the social implications of computing "the most profound technologies are those that disappear....

41
The Social The Social Implications of Implications of Computing Computing "The most profound technologies "The most profound technologies are those that disappear. They are those that disappear. They weave themselves into the weave themselves into the fabric of everyday life until fabric of everyday life until they are indistinguishable from they are indistinguishable from it.” it.” -Mark Weiser, Xerox PARC -Mark Weiser, Xerox PARC

Post on 22-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

The Social Implications The Social Implications of Computingof Computing

"The most profound technologies are "The most profound technologies are those that disappear. They weave those that disappear. They weave themselves into the fabric of everyday life themselves into the fabric of everyday life until they are indistinguishable from it.”until they are indistinguishable from it.”

-Mark Weiser, Xerox PARC-Mark Weiser, Xerox PARC

Computer Contributions to Computer Contributions to SocietySociety

E-mailE-mail Instant MessagingInstant Messaging The WebThe Web Cellular PhonesCellular Phones Video GamesVideo Games

Social Implications of Social Implications of Networked Networked

CommunicationsCommunications

Estimated Users on the 'Net as Estimated Users on the 'Net as of March 1999of March 1999

88.3 million in the US and Canada 88.3 million in the US and Canada

37.15 million in Europe 37.15 million in Europe

26.97 million in Asia 26.97 million in Asia

4.63 million in South America 4.63 million in South America

1.14 million in Africa 1.14 million in Africa 0.88 million in Middle East 0.88 million in Middle East 159.0 million159.0 million Doubles every yearDoubles every year

The Internet as a The Internet as a Communications MediumCommunications Medium

Electronic PublicationsElectronic Publications Library ArchivesLibrary Archives NewsgroupsNewsgroups EmailEmail AdvertisementsAdvertisements NewsNews P2P networksP2P networks

Public SpheresPublic Spheres

Prior Networked Prior Networked Communication:Communication:

Town HallTown Hall ChurchChurch Town SquareTown Square

Ensuing Networked Ensuing Networked Communication:Communication:

TelevisionTelevision NewsgroupsNewsgroups Online PollsOnline Polls

Virtual vs. ‘Real’ ResourcesVirtual vs. ‘Real’ Resources

Online coursesOnline courses EmailEmail Research using Research using

search enginessearch engines

Class discussionClass discussion Having coffee with Having coffee with

a frienda friend A book which is A book which is

primary source primary source written by an written by an expert in the fieldexpert in the field

Globalization vs. IsolationGlobalization vs. Isolation

Share ideas with Share ideas with the worldthe world

Buy anything from Buy anything from anywhere, anywhere, regardless of regardless of locationlocation

Connect with Connect with anyone in the world anyone in the world using 2 of your using 2 of your sensessenses

But will be taken But will be taken with a grain of saltwith a grain of salt

Without Without experiencing any experiencing any culture outside the culture outside the computer roomcomputer room

As opposed to As opposed to meeting in person meeting in person and communicating and communicating on all 5on all 5

ConsCons

Copyright infringementCopyright infringement AddictionAddiction Loss of social skillLoss of social skill InsecurityInsecurity DesensitizationDesensitization

ConclusionConclusion

Great tool if not taken out of contextGreat tool if not taken out of context

Growth of, Access to, and Growth of, Access to, and Control of the InternetControl of the Internet

Extreme GrowthExtreme Growth

0123456789

10

1971 1983 2003 2050

Computers on the ARPA/ Internet (in thousands)

Year 1971 1983 2003 2050

Number of computers

25 10003000

(projection)Who

knows?

Growth of the internetGrowth of the internet

ARPANET - started by DoD to ARPANET - started by DoD to research networks (1969)research networks (1969)

December 1995 - 16 million usersDecember 1995 - 16 million users

Current:Current:• According to NielsonAccording to Nielson

580 million people worldwide now have 580 million people worldwide now have access to the internetaccess to the internet

168.6 million attributed to the U.S168.6 million attributed to the U.S

The Top Five Most Popular Internet Activities The Top Five Most Popular Internet Activities (Percent Of Internet Users)(Percent Of Internet Users)

1. 1. E-mail and instant messaging E-mail and instant messaging 87.9%87.9%2. 2. Web surfing or browsingWeb surfing or browsing 76.3%76.3%3. 3. Buying online Buying online 48.9%48.9%4. 4. Finding entertainment information Finding entertainment information 47.9%47.9%5. 5. Reading news Reading news 47.6%47.6%

(data from 2001) (data from 2001)

• Email usage has doubled in past three Email usage has doubled in past three yearsyears

30 30 60 billion messages a year 60 billion messages a year Another doubling expected by 2005Another doubling expected by 2005

Who controls the internetWho controls the internet

Cyber crime definedCyber crime defined• The dissemination of racist and xenophobic The dissemination of racist and xenophobic

material through computer systemsmaterial through computer systems

GovernmentsGovernments• Citizens must use state-run ISPs in some Citizens must use state-run ISPs in some

countriescountries Blocked contentBlocked content

Who controls the internet (cont’d)Who controls the internet (cont’d)

Parents and EmployersParents and Employers• Cyber nannyCyber nanny

Disallows graphic or violent imagesDisallows graphic or violent images

• PICSPICS Platform for Internet Content Selection Platform for Internet Content Selection Labels that discuss a sites contentLabels that discuss a sites content

Access to the InternetAccess to the Internet

72.3% of Americans use the net72.3% of Americans use the net• Others do not for lack of accessOthers do not for lack of access

Not disinterestNot disinterest Men & WomenMen & Women

• Approx the same 74-70%Approx the same 74-70% Income and educational difsIncome and educational difs

• PhDs >85% PhDs >85% >$100k = 10 hrs>$100k = 10 hrs

vs.vs. vs.vs.

• High school 60%High school 60% <$30k = 4hrs <$30k = 4hrs

Here to stayHere to stay

More people are using it dailyMore people are using it daily Look forward to equal access…Look forward to equal access…

After all, the Internet is for everyoneAfter all, the Internet is for everyone

(RFC 3721)(RFC 3721)

Gender related Issues of Gender related Issues of Computing Computing

Personal Experience Personal Experience

I was too quick to I was too quick to judge.judge.

Stereotyped.Stereotyped.

Can such a biased Can such a biased stereotype be stereotype be justified? justified?

Is there a Gender Gap?Is there a Gender Gap?

After analyzing After analyzing more than 1,000 more than 1,000 research studies, research studies, the American the American Association of Association of University Women University Women (AAUW) has (AAUW) has concluded that concluded that when it comes to when it comes to technology, there technology, there is an alarming is an alarming gender gap. gender gap.

StatisticsStatistics US population of men US population of men

and women is 50:50.and women is 50:50.

Tech jobs are growing Tech jobs are growing every year.every year.

However women However women represent only 20% of represent only 20% of the Computer science the Computer science and engineering labor and engineering labor force. force.

Where are all the Women?Where are all the Women?

So What?So What?

““The gender gap in computer science must be The gender gap in computer science must be eliminated for two reasons.eliminated for two reasons.

(1) The more obvious reason is to ensure that fair (1) The more obvious reason is to ensure that fair and equal treatment is being provided to all and equal treatment is being provided to all potential and current computer scientists. potential and current computer scientists.

(2) The less considered danger of the gender gap (2) The less considered danger of the gender gap concerns the advancement of the field as a concerns the advancement of the field as a whole. By hindering half of the population as whole. By hindering half of the population as potential contributors, the field of computer potential contributors, the field of computer science decreases its chance of further science decreases its chance of further development.”development.”

Quoted from: http://www.expage.com/page/genderissues3

AnglesAngles Male-Dominated EnvironmentMale-Dominated Environment

-Are women being elbowed out?-Are women being elbowed out? DiscriminationDiscrimination

-HR playing favoritism?-HR playing favoritism? Image of Computing Image of Computing

--Nerdy/Bad Stereotypes Nerdy/Bad Stereotypes Lack of Adequate High Lack of Adequate High

School/College PreparationSchool/College Preparation -Do teachers -Do teachers encourage/discourage females to encourage/discourage females to pursue tech jobs?pursue tech jobs?

Societal ImplicationsSocietal Implications -Games-Games-Role models-Role models

Lack of Adequate Lack of Adequate High School/College PreparationHigh School/College Preparation

According to a study by the According to a study by the Research Foundation for Improving the Research Foundation for Improving the Representation of Women in the Technology Workforce, Representation of Women in the Technology Workforce, the the number of women who received CS bachelor's degrees, the number of women who received CS bachelor's degrees, the number peaked in 1986 when women represented approximately number peaked in 1986 when women represented approximately 36% of the total number of graduates. Since then numbers have 36% of the total number of graduates. Since then numbers have only declined!only declined!

““The gender gaps we see are evidenceThe gender gaps we see are evidence that public schools are failing to fully prepare that public schools are failing to fully prepare girls for the 21st century”.girls for the 21st century”.

Concerned and embarrassed that women Concerned and embarrassed that women account for only 15 to 20 percent of their account for only 15 to 20 percent of their computer science majors, a number of top computer science majors, a number of top colleges are looking for ways to attract more women to careers in colleges are looking for ways to attract more women to careers in computers. They are adding courses that appeal to women's computers. They are adding courses that appeal to women's strengths, creating mentoring programs and thinking harder about strengths, creating mentoring programs and thinking harder about the gender gap.the gender gap.

Societal ImplicationsSocietal Implications- Childhood Development?- Childhood Development?

The Association for Computing Machinery's The Association for Computing Machinery's Committee on Women in Computing (ACM-W) have Committee on Women in Computing (ACM-W) have found that:found that:

Role Models?Role Models? – “Fathers are more likely to be using – “Fathers are more likely to be using computers in the home than mothers so you have the computers in the home than mothers so you have the element of the role model”.element of the role model”.

Self-confidence? - boys “exhibit higher computer self-Self-confidence? - boys “exhibit higher computer self-confidence and a more positive attitude about computers confidence and a more positive attitude about computers than girls”.than girls”.

Societal Implications Societal Implications - Video Games?- Video Games?

Computer games, which often attract children to Computer games, which often attract children to computers, are written by male programmers!computers, are written by male programmers!

Generally these games consist of violence, killing and Generally these games consist of violence, killing and scoring points, all of which interest young boys . Thus girls, scoring points, all of which interest young boys . Thus girls, who are not engaged as much by these games, are less who are not engaged as much by these games, are less likely to follow this avenue into computer science.likely to follow this avenue into computer science.

Software produced specifically for girls?Software produced specifically for girls?

-Researchers and parents feel that so-called “pink” -Researchers and parents feel that so-called “pink” software, such as Disney’s Princess Fashion Boutique and software, such as Disney’s Princess Fashion Boutique and Barbie Magic Hairstyler will teach girls the technology skills Barbie Magic Hairstyler will teach girls the technology skills and confidence building they need to narrow the digital and confidence building they need to narrow the digital gender gap.gender gap.

ConclusionConclusion

As technology continues to expand As technology continues to expand nationally and internationally, it is nationally and internationally, it is important that advances are equally important that advances are equally influenced by men and women.influenced by men and women.

In order to reduce the Gender Gap, the In order to reduce the Gender Gap, the issue must be taken seriously. Schools, issue must be taken seriously. Schools, video game manufacturers, and industries video game manufacturers, and industries must find a way to involve both genders. must find a way to involve both genders.

Parents (mothers) must take an active roll Parents (mothers) must take an active roll in influencing and encouraging their in influencing and encouraging their daughters to pursue tech jobs/degrees.daughters to pursue tech jobs/degrees.

International IssuesInternational Issues

Issues of International BusinessIssues of International Business

LanguageLanguage Time ZonesTime Zones Sharing of dataSharing of data Learning foreign Business PracticesLearning foreign Business Practices PresentationPresentation

LanguageLanguage

Knowing a second languageKnowing a second language• If not then a translator may be neededIf not then a translator may be needed• Americans tend not to be multilingualAmericans tend not to be multilingual

Translations may contain errorsTranslations may contain errors

TimeTime

Time zone differencesTime zone differences• Limited windows of communicationLimited windows of communication

Email?Email?• Not always a perfect solutionNot always a perfect solution

Can be time intensiveCan be time intensive May not produce the best resultsMay not produce the best results

Sharing of DataSharing of Data

Media of transport/ CommunicationMedia of transport/ Communication• WANWAN

Transfering projectsTransfering projects EmailsEmails

• Snail MailSnail Mail

Learning foreign Business Learning foreign Business PracticesPractices

Trying to treat international business Trying to treat international business partners like an american business is a BAD partners like an american business is a BAD idea...idea...• ““The appropriate ways of conducting business The appropriate ways of conducting business

and holding meetings vary from country to and holding meetings vary from country to country and from culture to culture.”country and from culture to culture.”

Good exampleGood example• A meeting set for a certain time in China a A meeting set for a certain time in China a

person should be 15 minutes early and preparingperson should be 15 minutes early and preparing• A meeting set for a certain time in Mexico might A meeting set for a certain time in Mexico might

not actually start for an hour or twonot actually start for an hour or two

Examples of Do’s and Dont’sExamples of Do’s and Dont’s

GermanyGermany• DoDo

Knock before opening a closed door. Knock before opening a closed door.

• Don'tDon't Shake someone's hand while your other Shake someone's hand while your other

hand is in your pocket. hand is in your pocket.

Examples of Do’s and Dont’sExamples of Do’s and Dont’s

FranceFrance• DoDo

Avoid calling your associates' personal Avoid calling your associates' personal number for business related issues. If it number for business related issues. If it cannot be avoided, do so before 9:00pm. cannot be avoided, do so before 9:00pm.

For corporate letters or e-mail, use a very For corporate letters or e-mail, use a very formal and business-like approach. formal and business-like approach.

• Don'tDon't Use first names during a business meeting. Use first names during a business meeting. Show up late for meetings. Show up late for meetings. Bring up business at the start of a Bring up business at the start of a

dinner/meeting. dinner/meeting.

Examples of Do’s and Dont’sExamples of Do’s and Dont’s

JapanJapan• Forget it I don’t have enough time...Forget it I don’t have enough time...

LiteratureLiterature

Books found @ barnesandnoble.comBooks found @ barnesandnoble.com

• Doing Business in ChinaDoing Business in China• Business Korea: A Practical Guide to Business Korea: A Practical Guide to

Understanding South Korean Business CultureUnderstanding South Korean Business Culture• International BusinessInternational Business• International Business and Trade: Theory, International Business and Trade: Theory,

Practice, and PolicyPractice, and Policy

PresentationPresentation

OrganizationOrganization AppearanceAppearance ““Be civil, neat and listen to what they Be civil, neat and listen to what they

are saying. Since we are are saying. Since we are representing our company, we need representing our company, we need to project the best image to our to project the best image to our customer.” –Ralph Flataucustomer.” –Ralph Flatau

ReferencesReferences• http://www.zakon.org/robert/internet/timeline/ • http://www.isp-planet.com/research/• Number of users: http://cyberatlas.internet.com/big_picture/geographics/article/0,,5911_1593591,00.html (feb

2003)• IPv4: http://www.isoc.org/briefings/001/ • Crime: http://www.cyber-rights.org/cybercrime/• Demographics: http://ccp.ucla.edu/pdf/UCLA-Internet-Report-2001.pdf • Gov’t control: http://www.rferl.org/nca/special/enemies.html• The map of the world: http://www.ipsos-reid.com/us/services/syndicated/dsp_face.cfm• Armando Gomez. (2003, February 24). Business Travel Etiquette. [World Wide Web] Available:

http://www.askmen.com/money/career/20_career.html• Flatau, Ralph. (2003, February 25). Infimed Inc Manager. [Email Interview]• http://portal.acm.org/citation.cfm?id=320264<http://portal.acm.org/citation.cfm?

id=320264&;coll=portal&dl=ACM&CFID=8149335&CFTOKEN=12007127>&coll=portal&dl=ACM&CFID=8149335&CFTOKEN=12007127

• Brainball: http://portal.acm.org/toc.cfm?id=604575<http://portal.acm.org/toc.cfm?id=604575&;idx=J373&type=issue&coll=portal&dl=ACM&part=magazine&WantType=Magazines&title=interactions&CFID=8149042&CFTOKEN=44437748>&idx=J373&type=issue&coll=portal&dl=ACM&part=magazine&WantType=Magazines&title=interactions&CFID=8149042&CFTOKEN=44437748

• Number of Cell Phone Customers: http://www.emc-database.com/website.nsf/index/pr020319http://inventors.about.com/gi/dynamic/offsite.htm?site=

• http://www.pbs.org/internet/timeline/timeline%2Dtxt.html• http://www.oreillynet.com/pub/a/wireless/2001/09/28/relay.html

References (Cont.)References (Cont.)

• http://www.acm.org/women/• http://www.expage.com/page/genderissues3• http://www.cpsr.org/program/gender/index.html• http://www.pbs.org/newshour/bb/youth/jan-june99/gendergap_1-29.html• http://www.iota.org/Winter00/gendergap.html• http://www.ucalgary.ca/~northcot/380-2/lec12.html • http://www.ucalgary.ca/%7Ekawwalsh/introduction.htm • http://www.interweb-tech.com/nsmnet/docs/updated_numbers.htm • http://www.anu.edu.au/people/Roger.Clarke/II/NetN3.html• http://www.uclic.ucl.ac.uk/harold/srf/networked.pdf • http://www.caul.edu.au/org/commsdoc.htm