The Social Context of Computing - PowerPoint PPT Presentation

About This Presentation
Title:

The Social Context of Computing

Description:

The first fully functioning electronic digital computer was Colossus (1943) ... E-mail, message boards, IRC. Primary advantage: convenience factor. Social Implications ... – PowerPoint PPT presentation

Number of Views:907
Avg rating:3.0/5.0
Slides: 61
Provided by: nic188
Category:

less

Transcript and Presenter's Notes

Title: The Social Context of Computing


1
The Social Context of Computing
  • Group 1

2
Introduction to the Social Implications of
Computing
  • John Basias

3
History of computing
  • The first fully functioning electronic digital
    computer was Colossus (1943)
  • 'first generation' computers
  • weighed 30 tons and contained 18,000 electronic
    valves

4
Second generation Computing
  • Transistor was invented in 1947
  • 'Second Generation' and computers made their
    debut the late 1950s and early 1960s
  • still bulky and strictly the domain of
    Universities and governments

5
'Third and Fourth Generation' computing the great
leap foward
  • Jack St. Claire Kilby's invention of the
    integrated circuit or microchip in the 1950s
  • 1963 technology was integrated creating the first
    3rd generation computers
  • Smaller more efficient were used by smaller
    businesses
  • Still unavailable or affordable at the individual
    level

6
'Third and Fourth Generation' computing the great
leap forward (cont.)
  • November 15th, 1971, Intel released the 4004, the
    world's first commercial microprocessor and the
    RAM chip
  • Dawn of the fourth and latest generation of
    computing

7
Effects
  • Drive toward improvement and applicability
  • The creation of operating systems in the 1980s
    that directly translated conceptual action into
    computer code
  • Cheap affordable computing became possible to a
    much larger audience
  • Revolutionized the job market restructured the
    inner operations of many businesses. Outdated a
    lot of technology.
  • The emergence of hacking and viruses as threats

8
The Dawn of the Internet
  • Origionally ARPANET started by the US Dept. of
    Defense for research into networking sometime in
    1969
  • Became an object of interest by the 1970s to
    large companies and Universities
  • It wasnt until 1980s that technology advanced
    far enough for there to be any use of this
    network
  • DNS 1984 replacing IP addressing
  • HTTP and was invented in 1989 by Tim Berners-Lee
  • Graphical interface and web browsers appeared in
    the early 1990s

9
Effects
  • Great shift in social status and social
    boundaries over the net
  • individual have the liberty to exchange, view
    ideas and information anonymously
  • How do we define boundaries? Ethical and moral
    issues

10
Effects (cont.)
  • New Age of Hacking - everyone is at greater
    risk - viruses are potentially more
    destructive - spyware
  • Priavacy
  • Internet policing and enforcement and regulation
    of the netwok - the development of software
    and hardware to protect against hacking
    firewalls virus protection

11
Social Implications of Networked Communications
  • Matt Berger

12
Networked Communications
  • Take many forms.
  • E-mail, message boards, IRC.
  • Primary advantage convenience factor.
  • Social Implications
  • Community, local and global.
  • Social Skills.
  • The future of computer-mediated communication.

13
Community
  • Beneficial Effects
  • Study has shown that networked communications
    increase both local and global community
    involvement.
  • Not intuitive would expect less local
    involvement.
  • Anonymity fosters a global community.
  • Discrimination is now not a factor.
  • Potential for this to spread into real life
    interaction.

14
Community
  • Detrimental Effects
  • Internet communities are not situated anywhere.
  • Creates a certain level of unease and mistrust.
  • Transition from group-based societies to
    network-based societies.
  • Internet communities contain a very weak level of
    connectivity.

15
Social Skills
  • Advantages of Anonymity
  • The freedom a person has.
  • One can gain confidence in using an Internet
    persona.
  • Advantageous to normally anti-social people.
  • Easier for them to express their thoughts could
    extend to real life interactions.

16
Social Skills
  • Disadvantages of Anonymity
  • Undergoing an Internet persona to insult others.
  • Freedom of Internet communication encourages
    this.
  • Constant level of distrust.
  • Obstructs the possibility of developing healthy
    relationships.
  • Computer-mediated communication is simply a poor
    substitute for physical interaction.

17
Future of Networked Communications
  • Advances under a matter of convenience.
  • Should always be aware of the social
    consequences.
  • For instance recent controversy of using web
    logs as valid information sources.
  • Ultimately, will never be a substitute for
    standard person-to-person communication.

18
Growth of, Control of, and Access to the
Internet
  • Luis M. Callejo

19
Growth of the Internet
  • Trends of Growth
  • Adaption into Society
  • Growing Ethical Considerations
  • Cyber ethics
  • Growth of Applications
  • Website vs. Peer to Peer

20
Control of the Internet
  • Autonomous System
  • Peering
  • Border Gateway Protocol
  • Concerns about security

21
Access to the Internet
  • Access to Information
  • Cyberethics
  • Presentation of Information
  • Directories
  • Automation

22
Conclusion
  • What will determine the future of the Internet?
  • Development of Cyberethics
  • Demands on Architecture

23
Gender Related Issues of Computing
  • Nick Cavuoto

24
History of Women in Computing
  • Ada Byron
  • Edith Clarke
  • Grace Murray Hopper
  • World War II opened the door

25
Traditionally
  • Math and Technology Men
  • Humanities Women
  • Video Games also are a factor

26
At the Job
  • Stereotypes in the work place
  • Sex appeal
  • Corporations with women at the helm are more
    successful

27
What to do?
  • AWC (Association for Women in Computing)
  • Parents
  • Teachers

28
International Issue
  • Kefei Chen

29
Informational Technology (IT) and National
Culture
  • Comparing the different approaches for managing
    IT between Japanese Culture and Western Culture.

30
Informational Technology (IT) and National
Culture
  • How do they decide what are their business needs?
  • strategic alignment vs. strategic instinct
  • How will they know whether IT investments are
    worthwhile?
  • value for money vs. performance improvement
  • When they are trying to improve a business
    process, how does technology fit into their
    thinking?
  • technology solutions vs. appropriate technology
  • How should IT users and IT specialists connect in
    their organization?
  • IT user relations vs. organizational bonding
  • How can they design systems that improve
    organizational performance?
  • system design vs. human design

31
IT and Economy
  • IT consumers and IT producers in Asia

32
IT and Economy
  • Japan Model of IT Industrial Development

33
Internet Users
34
Internet Users
  • Key factors that determine the use of information
    technologies on an international basis
  • Income
  • Cost of connection Monthly
  • Education
  • Gender
  • Age
  • Language

35
Internet Users
  • Example
  • An African country Zambia
  • Reasons of low internet usage
  • High Cost of the internet
  • Low Computer Penetration
  • Shortage of Trained Personnel
  • Lack of Awareness of Information Technology

36
Computer Crime
  • Hodan Egal

37
Computer Crime
  • Computer Crime is defined as any illegal act
    where special knowledge of computer is essential
    for its perpetration, investigation, or
    persecution.

38
Types of Attacks
  • Military and Intelligence attacks
  • Business Attacks
  • Financial Attacks
  • Terrorist Attacks
  • Grudge Attacks
  • Fun Attacks

39
Military and Intelligence Attacks
  • Computer store information ranging from the
    positioning of Air Force satellites to plans for
    troop deployment throughout the world.
  • In June 1988, computer cracker Kevin Mitnick
    (code-named Condor) broke in remotely to a
    defense Department network. He allegedly stole a
    pre-release version of Digital Equipment
    Corporations VMS V5.0 operating system software
    and temporarily stored on a Navy computer at the
    Patuxent Naval Air Station.

40
Business Attacks
  • Business are increasingly the target of both
    competitors and the curious, although most
    business crimes are still committed by employees.
  • e.g. In December 1987, apple found a virus in
    its electronic mail system. The virus succeeded
    in shutting down the system and erasing all
    Apples voice-mail.

41
Financial Attacks
  • Banks are always a tempting target for computer
    criminals.
  • e.g. Back 1998, seven criminals hatched a plot
    against the First National Bank of Chicago. The
    group used a wire transfer scheme to move 25.37
    million belonging to Merrill Lynch and Co, 25
    million belonging to United Airlines and 19.75
    million belonging to the Brown-Forman Corporation
    to a New York bank and then to two separate banks
    in Vienna.

42
Terrorist Attacks
  • Even terrorist have gone high-tech.
  • Terrorist were striking at the
  • computer industry, but not for the first
  • time

43
Grudge Fun Attacks
  • Not all computers criminals are
  • seeking information.Some simply
  • want to wreak damage and
  • destruction.
  • At one extreme, computer crime can
  • be much more profitable than other
  • forms of fraud and terrorism.

44
Federal Approaches
  • This section explores the major federal
  • statutes, enforcement strategies and
  • constitutional issues regarding computer
  • related crimes.
  • Federal Criminal Code
  • Enforcement Strategies

45
Prevention of Computer Crime
  • There are many approaches to protect computer
    system from attack.
  • Identifying Risks
  • Physical Security
  • Personal Security
  • Communication Security
  • Operations Security

46
Conclusion
  • Computer Crime will increasingly be a
  • challenge faced by all industrialized nations.
  • Solutions that rely solely on international
  • coordination to investigate and prosecute
  • computer criminals will not work.

47
Computer Crime Prevention
  • Sean Egan

48
Preventing Computer Crime
  • Use secure software
  • Have a sane password policy
  • Understand how computer crime works

49
Use Secure Software
  • Regardless of how safe you are, using insecure
    software puts you at risk
  • Don't use buggy software
  • Microsoft Windows/IE/Outlook/etc. suck
  • Even bug-free software is dangerous if poorly
    designed
  • Telnet vs. SSH

50
Have a Sane Password Policy
  • Passwords are often the only thing keeping
    intruders out of your system
  • Choose good passwords
  • Consider passphrases
  • Handle with care
  • Change passwords often
  • Keep passwords secret

51
Understand How Computer Crime Works
  • Keep informed about software vulnerabilities
  • BugTraq mailing list
  • Operating system announcements
  • Automatic updates
  • Honeypots
  • Used to safely monitor illicit activity in the
    wild
  • Not limited just to single computers

52
Conclusion
  • Be responsible computer users
  • Make smart choices about software
  • Exhibit responsible behavior about password usage
  • Educate yourself

53
Diversity in the Workplace
  • Philip Fong

54
Diversity
  • Acknowledging, understanding, accepting, valuing,
    and celebrating differences among people with
    respect to age, class, ethnicity, gender,
    physical and mental ability, race, sexual
    orientation, spiritual practice, and public
    assistance status

55
Affirmative Action
  • Established by Kennedy Administration
  • Counteract racial discrimination
  • Reverse Discrimination
  • Now nearly obsolete

56
Glass Ceiling
  • Barrier that inhibits women and minorities from
    top-tier job positions
  • The result of conscious and unconscious
    stereotyping and discrimination

57
Gender Roles
  • Imposed by tradition and society
  • Men Power suit, power tie, power steering.
  • Women 50 times more likely to stay at home to
    take care of children

58
Age
  • Elderly employees are paid more with lucrative
    benefit packages
  • More expensive to keep in the work force
  • Older employees are more educated important to
    countrys productivity growth

59
Diversity is the Future
  • Monochrome work force will not survive into the
    future
  • Diverse work force promotes creativity,
    productivity, and competitiveness
  • Diversity reinforces that employees are hired
    based on skill and talent, not on demographic
    differences

60
Diversity is the Future (cont.)
  • Projected that women will eventually make up 50
    of the entire labor force
  • 85 of new workers in 2005 include women and
    minorities
  • Human resource departments
  • trained to manage diverse workplace
  • trained to hire the best talent
Write a Comment
User Comments (0)
About PowerShow.com