Title: The Social Context of Computing
1The Social Context of Computing
2Introduction to the Social Implications of
Computing
3History of computing
- The first fully functioning electronic digital
computer was Colossus (1943) - 'first generation' computers
- weighed 30 tons and contained 18,000 electronic
valves
4Second generation Computing
- Transistor was invented in 1947
- 'Second Generation' and computers made their
debut the late 1950s and early 1960s - still bulky and strictly the domain of
Universities and governments
5'Third and Fourth Generation' computing the great
leap foward
- Jack St. Claire Kilby's invention of the
integrated circuit or microchip in the 1950s - 1963 technology was integrated creating the first
3rd generation computers - Smaller more efficient were used by smaller
businesses - Still unavailable or affordable at the individual
level
6'Third and Fourth Generation' computing the great
leap forward (cont.)
- November 15th, 1971, Intel released the 4004, the
world's first commercial microprocessor and the
RAM chip - Dawn of the fourth and latest generation of
computing
7Effects
- Drive toward improvement and applicability
- The creation of operating systems in the 1980s
that directly translated conceptual action into
computer code - Cheap affordable computing became possible to a
much larger audience - Revolutionized the job market restructured the
inner operations of many businesses. Outdated a
lot of technology. - The emergence of hacking and viruses as threats
8The Dawn of the Internet
- Origionally ARPANET started by the US Dept. of
Defense for research into networking sometime in
1969 - Became an object of interest by the 1970s to
large companies and Universities - It wasnt until 1980s that technology advanced
far enough for there to be any use of this
network - DNS 1984 replacing IP addressing
- HTTP and was invented in 1989 by Tim Berners-Lee
- Graphical interface and web browsers appeared in
the early 1990s
9Effects
- Great shift in social status and social
boundaries over the net - individual have the liberty to exchange, view
ideas and information anonymously - How do we define boundaries? Ethical and moral
issues
10Effects (cont.)
- New Age of Hacking - everyone is at greater
risk - viruses are potentially more
destructive - spyware - Priavacy
- Internet policing and enforcement and regulation
of the netwok - the development of software
and hardware to protect against hacking
firewalls virus protection
11Social Implications of Networked Communications
12Networked Communications
- Take many forms.
- E-mail, message boards, IRC.
- Primary advantage convenience factor.
- Social Implications
- Community, local and global.
- Social Skills.
- The future of computer-mediated communication.
13Community
- Beneficial Effects
- Study has shown that networked communications
increase both local and global community
involvement. - Not intuitive would expect less local
involvement. - Anonymity fosters a global community.
- Discrimination is now not a factor.
- Potential for this to spread into real life
interaction.
14Community
- Detrimental Effects
- Internet communities are not situated anywhere.
- Creates a certain level of unease and mistrust.
- Transition from group-based societies to
network-based societies. - Internet communities contain a very weak level of
connectivity.
15Social Skills
- Advantages of Anonymity
- The freedom a person has.
- One can gain confidence in using an Internet
persona. - Advantageous to normally anti-social people.
- Easier for them to express their thoughts could
extend to real life interactions.
16Social Skills
- Disadvantages of Anonymity
- Undergoing an Internet persona to insult others.
- Freedom of Internet communication encourages
this. - Constant level of distrust.
- Obstructs the possibility of developing healthy
relationships. - Computer-mediated communication is simply a poor
substitute for physical interaction.
17Future of Networked Communications
- Advances under a matter of convenience.
- Should always be aware of the social
consequences. - For instance recent controversy of using web
logs as valid information sources. - Ultimately, will never be a substitute for
standard person-to-person communication.
18Growth of, Control of, and Access to the
Internet
19Growth of the Internet
- Trends of Growth
- Adaption into Society
- Growing Ethical Considerations
- Cyber ethics
- Growth of Applications
- Website vs. Peer to Peer
20Control of the Internet
- Autonomous System
- Peering
- Border Gateway Protocol
- Concerns about security
21Access to the Internet
- Access to Information
- Cyberethics
- Presentation of Information
- Directories
- Automation
22Conclusion
- What will determine the future of the Internet?
- Development of Cyberethics
- Demands on Architecture
23Gender Related Issues of Computing
24History of Women in Computing
- Ada Byron
- Edith Clarke
- Grace Murray Hopper
- World War II opened the door
25Traditionally
- Math and Technology Men
- Humanities Women
- Video Games also are a factor
26At the Job
- Stereotypes in the work place
- Sex appeal
- Corporations with women at the helm are more
successful
27What to do?
- AWC (Association for Women in Computing)
- Parents
- Teachers
28International Issue
29Informational Technology (IT) and National
Culture
- Comparing the different approaches for managing
IT between Japanese Culture and Western Culture.
30Informational Technology (IT) and National
Culture
- How do they decide what are their business needs?
- strategic alignment vs. strategic instinct
- How will they know whether IT investments are
worthwhile? - value for money vs. performance improvement
- When they are trying to improve a business
process, how does technology fit into their
thinking? - technology solutions vs. appropriate technology
- How should IT users and IT specialists connect in
their organization? - IT user relations vs. organizational bonding
- How can they design systems that improve
organizational performance? - system design vs. human design
31IT and Economy
- IT consumers and IT producers in Asia
32IT and Economy
- Japan Model of IT Industrial Development
33Internet Users
34Internet Users
- Key factors that determine the use of information
technologies on an international basis - Income
- Cost of connection Monthly
- Education
- Gender
- Age
- Language
35Internet Users
- Example
- An African country Zambia
- Reasons of low internet usage
- High Cost of the internet
- Low Computer Penetration
- Shortage of Trained Personnel
- Lack of Awareness of Information Technology
36Computer Crime
37Computer Crime
- Computer Crime is defined as any illegal act
where special knowledge of computer is essential
for its perpetration, investigation, or
persecution.
38Types of Attacks
- Military and Intelligence attacks
- Business Attacks
- Financial Attacks
- Terrorist Attacks
- Grudge Attacks
- Fun Attacks
39Military and Intelligence Attacks
- Computer store information ranging from the
positioning of Air Force satellites to plans for
troop deployment throughout the world. - In June 1988, computer cracker Kevin Mitnick
(code-named Condor) broke in remotely to a
defense Department network. He allegedly stole a
pre-release version of Digital Equipment
Corporations VMS V5.0 operating system software
and temporarily stored on a Navy computer at the
Patuxent Naval Air Station.
40Business Attacks
- Business are increasingly the target of both
competitors and the curious, although most
business crimes are still committed by employees. - e.g. In December 1987, apple found a virus in
its electronic mail system. The virus succeeded
in shutting down the system and erasing all
Apples voice-mail.
41Financial Attacks
- Banks are always a tempting target for computer
criminals. - e.g. Back 1998, seven criminals hatched a plot
against the First National Bank of Chicago. The
group used a wire transfer scheme to move 25.37
million belonging to Merrill Lynch and Co, 25
million belonging to United Airlines and 19.75
million belonging to the Brown-Forman Corporation
to a New York bank and then to two separate banks
in Vienna.
42Terrorist Attacks
- Even terrorist have gone high-tech.
- Terrorist were striking at the
- computer industry, but not for the first
- time
43Grudge Fun Attacks
- Not all computers criminals are
- seeking information.Some simply
- want to wreak damage and
- destruction.
- At one extreme, computer crime can
- be much more profitable than other
- forms of fraud and terrorism.
44Federal Approaches
- This section explores the major federal
- statutes, enforcement strategies and
- constitutional issues regarding computer
- related crimes.
- Federal Criminal Code
- Enforcement Strategies
45Prevention of Computer Crime
- There are many approaches to protect computer
system from attack. - Identifying Risks
- Physical Security
- Personal Security
- Communication Security
- Operations Security
46Conclusion
- Computer Crime will increasingly be a
- challenge faced by all industrialized nations.
- Solutions that rely solely on international
- coordination to investigate and prosecute
- computer criminals will not work.
47Computer Crime Prevention
48Preventing Computer Crime
- Use secure software
- Have a sane password policy
- Understand how computer crime works
49Use Secure Software
- Regardless of how safe you are, using insecure
software puts you at risk - Don't use buggy software
- Microsoft Windows/IE/Outlook/etc. suck
- Even bug-free software is dangerous if poorly
designed - Telnet vs. SSH
50Have a Sane Password Policy
- Passwords are often the only thing keeping
intruders out of your system - Choose good passwords
- Consider passphrases
- Handle with care
- Change passwords often
- Keep passwords secret
51Understand How Computer Crime Works
- Keep informed about software vulnerabilities
- BugTraq mailing list
- Operating system announcements
- Automatic updates
- Honeypots
- Used to safely monitor illicit activity in the
wild - Not limited just to single computers
52Conclusion
- Be responsible computer users
- Make smart choices about software
- Exhibit responsible behavior about password usage
- Educate yourself
53Diversity in the Workplace
54Diversity
- Acknowledging, understanding, accepting, valuing,
and celebrating differences among people with
respect to age, class, ethnicity, gender,
physical and mental ability, race, sexual
orientation, spiritual practice, and public
assistance status
55Affirmative Action
- Established by Kennedy Administration
- Counteract racial discrimination
- Reverse Discrimination
- Now nearly obsolete
56Glass Ceiling
- Barrier that inhibits women and minorities from
top-tier job positions - The result of conscious and unconscious
stereotyping and discrimination
57Gender Roles
- Imposed by tradition and society
- Men Power suit, power tie, power steering.
- Women 50 times more likely to stay at home to
take care of children
58Age
- Elderly employees are paid more with lucrative
benefit packages - More expensive to keep in the work force
- Older employees are more educated important to
countrys productivity growth
59Diversity is the Future
- Monochrome work force will not survive into the
future - Diverse work force promotes creativity,
productivity, and competitiveness - Diversity reinforces that employees are hired
based on skill and talent, not on demographic
differences
60Diversity is the Future (cont.)
- Projected that women will eventually make up 50
of the entire labor force - 85 of new workers in 2005 include women and
minorities - Human resource departments
- trained to manage diverse workplace
- trained to hire the best talent