SlideShare a Scribd company logo
1 of 63
Download to read offline
SOSIO INFORMATIKA
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Socio Informatics
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Yusra Fernando, M.Komyusra.fernando@teknokrat.ac.id
CONTACT ME
2
Social Context of Computing
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Socio Informatics
Ethical and Social...J.M.Kizza 4
Objectives Learn
considers the three main social issues in computing namely, the
digital divide, workplace issues like employee monitoring, and health
risks, and how these issues are changing with the changing computer
technology.
The Social Context of Computing What is it?
• Appropriate vs. Inappropriate
• Proper Credit vs. Plagiarism
• Codes of ethics for computer users and professionals, ex. ACM Code
of Ethics
• Protection of Privacy and Civil Liberties
Introduction to the Social Implications of Computing
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Socio Informatics
Historical Perspective
• ACM Code of Ethics and Professional Conduct
• Adopted in 1973 from work dating to the 1940’s
• General Moral Imperatives, Professional Responsibilities,
Organizational Leadership Imperatives, Compliance with the Code
• “As an ACM member I will contribute to society and human well-
being” - First Code
• IFIP’s Technical Committee 9 (TC9)
• Established in 1976
• Relationships between Computers and Society
• Not technical issues
• 8 Working Groups added since then
• Computers and Work (est. 1977)
• Social Accountability (est. 1977)
• Home-Oriented Informatics and Telematics (est. 1988)
• Social Implications of Computers in Developing Countries (est. 1989)
• Applications and Social Implications of Virtual Worlds (est. 1989)
• Information Technology Mis-Use and the Law (est. 1990)
• History of Computing (est. 1992)
• Women and Information Technology (est. 2001)
Research: Growth of, and Access to the Internet
Research: Growth of, and Access to the Internet
• Issues with Internet Access
• Low-Bandwidth and Low-Connectivity
• Stats
• In 1998, the country of Ethiopia had a 256Kbps connection to the rest of the
Internet.
• In 2000, India had a total international bandwidth of 350 Mbps for 1 billion
people.
• Eight Arab countries (Egypt, Saudi Arabia, Lebanon, Jordan, Morocco, Oman,
Syria, and the UAE) have, combined, the same bandwidth as 518 cable modem
subscribers in the U.S.
Research: Growth of, and Access to the Internet
• Issues with Internet Access
• ISP Charges
• For example, “one ISP in Ghana is faced with the fact that Internet bandwidth
that would cost less than $1,000 in the US must be beamed to Ghana through
a satellite link to Canada, at about $40,000 a month.”
• Often economically unfeasible
Research: Growth of, and Access to the Internet
• Issues with Internet Access - Solutions
• TEK Search Engine
• Characteristics - can be generally applied
• Low-connectivity, in that it does not rely on end-to-end connection at any point in
time.
• Low-bandwidth, in that it maximizes ‘information density’ and only sends
attachments that can be downloaded over slow connections.
• User friendly, in that it does not overwhelm users from information-poor
environments with more results than they can manage.
• Similar to standard search engine tools, so that the skills the user acquires can be
transferred to other Web tools in the future.
Research: Computer Crime and Prevention
• Many crimes through Internet
• Plagiarism, peer-to-peer sharing, etc.
• Focus on child exploitation…pedophiles
• “Most pedophiles are attracted to the fact that there are many dark corners of the Internet
that are not being regulated.”
• Easy for a pedophile to exploit an innocent child without even having to leave his or her
home.
• Free programs exist that allow potential pedophiles to surf the Internet or use e-mail
anonymously.
• Prevention - Protection of Children From Sexual Predators Act of 1998, U.S.
Research: Gender Related Issues
• Growing concern of a gender divide
• The following based on British population
• It is recognized that males dominate the use of technologies in all areas of society.
• Fewer girls are taking up Computing at an advanced level, and universities are experiencing
a continued lack of interest in applications by women to computing degrees.
• In 1996, 19% of computer science students we were reported to be female.
• Today, only 21% of computing graduates in the UK are women.
• Barely an increase
Research: Gender Related Issues
Conclusion
• Implications of computing clear to see
• Both the good and bad
• These instances give a broader view of the need to recognize these negative implications
• During development before they occur
• Currently existing as well to derive possible solutions
• ACM and IFIP
• Aid in both prevention and solution to reduce the negative implications of computing
• Realize there will always be negatives to a positive thing
DIGITAL DIVIDE
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Socio Informatics
Ethical and Social...J.M.Kizza 18
• We spend more time in the workplace
• Domesticated technology to improve workplace
• Since the industrial age, the workplace has been in the forefront
of technological innovation
• The fears that technology will replace workers, which have been
the main force behind the resistance to workplace
modernization have not materialized
• Every new technology brings new workers in the workspace
Ethical and Social...J.M.Kizza 19
The Digital Divide
• Communication technological inequalities among peoples in one country and
between countries, commonly known as the digital divide, sprung out of the 1994
landmark U.S Commerce Department’s study
• The debate has centered on a number of key critical issues including:
• whether there is such a thing as a digital divide,
• indicators that should be used to measure such a divide if it exists, and
• the best ways to close such a divide.
• In general, the study of the digital divide involves the study of the impact on society’s
social, economic, political, and cultural institutions by communication technologies
such as : radio, television, the press, post offices, fixed and cellular telephones, fax
machines, airports, computers, and connectivity to the Internet
Ethical and Social...J.M.Kizza 20
• There are five indicators of the digital divide namely: access,
technology, humanware (human capacity), infrastructure, and
enabling environment.
• Access – Presents obstacles which can broadly be grouped into
five categories:
• geography,
• income,
• ethnicity,
• age, and
• education.
Ethical and Social...J.M.Kizza 21
• Technology -The computer-driven technological revolution has
brought the countries of the world ever closer together but it also
divided countries
• Technologies like faxes, cellular phones, computers and Internet
connections registered almost zero growth per thousand people in
developing countries in comparison to their counterparts in the
developed countries during the same period.
• A good technological base depends a great deal on relevant inputs:
• investment capital,
• infrastructure, and
• humanware(human capacity).
Ethical and Social...J.M.Kizza 22
• Humanware (Human Capacity ) - The availability and easy access
to ICT does not always solve the digital divide problem.
• lack of humanware, in developing counties to maintain the equipment -
shortage of teachers, technicians and institutes to train them.
• challenge to ensure that people can gainfully use ICT to add value to
local inputs. People will take ICT seriously when it meets and serves
their own local
Ethical and Social...J.M.Kizza 23
• Human capacity development is a complex multifaceted endeavor
consisting of many parts including:
• creating awareness of the potential for ICT to meet one's needs
• creating, developing, and strengthening capacity to use information and ICT
effectively using local inputs.
• Building capacity to produce and package information so that it adds value to
local inputs.
• Ensuring ongoing technical capacity development, and developing a format for
knowledge and information sharing.
• Preventing the local capacity from being drained to other, usually, developed
countries.
Ethical and Social...J.M.Kizza 24
• Infrastructure -As noted by many, the digital divide infrastructure is related to access in many
ways. They both present obstacles to gaining access to ICT.
• Fixed communication structures. In those countries with good fixed communication structures
like electricity, telephones, good roads, and airports, ICT development is a lot faster. Lack of
such resources hinders the development of ICT
• Enabling Environments - there are many countries with similar levels of per capita incomes and
economic structures exhibiting widely varying ICT performances. There are no good
explanations for this except that of enabling environments or lack of. An ICT enabling
environment is an environment in which ICT can thrive. There are several things that can bring
about such an environment, including politics and public policy and management styles.
• Politics - ICT thrives in a good political environment that ensures: a climate of democratic rights and
civil liberties conducive to ICT adaptation
• respect for the rule of law and security of property rights
• investment in human capacity, and
• low level of government distortions
Ethical and Social...J.M.Kizza 25
• Public Policy and Management Styles - Governments must put in
place streamlined regulatory policies for importation and
licensing of ICT technologies. Laws must be enacted and uniformly
enforced so that non-governmental organizations (NGOs) and
other organizations interested in investing in ICT economic
activities do so with ease
Ethical and Social...J.M.Kizza 26
The Changing Workplace
• The workplace can be anywhere where one performs tasks:
• A place away from home
• In a car/plane/train
• Home
• Virtual office
• In the home office:
• Categories of workers have been changing
• Company benefits are mixed
• Not everyone benefits from home-based work
Ethical and Social...J.M.Kizza 27
The Changing Workplace…
• There are company fears arising from home-based work:
• Trade secrets
• Supervision
• Productivity
• Liability
• Unstudied social and Ethical effects:
• Psychological
• Social
Ethical and Social...J.M.Kizza 28
Employee Monitoring
• The purpose of workspace monitoring
• Types of monitoring:
• Electronic
• Video
• Benefits of monitoring:
• Good management, performance evaluation, management control, accurate
assessment, immediate feedback and, flexible work assignments.
Ethical and Social...J.M.Kizza 29
Workplace Privacy and Surveillance…
• Effects of electronic monitoring:
• Reduced task variety
• Lack of individual initiatives
• Reduced or no peer social support
• Lack of self-esteem
• Lack of interest in the job
• Lack of trust among workers, between workers and supervisors, and between
supervisors and management
• Alienation
Ethical and Social...J.M.Kizza 30
Computer-related Risks
• Employee safety
• Reliability
• System safety and security
• Individual privacy.
Ethical and Social...J.M.Kizza 31
Employee Health and Productivity
• Ergonomics- an applied science concerned with the human-machine
interactions that offer and maintain the safety, comfort, health, and
habitable environment.
• Ergonomic injuries result when demand on an employee to perform far
exceeds that person’s working capacity
Ethical and Social...J.M.Kizza 32
Employee Health and Productivity…
• Ergonomic-related musculosketal disorder such as:
• Back pain
• Neck and shoulder pains
• Repetitive strain injuries (RSI)
• Stress
• Productivity of workers depends on their health
• Companies are getting the message and are forming health clubs,
day-care centers on company premises, and offering extended
maternity leaves
Social Implications of Networked Communications
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Socio Informatics
Impacts of the Internet
• Networked Communications, more specifically the Internet, has
effected society in many ways
• Methods of Communication
• Amassment of media
• The emergence of virtual communities
• Leads to new social responsibilities
How the Internet Affects Methods of Communications
• Applications that increase communications and decrease the impact
of geographic barriers
• Bulletin Board programs such as USENET
• Instant Messaging Programs such as MSN Instant Messenger and IRC
• Most common, e-mail
How the Internet Affects Methods of Communications
• Many of these applications are replacing their non-computer related
counterparts
• E-mail is faster than the Postal Service
• IRC doesn’t require the telephone
• USENET doesn’t require a physical bulletin board, or thumbtacks.
Impact of Increased Communications
• People within a society and between societies can now communicate
in ways that were impossible before
• Has made communication easier
• Varied and easier forms of communication can have massive affects
on society
How the Internet has Affected Amassment of Media
• Many encyclopedias, dictionaries, and similar resources available
online
• Movie clips and song clips have become commonplace on the
Internet
• Significant impact on the 1996 Presidential Election
1996 US Presidential Election
• Privately run WebPages and media-based WebPages collected
documents from journalists, pollsters, politicians
• PoliticsNow
• Networked Communications allowed the candidates better and more
immediate access to their campaign teams
• First time ever candidacy was declared online before publicly
Advent of Virtual Communities
• Two definitions
• Physically based virtual communities
• Actual community augmented by electric resources such as online libraries, town
meetings, etc.
• Shared interest virtual communities
• Community members have similar interests, can span continents, gender, creed
Impact of Virtual Communities
• Physically based virtual communities can help bring local people
together
• Strengthen existing social relations
• Shared interest virtual communities have the potential to form new
social relations between people, but also can hinder existing relations
within a community
Example of Sacrificing Real Community Relations for Virtual
Ones
• http://www.head2headgames.com/pics/cscpl18.jpg
New Social Responsibilities
• Issues of privacy
• Windows 98 personal identifier
• Issues of freedom of speech
• 1996 Communication Decency Act
• Advent of computer crime
• Identity theft has become a large concern in recent years
Need for Regulation
• Regulation policies are being created both on national and
international levels
• Aforementioned 1996 Act
• In 2000, the European Commission began to work on a set of international
regulations
• The social implications of such regulations could range anywhere
from censorship of obscene material to specialized online
transactions to guarantee privacy
Conclusions
• Networked Communications, most importantly the Internet, have
various impacts on society
• Establishes new methods of communication between persons around the
world
• Provides a means by which to amass large amounts of media that is easily
accessible
• Has laid the groundwork for the development of virtual communities, new
social trends in their own right
• Results in a new set of social responsibilities and regulations
Growth of, Control of and Access to the Internet
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Socio Informatics
A Brief History of the Internet
• First recorded description of social interactions through networking
done by J.C.R. Licklider of MIT in 1962.
• On September 1969, BBN delivered the first network computer and
created the first long distance computer network, named ARPANET.
• During the 1970’s, ARPANET evolved in size and stability.
• Email was the most noteworthy development.
A Brief History of the Internet
• In the 1980’s, a set of new communication protocols, TCP/IP, was
introduced.
• In 1983, there was the transition of the ARPANET host protocol from
NCP to TCP/IP.
• In 1989 ARPANET was decommissioned, leaving a number of private
companies to provide the backbone of the Internet.
• The World-Wide Web was conceived by Tim Berners-Lee and Robert
Cailliau at CERN and made public in 1991.
Internet Growth in the Past Ten Years
Control of the Internet
• Originally developed for military and then academic use. It was a
closed network, so an ethical debate was not present.
• With the sudden growth of the Internet, ethical issues are becoming
prevalent.
• Who should be held responsible?
• Governments, ISP’s, operators of services, along with end-users.
• However, much work still needs to be done.
Ethical Debates Regarding Control
• Protection of minors.
• Protection/privacy of the individual.
• Respect for cultural differences.
• Finding a balance between freedom of expression versus censorship.
• Value and accuracy of the information provided.
Access to the Internet
• Internet originally developed for the intellectual.
• Access to the Internet should be universal, regardless of income or
disability.
• As the Internet continues to expand, more ethical debates will arise.
• Acceptable Use Policies are put in place in many institutions.
• Access to the Internet is a privilege that carries many responsibilities.
Gender related Issues of Computing
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Socio Informatics
International Issues
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Socio Informatics
Globalization due to IT
• Definition – the unification of the nations on earth
• Increase in globalization brought about by the new ways of communicating:
• Email
• Video conferencing
• And other cheap and nearly instantaneous ways to communicate
1.) The Open-Source Software Movement
• Open Source Software –
free distribution of source
code
• Started off as a social
community
• Hackers
Richard Stallman
Closed-Source V.S. Open-Source
• Caused by the attempted passing of legislation that supports open-source software
• Lobbying:
• Closed-Source: Initiative for Software Choice (ISC)
• Open-Source: Sincere Choice
Mike
Wendy
Bruce
Perens
2.) Offshoring
Jobs Lost to Date Projected Job Loss Jobs at Risk
300,000-995,000 3.3 million-6 million 14.1 million
300,000-500,000
(Goldman Sachs)
3.3 million over 15 years
(Forrester Research)
14.1 million
(UC Berkeley)
400,000-500,000
(Business Week)
6 million over 10 years
(Goldman Sachs)
995,000
(economy.com)
• Offshoring – The sending of jobs overseas
• For example American companies moving parts of their operations to India
• Causes social issues in both countries
*Statistics taken on
March 16, 2004
In the United States
• Social movements against outsourcing
have mobilized
• Movements include:
• The American Champions
• Techs Unite
• The E-Activist Network
• Communications Workers of America
In India
• Increase in the number
of middle class Indian
people
• Statistics:
• The new 487 million
middle-class Indians are
expected to spend $420
billion in the next four
years
• Draws the attention of
many companies
Related to Globalization?
• The Open-Source Movement
• Allows modification and improvement of source code on a global level
• Offshoring
• By directly influencing the culture of the affected areas
Thank You ..
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
YUSRA FERNANDO, S.KOM., M.KOM
20192019

More Related Content

What's hot

Institutional DeFi Architecture
Institutional DeFi ArchitectureInstitutional DeFi Architecture
Institutional DeFi ArchitectureFloyd DCosta
 
CASHLESS INDIA - A Way Forward
CASHLESS INDIA - A Way Forward CASHLESS INDIA - A Way Forward
CASHLESS INDIA - A Way Forward Somyadarshna
 
Fintech : An Innovation in Financial Industry by Fintech App Development Company
Fintech : An Innovation in Financial Industry by Fintech App Development CompanyFintech : An Innovation in Financial Industry by Fintech App Development Company
Fintech : An Innovation in Financial Industry by Fintech App Development CompanyGame App Studio
 
E-Governance Slide.pdf
E-Governance Slide.pdfE-Governance Slide.pdf
E-Governance Slide.pdfInfinityHealth
 
Fintech: A Job, Career or your Vision?
Fintech: A Job, Career or your Vision?Fintech: A Job, Career or your Vision?
Fintech: A Job, Career or your Vision?Sumsun He
 
Central banks and the future of digital money. A practical proposal for centr...
Central banks and the future of digital money. A practical proposal for centr...Central banks and the future of digital money. A practical proposal for centr...
Central banks and the future of digital money. A practical proposal for centr...eraser Juan José Calderón
 
Banking Disruption in Financial Services: Threats and Opportunities
Banking Disruption in Financial Services: Threats and OpportunitiesBanking Disruption in Financial Services: Threats and Opportunities
Banking Disruption in Financial Services: Threats and OpportunitiesDogTelligent
 
26 Disruptive & Technology Trends 2016 - 2018
26 Disruptive & Technology Trends 2016 - 201826 Disruptive & Technology Trends 2016 - 2018
26 Disruptive & Technology Trends 2016 - 2018Brian Solis
 
EU'S Ethics Guidelines for Trustworthy AI 2019
EU'S Ethics Guidelines for Trustworthy AI 2019EU'S Ethics Guidelines for Trustworthy AI 2019
EU'S Ethics Guidelines for Trustworthy AI 2019ELSE CORP
 
Bitcoin - Introduction to Virtual Currency / Cryptocurrency
Bitcoin - Introduction to Virtual Currency / CryptocurrencyBitcoin - Introduction to Virtual Currency / Cryptocurrency
Bitcoin - Introduction to Virtual Currency / CryptocurrencySwaminath Sam
 
“Empowerment through information and communication technologies-women's persp...
“Empowerment through information and communication technologies-women's persp...“Empowerment through information and communication technologies-women's persp...
“Empowerment through information and communication technologies-women's persp...AMU
 
Innovation in Design | Digital Transformation 2019
Innovation in Design | Digital Transformation 2019Innovation in Design | Digital Transformation 2019
Innovation in Design | Digital Transformation 2019Italian Design Brands
 
Bitcoin as an Emerging Technology Written Report
Bitcoin as an Emerging Technology Written ReportBitcoin as an Emerging Technology Written Report
Bitcoin as an Emerging Technology Written ReportShane Hickey
 
Exploring Digital Transformation: An Overview of Future Trends
Exploring Digital Transformation:  An Overview of Future Trends Exploring Digital Transformation:  An Overview of Future Trends
Exploring Digital Transformation: An Overview of Future Trends Mark Brown
 
Sunny Tech 2019 - Craft Forever
Sunny Tech 2019 - Craft ForeverSunny Tech 2019 - Craft Forever
Sunny Tech 2019 - Craft ForeverCyrille Martraire
 

What's hot (20)

Institutional DeFi Architecture
Institutional DeFi ArchitectureInstitutional DeFi Architecture
Institutional DeFi Architecture
 
CASHLESS INDIA - A Way Forward
CASHLESS INDIA - A Way Forward CASHLESS INDIA - A Way Forward
CASHLESS INDIA - A Way Forward
 
Fintech : An Innovation in Financial Industry by Fintech App Development Company
Fintech : An Innovation in Financial Industry by Fintech App Development CompanyFintech : An Innovation in Financial Industry by Fintech App Development Company
Fintech : An Innovation in Financial Industry by Fintech App Development Company
 
BLOCKCHAIN TECHNOLOGY
BLOCKCHAIN TECHNOLOGYBLOCKCHAIN TECHNOLOGY
BLOCKCHAIN TECHNOLOGY
 
E-Governance Slide.pdf
E-Governance Slide.pdfE-Governance Slide.pdf
E-Governance Slide.pdf
 
Quality 4.0
Quality 4.0Quality 4.0
Quality 4.0
 
Fintech: A Job, Career or your Vision?
Fintech: A Job, Career or your Vision?Fintech: A Job, Career or your Vision?
Fintech: A Job, Career or your Vision?
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Central banks and the future of digital money. A practical proposal for centr...
Central banks and the future of digital money. A practical proposal for centr...Central banks and the future of digital money. A practical proposal for centr...
Central banks and the future of digital money. A practical proposal for centr...
 
Banking Disruption in Financial Services: Threats and Opportunities
Banking Disruption in Financial Services: Threats and OpportunitiesBanking Disruption in Financial Services: Threats and Opportunities
Banking Disruption in Financial Services: Threats and Opportunities
 
26 Disruptive & Technology Trends 2016 - 2018
26 Disruptive & Technology Trends 2016 - 201826 Disruptive & Technology Trends 2016 - 2018
26 Disruptive & Technology Trends 2016 - 2018
 
EU'S Ethics Guidelines for Trustworthy AI 2019
EU'S Ethics Guidelines for Trustworthy AI 2019EU'S Ethics Guidelines for Trustworthy AI 2019
EU'S Ethics Guidelines for Trustworthy AI 2019
 
Bitcoin - Introduction to Virtual Currency / Cryptocurrency
Bitcoin - Introduction to Virtual Currency / CryptocurrencyBitcoin - Introduction to Virtual Currency / Cryptocurrency
Bitcoin - Introduction to Virtual Currency / Cryptocurrency
 
Cashless India
Cashless IndiaCashless India
Cashless India
 
Virtual currency
Virtual currencyVirtual currency
Virtual currency
 
“Empowerment through information and communication technologies-women's persp...
“Empowerment through information and communication technologies-women's persp...“Empowerment through information and communication technologies-women's persp...
“Empowerment through information and communication technologies-women's persp...
 
Innovation in Design | Digital Transformation 2019
Innovation in Design | Digital Transformation 2019Innovation in Design | Digital Transformation 2019
Innovation in Design | Digital Transformation 2019
 
Bitcoin as an Emerging Technology Written Report
Bitcoin as an Emerging Technology Written ReportBitcoin as an Emerging Technology Written Report
Bitcoin as an Emerging Technology Written Report
 
Exploring Digital Transformation: An Overview of Future Trends
Exploring Digital Transformation:  An Overview of Future Trends Exploring Digital Transformation:  An Overview of Future Trends
Exploring Digital Transformation: An Overview of Future Trends
 
Sunny Tech 2019 - Craft Forever
Sunny Tech 2019 - Craft ForeverSunny Tech 2019 - Craft Forever
Sunny Tech 2019 - Craft Forever
 

Similar to Chp 7 lect 7 - social context of computing (shared)

Digital divide
Digital divideDigital divide
Digital divideUc Man
 
Information management report on ICT
Information management   report on ICTInformation management   report on ICT
Information management report on ICTAbigail Pugal-Somera
 
Information and communication as sources of understanding and transforming th...
Information and communication as sources of understanding and transforming th...Information and communication as sources of understanding and transforming th...
Information and communication as sources of understanding and transforming th...carmenpuigdueta
 
Capstone Presentation
Capstone PresentationCapstone Presentation
Capstone Presentationcjolsen2188
 
Digital inclusion and exclusion
Digital inclusion and exclusionDigital inclusion and exclusion
Digital inclusion and exclusionpumascomm
 
GTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network SocietyGTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network SocietyGreater_Tygerberg_Partnership
 
Information and Communication Technologies
Information and Communication TechnologiesInformation and Communication Technologies
Information and Communication Technologiesbmock3
 
Whatever happened to the digital divide
Whatever happened to the digital divideWhatever happened to the digital divide
Whatever happened to the digital divideMarcus Leaning
 
Political Economy
Political EconomyPolitical Economy
Political Economypumascomm
 
Unit 6: Information Communication Technology (ICT)
Unit 6: Information Communication Technology (ICT)Unit 6: Information Communication Technology (ICT)
Unit 6: Information Communication Technology (ICT)Miss Chey
 
Informationcommunicationtechnology 130809125307-phpapp02
Informationcommunicationtechnology 130809125307-phpapp02Informationcommunicationtechnology 130809125307-phpapp02
Informationcommunicationtechnology 130809125307-phpapp02Amarjeet Sinha
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technologyAditya
 

Similar to Chp 7 lect 7 - social context of computing (shared) (20)

Digital divide
Digital divideDigital divide
Digital divide
 
Information management report on ICT
Information management   report on ICTInformation management   report on ICT
Information management report on ICT
 
Information and communication as sources of understanding and transforming th...
Information and communication as sources of understanding and transforming th...Information and communication as sources of understanding and transforming th...
Information and communication as sources of understanding and transforming th...
 
Capstone Presentation
Capstone PresentationCapstone Presentation
Capstone Presentation
 
Digital inclusion and exclusion
Digital inclusion and exclusionDigital inclusion and exclusion
Digital inclusion and exclusion
 
Digital divide
Digital divideDigital divide
Digital divide
 
GTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network SocietyGTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network Society
 
DIGITAL-DIVIDE.pptx
DIGITAL-DIVIDE.pptxDIGITAL-DIVIDE.pptx
DIGITAL-DIVIDE.pptx
 
Info 442 chapter 2
Info 442 chapter 2Info 442 chapter 2
Info 442 chapter 2
 
Information and Communication Technologies
Information and Communication TechnologiesInformation and Communication Technologies
Information and Communication Technologies
 
Whatever happened to the digital divide
Whatever happened to the digital divideWhatever happened to the digital divide
Whatever happened to the digital divide
 
Digital economy
Digital economyDigital economy
Digital economy
 
Political Economy
Political EconomyPolitical Economy
Political Economy
 
Unit 6: Information Communication Technology (ICT)
Unit 6: Information Communication Technology (ICT)Unit 6: Information Communication Technology (ICT)
Unit 6: Information Communication Technology (ICT)
 
Digital divide
Digital divideDigital divide
Digital divide
 
ICT & Youth
ICT & YouthICT & Youth
ICT & Youth
 
ets digital divide.pptx
ets digital divide.pptxets digital divide.pptx
ets digital divide.pptx
 
Fact Sheet: Information and Communication Technology
Fact Sheet: Information and Communication TechnologyFact Sheet: Information and Communication Technology
Fact Sheet: Information and Communication Technology
 
Informationcommunicationtechnology 130809125307-phpapp02
Informationcommunicationtechnology 130809125307-phpapp02Informationcommunicationtechnology 130809125307-phpapp02
Informationcommunicationtechnology 130809125307-phpapp02
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 

More from YUSRA FERNANDO

Vs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdfVs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdfYUSRA FERNANDO
 
Chp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfChp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfYUSRA FERNANDO
 
Chp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdfChp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdfYUSRA FERNANDO
 
7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdf7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdfYUSRA FERNANDO
 
8. IT and Decision Making.pdf
8. IT and Decision Making.pdf8. IT and Decision Making.pdf
8. IT and Decision Making.pdfYUSRA FERNANDO
 
06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdfYUSRA FERNANDO
 
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...YUSRA FERNANDO
 
Bab 1 pengantar desain web
Bab 1   pengantar desain webBab 1   pengantar desain web
Bab 1 pengantar desain webYUSRA FERNANDO
 
Chapter 3.3 css - tugas css (shared)
Chapter 3.3   css - tugas css (shared)Chapter 3.3   css - tugas css (shared)
Chapter 3.3 css - tugas css (shared)YUSRA FERNANDO
 
Javascript yusra 2021 (shared)
Javascript   yusra 2021 (shared)Javascript   yusra 2021 (shared)
Javascript yusra 2021 (shared)YUSRA FERNANDO
 
3. latihan css 01 (shared)
3. latihan css   01 (shared)3. latihan css   01 (shared)
3. latihan css 01 (shared)YUSRA FERNANDO
 
2 property css (shared)
2   property css (shared)2   property css (shared)
2 property css (shared)YUSRA FERNANDO
 
Chapter 1 introduction html (shared)
Chapter 1   introduction html (shared)Chapter 1   introduction html (shared)
Chapter 1 introduction html (shared)YUSRA FERNANDO
 
Chapter 00 introduction - web desain -(shared)
Chapter 00   introduction - web desain -(shared)Chapter 00   introduction - web desain -(shared)
Chapter 00 introduction - web desain -(shared)YUSRA FERNANDO
 
Emosi dan Suasana Hati
Emosi dan Suasana HatiEmosi dan Suasana Hati
Emosi dan Suasana HatiYUSRA FERNANDO
 
Sikap dan Kepuasan Kerja
Sikap dan Kepuasan KerjaSikap dan Kepuasan Kerja
Sikap dan Kepuasan KerjaYUSRA FERNANDO
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiYUSRA FERNANDO
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiYUSRA FERNANDO
 

More from YUSRA FERNANDO (20)

Vs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdfVs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdf
 
Chp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfChp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdf
 
Chp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdfChp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdf
 
7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdf7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdf
 
8. IT and Decision Making.pdf
8. IT and Decision Making.pdf8. IT and Decision Making.pdf
8. IT and Decision Making.pdf
 
06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf
 
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
 
Bab 1 pengantar desain web
Bab 1   pengantar desain webBab 1   pengantar desain web
Bab 1 pengantar desain web
 
Chapter 3.3 css - tugas css (shared)
Chapter 3.3   css - tugas css (shared)Chapter 3.3   css - tugas css (shared)
Chapter 3.3 css - tugas css (shared)
 
Javascript yusra 2021 (shared)
Javascript   yusra 2021 (shared)Javascript   yusra 2021 (shared)
Javascript yusra 2021 (shared)
 
3. latihan css 01 (shared)
3. latihan css   01 (shared)3. latihan css   01 (shared)
3. latihan css 01 (shared)
 
2 property css (shared)
2   property css (shared)2   property css (shared)
2 property css (shared)
 
Css pengenalan css
Css   pengenalan cssCss   pengenalan css
Css pengenalan css
 
Chapter 1 introduction html (shared)
Chapter 1   introduction html (shared)Chapter 1   introduction html (shared)
Chapter 1 introduction html (shared)
 
Chapter 00 introduction - web desain -(shared)
Chapter 00   introduction - web desain -(shared)Chapter 00   introduction - web desain -(shared)
Chapter 00 introduction - web desain -(shared)
 
Kepribadian dan Nilai
Kepribadian dan NilaiKepribadian dan Nilai
Kepribadian dan Nilai
 
Emosi dan Suasana Hati
Emosi dan Suasana HatiEmosi dan Suasana Hati
Emosi dan Suasana Hati
 
Sikap dan Kepuasan Kerja
Sikap dan Kepuasan KerjaSikap dan Kepuasan Kerja
Sikap dan Kepuasan Kerja
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku Organisasi
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku Organisasi
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Chp 7 lect 7 - social context of computing (shared)

  • 1. SOSIO INFORMATIKA UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Socio Informatics
  • 2. UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Yusra Fernando, M.Komyusra.fernando@teknokrat.ac.id CONTACT ME 2
  • 3. Social Context of Computing UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Socio Informatics
  • 4. Ethical and Social...J.M.Kizza 4 Objectives Learn considers the three main social issues in computing namely, the digital divide, workplace issues like employee monitoring, and health risks, and how these issues are changing with the changing computer technology.
  • 5. The Social Context of Computing What is it? • Appropriate vs. Inappropriate • Proper Credit vs. Plagiarism • Codes of ethics for computer users and professionals, ex. ACM Code of Ethics • Protection of Privacy and Civil Liberties
  • 6. Introduction to the Social Implications of Computing UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Socio Informatics
  • 7. Historical Perspective • ACM Code of Ethics and Professional Conduct • Adopted in 1973 from work dating to the 1940’s • General Moral Imperatives, Professional Responsibilities, Organizational Leadership Imperatives, Compliance with the Code • “As an ACM member I will contribute to society and human well- being” - First Code
  • 8. • IFIP’s Technical Committee 9 (TC9) • Established in 1976 • Relationships between Computers and Society • Not technical issues • 8 Working Groups added since then • Computers and Work (est. 1977) • Social Accountability (est. 1977) • Home-Oriented Informatics and Telematics (est. 1988) • Social Implications of Computers in Developing Countries (est. 1989) • Applications and Social Implications of Virtual Worlds (est. 1989) • Information Technology Mis-Use and the Law (est. 1990) • History of Computing (est. 1992) • Women and Information Technology (est. 2001)
  • 9. Research: Growth of, and Access to the Internet
  • 10. Research: Growth of, and Access to the Internet • Issues with Internet Access • Low-Bandwidth and Low-Connectivity • Stats • In 1998, the country of Ethiopia had a 256Kbps connection to the rest of the Internet. • In 2000, India had a total international bandwidth of 350 Mbps for 1 billion people. • Eight Arab countries (Egypt, Saudi Arabia, Lebanon, Jordan, Morocco, Oman, Syria, and the UAE) have, combined, the same bandwidth as 518 cable modem subscribers in the U.S.
  • 11. Research: Growth of, and Access to the Internet • Issues with Internet Access • ISP Charges • For example, “one ISP in Ghana is faced with the fact that Internet bandwidth that would cost less than $1,000 in the US must be beamed to Ghana through a satellite link to Canada, at about $40,000 a month.” • Often economically unfeasible
  • 12. Research: Growth of, and Access to the Internet • Issues with Internet Access - Solutions • TEK Search Engine • Characteristics - can be generally applied • Low-connectivity, in that it does not rely on end-to-end connection at any point in time. • Low-bandwidth, in that it maximizes ‘information density’ and only sends attachments that can be downloaded over slow connections. • User friendly, in that it does not overwhelm users from information-poor environments with more results than they can manage. • Similar to standard search engine tools, so that the skills the user acquires can be transferred to other Web tools in the future.
  • 13. Research: Computer Crime and Prevention • Many crimes through Internet • Plagiarism, peer-to-peer sharing, etc. • Focus on child exploitation…pedophiles • “Most pedophiles are attracted to the fact that there are many dark corners of the Internet that are not being regulated.” • Easy for a pedophile to exploit an innocent child without even having to leave his or her home. • Free programs exist that allow potential pedophiles to surf the Internet or use e-mail anonymously. • Prevention - Protection of Children From Sexual Predators Act of 1998, U.S.
  • 14. Research: Gender Related Issues • Growing concern of a gender divide • The following based on British population • It is recognized that males dominate the use of technologies in all areas of society. • Fewer girls are taking up Computing at an advanced level, and universities are experiencing a continued lack of interest in applications by women to computing degrees. • In 1996, 19% of computer science students we were reported to be female. • Today, only 21% of computing graduates in the UK are women. • Barely an increase
  • 16. Conclusion • Implications of computing clear to see • Both the good and bad • These instances give a broader view of the need to recognize these negative implications • During development before they occur • Currently existing as well to derive possible solutions • ACM and IFIP • Aid in both prevention and solution to reduce the negative implications of computing • Realize there will always be negatives to a positive thing
  • 17. DIGITAL DIVIDE UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Socio Informatics
  • 18. Ethical and Social...J.M.Kizza 18 • We spend more time in the workplace • Domesticated technology to improve workplace • Since the industrial age, the workplace has been in the forefront of technological innovation • The fears that technology will replace workers, which have been the main force behind the resistance to workplace modernization have not materialized • Every new technology brings new workers in the workspace
  • 19. Ethical and Social...J.M.Kizza 19 The Digital Divide • Communication technological inequalities among peoples in one country and between countries, commonly known as the digital divide, sprung out of the 1994 landmark U.S Commerce Department’s study • The debate has centered on a number of key critical issues including: • whether there is such a thing as a digital divide, • indicators that should be used to measure such a divide if it exists, and • the best ways to close such a divide. • In general, the study of the digital divide involves the study of the impact on society’s social, economic, political, and cultural institutions by communication technologies such as : radio, television, the press, post offices, fixed and cellular telephones, fax machines, airports, computers, and connectivity to the Internet
  • 20. Ethical and Social...J.M.Kizza 20 • There are five indicators of the digital divide namely: access, technology, humanware (human capacity), infrastructure, and enabling environment. • Access – Presents obstacles which can broadly be grouped into five categories: • geography, • income, • ethnicity, • age, and • education.
  • 21. Ethical and Social...J.M.Kizza 21 • Technology -The computer-driven technological revolution has brought the countries of the world ever closer together but it also divided countries • Technologies like faxes, cellular phones, computers and Internet connections registered almost zero growth per thousand people in developing countries in comparison to their counterparts in the developed countries during the same period. • A good technological base depends a great deal on relevant inputs: • investment capital, • infrastructure, and • humanware(human capacity).
  • 22. Ethical and Social...J.M.Kizza 22 • Humanware (Human Capacity ) - The availability and easy access to ICT does not always solve the digital divide problem. • lack of humanware, in developing counties to maintain the equipment - shortage of teachers, technicians and institutes to train them. • challenge to ensure that people can gainfully use ICT to add value to local inputs. People will take ICT seriously when it meets and serves their own local
  • 23. Ethical and Social...J.M.Kizza 23 • Human capacity development is a complex multifaceted endeavor consisting of many parts including: • creating awareness of the potential for ICT to meet one's needs • creating, developing, and strengthening capacity to use information and ICT effectively using local inputs. • Building capacity to produce and package information so that it adds value to local inputs. • Ensuring ongoing technical capacity development, and developing a format for knowledge and information sharing. • Preventing the local capacity from being drained to other, usually, developed countries.
  • 24. Ethical and Social...J.M.Kizza 24 • Infrastructure -As noted by many, the digital divide infrastructure is related to access in many ways. They both present obstacles to gaining access to ICT. • Fixed communication structures. In those countries with good fixed communication structures like electricity, telephones, good roads, and airports, ICT development is a lot faster. Lack of such resources hinders the development of ICT • Enabling Environments - there are many countries with similar levels of per capita incomes and economic structures exhibiting widely varying ICT performances. There are no good explanations for this except that of enabling environments or lack of. An ICT enabling environment is an environment in which ICT can thrive. There are several things that can bring about such an environment, including politics and public policy and management styles. • Politics - ICT thrives in a good political environment that ensures: a climate of democratic rights and civil liberties conducive to ICT adaptation • respect for the rule of law and security of property rights • investment in human capacity, and • low level of government distortions
  • 25. Ethical and Social...J.M.Kizza 25 • Public Policy and Management Styles - Governments must put in place streamlined regulatory policies for importation and licensing of ICT technologies. Laws must be enacted and uniformly enforced so that non-governmental organizations (NGOs) and other organizations interested in investing in ICT economic activities do so with ease
  • 26. Ethical and Social...J.M.Kizza 26 The Changing Workplace • The workplace can be anywhere where one performs tasks: • A place away from home • In a car/plane/train • Home • Virtual office • In the home office: • Categories of workers have been changing • Company benefits are mixed • Not everyone benefits from home-based work
  • 27. Ethical and Social...J.M.Kizza 27 The Changing Workplace… • There are company fears arising from home-based work: • Trade secrets • Supervision • Productivity • Liability • Unstudied social and Ethical effects: • Psychological • Social
  • 28. Ethical and Social...J.M.Kizza 28 Employee Monitoring • The purpose of workspace monitoring • Types of monitoring: • Electronic • Video • Benefits of monitoring: • Good management, performance evaluation, management control, accurate assessment, immediate feedback and, flexible work assignments.
  • 29. Ethical and Social...J.M.Kizza 29 Workplace Privacy and Surveillance… • Effects of electronic monitoring: • Reduced task variety • Lack of individual initiatives • Reduced or no peer social support • Lack of self-esteem • Lack of interest in the job • Lack of trust among workers, between workers and supervisors, and between supervisors and management • Alienation
  • 30. Ethical and Social...J.M.Kizza 30 Computer-related Risks • Employee safety • Reliability • System safety and security • Individual privacy.
  • 31. Ethical and Social...J.M.Kizza 31 Employee Health and Productivity • Ergonomics- an applied science concerned with the human-machine interactions that offer and maintain the safety, comfort, health, and habitable environment. • Ergonomic injuries result when demand on an employee to perform far exceeds that person’s working capacity
  • 32. Ethical and Social...J.M.Kizza 32 Employee Health and Productivity… • Ergonomic-related musculosketal disorder such as: • Back pain • Neck and shoulder pains • Repetitive strain injuries (RSI) • Stress • Productivity of workers depends on their health • Companies are getting the message and are forming health clubs, day-care centers on company premises, and offering extended maternity leaves
  • 33. Social Implications of Networked Communications UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Socio Informatics
  • 34. Impacts of the Internet • Networked Communications, more specifically the Internet, has effected society in many ways • Methods of Communication • Amassment of media • The emergence of virtual communities • Leads to new social responsibilities
  • 35. How the Internet Affects Methods of Communications • Applications that increase communications and decrease the impact of geographic barriers • Bulletin Board programs such as USENET • Instant Messaging Programs such as MSN Instant Messenger and IRC • Most common, e-mail
  • 36. How the Internet Affects Methods of Communications • Many of these applications are replacing their non-computer related counterparts • E-mail is faster than the Postal Service • IRC doesn’t require the telephone • USENET doesn’t require a physical bulletin board, or thumbtacks.
  • 37. Impact of Increased Communications • People within a society and between societies can now communicate in ways that were impossible before • Has made communication easier • Varied and easier forms of communication can have massive affects on society
  • 38. How the Internet has Affected Amassment of Media • Many encyclopedias, dictionaries, and similar resources available online • Movie clips and song clips have become commonplace on the Internet • Significant impact on the 1996 Presidential Election
  • 39. 1996 US Presidential Election • Privately run WebPages and media-based WebPages collected documents from journalists, pollsters, politicians • PoliticsNow • Networked Communications allowed the candidates better and more immediate access to their campaign teams • First time ever candidacy was declared online before publicly
  • 40. Advent of Virtual Communities • Two definitions • Physically based virtual communities • Actual community augmented by electric resources such as online libraries, town meetings, etc. • Shared interest virtual communities • Community members have similar interests, can span continents, gender, creed
  • 41. Impact of Virtual Communities • Physically based virtual communities can help bring local people together • Strengthen existing social relations • Shared interest virtual communities have the potential to form new social relations between people, but also can hinder existing relations within a community
  • 42. Example of Sacrificing Real Community Relations for Virtual Ones • http://www.head2headgames.com/pics/cscpl18.jpg
  • 43. New Social Responsibilities • Issues of privacy • Windows 98 personal identifier • Issues of freedom of speech • 1996 Communication Decency Act • Advent of computer crime • Identity theft has become a large concern in recent years
  • 44. Need for Regulation • Regulation policies are being created both on national and international levels • Aforementioned 1996 Act • In 2000, the European Commission began to work on a set of international regulations • The social implications of such regulations could range anywhere from censorship of obscene material to specialized online transactions to guarantee privacy
  • 45. Conclusions • Networked Communications, most importantly the Internet, have various impacts on society • Establishes new methods of communication between persons around the world • Provides a means by which to amass large amounts of media that is easily accessible • Has laid the groundwork for the development of virtual communities, new social trends in their own right • Results in a new set of social responsibilities and regulations
  • 46. Growth of, Control of and Access to the Internet UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Socio Informatics
  • 47. A Brief History of the Internet • First recorded description of social interactions through networking done by J.C.R. Licklider of MIT in 1962. • On September 1969, BBN delivered the first network computer and created the first long distance computer network, named ARPANET. • During the 1970’s, ARPANET evolved in size and stability. • Email was the most noteworthy development.
  • 48. A Brief History of the Internet • In the 1980’s, a set of new communication protocols, TCP/IP, was introduced. • In 1983, there was the transition of the ARPANET host protocol from NCP to TCP/IP. • In 1989 ARPANET was decommissioned, leaving a number of private companies to provide the backbone of the Internet. • The World-Wide Web was conceived by Tim Berners-Lee and Robert Cailliau at CERN and made public in 1991.
  • 49. Internet Growth in the Past Ten Years
  • 50. Control of the Internet • Originally developed for military and then academic use. It was a closed network, so an ethical debate was not present. • With the sudden growth of the Internet, ethical issues are becoming prevalent. • Who should be held responsible? • Governments, ISP’s, operators of services, along with end-users. • However, much work still needs to be done.
  • 51. Ethical Debates Regarding Control • Protection of minors. • Protection/privacy of the individual. • Respect for cultural differences. • Finding a balance between freedom of expression versus censorship. • Value and accuracy of the information provided.
  • 52. Access to the Internet • Internet originally developed for the intellectual. • Access to the Internet should be universal, regardless of income or disability. • As the Internet continues to expand, more ethical debates will arise. • Acceptable Use Policies are put in place in many institutions. • Access to the Internet is a privilege that carries many responsibilities.
  • 53.
  • 54. Gender related Issues of Computing UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Socio Informatics
  • 55. International Issues UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Socio Informatics
  • 56. Globalization due to IT • Definition – the unification of the nations on earth • Increase in globalization brought about by the new ways of communicating: • Email • Video conferencing • And other cheap and nearly instantaneous ways to communicate
  • 57. 1.) The Open-Source Software Movement • Open Source Software – free distribution of source code • Started off as a social community • Hackers Richard Stallman
  • 58. Closed-Source V.S. Open-Source • Caused by the attempted passing of legislation that supports open-source software • Lobbying: • Closed-Source: Initiative for Software Choice (ISC) • Open-Source: Sincere Choice Mike Wendy Bruce Perens
  • 59. 2.) Offshoring Jobs Lost to Date Projected Job Loss Jobs at Risk 300,000-995,000 3.3 million-6 million 14.1 million 300,000-500,000 (Goldman Sachs) 3.3 million over 15 years (Forrester Research) 14.1 million (UC Berkeley) 400,000-500,000 (Business Week) 6 million over 10 years (Goldman Sachs) 995,000 (economy.com) • Offshoring – The sending of jobs overseas • For example American companies moving parts of their operations to India • Causes social issues in both countries *Statistics taken on March 16, 2004
  • 60. In the United States • Social movements against outsourcing have mobilized • Movements include: • The American Champions • Techs Unite • The E-Activist Network • Communications Workers of America
  • 61. In India • Increase in the number of middle class Indian people • Statistics: • The new 487 million middle-class Indians are expected to spend $420 billion in the next four years • Draws the attention of many companies
  • 62. Related to Globalization? • The Open-Source Movement • Allows modification and improvement of source code on a global level • Offshoring • By directly influencing the culture of the affected areas
  • 63. Thank You .. UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER YUSRA FERNANDO, S.KOM., M.KOM 20192019