the social context of computing foundation computing never underestimate the power of human...

28
The Social Context The Social Context of Computing of Computing Foundation Computing Never underestimate the power of human stupidity.

Upload: ashlee-ford

Post on 25-Dec-2015

226 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

The Social Context of The Social Context of ComputingComputing

Foundation Computing

Never underestimate the power of human stupidity.

Page 2: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

2 of 28

QuizWhat is the difference between the

internet and the world wide web?

Page 3: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

3 of 28

Quiz (2)Why do we need protocols for

communication between computers?

Page 4: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

4 of 28

Quiz (3)Name the protocol on which all internet

traffic is based.

Page 5: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

5 of 28

Quiz(4)Name the protocol that WWW clients and

servers use.

Page 6: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

6 of 28

Quiz (5)What does the DNS keep a list of

mappings of?

Page 7: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

7 of 28

Quiz (6)What is encryption, and why do we need

it?

Page 8: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

8 of 28

Ethics

What is morality? Informal rules for public interaction What conduct is “good” or “bad”

What is Ethics? Study of moral, social and legal issues Moral rules Social guidelines Law Cyber-ethics: relates to Internet Computer Ethics: general computer use

Page 9: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

9 of 28

Privacy versus Public Protection

People's privacy should be protected: Communications, emails Web sites visited Physical location

But what about: Terrorism and crime Paedophilia Employees misusing facilities Government special powers?

Page 10: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

10 of 28

CensorshipCensorship and the Internet

Pornography Protection of children Filtering of inappropriate Internet traffic - how? Freedom of speech/expression Defamation Criminal activity Internet crosses borders Who is responsible?

Page 11: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

11 of 28

Responsible Use of Information

Business may keep information but only use for intended purpose

Use personal information to deliver product?

Yes

Use personal information to advertise other products?

Maybe

Sell personal information to another business without permission?

No

Page 12: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

12 of 28

SafetySoftware and hardware creators responsible

for safety: Medical equipment Robots

Should they be liable for damages: Pentium Processor Therac-25 Machine Operating system crashes, vulnerabilities

Page 13: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

13 of 28

Computer Security & Privacy LawsPrivacy Act 1988 regulates:

Collection Retention Use Disclosure

Government Data-matching Sharing information between departments Use Tax File Number as key To prevent fraud

Page 14: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

14 of 28

Your Rights?Under the Freedom of Information

Act 1982 people have rights to: View information about themselves Consent to information use for other

purposes Correct erroneous information about

themselves

Secret databases not permitted

Page 15: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

15 of 28

SpamSpam (Unsolicited communications)

Sell (often illegal) items without permission Try to trick you into providing some personal

details, like banking information Deliver damaging software

SPAM Filtering can help, but the problem remains.

Spam examples

Page 16: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

16 of 28

Page 17: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

17 of 28

Page 18: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

18 of 28

Page 19: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

19 of 28

Page 20: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

20 of 28

Page 21: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

21 of 28

Page 22: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

22 of 28

Spam (2)Spam Act of 2003

Unsolicited email must not be sent Commercial emails must include who sent

them Ability to unsubscribe Address harvesting illegal

Page 23: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

23 of 28

Electronic TransactionsElectronic Transactions Act 1999:

Electronic transactions are legal Not allowed to impersonate Not responsible if someone impersonates you

Reality: Reasonably good privacy Slow uptake of authentication technologies There have been cases of identity theft…

Page 24: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

24 of 28

CopyrightWhy have copyright?

Financial rewards Protecting copyright owners Allowing sales

Illegal to copy information that carries a copyright, including: Software Music & Video Others (e-books, photos, web pages etc.)

C

Page 25: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

25 of 28

Copyright (2)

Music

Some say yes, others say it increases sales.

Does illegal sharing damage music industry?

No.Copy music from CD I own?Maybe.Copy legal music to CD?

Yes.Copy legal music to portable player?

No.Share music?If authorised, Yes.Buy and download music?

Page 26: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

26 of 28

Copyright Owners & VendorsCopyright owners are the creators such as

musicians, artists and authorsFor software companies, programmers

usually cede ownership to their employerCopyright vendors such as book

publishers, recording companies, etc. make most of the money!

Page 27: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

27 of 28

Intellectual Property

Patents are like copyright, protect rights of creators, but managed differently

Patents only apply to innovations, copyright applies to any written document, even a compilation

Patents retire after 10-20 years, depending on the type, & the national law

Page 28: The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity

28 of 28

ConclusionsRapid technological change has

transformed business and many other aspects of our lives

Rapid change challenges ethical, privacy and legal issues

Laws will probably continue to trail behind the latest technological advances