Upload
julius-wood
View
220
Download
2
Tags:
Embed Size (px)
Citation preview
Chapter 8 - Computers In Polite Society:Social Implications of IT
• Discuss examples of how social networking technology can improve society
• Describe several tips associated with netiquette and explain the benefits of following them
• Give the requirements of a good password, and how to achieve them
• Name three permitted/not permitted uses of licensed software
• Discuss what rights are granted to owners/creators of material that is copyrighted
The Power of the Crowd
• The Internet has brought substantial changes to society
• Positive or Negative?• Social interactions have been extended well
beyond the experiences that previous generations could have.
• We will consider a few examples that have ostensibly brought “positive change”
Crowdsourcing
• Refers to solving a problem or achieving a goal by combining the contributions of a large, unconstrained volunteer population
• Wikipedia is perhaps the most famous of the crowdsourcing enterprises
• The goal is to build a database of all (?) knowledge through a global effort
• Issues: Control, Cliques, Deletionism
Be a Martian
• Volunteers help NASA by tagging images from the Mars rovers
• Crowdsourcing is a new phenomenon made possible by the “free” and easy communication enabled by the Internet
• “Crowd” is obviously important because it increases the number of people working on a project, a benefit for the people with the problem
• Issues?
Be a Martian
• By opening up the project to a wide variety of people, participants will have a wide variety of skill sets
• Volunteers might actually be faster and more efficient at the task!
• Their skills and knowledge might lead to a better solution, as Wikipedia proves in most cases
Crowdsourcing
• So, what’s in it for the participants? – It’s fun– Earn points, win prizes– Participants receive a sense of satisfaction
that they are contributing to a project– Many projects require skills that are more
challenging than watching TV– Issues?
Foldit
• Foldit is a game program in which teams compete to fold a protein• Proteins get all twisted as they float
around in cells.• How they fold largely determines how
they work (medicine doesn’t “know a protein” until it knows how it folds)
Foldit
• Foldit program works on proteins that are important to AIDS, cancer, and Alzheimer’s research
• Using Foldit, the structure of the protein associated with the AIDS virus was solved in three weeks
Freerice • Freerice has a vocabulary game (also others) : • The player is given
an English word and four possible definitions• Picking the right
answer donates 10 grains of rice
Kickstarter
• People with creative projects pitch their ideas:– They say what they’ll do
– How much money they need to do it
– Why it’s important, etc.
• Donors can contribute toward the goal• If the goal is achieved the project is
funded; otherwise, the donors get their money back
Out on Good Behavior
• The online world we live in today is different in many ways than the real world many grew up in
• Our range of interactions is much broader; we may never meet face-to-face with the online people
• Families and relatives usually influence our online behavior very little
• Unintended consequences? Concerns?
Out on Good Behavior
• We can be anonymous on the Internet, so no one knows if we behave badly…Right?
• We are not entirely anonymous online. There are means to get the identities of people on the Internet
• We all want to enjoy the benefits the Internet gives us, so our daily uses of the Internet should encourage us to behave
Improving the Effectiveness of Email
• Problems with email and online comms:
– Conveying emotion
– Emphasis
– Conversational pace
– Ambiguity
– Flame-a-thons
– Spam
– Scams
Conveying Emotion• Difficult to convey subtle emotions
using email
– Medium is too informal, impersonal, and casually written.
– Conversational cues are missing
– Good Writing still important - consider classic letters
• Emoticons are (somewhat) popular
– Tags a sentence indicating the emotion we mean to communicate
Emphasis
• Typing for emphasis can convey the wrong meaning– Text in all caps can be interpreted
as yelling
• Email is still largely ASCII based and may not allow italics or underlining– Asterisks or underscores can
replace underlining
Conversational Pace
• Asynchronous medium makes dialog difficult– For interactive purposes (like negotiation)
synchronous medium like telephone may be best
Ambiguity
• Text can be interpreted in ways we don't intend– People often don't proofread what they
write in email to avoid ambiguity
Flames
• Flame is slang for inflammatory exchanges
• Flame-a-thon is ongoing exchange of angry emails
• When angered by email, it's best to delay answering until you cool down
Netiquette (more rules in the book)• Originally rules to promote civilized email usage
• Now interpreted more broadly: civilized behavior in any of the social settings on the Internet
– Ask about one topic at a time
– Include context (quote previous text as needed)
– Use an automated reply when away (careful!)
– Get sender's permission before forwarding email
– Use targeted distribution lists (don't send latest joke to everyone you've ever emailed)
– Posted Content lives forever! Like a bulletin board.
Please, Don’t Be Offended
• The “Offensensitivity” perspective can be summarized as follows:1. Your post will be seen by people all over
the world, and you will see posts from people all over the world
2. You can easily and unintentionally offend them; they can easily and unintentionally offend you
Please, Don’t Be Offended
• The “Offensensitivity” perspective can be summarized as follows:3. The “problem” is our different cultures,
social norms, backgrounds, religions, assumptions, and so forth. You’re not wrong; they’re not wrong. And they are no more likely to change their thinking than you are. Be tolerant. Be respectful.
4. Are norms and standards relative or absolute?
Expect the Unexpected
• Expecting the unexpected is a valuable survival skill in life and in computing.
• When something unexpected happens, we should ask – “Why did that happen?”
– “What’s going on?”• An essential skill in the social world of
computing is, Expect the Unexpected
The Onion
• The Onion is a humor magazine specializing in news satire
• It produces “news” stories that are almost believable
• Rather than checking an unbelievable story by asking if it makes sense many people simply believe it and repeat it
Suspicious Activity
• Other kinds of online activity are of greater concern.
• Is your software:
– “acting” strange?
– “behaving” unusually?• These could be indicators of a software problem
such as disk fragmentation, or a computer virus infection
• If the behavior continues after a reboot, you might need some help
Authentication and Passwords: Are, Have, Know
• The Role of Passwords– To limit computer or system access to only those
who know a sequence of keyboard characters– To help track who did what - protect the innocent
• Breaking into a Computer without a Password– Trying all possible passwords algorithmically
would eventually find correct password, but software usually limits the number of tries
• Forgetting a Password– Passwords are scrambled or encrypted and
stored, so system administrator usually can't tell you your password if you forget it
Guidelines for Selecting a Password
• Don’tchoose something easily guessed
• Should have at least 8 characters (if possible)
• Mix of uppercase and lowercase letters, numbers, punctuation characters, symbols like % and *).
• Avoid “dictionary words”
• No personal association (like your name)
• Phrase-to-password “algorithm”
Heuristics for picking a password
• Select a personally interesting topic
– Always select passwords related to topic
• Develop a password from a phrase rather than a single word. (Or use phrase)
• Encode the password phrase
– Make it short by abbreviating, replace letters and syllables with alternate characters or spellings
Changing Passwords
• Should be changed periodically
• Resets/ “Security” Questions
• Managing Passwords
– Using a single password for everything is risky; using a different password for everything is hard to remember
– Passwords can be recycled• Make good changes to good passwords or• Rotate passwords
– Password safe or “keychain”
Viruses and Worms
• Virus - a program that "infects" another program by embedding a copy of itself. When the infected program runs, the virus copies itself and infects other programs
• Worm is an independent program that copies itself across network connections
• Trojan is a program that hides inside another useful program, and performs secret operations– May record keystrokes or other sensitive data, or load
malicious software
• Exploit is a program that takes advantage of security hole (Say in an Internet browser )– Backdoor access enters computer and reconfigures it for
remote control
How to "Catch" a Virus
• Email attachments. Do not open attachments before checking:– Is this email from someone I know?– Is the message a sensible follow-up to the last
message from the sender?– Is the content of the message something the
sender would say to me?– Is there a reason for the sender to include an
attachment?• When in doubt, be cautious - save and scan
How to "Catch" a Virus (cont'd)
• Copying software from an infected computer
• Peer-to-Peer Exchange
– Downloading files from unreliable sources
• New Software
– Any software is a potential source of infected code
– Most software distributors are careful to avoid infection
Virus-Checking Software
• Free and Shareware scanners exist - AVG
• Three companies are McAfee, Norton, and Sophos, Inc.
• Programs check for known viruses, worms, etc. May also use heuristics.
• New viruses are created all the time, so update often
Phishing• Password harvesting fishing
• “Social Engineering”
• Users are sent SPAM emails asking for credit card or banking information, or even just passwords.
• Message is disguised to appear to be from a bank or other company
– Often reports a security problem the user needs
to address
– When the user clicks legitimate looking link, they are linked to bogus sites set up to steal the information entered
What Can Be Done About Phishing?
• Never respond to requests for personal information like passwords via email; legitimate businesses do not request information this way
• Do not click on links or pre-typed addresses. They can be spoofed (faked); type the URL yourself.
• Check to make sure the website is using encryption - Lock Icon, etc.
• Routinely review credit card and bank statements for unusual activity
• Report suspected abuses to proper authorities
Protecting Intellectual Property• Intellectual property is any human creation like
photograph, music, textbooks, cartoons, etc.
• Licensing of software– You don't buy most software; you lease it– Commercial Licenses gives you the right to use
personally, but not sell or give away
• Try before you buy– Shareware allows you to download and try software for
free, then pay the person who built it if you like it (honor system)
• GPL - alternate license, allows almost any use, as long as you distribute the source code of any changes you make. (Based on Copyright Law)
Copyright on the Web• A person automatically owns copyright of what he
creates in the U.S. and most nations
• Copyright “temporarily” protects owner's right to
– Make a copy of the work
– Use a work as the basis for a new work (derivative work) (exception for satire/parody)
– Distribute or publish the work, including electronically
– Publicly perform the work
– Publicly display the work
Copyright on the Web (cont'd)
• Free Personal Use
– You are free to read, view or listen to protected work
• When is permission needed?
– Information placed in public domain is free for anyone to use (Creative Commons.)
– Otherwise you must get permission from the owner of the copyright
Copyright on the Web (cont'd)
• The Concept of Fair Use
– Allows use of copyrighted material for educational or scholarly purposes, to allow limited quotation for review or criticism, to permit parody
• When Is It Fair Use? Depends on several factors:
– What is the planned use?
– What is the nature of the work in which the material is to be used?
– How much of the work will be used?
– What effect would this use have on the market for the work, if the use were widespread?
Copyright on the Web (cont'd)
• Violating the Copyright Law– You break the law whether you give away
copyrighted material or sell it– Commercial use usually results in
higher fines (Could even result in criminal penalties - but rare.)
• Alternatives: Public Domain. Creative Commons, Original material, Others?
Ensuring the Reliability of Software
• Safety-Critical Applications (systems that support life or control hazardous devices or materials)
– Hardware failures can be avoided or resolved using redundancy
• Have three computers perform all computations of safety-critical system
• Compare results - 2 out of 3 rule
– Burn-in
• Most errors show up after a few hours of operation
Software Failures
• How can programmers be sure their programs work correctly?
– All reachable configurations (states the software can get into), cannot be examined for correctness—there are too many
– A program is said to be correct if its behavior exactly matches its specification
– What can we do about the fact that we can't prove correctness?
Software Failures (cont'd)
• The Challenge
– Accept that software may contain bugs. Monitor usage, be alert to unusual behavior and be prepared to limit the harm they can do
– Demand high-quality software, refuse buggy software, and be prepared to change to better software
Software Failures (cont'd)
• Fail-Soft and Fail-Safe Software
– Fail-soft means the program continues to operate under stress, providing a possibly degraded level of functionality
– Fail-safe means the system stops functioning to avoid causing harm
• Perfectly safe software is just as impossible as perfectly correct software; there is always a risk