the social context of computing group 1. introduction to the social implications of computing john...
Post on 21-Dec-2015
230 views
TRANSCRIPT
![Page 1: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/1.jpg)
The Social Context of ComputingGroup 1
![Page 2: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/2.jpg)
Introduction to the Social Implications of Computing
John Basias
![Page 3: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/3.jpg)
History of computing
The first fully functioning electronic digital computer was Colossus (1943)
'first generation' computers
weighed 30 tons and contained 18,000 electronic valves
![Page 4: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/4.jpg)
Second generation Computing Transistor was invented in 1947
'Second Generation' and computers made their debut the late 1950s and early 1960s
still bulky and strictly the domain of Universities and governments
![Page 5: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/5.jpg)
'Third and Fourth Generation' computing the great leap foward
Jack St. Claire Kilby's invention of the integrated circuit or microchip in the 1950’s
1963 technology was integrated creating the first 3rd generation computers
Smaller more efficient were used by smaller businesses
Still unavailable or affordable at the individual level
![Page 6: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/6.jpg)
'Third and Fourth Generation' computing the great leap forward (cont.)
November 15th, 1971, Intel released the 4004, the world's first commercial microprocessor and the RAM chip
Dawn of the fourth and latest generation of computing
![Page 7: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/7.jpg)
Effects Drive toward improvement and applicability
The creation of operating systems in the 1980’s that directly translated conceptual action into computer code
Cheap affordable computing became possible to a much larger audience
Revolutionized the job market restructured the inner operations of many businesses. Outdated a lot of technology.
The emergence of hacking and viruses as threats
![Page 8: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/8.jpg)
The Dawn of the Internet Origionally ARPANET started by the US Dept. of Defense for
research into networking sometime in 1969
Became an object of interest by the 1970’s to large companies and Universities
It wasn’t until 1980’s that technology advanced far enough for there to be any use of this network
DNS – 1984 replacing IP addressing
HTTP and was invented in 1989 by Tim Berners-Lee
Graphical interface and web browsers appeared in the early 1990’s
![Page 9: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/9.jpg)
Effects
Great shift in social status and social boundaries over the net
individual have the liberty to exchange, view ideas and information anonymously
How do we define boundaries? Ethical and moral issues
![Page 10: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/10.jpg)
Effects (cont.)
New Age of Hacking - everyone is at greater risk - viruses are potentially more destructive - spyware
Priavacy
Internet policing and enforcement and regulation of the netwok - the development of software and hardware to protect against hacking firewalls virus protection
![Page 11: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/11.jpg)
Social Implications of Networked CommunicationsMatt Berger
![Page 12: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/12.jpg)
Networked Communications
Take many forms.E-mail, message boards, IRC.
Primary advantage: convenience factor. Social Implications
Community, local and global.Social Skills.The future of computer-mediated
communication.
![Page 13: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/13.jpg)
Community
Beneficial EffectsStudy has shown that networked communications
increase both local and global community involvement.
Not intuitive – would expect less local involvement.
Anonymity fosters a global community. Discrimination is now not a factor. Potential for this to spread into real life
interaction.
![Page 14: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/14.jpg)
Community
Detrimental Effects Internet communities are not situated
anywhere. Creates a certain level of unease and
mistrust.Transition from group-based societies to
network-based societies. Internet communities contain a very
weak level of connectivity.
![Page 15: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/15.jpg)
Social Skills
Advantages of AnonymityThe freedom a person has.
One can gain confidence in using an Internet persona.
Advantageous to normally anti-social people.
Easier for them to express their thoughts – could extend to real life interactions.
![Page 16: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/16.jpg)
Social Skills
Disadvantages of AnonymityUndergoing an Internet persona to insult
others. Freedom of Internet communication
encourages this.Constant level of distrust.
Obstructs the possibility of developing healthy relationships.
Computer-mediated communication is simply a poor substitute for physical interaction.
![Page 17: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/17.jpg)
Future of Networked Communications Advances under a matter of convenience. Should always be aware of the social
consequences.For instance – recent controversy of using
web logs as valid information sources. Ultimately, will never be a substitute for
standard person-to-person communication.
![Page 18: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/18.jpg)
Growth of, Control of, and Access to the Internet
Luis M. Callejo
![Page 19: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/19.jpg)
Growth of the Internet
Trends of Growth Adaption into
Society Growing Ethical
Considerations Cyber ethics
Growth of Applications
Website vs. Peer to Peer
![Page 20: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/20.jpg)
Control of the Internet
Autonomous SystemPeeringBorder Gateway Protocol
Concerns about security
![Page 21: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/21.jpg)
Access to the Internet
Access to Information Cyberethics
Presentation of InformationDirectoriesAutomation
![Page 22: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/22.jpg)
Conclusion
What will determine the future of the Internet?Development of CyberethicsDemands on Architecture
![Page 23: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/23.jpg)
Gender Related Issues of Computing
NickNick CavuotoCavuoto
![Page 24: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/24.jpg)
History of Women in History of Women in ComputingComputing Ada Byron Edith Clarke Grace Murray Hopper World War II opened the door
![Page 25: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/25.jpg)
Traditionally
Math and Math and Technology = MenTechnology = Men
Humanities = Humanities = WomenWomen
Video Games also Video Games also are a factorare a factor
![Page 26: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/26.jpg)
At the Job
Stereotypes in the work place Sex appeal Corporations with women at the helm are
more successful
![Page 27: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/27.jpg)
What to do?
AWC (Association for Women in Computing)
Parents Teachers
![Page 28: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/28.jpg)
International Issue
Kefei Chen
![Page 29: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/29.jpg)
Informational Technology (IT) and National Culture Comparing the different approaches for
managing IT between Japanese Culture and Western Culture.
![Page 30: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/30.jpg)
Informational Technology (IT) and National Culture How do they decide what are their business needs?
strategic alignment vs. strategic instinct How will they know whether IT investments are worthwhile?
value for money vs. performance improvement When they are trying to improve a business process, how does
technology fit into their thinking? technology solutions vs. appropriate technology
How should IT users and IT specialists connect in their organization? IT user relations vs. organizational bonding
How can they design systems that improve organizational performance? system design vs. human design
![Page 31: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/31.jpg)
IT and Economy
IT consumers and IT producers in Asia
![Page 32: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/32.jpg)
IT and Economy Japan Model of IT Industrial
Development
![Page 33: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/33.jpg)
Internet Users
![Page 34: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/34.jpg)
Internet Users
Key factors that determine the use of information technologies on an international basis: IncomeCost of connection MonthlyEducation GenderAgeLanguage
![Page 35: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/35.jpg)
Internet Users
Example: An African country: ZambiaReasons of low internet usage:
High Cost of the internet Low Computer Penetration Shortage of Trained Personnel Lack of Awareness of Information
Technology
![Page 36: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/36.jpg)
Computer Crime
Hodan Egal
![Page 37: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/37.jpg)
Computer Crime
Computer Crime is defined as any illegal act where special knowledge of computer is essential for its perpetration, investigation, or persecution.
![Page 38: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/38.jpg)
Types of Attacks
Military and Intelligence attacks Business Attacks Financial Attacks Terrorist Attacks Grudge Attacks Fun Attacks
![Page 39: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/39.jpg)
Military and Intelligence Attacks Computer store information ranging from the
positioning of Air Force satellites to plans for troop deployment throughout the world.
In June 1988, computer cracker Kevin Mitnick (code-named “Condor”) broke in remotely to a defense Department network. He allegedly stole a pre-release version of Digital Equipment Corporations VMS V5.0 operating system software and temporarily stored on a Navy computer at the Patuxent Naval Air Station.
![Page 40: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/40.jpg)
Business Attacks
Business are increasingly the target of both competitors and the curious, although most business crimes are still committed by employees.e.g. In December 1987, apple found a virus in its electronic mail system. The virus succeeded in shutting down the system and erasing all Apple’s voice-mail.
![Page 41: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/41.jpg)
Financial Attacks
Banks are always a tempting target for computer criminals.
e.g. Back 1998, seven criminals hatched a plot against the First National Bank of Chicago. The group used a wire transfer scheme to move &25.37 million belonging to Merrill Lynch and Co, $25 million belonging to United Airlines and $19.75 million belonging to the Brown-Forman Corporation to a New York bank and then to two separate banks in Vienna.
![Page 42: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/42.jpg)
Terrorist Attacks
Even terrorist have gone high-tech. Terrorist were striking at thecomputer industry, but not for the firsttime
![Page 43: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/43.jpg)
Grudge & Fun Attacks
Not all computers criminals areseeking information.Some simplywant to wreak damage anddestruction.At one extreme, computer crime canbe much more profitable than otherforms of fraud and terrorism.
![Page 44: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/44.jpg)
Federal Approaches
This section explores the major federalstatutes, enforcement strategies andconstitutional issues regarding computerrelated crimes.
Federal Criminal Code Enforcement Strategies
![Page 45: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/45.jpg)
Prevention of Computer CrimeThere are many approaches to protect
computer system from attack. Identifying Risks Physical Security Personal Security Communication Security Operations Security
![Page 46: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/46.jpg)
Conclusion
Computer Crime will increasingly be a challenge faced by all industrialized nations.Solutions that rely solely on internationalcoordination to investigate and prosecutecomputer criminals will not work.
![Page 47: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/47.jpg)
Computer Crime Prevention
Sean Egan
![Page 48: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/48.jpg)
Preventing Computer Crime Use secure software Have a sane password policy Understand how computer crime works
![Page 49: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/49.jpg)
Use Secure Software
Regardless of how safe you are, using insecure software puts you at risk
Don't use buggy softwareMicrosoft Windows/IE/Outlook/etc. suck
Even bug-free software is dangerous if poorly designedTelnet vs. SSH
![Page 50: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/50.jpg)
Have a Sane Password Policy Passwords are often the only thing keeping
intruders out of your system Choose good passwords
Consider passphrases Handle with care
Change passwords oftenKeep passwords secret
![Page 51: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/51.jpg)
Understand How Computer Crime Works Keep informed about software vulnerabilities
BugTraq mailing listOperating system announcementsAutomatic updates
HoneypotsUsed to safely monitor illicit activity in the
wildNot limited just to single computers
![Page 52: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/52.jpg)
Conclusion
Be responsible computer users Make smart choices about software Exhibit responsible behavior about
password usage Educate yourself
![Page 53: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/53.jpg)
Diversity in the Workplace
Philip Fong
![Page 54: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/54.jpg)
Diversity
Acknowledging, understanding, accepting, valuing, and celebrating differences among people with respect to age, class, ethnicity, gender, physical and mental ability, race, sexual orientation, spiritual practice, and public assistance status
![Page 55: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/55.jpg)
Affirmative Action
Established by Kennedy Administration Counteract racial discrimination “Reverse Discrimination” Now nearly obsolete
![Page 56: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/56.jpg)
Glass Ceiling
Barrier that inhibits women and minorities from top-tier job positions
The result of conscious and unconscious stereotyping and discrimination
![Page 57: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/57.jpg)
Gender Roles
Imposed by tradition and society Men – “Power suit, power tie, power
steering.” Women – 50 times more likely to stay at
home to take care of children
![Page 58: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/58.jpg)
Age
Elderly employees are paid more with lucrative benefit packages
More expensive to keep in the work force Older employees are more educated –
important to country’s productivity growth
![Page 59: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/59.jpg)
Diversity is the Future
Monochrome work force will not survive into the future
Diverse work force promotes creativity, productivity, and competitiveness
Diversity reinforces that employees are hired based on skill and talent, not on demographic differences
![Page 60: The Social Context of Computing Group 1. Introduction to the Social Implications of Computing John Basias](https://reader035.vdocuments.mx/reader035/viewer/2022062320/56649d5e5503460f94a3e00f/html5/thumbnails/60.jpg)
Diversity is the Future (cont.) Projected that women will eventually make
up 50% of the entire labor force 85% of new workers in 2005 include
women and minorities Human resource departments
– trained to manage diverse workplace– trained to hire the best talent