Date post: | 21-Dec-2015 |
Category: |
Documents |
View: | 223 times |
Download: | 0 times |
The Social Context of ComputingGroup 1
Introduction to the Social Implications of Computing
John Basias
History of computing
The first fully functioning electronic digital computer was Colossus (1943)
'first generation' computers
weighed 30 tons and contained 18,000 electronic valves
Second generation Computing Transistor was invented in 1947
'Second Generation' and computers made their debut the late 1950s and early 1960s
still bulky and strictly the domain of Universities and governments
'Third and Fourth Generation' computing the great leap foward
Jack St. Claire Kilby's invention of the integrated circuit or microchip in the 1950’s
1963 technology was integrated creating the first 3rd generation computers
Smaller more efficient were used by smaller businesses
Still unavailable or affordable at the individual level
'Third and Fourth Generation' computing the great leap forward (cont.)
November 15th, 1971, Intel released the 4004, the world's first commercial microprocessor and the RAM chip
Dawn of the fourth and latest generation of computing
Effects Drive toward improvement and applicability
The creation of operating systems in the 1980’s that directly translated conceptual action into computer code
Cheap affordable computing became possible to a much larger audience
Revolutionized the job market restructured the inner operations of many businesses. Outdated a lot of technology.
The emergence of hacking and viruses as threats
The Dawn of the Internet Origionally ARPANET started by the US Dept. of Defense for
research into networking sometime in 1969
Became an object of interest by the 1970’s to large companies and Universities
It wasn’t until 1980’s that technology advanced far enough for there to be any use of this network
DNS – 1984 replacing IP addressing
HTTP and was invented in 1989 by Tim Berners-Lee
Graphical interface and web browsers appeared in the early 1990’s
Effects
Great shift in social status and social boundaries over the net
individual have the liberty to exchange, view ideas and information anonymously
How do we define boundaries? Ethical and moral issues
Effects (cont.)
New Age of Hacking - everyone is at greater risk - viruses are potentially more destructive - spyware
Priavacy
Internet policing and enforcement and regulation of the netwok - the development of software and hardware to protect against hacking firewalls virus protection
Social Implications of Networked CommunicationsMatt Berger
Networked Communications
Take many forms.E-mail, message boards, IRC.
Primary advantage: convenience factor. Social Implications
Community, local and global.Social Skills.The future of computer-mediated
communication.
Community
Beneficial EffectsStudy has shown that networked communications
increase both local and global community involvement.
Not intuitive – would expect less local involvement.
Anonymity fosters a global community. Discrimination is now not a factor. Potential for this to spread into real life
interaction.
Community
Detrimental Effects Internet communities are not situated
anywhere. Creates a certain level of unease and
mistrust.Transition from group-based societies to
network-based societies. Internet communities contain a very
weak level of connectivity.
Social Skills
Advantages of AnonymityThe freedom a person has.
One can gain confidence in using an Internet persona.
Advantageous to normally anti-social people.
Easier for them to express their thoughts – could extend to real life interactions.
Social Skills
Disadvantages of AnonymityUndergoing an Internet persona to insult
others. Freedom of Internet communication
encourages this.Constant level of distrust.
Obstructs the possibility of developing healthy relationships.
Computer-mediated communication is simply a poor substitute for physical interaction.
Future of Networked Communications Advances under a matter of convenience. Should always be aware of the social
consequences.For instance – recent controversy of using
web logs as valid information sources. Ultimately, will never be a substitute for
standard person-to-person communication.
Growth of, Control of, and Access to the Internet
Luis M. Callejo
Growth of the Internet
Trends of Growth Adaption into
Society Growing Ethical
Considerations Cyber ethics
Growth of Applications
Website vs. Peer to Peer
Control of the Internet
Autonomous SystemPeeringBorder Gateway Protocol
Concerns about security
Access to the Internet
Access to Information Cyberethics
Presentation of InformationDirectoriesAutomation
Conclusion
What will determine the future of the Internet?Development of CyberethicsDemands on Architecture
Gender Related Issues of Computing
NickNick CavuotoCavuoto
History of Women in History of Women in ComputingComputing Ada Byron Edith Clarke Grace Murray Hopper World War II opened the door
Traditionally
Math and Math and Technology = MenTechnology = Men
Humanities = Humanities = WomenWomen
Video Games also Video Games also are a factorare a factor
At the Job
Stereotypes in the work place Sex appeal Corporations with women at the helm are
more successful
What to do?
AWC (Association for Women in Computing)
Parents Teachers
International Issue
Kefei Chen
Informational Technology (IT) and National Culture Comparing the different approaches for
managing IT between Japanese Culture and Western Culture.
Informational Technology (IT) and National Culture How do they decide what are their business needs?
strategic alignment vs. strategic instinct How will they know whether IT investments are worthwhile?
value for money vs. performance improvement When they are trying to improve a business process, how does
technology fit into their thinking? technology solutions vs. appropriate technology
How should IT users and IT specialists connect in their organization? IT user relations vs. organizational bonding
How can they design systems that improve organizational performance? system design vs. human design
IT and Economy
IT consumers and IT producers in Asia
IT and Economy Japan Model of IT Industrial
Development
Internet Users
Internet Users
Key factors that determine the use of information technologies on an international basis: IncomeCost of connection MonthlyEducation GenderAgeLanguage
Internet Users
Example: An African country: ZambiaReasons of low internet usage:
High Cost of the internet Low Computer Penetration Shortage of Trained Personnel Lack of Awareness of Information
Technology
Computer Crime
Hodan Egal
Computer Crime
Computer Crime is defined as any illegal act where special knowledge of computer is essential for its perpetration, investigation, or persecution.
Types of Attacks
Military and Intelligence attacks Business Attacks Financial Attacks Terrorist Attacks Grudge Attacks Fun Attacks
Military and Intelligence Attacks Computer store information ranging from the
positioning of Air Force satellites to plans for troop deployment throughout the world.
In June 1988, computer cracker Kevin Mitnick (code-named “Condor”) broke in remotely to a defense Department network. He allegedly stole a pre-release version of Digital Equipment Corporations VMS V5.0 operating system software and temporarily stored on a Navy computer at the Patuxent Naval Air Station.
Business Attacks
Business are increasingly the target of both competitors and the curious, although most business crimes are still committed by employees.e.g. In December 1987, apple found a virus in its electronic mail system. The virus succeeded in shutting down the system and erasing all Apple’s voice-mail.
Financial Attacks
Banks are always a tempting target for computer criminals.
e.g. Back 1998, seven criminals hatched a plot against the First National Bank of Chicago. The group used a wire transfer scheme to move &25.37 million belonging to Merrill Lynch and Co, $25 million belonging to United Airlines and $19.75 million belonging to the Brown-Forman Corporation to a New York bank and then to two separate banks in Vienna.
Terrorist Attacks
Even terrorist have gone high-tech. Terrorist were striking at thecomputer industry, but not for the firsttime
Grudge & Fun Attacks
Not all computers criminals areseeking information.Some simplywant to wreak damage anddestruction.At one extreme, computer crime canbe much more profitable than otherforms of fraud and terrorism.
Federal Approaches
This section explores the major federalstatutes, enforcement strategies andconstitutional issues regarding computerrelated crimes.
Federal Criminal Code Enforcement Strategies
Prevention of Computer CrimeThere are many approaches to protect
computer system from attack. Identifying Risks Physical Security Personal Security Communication Security Operations Security
Conclusion
Computer Crime will increasingly be a challenge faced by all industrialized nations.Solutions that rely solely on internationalcoordination to investigate and prosecutecomputer criminals will not work.
Computer Crime Prevention
Sean Egan
Preventing Computer Crime Use secure software Have a sane password policy Understand how computer crime works
Use Secure Software
Regardless of how safe you are, using insecure software puts you at risk
Don't use buggy softwareMicrosoft Windows/IE/Outlook/etc. suck
Even bug-free software is dangerous if poorly designedTelnet vs. SSH
Have a Sane Password Policy Passwords are often the only thing keeping
intruders out of your system Choose good passwords
Consider passphrases Handle with care
Change passwords oftenKeep passwords secret
Understand How Computer Crime Works Keep informed about software vulnerabilities
BugTraq mailing listOperating system announcementsAutomatic updates
HoneypotsUsed to safely monitor illicit activity in the
wildNot limited just to single computers
Conclusion
Be responsible computer users Make smart choices about software Exhibit responsible behavior about
password usage Educate yourself
Diversity in the Workplace
Philip Fong
Diversity
Acknowledging, understanding, accepting, valuing, and celebrating differences among people with respect to age, class, ethnicity, gender, physical and mental ability, race, sexual orientation, spiritual practice, and public assistance status
Affirmative Action
Established by Kennedy Administration Counteract racial discrimination “Reverse Discrimination” Now nearly obsolete
Glass Ceiling
Barrier that inhibits women and minorities from top-tier job positions
The result of conscious and unconscious stereotyping and discrimination
Gender Roles
Imposed by tradition and society Men – “Power suit, power tie, power
steering.” Women – 50 times more likely to stay at
home to take care of children
Age
Elderly employees are paid more with lucrative benefit packages
More expensive to keep in the work force Older employees are more educated –
important to country’s productivity growth
Diversity is the Future
Monochrome work force will not survive into the future
Diverse work force promotes creativity, productivity, and competitiveness
Diversity reinforces that employees are hired based on skill and talent, not on demographic differences
Diversity is the Future (cont.) Projected that women will eventually make
up 50% of the entire labor force 85% of new workers in 2005 include
women and minorities Human resource departments
– trained to manage diverse workplace– trained to hire the best talent