The social context of computing
Download
1 / 49

the social context of computing - PowerPoint PPT Presentation


  • 301 Views
  • Updated On :

The Social Context of Computing . Group 1. The Social Context of Computing . Kyle Lippencott – Introduction to the Social Implications of computing Laura Thurber – Social Implications of Networked Communications Douglas Camin – Growth of, Control of and Access to the Internet

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'the social context of computing ' - ivanbritt


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

The social context of computing2 l.jpg
The Social Context of Computing

  • Kyle Lippencott – Introduction to the Social Implications of computing

  • Laura Thurber – Social Implications of Networked Communications

  • Douglas Camin – Growth of, Control of and Access to the Internet

  • Christopher Conway – Gender related Issues of Computing

  • Matthew Dietz – International Issues

  • Robert Host – Computer Crime



Primary issues l.jpg
Primary Issues

  • Interpersonal Relations

  • Privacy and Anonymity

  • Segregation and Stereotyping

  • Education and Work

  • Reliability


Interpersonal relations l.jpg
Interpersonal Relations

  • Always-On

    • Cell Phones

    • Email

    • Instant Messaging

  • Efficient

  • Impersonal


Privacy and anonymity l.jpg
Privacy and Anonymity

  • Data Mining

  • Identifiable Trails

    • Cookies/History

    • Email Inbox/Chat Logs

  • Unique Identifiers and Alternate Identities

  • Anonymizer Services

  • Information/Identity Theft


Segregation and stereotyping l.jpg
Segregation and Stereotyping

  • Digital Divide

  • Stereotyping

    • Gender

    • Race

    • Social Class

    • Elitism

    • Cliques


Education and work l.jpg
Education and Work

  • Computers in the Classroom

    • Student Attention

    • Access Control

  • Changes in Workflow

    • Digital Meetings


Reliability l.jpg
Reliability

  • Physical Reliability

    • Always-On

      • Alwayson=!You.place.equals(bing);

    • Uptime

  • Data Integrity

    • Compromised Data

    • Flawed Programming



Social implications of networked computing l.jpg
Social Implications of Networked Computing

  • The everyday effect of networks on our lives

    • Benefits

    • Misuses

    • What values has society adopted from this widespread internet culture?

  • The social impact of these networks has changed our lives to a degree probably unimagined 10 or 15 years ago.


Benefits of networks l.jpg
Benefits of Networks

  • What can networks do for the average user?

    • -The normal stuff

      • Chatting

      • Email

      • Simple research, i.e. News, health, games


However l.jpg
However...

  • There are other uses for a network

    • The Center for Children and Technology and Lexington School for the Deaf

    • Using a network for basic communication

      • Chatting to perform lessons

      • Improve basic language skills

      • Dramatic improvement in communication and understanding

      • Classes became much more fun!


The problems l.jpg
The Problems

  • However, networks can also create problems

    • Viruses, worms, trojans

    • Scams and hoaxes

      • The Good Times “virus”

        • Threatened to erase all files on the computer, scare the dog, kill the cat, overheat the stove, and turn off the freezer so that your ice cream goes all melty.

        • Physically impossible to execute

        • Nevertheless captured the imagination/attention of the nation

        • Major companies shut down – AT&T, NASA, DoD, FCC, TI

        • The effect it had on the populace


The overall impact l.jpg
The Overall Impact

  • The level of integration

    • Schools

      • Reports typed, online sources encouraged

    • Pharmacies

      • Records no longer accepted in hard copy

    • Banks

      • Moving away from passbook accounts

    • Business Offices, Newspapers, dental offices


Slide16 l.jpg

  • Have we progressed to dependance?

  • Entire industries are spawned from our dependance on these machines

  • Interaction accomplished online, rather than in person

    • Email, instant messaging and online shopping replace standing in line at the grocery store

    • Good or bad?


Slide17 l.jpg


Growth of control of and access to the internet l.jpg

Growth of, Control of and Access to the Internet would be difficult to regress, even given an impetus to.

By: Douglass Camin


Humble beginnings 1969 l.jpg
Humble Beginnings - 1969 would be difficult to regress, even given an impetus to.

  • ARPANet: precursor of today’s Internet

  • 4 Nodes:

    • Stanford

    • UC Santa Barbara

    • UCLA

    • University of Utah

  • Sponsored by Department of Defense

The Internet, circa 1969


Innovations 1970 s l.jpg
Innovations – 1970’s would be difficult to regress, even given an impetus to.

  • 15 Nodes (1971) – 188 nodes (1979)

  • First e-mail program created (1971)

  • Telnet specification created (1972)

  • Ethernet proposal by Metcalfe (1973)

  • TCP Specification by Cerf and Kahn (1974)

  • ARPA established the Internet Configuration Control Board (ICCB) (1979)


Years of transition 1980 s l.jpg
Years of Transition – 1980’s would be difficult to regress, even given an impetus to.

  • 213 Hosts (1981) – ~159,000 (1989)

  • Phrase “Internet” came to be popular

  • DNS created (1984)

  • NSF creates five “supercomputing” sites as backbone to handle growing load (1986):

    • Princeton (NJ)

    • Pittsburgh (PA)

    • UC – San Diego

    • Cornell (NY)

  • Number of new connections grows logarithmically


In the mainstream 1990 s l.jpg
In the Mainstream – 1990’s would be difficult to regress, even given an impetus to.

  • 313,000 hosts (1990) – 56.2 million (1999)

  • Original ARPANet removed from service and transferred to NSF (1990)

  • First commercial dial-up Internet service: The World (1990)

  • NSF increases backbone speed to T3 (44.736Mbps) (1991)

  • World Wide Web protocols and software released by CERN (1991)


In the mainstream cont 1990 s l.jpg
In the Mainstream (cont) – 1990’s would be difficult to regress, even given an impetus to.

  • Government agencies begin to have presence on the Internet – White House, UN (1993)

  • Web browsing becomes an immediate hit with the release of the Mosaic browser (1993)

  • Businesses begin to see Internet as a viable commerce tool. First web advertisements are served (1994)

  • NSF turns support of backbone over to private enterprise (1995)

  • Private commercial dial-up services such as America Online and CompuServe connect users to the Internet


In the mainstream cont 1990 s24 l.jpg
In the Mainstream (cont) – 1990’s would be difficult to regress, even given an impetus to.

  • MCI increases backbone speed from 155Mbps to 622Mbps (1996)

  • DNS turned over to ICANN, a quasi-private enterprise

  • MCI increases backbone capacity again, to 2.5Gbps (1999)

  • “Internet Mania” takes hold – shaky business plans lead to rush of technology investment (1999)


New millennium 2000 s l.jpg
New Millennium – 2000’s would be difficult to regress, even given an impetus to.

  • Internet mania (or Internet bubble) ends – many online businesses fail (2000-2001)

  • Connections of new users to Internet continues to grow exponentially

  • Many other countries catching the United States in terms of percentage of population accessing Internet


Security control l.jpg
Security & Control would be difficult to regress, even given an impetus to.

  • Early security concerns stemmed primarily from intruder access (1970’s)

  • As network grew, concerns changed to malicious code and viruses (1980’s)

  • “Morris” worm spreads and shuts down most of Internet (1988) – CERT created in response

  • As Internet technology spreads into the mainstream, and web pages become prevalent, who can view content becomes most important (1990’s)

  • Privacy and rights (copyrights) are large issues with advent of high-speed data connections to homes (2000’s)


Security control27 l.jpg
Security & Control would be difficult to regress, even given an impetus to.

  • Some governments imposed more strict limits on users’ ability to access the Internet:

    • China – All users and service providers must first register with the government

    • Germany – Asked service providers to block content the government deemed offensive to it’s citizens

    • France – Asked Yahoo to block objectionable items from online auction sites it felt violated decency laws.


Sociological implications l.jpg
Sociological Implications would be difficult to regress, even given an impetus to.

  • Who has access to the Internet has become an important social issue recently

  • Many governments and private enterprises work hard to provide internet access to poor, rural, or otherwise disadvantaged people

  • Many social advocates believe the Internet will, over the long term, help foster better communication and interconnection between various societies in the world


Gender related issues of computing l.jpg

Gender Related Issues of Computing would be difficult to regress, even given an impetus to.

By: Christopher Conway


Decrease in female participation l.jpg
Decrease in female Participation would be difficult to regress, even given an impetus to.

  • In 1986, 36% of bachelor degrees were given to females.

  • In 1996, 27% of bachelor and master’s degrees were given to females.


Pipeline shrinkage l.jpg
“Pipeline Shrinkage” would be difficult to regress, even given an impetus to.

  • The process of a gradual decline in the participation of women as they advance along the academic pipeline.

  • 3 major factors

    • Lack of self esteem

    • Gender Discrimination

    • Balancing of a career and family Responsibilities


Self esteem l.jpg
Self Esteem would be difficult to regress, even given an impetus to.

  • Study by American Association for the Advancement of Science

    • 30% vs. 15% questioned ability to do work

    • 27% vs. 12% criticism hard to handle

    • 30% vs. 57% confident in class

    • 33% vs. 9% fear speaking

  • Dealing with Success and Failure

    • Lack of strategy vs. Lack of competence

    • Reproductive strategy vs. Constructive strategy


Gender discrimination l.jpg
Gender Discrimination would be difficult to regress, even given an impetus to.

  • Patronizing behavior

  • Male dominated preconception

    • “The early stereotyping of toys for boys and girls: Transformers for boys and Barbie for girls.”

    • Aggressive metaphors in software


Career vs family l.jpg
Career vs. Family would be difficult to regress, even given an impetus to.

  • Tenure vs. Childbearing

  • Effects males and females

  • Possible Solutions

    • Quality childcare

    • Increased amount of time to earn tenure


International issues l.jpg

International Issues would be difficult to regress, even given an impetus to.

By: Matthew Dietz


Digital divide l.jpg
Digital Divide would be difficult to regress, even given an impetus to.

  • Separation of the Rich from the Poor

  • Eastern Europe, monopolizing phone companies

    • The Internet moves citizens to participate in Society

    • “Information Poverty”

  • 2001- less than 25% online lived outside of U.S.


Non western culture l.jpg
Non-Western Culture would be difficult to regress, even given an impetus to.

  • Iran

    • Requires Internet users to sign waivers agreeing to not access non-Islamic sites

  • Israel

    • Accepts the internet openly

    • Uses internet as propaganda tool

      • Middle East Peace Process


Security and privacy l.jpg
Security and Privacy would be difficult to regress, even given an impetus to.

  • Computer Terrorism

    • NYC Blackout

      • Not caused by a computer, but takes almost nothing to cripple 2 million people

      • Raises concern over how easily terrorists could destroy communications, banking, or more

  • Security

    • Israel

      • Head of Secret Service name revealed publicly in Washington Post


Security and privacy cont l.jpg
Security and Privacy Cont… would be difficult to regress, even given an impetus to.

  • Ban on encryption

    • U.S. bans export of encryption strong than 40 bit

      • International fears of secret information being cracked using own products

    • Causes other nations to question usefulness vs security concerns

      • Total dependence on computers, likely a weakness?


H1 b and l 1 l.jpg
H1-B and L-1 would be difficult to regress, even given an impetus to.

  • Visas

    • Allow the import of foreign workers and executives

      • Cheaper labor, often equally skilled

      • Workers often paid significantly less

      • Factor in many developed nations, not just U.S.

      • Some lose jobs, but others able to feed and clothe families

      • Raises many moral issues

      • 1999 – 40% of foreign visa workers to fill computer-related positions


Outsourcing l.jpg
Outsourcing would be difficult to regress, even given an impetus to.

  • Act of sending workload of common practices to other, often cheaper companies

    • India primary receiver of outsourced labor

    • Beneficial to some, detrimental to others.

    • India

      • Some make as little as $11,000/yr

        • Actually 22 times more than average salary in India


Outsourcing cont l.jpg
Outsourcing cont… would be difficult to regress, even given an impetus to.


Outsourcing cont43 l.jpg
Outsourcing cont… would be difficult to regress, even given an impetus to.

  • Issue of great controversy

    • Is it fair to export work when there are job-less domestically?


International issues44 l.jpg
International Issues would be difficult to regress, even given an impetus to.

  • Computers have proven to be both good and bad

    • Flow of information to new places every day

    • People can benefit from improved medical care, education, etc.

    • Causes conflict in terms of what’s considered moral

    • Important part of the future of the world.


Computer crime l.jpg
Computer Crime would be difficult to regress, even given an impetus to.

By: Robert Host


Introduction l.jpg
Introduction would be difficult to regress, even given an impetus to.

  • Rise of the internet

  • The Good:

    • New medium for communication and business

  • The Bad:

    • Identity Theft

    • Peer to Peer programs


Identity theft l.jpg
Identity Theft would be difficult to regress, even given an impetus to.

  • One of the fastest growing crimes in America

  • Methods:

    • “Shoulder Surfing”

    • Mail

    • Email hoaxes

  • Victims

    • Consumers

    • Companies


A brief comparison l.jpg
A brief comparison… would be difficult to regress, even given an impetus to.


Peer to peer l.jpg
Peer to Peer would be difficult to regress, even given an impetus to.

  • “Come and get it…FREE!”

  • Napster is made and people use it to swap music files illegally.

  • Recording Industry Association of America (RIAA) to the rescue!

  • Kazaa, Morpheus, Bittorent

  • US District Court rules in favor of P2P programs

  • Not totally illegal, some practical applications


ad