Title: Introduction to the Social Implications of Computing
1Introduction to the Social Implications of
Computing
2Overview
- Introduction to the Social Implications of
Computing - Social Implications of Networked Communications
- Growth of, Control of and Access to the Internet
- The Internet and Social Engineering
- Gender Related Issues of Computing
- Computer Crime
- Computer Crime Prevention
3History
- 1974 Xerox Alto first work station with
built-in mouse. Menus and Icons. LAN
capabilities. - 1969 ARPANET commissioned by DoD
- 1990 Hyper Text Markup Language developed by Tim
Berners-Lee. Allowed the internet to expand into
the World Wide Web using Uniform Resource Locator
and HyperText Transfer Protocol. - 1996 Internet was mainstream. AOL, ATT WorldNet
4What is a Computer?
- computer a programmable electronic device
that can store, retrieve, and process data - The computer is a tool.
- A tool is only as smart as its user.
5Positive Impact of Computers
- Computers take over mundane tasks
- Higher productivity
- Credit Cards, Space Travel, Medical Research
- New Jobs created from New Technology
- Global Communication
- Information Highway
6Negative Impact of Computers
- Fast paced business, More Stress.
- Creates skilled jobs only.
- Dependency on Computers.
- Lack of more intimate social interaction.
- Health Issues.
7Social Implication of Networked Communication
8Email
- Early email was developed as an application on
the ARPANET for complex mixture of Cold War
military. - The idea of using the ARPANET as a medium for
human communication was not widely recognized
until the creation of network email in 1971. - In 1984, domain name server developed and the
number of hosts on Internet breaks 1000. - In 1988, the number of Internet hosts breaks
100,000 and first commercial electronic mail
carriers appeared on the Internet MCI Mail and
Compuserve.
9Instant Messenger
- MSN Messenger you can chat online instantlyin
real timewith friends, family and colleagues.
It's faster than e-mail, more discreet than a
phone call, and best of allit's FREE! - people are able to communicate synchronously on
different "channels" from disparate locations. - there are many more features in IM such as file
sharing, weather report, and stock alert, etc. - 84 of US enterprises that have IM usage
- Microsoft sees IM as the bridge to a
communication system of the future with highly
integrated voice, video, text, presence, and
applications. - Lotus recently announced that it would be tightly
integrating its Sametime IM application with its
Websphere server.
10Psychological Effect
- Socially anonymous
- public identity are not revealed immediately.
- invent an alternate version of ones self or
someone else. - more comfortable.
- social interaction and sometimes intimacy
- Socially insensible
- rude by using improper and abusive languages
- falling in love through Internet forums, chat
room, instant messages and emails.
11Online Language
- express affective and speedy conversation
- dont follow correct grammars or spelling.
- ROFL
- btw
- add repeated exclamation points and question
marks to add affective emphasis - Emotion icons or smileys serves facial
expression over the Internet - T_T
- -)
12Future Applications
- VoIP (voice over Internet protocol )
- 500,000 residential users just in the US
- 16.5 million by 2008
- cheaper than traditional kind and its packed
with new features - IP-TV
- offering a low-cost Internet alternative to
traditional TiVo. - Internet-style interactivity and flexibility to
our TV set.
13Growth of, Control of and Access to the Internet
14History of the Internet
- J.C.R Licklider Galactic Network Concept
- Defense Advanced Research Project Agency (DARPA)
- Pursuit of technological advancement, mainly for
military use - ARPANET and packet switching
15Growth of the Internet
- Growth of internet doubled every year since 1996
- Usage of internet spans from academics to
business to recreation. - HTML and HTTP
Year TB/Month
1990 1.0
1991 2.0
1992 4.4
1993 8.3
1994 16.3
1995 ?
1996 1,500
1997 2,500 4,000
1998 5,000 8,000
1999 10,000 16,000
2000 20,000 35,000
16Access to the Internet
- Dialup connection
- Faster data transmission speeds now due to new
technologies - Cable, DSL, Satellite
- Advantages and disadvantages
- Wi-fi allows wireless connectivity to the
Internet - Available in hotels, cafes and airports, etc
17Control of the Internet
- Preventative measures
- Laws and licenses
- Software and hardware manipulation
- Governmental censorship of information
- Programs that monitor internet usage
- Set site viewing restrictions
- Adult content
- Graphic Violence
- NetNanny, CyberPatrol, CyberSitter
18Future of the Internet
- Internet2
- Partnership between corporations, universities,
and government agencies - Interactive television, video conferencing,
movies on demand - Departure from PC internet connection
- Cellular phones and pagers
19The Internet and Social Engineering
- Users are the weakest link
Steve Dittmar
20What is It?
- Social Engineering
- the practice of conning people into revealing
sensitive data on a computer system, often on the
Internet
21How Is It Done?
- E-mail
- Send malicious attachments that then spam
- Phishing
- Convince a user that you are an administrator
asking for account passwords or credit card
information - Spyware
- Software that executes hidden background tasks
22Past Instances Of It
- Kevin Mitnick
- Convicted five times suspected of more
- Broke into FBI, SCO, Pentagon, more
- Fake Tsunami Relief Orgs.
- At least 170 potentially fraudulent Web sites
soliciting donations tsunami victims have turned
up - PayPal Phishing
- Email claiming unusual activity in your account
asks for you to click a link and fill out/verify
account information
23How To Protect Yourself
- Five Levels
- Foundation Have a security policy for the
standards and level of security on a network - Parameter Security awareness training for all
users - Fortress Resistance training for key personnel
- Persistence On going reminders
- Gotcha Social Engineering Land Mines (SLEM)
- Offensive Incident response a plan of action
24Sources
- Title Page http//www.computerworld.com/securityt
opics/security/story/0,10801,65745,00.html - Slide 1,2,3
- http//en.wikipedia.org/wiki/Social_engineering_
28computer_security29 - Slide 4
- http//en.wikipedia.org/wiki/Kevin_Mitnick
- http//www.wistechnology.com/article.php?id1487
- http//www.antiphishing.org/phishing_archive/02-1
7-05_Paypal/02-17-05_Paypal.html - Slide 5
- http//www.giac.org/practical/GSEC/David_Gragg_GS
EC.pdf
25Gender Related Issues of Computing
26Gender Related Issues of Computing
- Under-representation of Women in computing
- Few women enter the Computer Science program,
but why? - Growing gender gap in the computing field
- Future outlooks of the composition in the work
force
27Under-representation of Women in Computing- past
and current
- The number of men earning degrees in CS surpasses
those earned by women throughout the 1970s,
1980s,and early 1990s. - (US Department of Education 1994)
- The figures have fallen over the last 15 years.
- Tendency to drop out of academia
- Few have made it into teaching
Figure1. Female of Intended CS Majors
Source University of Virginia
28Computing Research Association Figures.
Source CRA Taulbee Trends Women Students
Faculty
29Why So Few Women in Computing?
- Computing is a male-stereotype activity
- Lack of support
- Family support
- Teacher support
- Peer support
- Lack of self-confidence
- Lose interest to get advance
- Lack of female role models
- Guys have more initial experience in computer
30Growing Gender Gap?
- Gender gap is growing in academia and industry
- Under-representation further discourage women
from entering and staying with it. - Gender gap will continue to grow.
- Yet jobs in computing are expected to grow
through 2012. (U.S. Department of Labor) - Effective intervention -gt more women will
participate
31Computer Crime
- The act must be one that can be carried out only
through the use of computer technology. Herman
T. Tavini
Speaker Lisa Punzo
32Where did it start?
- The Trojan Horse 1972
- First Worm 1982
- First Virus - 1983
33Three Types of Computer Crime
- Software Piracy
- Electronic Break-ins
- Computer Sabotage
- Spam?
34Economic Impact
- 141,496,560 lost to computer crime in 2004.
- Virus takes top billing in 2004.
- Cost of security.
- 10 billion in lost productivity due to Spam.
-
35Future
- Cost
- Reports
- Technology
- Point to Ponder
- What about the world of virtual crime?
36Computer Crime Prevention
37Computer Crime Prevention
- Computer crime prevention has been a big topic
since 2001. - Different types of computer crimes include
- Hacking gaining unauthorized access to
computer, network, et cetera. - Virus programs attaching to files thus, making
the computer sick. - Spyware/Spam annoying advertisements and junk
e-mails. - Piracy Sharing and downloading of illegal
software and media files.
38Computer Crime Prevention
- Computer crimes have started since the earliest
networks were built. - Earliest history of viruses were around 1987.
- Basit Amjad created the Brain virus in 1987.
- First anti-virus available in 1988.
- Firewalls became a second option to the reality
of viruses. - First security firewalls were IP routers with
filtering capabilities, used in the early 90s.
39Computer Crime Prevention
- It is impossible to stop every method of attack
technology changes rapidly. - Here are some of the more common methods
- Firewall packet, circuit and application
filtering. Data encryption recently included
provides authentication, confidentiality and
integrity. - Antivirus software on-access and on-demand
detection. - Spyware/Spam Ad-aware, Can-Spam bill, the Spy
Act. - Piracy RIAA lawsuits, only way currently to
combat problem.
40Computer Crime Prevention
- Total computer crime prevention is impossible.
- The future of computer crime prevention is
preventing international crimes and determining
the jurisdiction of the crimes. - Prevention of crimes through newer mediums like
wireless. - Conference held in France in 2004, Council of
Europes Cybercrime convention. US did not sign
treaty. - In 2002, US government issued the National
Strategy to Secure Cyberspace. - Laws will be passed, when will it infringe on
individual rights?
41Thank You