer Crime Prevention
4
Introduction to the Social Implications of Computing By Ryan Andrew
5
Historical Perspective ACM Code of Ethics and Professional Conduct ACM Code of Ethics and Professional Conduct –Adopted in 1973 from work dating to the 1940’s General Moral Imperatives, Professional Responsibilities, Organizational Leadership Imperatives, Compliance with the Code General Moral Imperatives, Professional Responsibilities, Organizational Leadership Imperatives, Compliance with the Code “As an ACM member I will contribute to society and human well-being” - First Code “As an ACM member I will contribute to society and human well-being” - First Code
6
IFIP’s Technical Committee 9 (TC9) IFIP’s Technical Committee 9 (TC9) –Established in 1976 – Relationships between Computers and Society Not technical issues Not technical issues –8 Working Groups added since then Computers and Work (est. 1977) Computers and Work (est. 1977) Social Accountability (est. 1977) Social Accountability (est. 1977) Home-Oriented Informatics and Telematics (est. 1988) Home-Oriented Informatics and Telematics (est. 1988) Social Implications of Computers in Developing Countries (est. 1989) Social Implications of Computers in Developing Countries (est. 1989) Applications and Social Implications of Virtual Worlds (est. 1989) Applications and Social Implications of Virtual Worlds (est. 1989) Information Technology Mis-Use and the Law (est. 1990) Information Technology Mis-Use and the Law (est. 1990) History of Computing (est. 1992) History of Computing (est. 1992) Women and Information Technology (est. 2001) Women and Information Technology (est. 2001)
7
Research: Growth of, and Access to the Internet
8
Issues with Internet Access Issues with Internet Access –Low-Bandwidth and Low-Connectivity –Stats In 1998, the country of Ethiopia had a 256Kbps connection to the rest of the Internet. In 1998, the country of Ethiopia had a 256Kbps connection to the rest of the Internet. In 2000, India had a total international bandwidth of 350 Mbps for 1 billion people. In 2000, India had a total international bandwidth of 350 Mbps for 1 billion people. Eight Arab countries (Egypt, Saudi Arabia, Lebanon, Jordan, Morocco, Oman, Syria, and the UAE) have, combined, the same bandwidth as 518 cable modem subscribers in the U.S. Eight Arab countries (Egypt, Saudi Arabia, Lebanon, Jordan, Morocco, Oman, Syria, and the UAE) have, combined, the same bandwidth as 518 cable modem subscribers in the U.S.
9
Research: Growth of, and Access to the Internet Issues with Internet Access Issues with Internet Access –ISP Charges For example, “one ISP in Ghana is faced with the fact that Internet bandwidth that would cost less than $1,000 in the US must be beamed to Ghana through a satellite link to Canada, at about $40,000 a month.” For example, “one ISP in Ghana is faced with the fact that Internet bandwidth that would cost less than $1,000 in the US must be beamed to Ghana through a satellite link to Canada, at about $40,000 a month.” Often economically unfeasible Often economically unfeasible
10
Research: Growth of, and Access to the Internet Issues with Internet Access - Solutions Issues with Internet Access - Solutions –TEK Search Engine –Characteristics - can be generally applied Low-connectivity, in that it does not rely on end-to-end connection at any point in time. Low-connectivity, in that it does not rely on end-to-end connection at any point in time. Low-bandwidth, in that it maximizes ‘information density’ and only sends attachments that can be downloaded over slow connections. Low-bandwidth, in that it maximizes ‘information density’ and only sends attachments that can be downloaded over slow connections. User friendly, in that it does not overwhelm users from information-poor environments with more results than they can manage. User friendly, in that it does not overwhelm users from information-poor environments with more results than they can manage. Similar to standard search engine tools, so that the skills the user acquires can be transferred to other Web tools in the future. Similar to standard search engine tools, so that the skills the user acquires can be transferred to other Web tools in the future.
11
Research: Computer Crime and Prevention Many crimes through Internet Many crimes through Internet –Plagiarism, peer-to-peer sharing, etc. –Focus on child exploitation…pedophiles “Most pedophiles are attracted to the fact that there are many dark corners of the Internet that are not being regulated.” “Most pedophiles are attracted to the fact that there are many dark corners of the Internet that are not being regulated.” Easy for a pedophile to exploit an innocent child without even having to leave his or her home. Easy for a pedophile to exploit an innocent child without even having to leave his or her home. Free programs exist that allow potential pedophiles to surf the Internet or use e-mail anonymously. Free programs exist that allow potential pedophiles to surf the Internet or use e-mail anonymously. – Prevention - Protection of Children From Sexual Predators Act of 1998, U.S.
12
Research: Gender Related Issues Growing concern of a gender divide Growing concern of a gender divide –The following based on British population It is recognized that males dominate the use of technologies in all areas of society. It is recognized that males dominate the use of technologies in all areas of society. Fewer girls are taking up Computing at an advanced level, and universities are experiencing a continued lack of interest in applications by women to computing degrees. Fewer girls are taking up Computing at an advanced level, and universities are experiencing a continued lack of interest in applications by women to computing degrees. In 1996, 19% of computer science students we were reported to be female. In 1996, 19% of computer science students we were reported to be female. Today, only 21% of computing graduates in the UK are women. Today, only 21% of computing graduates in the UK are women. –Barely an increase
13
Research: Gender Related Issues
14
Conclusion – Implications of computing clear to see Both the good and bad Both the good and bad These instances give a broader view of the need to recognize these negative implications These instances give a broader view of the need to recognize these negative implications – During development before they occur – Currently existing as well to derive possible solutions ACM and IFIP ACM and IFIP – Aid in both prevention and solution to reduce the negative implications of computing Realize there will always be negatives to a positive thing Realize there will always be negatives to a positive thing
15
Social Implications of Networked Communications By Matthew Chedister
16
Impacts of the Internet Networked Communications, more specifically the Internet, has effected society in many ways Networked Communications, more specifically the Internet, has effected society in many ways –Methods of Communication –Amassment of media –The emergence of virtual communities –Leads to new social responsibilities
17
How the Internet Affects Methods of Communications Applications that increase communications and decrease the impact of geographic barriers Applications that increase communications and decrease the impact of geographic barriers –Bulletin Board programs such as USENET –Instant Messaging Programs such as MSN Instant Messenger and IRC –Most common, e-mail
18
How the Internet Affects Methods of Communications Many of these applications are replacing their non-computer related counterparts Many of these applications are replacing their non-computer related counterparts –E-mail is faster than the Postal Service –IRC doesn’t require the telephone –USENET doesn’t require a physical bulletin board, or thumbtacks.
19
Impact of Increased Communications People within a society and between societies can now communicate in ways that were impossible before People within a society and between societies can now communicate in ways that were impossible before Has made communication easier Has made communication easier Varied and easier forms of communication can have massive affects on society Varied and easier forms of communication can have massive affects on society
20
How the Internet has Affected Amassment of Media Many encyclopedias, dictionaries, and similar resources available online Many encyclopedias, dictionaries, and similar resources available online Movie clips and song clips have become commonplace on the Internet Movie clips and song clips have become commonplace on the Internet Significant impact on the 1996 Presidential Election Significant impact on the 1996 Presidential Election
21
1996 US Presidential Election Privately run WebPages and media-based WebPages collected documents from journalists, pollsters, politicians Privately run WebPages and media-based WebPages collected documents from journalists, pollsters, politicians –PoliticsNow Networked Communications allowed the candidates better and more immediate access to their campaign teams Networked Communications allowed the candidates better and more immediate access to their campaign teams First time ever candidacy was declared online before publicly First time ever candidacy was declared online before publicly
22
Advent of Virtual Communities Two definitions Two definitions –Physically based virtual communities Actual community augmented by electric resources such as online libraries, town meetings, etc. Actual community augmented by electric resources such as online libraries, town meetings, etc. –Shared interest virtual communities Community members have similar interests, can span continents, gender, creed Community members have similar interests, can span continents, gender, creed
23
Impact of Virtual Communities Physically based virtual communities can help bring local people together Physically based virtual communities can help bring local people together –Strengthen existing social relations Shared interest virtual communities have the potential to form new social relations between people, but also can hinder existing relations within a community Shared interest virtual communities have the potential to form new social relations between people, but also can hinder existing relations within a community
24
Example of Sacrificing Real Community Relations for Virtual Ones http://www.head2headgames.com/pics/cscpl18.jpg http://www.head2headgames.com/pics/cscpl18.jpg
25
New Social Responsibilities Issues of privacy Issues of privacy –Windows 98 personal identifier Issues of freedom of speech Issues of freedom of speech –1996 Communication Decency Act Advent of computer crime Advent of computer crime –Identity theft has become a large concern in recent years
26
Need for Regulation Regulation policies are being created both on national and international levels Regulation policies are being created both on national and international levels –Aforementioned 1996 Act –In 2000, the European Commission began to work on a set of international regulations The social implications of such regulations could range anywhere from censorship of obscene material to specialized online transactions to guarantee privacy The social implications of such regulations could range anywhere from censorship of obscene material to specialized online transactions to guarantee privacy
27
Conclusions Networked Communications, most importantly the Internet, have various impacts on society Networked Communications, most importantly the Internet, have various impacts on society –Establishes new methods of communication between persons around the world –Provides a means by which to amass large amounts of media that is easily accessible –Has laid the groundwork for the development of virtual communities, new social trends in their own right –Results in a new set of social responsibilities and regulations
28
Growth of, Control of and Access to the Internet By Roy Chung
29
A Brief History of the Internet First recorded description of social interactions through networking done by J.C.R. Licklider of MIT in 1962. First recorded description of social interactions through networking done by J.C.R. Licklider of MIT in 1962. On September 1969, BBN delivered the first network computer and created the first long distance computer network, named ARPANET. On September 1969, BBN delivered the first network computer and created the first long distance computer network, named ARPANET. During the 1970’s, ARPANET evolved in size and stability. During the 1970’s, ARPANET evolved in size and stability. Email was the most noteworthy development. Email was the most noteworthy development.
30
A Brief History of the Internet In the 1980’s, a set of new communication protocols, TCP/IP, was introduced. In the 1980’s, a set of new communication protocols, TCP/IP, was introduced. In 1983, there was the transition of the ARPANET host protocol from NCP to TCP/IP. In 1983, there was the transition of the ARPANET host protocol from NCP to TCP/IP. In 1989 ARPANET was decommissioned, leaving a number of private companies to provide the backbone of the Internet. In 1989 ARPANET was decommissioned, leaving a number of private companies to provide the backbone of the Internet. The World-Wide Web was conceived by Tim Berners-Lee and Robert Cailliau at CERN and made public in 1991. The World-Wide Web was conceived by Tim Berners-Lee and Robert Cailliau at CERN and made public in 1991.
31
Internet Growth in the Past Ten Years
32
Control of the Internet Originally developed for military and then academic use. It was a closed network, so an ethical debate was not present. Originally developed for military and then academic use. It was a closed network, so an ethical debate was not present. With the sudden growth of the Internet, ethical issues are becoming prevalent. With the sudden growth of the Internet, ethical issues are becoming prevalent. Who should be held responsible? Who should be held responsible? Governments, ISP’s, operators of services, along with end-users. Governments, ISP’s, operators of services, along with end-users. However, much work still needs to be done. However, much work still needs to be done.
33
Ethical Debates Regarding Control Protection of minors. Protection of minors. Protection/privacy of the individual. Protection/privacy of the individual. Respect for cultural differences. Respect for cultural differences. Finding a balance between freedom of expression versus censorship. Finding a balance between freedom of expression versus censorship. Value and accuracy of the information provided. Value and accuracy of the information provided.
34
Access to the Internet Internet originally developed for the intellectual. Internet originally developed for the intellectual. Access to the Internet should be universal, regardless of income or disability. Access to the Internet should be universal, regardless of income or disability. As the Internet continues to expand, more ethical debates will arise. As the Internet continues to expand, more ethical debates will arise. Acceptable Use Policies are put in place in many institutions. Acceptable Use Policies are put in place in many institutions. Access to the Internet is a privilege that carries many responsibilities. Access to the Internet is a privilege that carries many responsibilities.
36
Gender related Issues of Computing By Gene Cumm
37
International Issues By Daniel Dauchy
38
Globalization due to IT Definition – the unification of the nations on earth Definition – the unification of the nations on earth Increase in globalization brought about by the new ways of communicating: Increase in globalization brought about by the new ways of communicating: –Email –Video conferencing –And other cheap and nearly instantaneous ways to communicate
39
1.) The Open-Source Software Movement Open Source Software – free distribution of source code Open Source Software – free distribution of source code Started off as a social community Started off as a social community –Hackers Richard Stallman
40
Closed-Source V.S. Open-Source Caused by the attempted passing of legislation that supports open-source software Caused by the attempted passing of legislation that supports open-source software Lobbying: Lobbying: –Closed-Source: Initiative for Software Choice (ISC) –Open-Source: Sincere Choice Mike Wendy Bruce Perens
41
2.) Offshoring Jobs Lost to Date Projected Job Loss Jobs at Risk 300,000-995,000 3.3 million-6 million 14.1 million 300,000-500,000 (Goldman Sachs) Goldman SachsGoldman Sachs 3.3 million over 15 years (Forrester Research) Forrester ResearchForrester Research 14.1 million (UC Berkeley) UC BerkeleyUC Berkeley 400,000-500,000 (Business Week) Business WeekBusiness Week 6 million over 10 years (Goldman Sachs) Goldman SachsGoldman Sachs 995,000 (economy.com) economy.com Offshoring – The sending of jobs overseas Offshoring – The sending of jobs overseas –For example American companies moving parts of their operations to India Causes social issues in both countries Causes social issues in both countries *Statistics taken on March 16, 2004
42
In the United States Social movements against outsourcing have mobilized Social movements against outsourcing have mobilized Movements include: Movements include: –The American Champions –Techs Unite –The E-Activist Network –Communications Workers of America
43
In India Increase in the number of middle class Indian people Increase in the number of middle class Indian people –Statistics: The new 487 million middle-class Indians are expected to spend $420 billion in the next four years The new 487 million middle-class Indians are expected to spend $420 billion in the next four years –Draws the attention of many companies
44
Related to Globalization? The Open-Source Movement The Open-Source Movement –Allows modification and improvement of source code on a global level Offshoring Offshoring –By directly influencing the culture of the affected areas
45
Computer Crime By Martin Goldman
46
What Is Computer Crime? Criminal activity that is committed using computers, or that targets computers, or both Criminal activity that is committed using computers, or that targets computers, or both –Many different types of offenses –Different types of perpetrators, different motivations –One of the biggest criminal threats facing society today
47
What Are the Crimes? Breaches of Physical Security Breaches of Physical Security –Disruption of service –Interception of communication
48
What Are the Crimes? Breaches of Personnel Security Breaches of Personnel Security –Masquerading –Social engineering
49
What Are the Crimes? Breaches of Communications/Data Security Breaches of Communications/Data Security –Data attacks (e.g. data theft) –Software attacks (e.g. malware)
50
Who Are the Perpetrators? Crackers Crackers “Professional” Criminals “Professional” Criminals Vandals Vandals
51
What Is the Extent of the Problem?
52
CSI/FBI Computer Crime and Security Survey CSI/FBI Computer Crime and Security Survey –It's a big problem, but it's getting better Hard to tell Hard to tell –DoD: As few as 10% of cases are reported
53
Computer Crime Prevention By Joseph Wong
54
Computer Crime Prevention Do not connect to anything Do not connect to anything Hardware or Physical Level Hardware or Physical Level Software Level Software Level Laws and Lawsuits Laws and Lawsuits
55
Major Threats Viruses Viruses Hackers Hackers Spyware/Spam Spyware/Spam Copyright Infringement Copyright Infringement Theft Theft
56
Methods of Prevention Hardware Hardware –Locks –Firewalls Hardware based vs. Software based Hardware based vs. Software based Filtering Filtering –Allow everything vs. Deny everything.
57
Methods of Prevention Software Software –Data Encryption Firewalls Firewalls Wireless Wireless –Antivirus On-access Detection vs. On-demand Detection On-access Detection vs. On-demand Detection –Spyware/Spam Programs available online Programs available online
58
Methods of Prevention Laws Laws –“Can Spam” Act & Spy Act –Computer Fraud and Abuse Act “knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer “ “knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer “ Copyright Infringement (Piracy) Copyright Infringement (Piracy) –RIAA & MPAA –Software Companies
59
Total Prevention - Possible? Technology Growing Too Fast Technology Growing Too Fast Multi-layered prevention Multi-layered prevention Wireless Wireless
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.