chapter 8 - computers in polite society: social implications of it discuss examples of how social...

Post on 25-Dec-2015

221 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Chapter 8 - Computers In Polite Society:Social Implications of IT

• Discuss examples of how social networking technology can improve society

• Describe several tips associated with netiquette and explain the benefits of following them

• Give the requirements of a good password, and how to achieve them

• Name three permitted/not permitted uses of licensed software

• Discuss what rights are granted to owners/creators of material that is copyrighted

The Power of the Crowd

• The Internet has brought substantial changes to society

• Positive or Negative?• Social interactions have been extended well

beyond the experiences that previous generations could have.

• We will consider a few examples that have ostensibly brought “positive change”

Crowdsourcing

• Refers to solving a problem or achieving a goal by combining the contributions of a large, unconstrained volunteer population

• Wikipedia is perhaps the most famous of the crowdsourcing enterprises

• The goal is to build a database of all (?) knowledge through a global effort

• Issues: Control, Cliques, Deletionism

Be a Martian

• Volunteers help NASA by tagging images from the Mars rovers

• Crowdsourcing is a new phenomenon made possible by the “free” and easy communication enabled by the Internet

• “Crowd” is obviously important because it increases the number of people working on a project, a benefit for the people with the problem

• Issues?

Be a Martian

• By opening up the project to a wide variety of people, participants will have a wide variety of skill sets

• Volunteers might actually be faster and more efficient at the task!

• Their skills and knowledge might lead to a better solution, as Wikipedia proves in most cases

Crowdsourcing

• So, what’s in it for the participants? – It’s fun– Earn points, win prizes– Participants receive a sense of satisfaction

that they are contributing to a project– Many projects require skills that are more

challenging than watching TV– Issues?

Foldit

• Foldit is a game program in which teams compete to fold a protein• Proteins get all twisted as they float

around in cells.• How they fold largely determines how

they work (medicine doesn’t “know a protein” until it knows how it folds)

Foldit

• Foldit program works on proteins that are important to AIDS, cancer, and Alzheimer’s research

• Using Foldit, the structure of the protein associated with the AIDS virus was solved in three weeks

Freerice • Freerice has a vocabulary game (also others) : • The player is given

an English word and four possible definitions• Picking the right

answer donates 10 grains of rice

Kickstarter

• People with creative projects pitch their ideas:– They say what they’ll do

– How much money they need to do it

– Why it’s important, etc.

• Donors can contribute toward the goal• If the goal is achieved the project is

funded; otherwise, the donors get their money back

Out on Good Behavior

• The online world we live in today is different in many ways than the real world many grew up in

• Our range of interactions is much broader; we may never meet face-to-face with the online people

• Families and relatives usually influence our online behavior very little

• Unintended consequences? Concerns?

Out on Good Behavior

• We can be anonymous on the Internet, so no one knows if we behave badly…Right?

• We are not entirely anonymous online. There are means to get the identities of people on the Internet

• We all want to enjoy the benefits the Internet gives us, so our daily uses of the Internet should encourage us to behave

Improving the Effectiveness of Email

• Problems with email and online comms:

– Conveying emotion

– Emphasis

– Conversational pace

– Ambiguity

– Flame-a-thons

– Spam

– Scams

Conveying Emotion• Difficult to convey subtle emotions

using email

– Medium is too informal, impersonal, and casually written.

– Conversational cues are missing

– Good Writing still important - consider classic letters

• Emoticons are (somewhat) popular

– Tags a sentence indicating the emotion we mean to communicate

Emphasis

• Typing for emphasis can convey the wrong meaning– Text in all caps can be interpreted

as yelling

• Email is still largely ASCII based and may not allow italics or underlining– Asterisks or underscores can

replace underlining

Conversational Pace

• Asynchronous medium makes dialog difficult– For interactive purposes (like negotiation)

synchronous medium like telephone may be best

Ambiguity

• Text can be interpreted in ways we don't intend– People often don't proofread what they

write in email to avoid ambiguity

Flames

• Flame is slang for inflammatory exchanges

• Flame-a-thon is ongoing exchange of angry emails

• When angered by email, it's best to delay answering until you cool down

Netiquette (more rules in the book)• Originally rules to promote civilized email usage

• Now interpreted more broadly: civilized behavior in any of the social settings on the Internet

– Ask about one topic at a time

– Include context (quote previous text as needed)

– Use an automated reply when away (careful!)

– Get sender's permission before forwarding email

– Use targeted distribution lists (don't send latest joke to everyone you've ever emailed)

– Posted Content lives forever! Like a bulletin board.

Please, Don’t Be Offended

• The “Offensensitivity” perspective can be summarized as follows:1. Your post will be seen by people all over

the world, and you will see posts from people all over the world

2. You can easily and unintentionally offend them; they can easily and unintentionally offend you

Please, Don’t Be Offended

• The “Offensensitivity” perspective can be summarized as follows:3. The “problem” is our different cultures,

social norms, backgrounds, religions, assumptions, and so forth. You’re not wrong; they’re not wrong. And they are no more likely to change their thinking than you are. Be tolerant. Be respectful.

4. Are norms and standards relative or absolute?

Expect the Unexpected

• Expecting the unexpected is a valuable survival skill in life and in computing.

• When something unexpected happens, we should ask – “Why did that happen?”

– “What’s going on?”• An essential skill in the social world of

computing is, Expect the Unexpected

The Onion

• The Onion is a humor magazine specializing in news satire

• It produces “news” stories that are almost believable

• Rather than checking an unbelievable story by asking if it makes sense many people simply believe it and repeat it

Suspicious Activity

• Other kinds of online activity are of greater concern.

• Is your software:

– “acting” strange?

– “behaving” unusually?• These could be indicators of a software problem

such as disk fragmentation, or a computer virus infection

• If the behavior continues after a reboot, you might need some help

Authentication and Passwords: Are, Have, Know

• The Role of Passwords– To limit computer or system access to only those

who know a sequence of keyboard characters– To help track who did what - protect the innocent

• Breaking into a Computer without a Password– Trying all possible passwords algorithmically

would eventually find correct password, but software usually limits the number of tries

• Forgetting a Password– Passwords are scrambled or encrypted and

stored, so system administrator usually can't tell you your password if you forget it

Guidelines for Selecting a Password

• Don’tchoose something easily guessed

• Should have at least 8 characters (if possible)

• Mix of uppercase and lowercase letters, numbers, punctuation characters, symbols like % and *).

• Avoid “dictionary words”

• No personal association (like your name)

• Phrase-to-password “algorithm”

Heuristics for picking a password

• Select a personally interesting topic

– Always select passwords related to topic

• Develop a password from a phrase rather than a single word. (Or use phrase)

• Encode the password phrase

– Make it short by abbreviating, replace letters and syllables with alternate characters or spellings

Changing Passwords

• Should be changed periodically

• Resets/ “Security” Questions

• Managing Passwords

– Using a single password for everything is risky; using a different password for everything is hard to remember

– Passwords can be recycled• Make good changes to good passwords or• Rotate passwords

– Password safe or “keychain”

Viruses and Worms

• Virus - a program that "infects" another program by embedding a copy of itself. When the infected program runs, the virus copies itself and infects other programs

• Worm is an independent program that copies itself across network connections

• Trojan is a program that hides inside another useful program, and performs secret operations– May record keystrokes or other sensitive data, or load

malicious software

• Exploit is a program that takes advantage of security hole (Say in an Internet browser )– Backdoor access enters computer and reconfigures it for

remote control

How to "Catch" a Virus

• Email attachments. Do not open attachments before checking:– Is this email from someone I know?– Is the message a sensible follow-up to the last

message from the sender?– Is the content of the message something the

sender would say to me?– Is there a reason for the sender to include an

attachment?• When in doubt, be cautious - save and scan

How to "Catch" a Virus (cont'd)

• Copying software from an infected computer

• Peer-to-Peer Exchange

– Downloading files from unreliable sources

• New Software

– Any software is a potential source of infected code

– Most software distributors are careful to avoid infection

Virus-Checking Software

• Free and Shareware scanners exist - AVG

• Three companies are McAfee, Norton, and Sophos, Inc.

• Programs check for known viruses, worms, etc. May also use heuristics.

• New viruses are created all the time, so update often

Phishing• Password harvesting fishing

• “Social Engineering”

• Users are sent SPAM emails asking for credit card or banking information, or even just passwords.

• Message is disguised to appear to be from a bank or other company

– Often reports a security problem the user needs

to address

– When the user clicks legitimate looking link, they are linked to bogus sites set up to steal the information entered

What Can Be Done About Phishing?

• Never respond to requests for personal information like passwords via email; legitimate businesses do not request information this way

• Do not click on links or pre-typed addresses. They can be spoofed (faked); type the URL yourself.

• Check to make sure the website is using encryption - Lock Icon, etc.

• Routinely review credit card and bank statements for unusual activity

• Report suspected abuses to proper authorities

Protecting Intellectual Property• Intellectual property is any human creation like

photograph, music, textbooks, cartoons, etc.

• Licensing of software– You don't buy most software; you lease it– Commercial Licenses gives you the right to use

personally, but not sell or give away

• Try before you buy– Shareware allows you to download and try software for

free, then pay the person who built it if you like it (honor system)

• GPL - alternate license, allows almost any use, as long as you distribute the source code of any changes you make. (Based on Copyright Law)

Copyright on the Web• A person automatically owns copyright of what he

creates in the U.S. and most nations

• Copyright “temporarily” protects owner's right to

– Make a copy of the work

– Use a work as the basis for a new work (derivative work) (exception for satire/parody)

– Distribute or publish the work, including electronically

– Publicly perform the work

– Publicly display the work

Copyright on the Web (cont'd)

• Free Personal Use

– You are free to read, view or listen to protected work

• When is permission needed?

– Information placed in public domain is free for anyone to use (Creative Commons.)

– Otherwise you must get permission from the owner of the copyright

Copyright on the Web (cont'd)

• The Concept of Fair Use

– Allows use of copyrighted material for educational or scholarly purposes, to allow limited quotation for review or criticism, to permit parody

• When Is It Fair Use? Depends on several factors:

– What is the planned use?

– What is the nature of the work in which the material is to be used?

– How much of the work will be used?

– What effect would this use have on the market for the work, if the use were widespread?

Copyright on the Web (cont'd)

• Violating the Copyright Law– You break the law whether you give away

copyrighted material or sell it– Commercial use usually results in

higher fines (Could even result in criminal penalties - but rare.)

• Alternatives: Public Domain. Creative Commons, Original material, Others?

Ensuring the Reliability of Software

• Safety-Critical Applications (systems that support life or control hazardous devices or materials)

– Hardware failures can be avoided or resolved using redundancy

• Have three computers perform all computations of safety-critical system

• Compare results - 2 out of 3 rule

– Burn-in

• Most errors show up after a few hours of operation

Software Failures

• How can programmers be sure their programs work correctly?

– All reachable configurations (states the software can get into), cannot be examined for correctness—there are too many

– A program is said to be correct if its behavior exactly matches its specification

– What can we do about the fact that we can't prove correctness?

Software Failures (cont'd)

• The Challenge

– Accept that software may contain bugs. Monitor usage, be alert to unusual behavior and be prepared to limit the harm they can do

– Demand high-quality software, refuse buggy software, and be prepared to change to better software

Software Failures (cont'd)

• Fail-Soft and Fail-Safe Software

– Fail-soft means the program continues to operate under stress, providing a possibly degraded level of functionality

– Fail-safe means the system stops functioning to avoid causing harm

• Perfectly safe software is just as impossible as perfectly correct software; there is always a risk

top related