Top Banner
The Social The Social Implications of Implications of Computing Computing "The most profound technologies "The most profound technologies are those that disappear. They are those that disappear. They weave themselves into the weave themselves into the fabric of everyday life until fabric of everyday life until they are indistinguishable from they are indistinguishable from it.” it.” -Mark Weiser, Xerox PARC -Mark Weiser, Xerox PARC
41

The social-implications-of-computing

Apr 08, 2017

Download

Technology

hoho776
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The social-implications-of-computing

The Social Implications The Social Implications of Computingof Computing

"The most profound technologies are "The most profound technologies are those that disappear. They weave those that disappear. They weave themselves into the fabric of everyday life themselves into the fabric of everyday life until they are indistinguishable from it.”until they are indistinguishable from it.”

-Mark Weiser, Xerox PARC-Mark Weiser, Xerox PARC

Page 2: The social-implications-of-computing

Computer Contributions to Computer Contributions to SocietySociety

E-mailE-mail Instant MessagingInstant Messaging The WebThe Web Cellular PhonesCellular Phones Video GamesVideo Games

Page 3: The social-implications-of-computing

Social Implications of Social Implications of Networked Networked

CommunicationsCommunications

Page 4: The social-implications-of-computing

Estimated Users on the 'Net as Estimated Users on the 'Net as of March 1999of March 1999

88.3 million in the US and Canada 88.3 million in the US and Canada

37.15 million in Europe 37.15 million in Europe

26.97 million in Asia 26.97 million in Asia 4.63 million in South America 4.63 million in South America

1.14 million in Africa 1.14 million in Africa 0.88 million in Middle East 0.88 million in Middle East 159.0 million159.0 million Doubles every yearDoubles every year

Page 5: The social-implications-of-computing

The Internet as a The Internet as a Communications MediumCommunications Medium

Electronic PublicationsElectronic Publications Library ArchivesLibrary Archives NewsgroupsNewsgroups EmailEmail AdvertisementsAdvertisements NewsNews P2P networksP2P networks

Page 6: The social-implications-of-computing

Public SpheresPublic Spheres

Prior Networked Prior Networked Communication:Communication:

Town HallTown Hall ChurchChurch Town SquareTown Square

Ensuing Networked Ensuing Networked Communication:Communication:

TelevisionTelevision NewsgroupsNewsgroups Online PollsOnline Polls

Page 7: The social-implications-of-computing

Virtual vs. ‘Real’ ResourcesVirtual vs. ‘Real’ Resources Online coursesOnline courses EmailEmail Research using Research using

search enginessearch engines

Class discussionClass discussion Having coffee with Having coffee with

a frienda friend A book which is A book which is

primary source primary source written by an written by an expert in the fieldexpert in the field

Page 8: The social-implications-of-computing

Globalization vs. IsolationGlobalization vs. Isolation Share ideas with Share ideas with

the worldthe world Buy anything from Buy anything from

anywhere, anywhere, regardless of regardless of locationlocation

Connect with Connect with anyone in the world anyone in the world using 2 of your using 2 of your sensessenses

But will be taken with But will be taken with a grain of salta grain of salt

Without experiencing Without experiencing any culture outside any culture outside the computer roomthe computer room

As opposed to As opposed to meeting in person meeting in person and communicating and communicating on all 5on all 5

Page 9: The social-implications-of-computing

ConsCons Copyright infringementCopyright infringement AddictionAddiction Loss of social skillLoss of social skill InsecurityInsecurity DesensitizationDesensitization

Page 10: The social-implications-of-computing

ConclusionConclusion Great tool if not taken out of contextGreat tool if not taken out of context

Page 11: The social-implications-of-computing

Growth of, Access to, and Growth of, Access to, and Control of the InternetControl of the Internet

Page 12: The social-implications-of-computing

Extreme GrowthExtreme Growth

0123456789

10

1971 1983 2003 2050

Computers on the ARPA/ Internet (in thousands)

Year 1971 1983 2003 2050

Number of computers 25 1000 3000

(projection)Who

knows?

Page 13: The social-implications-of-computing

Growth of the internetGrowth of the internet ARPANET - started by DoD to ARPANET - started by DoD to

research networks (1969)research networks (1969) December 1995 - 16 million usersDecember 1995 - 16 million users Current:Current:

• According to NielsonAccording to Nielson 580 million people worldwide now have 580 million people worldwide now have

access to the internetaccess to the internet 168.6 million attributed to the U.S168.6 million attributed to the U.S

Page 14: The social-implications-of-computing

The Top Five Most Popular Internet Activities The Top Five Most Popular Internet Activities (Percent Of Internet Users)(Percent Of Internet Users)

1. 1. E-mail and instant messaging E-mail and instant messaging 87.9%87.9%2. 2. Web surfing or browsingWeb surfing or browsing 76.3%76.3%3. 3. Buying online Buying online 48.9%48.9%4. 4. Finding entertainment information Finding entertainment information 47.9%47.9%5. 5. Reading news Reading news 47.6%47.6%

(data from 2001) (data from 2001)

• Email usage has doubled in past three Email usage has doubled in past three yearsyears

30 30 60 billion messages a year 60 billion messages a year Another doubling expected by 2005Another doubling expected by 2005

Page 15: The social-implications-of-computing

Who controls the internetWho controls the internet

Cyber crime definedCyber crime defined• The dissemination of racist and xenophobic The dissemination of racist and xenophobic

material through computer systemsmaterial through computer systems

GovernmentsGovernments• Citizens must use state-run ISPs in some Citizens must use state-run ISPs in some

countriescountries Blocked contentBlocked content

Page 16: The social-implications-of-computing

Who controls the internet (cont’d)Who controls the internet (cont’d)

Parents and EmployersParents and Employers• Cyber nannyCyber nanny

Disallows graphic or violent imagesDisallows graphic or violent images• PICSPICS

Platform for Internet Content Selection Platform for Internet Content Selection Labels that discuss a sites contentLabels that discuss a sites content

Page 17: The social-implications-of-computing

Access to the InternetAccess to the Internet 72.3% of Americans use the net72.3% of Americans use the net

• Others do not for lack of accessOthers do not for lack of access Not disinterestNot disinterest

Men & WomenMen & Women• Approx the same 74-70%Approx the same 74-70%

Income and educational difsIncome and educational difs

• PhDs >85% PhDs >85% >$100k = 10 hrs>$100k = 10 hrsvs.vs. vs.vs.

• High school 60%High school 60% <$30k = 4hrs <$30k = 4hrs

Page 18: The social-implications-of-computing

Here to stayHere to stay

More people are using it dailyMore people are using it daily Look forward to equal access…Look forward to equal access…

After all, the Internet is for everyoneAfter all, the Internet is for everyone(RFC 3721)(RFC 3721)

Page 19: The social-implications-of-computing

Gender related Issues of Gender related Issues of Computing Computing

Page 20: The social-implications-of-computing

Personal Experience Personal Experience I was too quick to I was too quick to

judge.judge.

Stereotyped.Stereotyped.

Can such a biased Can such a biased stereotype be stereotype be justified? justified?

Page 21: The social-implications-of-computing

Is there a Gender Gap?Is there a Gender Gap? After analyzing After analyzing

more than 1,000 more than 1,000 research studies, research studies, the American the American Association of Association of University Women University Women (AAUW) has (AAUW) has concluded that concluded that when it comes to when it comes to technology, there is technology, there is an alarming gender an alarming gender gap. gap.

Page 22: The social-implications-of-computing

StatisticsStatistics US population of men US population of men

and women is 50:50.and women is 50:50.

Tech jobs are growing Tech jobs are growing every year.every year.

However women However women represent only 20% of represent only 20% of the Computer science the Computer science and engineering labor and engineering labor force. force.

Where are all the Women?Where are all the Women?

Page 23: The social-implications-of-computing

So What?So What?““The gender gap in computer science must be The gender gap in computer science must be

eliminated for two reasons.eliminated for two reasons.

(1) The more obvious reason is to ensure that fair (1) The more obvious reason is to ensure that fair and equal treatment is being provided to all and equal treatment is being provided to all potential and current computer scientists. potential and current computer scientists.

(2) The less considered danger of the gender gap (2) The less considered danger of the gender gap concerns the advancement of the field as a concerns the advancement of the field as a whole. By hindering half of the population as whole. By hindering half of the population as potential contributors, the field of computer potential contributors, the field of computer science decreases its chance of further science decreases its chance of further development.”development.”

Quoted from: http://www.expage.com/page/genderissues3

Page 24: The social-implications-of-computing

AnglesAngles Male-Dominated EnvironmentMale-Dominated Environment

-Are women being elbowed out?-Are women being elbowed out? DiscriminationDiscrimination

-HR playing favoritism?-HR playing favoritism? Image of Computing Image of Computing

--Nerdy/Bad Stereotypes Nerdy/Bad Stereotypes Lack of Adequate High Lack of Adequate High

School/College PreparationSchool/College Preparation -Do teachers -Do teachers encourage/discourage females to encourage/discourage females to pursue tech jobs?pursue tech jobs?

Societal ImplicationsSocietal Implications -Games-Games-Role models-Role models

Page 25: The social-implications-of-computing

Lack of Adequate Lack of Adequate High School/College PreparationHigh School/College Preparation

According to a study by the According to a study by the Research Foundation for Improving the Research Foundation for Improving the Representation of Women in the Technology Workforce, Representation of Women in the Technology Workforce, the number the number of women who received CS bachelor's degrees, the number peaked of women who received CS bachelor's degrees, the number peaked in 1986 when women represented approximately 36% of the total in 1986 when women represented approximately 36% of the total number of graduates. Since then numbers have only declined!number of graduates. Since then numbers have only declined!

““The gender gaps we see are evidenceThe gender gaps we see are evidence that public schools are failing to fully prepare that public schools are failing to fully prepare girls for the 21st century”.girls for the 21st century”.

Concerned and embarrassed that women Concerned and embarrassed that women account for only 15 to 20 percent of their account for only 15 to 20 percent of their computer science majors, a number of top computer science majors, a number of top colleges are looking for ways to attract more women to careers in colleges are looking for ways to attract more women to careers in computers. They are adding courses that appeal to women's computers. They are adding courses that appeal to women's strengths, creating mentoring programs and thinking harder about strengths, creating mentoring programs and thinking harder about the gender gap.the gender gap.

Page 26: The social-implications-of-computing

Societal ImplicationsSocietal Implications- Childhood Development?- Childhood Development?

The Association for Computing Machinery's The Association for Computing Machinery's Committee on Women in Computing (ACM-W) have Committee on Women in Computing (ACM-W) have found that:found that:

Role Models?Role Models? – “Fathers are more likely to be using – “Fathers are more likely to be using computers in the home than mothers so you have the computers in the home than mothers so you have the element of the role model”.element of the role model”.

Self-confidence? - boys “exhibit higher computer self-Self-confidence? - boys “exhibit higher computer self-confidence and a more positive attitude about computers confidence and a more positive attitude about computers than girls”.than girls”.

Page 27: The social-implications-of-computing

Societal Implications Societal Implications - Video Games?- Video Games?

Computer games, which often attract children to Computer games, which often attract children to computers, are written by male programmers!computers, are written by male programmers!

Generally these games consist of violence, killing and Generally these games consist of violence, killing and scoring points, all of which interest young boys . Thus girls, scoring points, all of which interest young boys . Thus girls, who are not engaged as much by these games, are less who are not engaged as much by these games, are less likely to follow this avenue into computer science.likely to follow this avenue into computer science.

Software produced specifically for girls?Software produced specifically for girls?

-Researchers and parents feel that so-called “pink” -Researchers and parents feel that so-called “pink” software, such as Disney’s Princess Fashion Boutique and software, such as Disney’s Princess Fashion Boutique and Barbie Magic Hairstyler will teach girls the technology skills Barbie Magic Hairstyler will teach girls the technology skills and confidence building they need to narrow the digital and confidence building they need to narrow the digital gender gap.gender gap.

Page 28: The social-implications-of-computing

ConclusionConclusion As technology continues to expand As technology continues to expand

nationally and internationally, it is nationally and internationally, it is important that advances are equally important that advances are equally influenced by men and women.influenced by men and women.

In order to reduce the Gender Gap, the In order to reduce the Gender Gap, the issue must be taken seriously. Schools, issue must be taken seriously. Schools, video game manufacturers, and industries video game manufacturers, and industries must find a way to involve both genders. must find a way to involve both genders.

Parents (mothers) must take an active roll Parents (mothers) must take an active roll in influencing and encouraging their in influencing and encouraging their daughters to pursue tech jobs/degrees.daughters to pursue tech jobs/degrees.

Page 29: The social-implications-of-computing

International IssuesInternational Issues

Page 30: The social-implications-of-computing

Issues of International BusinessIssues of International Business LanguageLanguage Time ZonesTime Zones Sharing of dataSharing of data Learning foreign Business PracticesLearning foreign Business Practices PresentationPresentation

Page 31: The social-implications-of-computing

LanguageLanguage Knowing a second languageKnowing a second language

• If not then a translator may be neededIf not then a translator may be needed• Americans tend not to be multilingualAmericans tend not to be multilingual

Translations may contain errorsTranslations may contain errors

Page 32: The social-implications-of-computing

TimeTime Time zone differencesTime zone differences

• Limited windows of communicationLimited windows of communication Email?Email?

• Not always a perfect solutionNot always a perfect solution Can be time intensiveCan be time intensive May not produce the best resultsMay not produce the best results

Page 33: The social-implications-of-computing

Sharing of DataSharing of Data Media of transport/ CommunicationMedia of transport/ Communication

• WANWAN Transfering projectsTransfering projects EmailsEmails

• Snail MailSnail Mail

Page 34: The social-implications-of-computing

Learning foreign Business Learning foreign Business PracticesPractices

Trying to treat international business Trying to treat international business partners like an american business is a BAD partners like an american business is a BAD idea...idea...• ““The appropriate ways of conducting business The appropriate ways of conducting business

and holding meetings vary from country to and holding meetings vary from country to country and from culture to culture.”country and from culture to culture.”

Good exampleGood example• A meeting set for a certain time in China a person A meeting set for a certain time in China a person

should be 15 minutes early and preparingshould be 15 minutes early and preparing• A meeting set for a certain time in Mexico might A meeting set for a certain time in Mexico might

not actually start for an hour or twonot actually start for an hour or two

Page 35: The social-implications-of-computing

Examples of Do’s and Dont’sExamples of Do’s and Dont’s

GermanyGermany• DoDo

Knock before opening a closed door. Knock before opening a closed door. • Don'tDon't

Shake someone's hand while your other Shake someone's hand while your other hand is in your pocket. hand is in your pocket.

Page 36: The social-implications-of-computing

Examples of Do’s and Dont’sExamples of Do’s and Dont’s FranceFrance

• DoDo Avoid calling your associates' personal number Avoid calling your associates' personal number

for business related issues. If it cannot be for business related issues. If it cannot be avoided, do so before 9:00pm. avoided, do so before 9:00pm.

For corporate letters or e-mail, use a very formal For corporate letters or e-mail, use a very formal and business-like approach. and business-like approach.

• Don'tDon't Use first names during a business meeting. Use first names during a business meeting. Show up late for meetings. Show up late for meetings. Bring up business at the start of a Bring up business at the start of a

dinner/meeting. dinner/meeting.

Page 37: The social-implications-of-computing

Examples of Do’s and Dont’sExamples of Do’s and Dont’s JapanJapan

• Forget it I don’t have enough time...Forget it I don’t have enough time...

Page 38: The social-implications-of-computing

LiteratureLiterature Books found @ barnesandnoble.comBooks found @ barnesandnoble.com

• Doing Business in ChinaDoing Business in China• Business Korea: A Practical Guide to Business Korea: A Practical Guide to

Understanding South Korean Business CultureUnderstanding South Korean Business Culture• International BusinessInternational Business• International Business and Trade: Theory, International Business and Trade: Theory,

Practice, and PolicyPractice, and Policy

Page 39: The social-implications-of-computing

PresentationPresentation OrganizationOrganization AppearanceAppearance ““Be civil, neat and listen to what they Be civil, neat and listen to what they

are saying. Since we are are saying. Since we are representing our company, we need representing our company, we need to project the best image to our to project the best image to our customer.” –Ralph Flataucustomer.” –Ralph Flatau

Page 40: The social-implications-of-computing

ReferencesReferences• http://www.zakon.org/robert/internet/timeline/ • http://www.isp-planet.com/research/• Number of users: http://cyberatlas.internet.com/big_picture/geographics/article/0,,5911_1593591,00.html (feb

2003)• IPv4: http://www.isoc.org/briefings/001/ • Crime: http://www.cyber-rights.org/cybercrime/• Demographics: http://ccp.ucla.edu/pdf/UCLA-Internet-Report-2001.pdf • Gov’t control: http://www.rferl.org/nca/special/enemies.html• The map of the world: http://www.ipsos-reid.com/us/services/syndicated/dsp_face.cfm• Armando Gomez. (2003, February 24). Business Travel Etiquette. [World Wide Web] Available:

http://www.askmen.com/money/career/20_career.html• Flatau, Ralph. (2003, February 25). Infimed Inc Manager. [Email Interview]• http://portal.acm.org/citation.cfm?id=320264<http://portal.acm.org/citation.cfm?

id=320264&;coll=portal&dl=ACM&CFID=8149335&CFTOKEN=12007127>&coll=portal&dl=ACM&CFID=8149335&CFTOKEN=12007127

• Brainball: http://portal.acm.org/toc.cfm?id=604575<http://portal.acm.org/toc.cfm?id=604575&;idx=J373&type=issue&coll=portal&dl=ACM&part=magazine&WantType=Magazines&title=interactions&CFID=8149042&CFTOKEN=44437748>&idx=J373&type=issue&coll=portal&dl=ACM&part=magazine&WantType=Magazines&title=interactions&CFID=8149042&CFTOKEN=44437748

• Number of Cell Phone Customers: http://www.emc-database.com/website.nsf/index/pr020319http://inventors.about.com/gi/dynamic/offsite.htm?site=

• http://www.pbs.org/internet/timeline/timeline%2Dtxt.html• http://www.oreillynet.com/pub/a/wireless/2001/09/28/relay.html

Page 41: The social-implications-of-computing

References (Cont.)References (Cont.)

• http://www.acm.org/women/• http://www.expage.com/page/genderissues3• http://www.cpsr.org/program/gender/index.html• http://www.pbs.org/newshour/bb/youth/jan-june99/gendergap_1-29.html• http://www.iota.org/Winter00/gendergap.html• http://www.ucalgary.ca/~northcot/380-2/lec12.html • http://www.ucalgary.ca/%7Ekawwalsh/introduction.htm • http://www.interweb-tech.com/nsmnet/docs/updated_numbers.htm • http://www.anu.edu.au/people/Roger.Clarke/II/NetN3.html• http://www.uclic.ucl.ac.uk/harold/srf/networked.pdf • http://www.caul.edu.au/org/commsdoc.htm