46
Chapter 8 - Computers In Polite Society: Social Implications of IT Discuss examples of how social networking technology can improve society Describe several tips associated with netiquette and explain the benefits of following them Give the requirements of a good password, and how to achieve them Name three permitted/not permitted uses of licensed software Discuss what rights are granted to owners/creators of material that is

Chapter 8 - Computers In Polite Society: Social Implications of IT Discuss examples of how social networking technology can improve society Describe several

Embed Size (px)

Citation preview

Chapter 8 - Computers In Polite Society:Social Implications of IT

• Discuss examples of how social networking technology can improve society

• Describe several tips associated with netiquette and explain the benefits of following them

• Give the requirements of a good password, and how to achieve them

• Name three permitted/not permitted uses of licensed software

• Discuss what rights are granted to owners/creators of material that is copyrighted

The Power of the Crowd

• The Internet has brought substantial changes to society

• Positive or Negative?• Social interactions have been extended well

beyond the experiences that previous generations could have.

• We will consider a few examples that have ostensibly brought “positive change”

Crowdsourcing

• Refers to solving a problem or achieving a goal by combining the contributions of a large, unconstrained volunteer population

• Wikipedia is perhaps the most famous of the crowdsourcing enterprises

• The goal is to build a database of all (?) knowledge through a global effort

• Issues: Control, Cliques, Deletionism

Be a Martian

• Volunteers help NASA by tagging images from the Mars rovers

• Crowdsourcing is a new phenomenon made possible by the “free” and easy communication enabled by the Internet

• “Crowd” is obviously important because it increases the number of people working on a project, a benefit for the people with the problem

• Issues?

Be a Martian

• By opening up the project to a wide variety of people, participants will have a wide variety of skill sets

• Volunteers might actually be faster and more efficient at the task!

• Their skills and knowledge might lead to a better solution, as Wikipedia proves in most cases

Crowdsourcing

• So, what’s in it for the participants? – It’s fun– Earn points, win prizes– Participants receive a sense of satisfaction

that they are contributing to a project– Many projects require skills that are more

challenging than watching TV– Issues?

Foldit

• Foldit is a game program in which teams compete to fold a protein• Proteins get all twisted as they float

around in cells.• How they fold largely determines how

they work (medicine doesn’t “know a protein” until it knows how it folds)

Foldit

• Foldit program works on proteins that are important to AIDS, cancer, and Alzheimer’s research

• Using Foldit, the structure of the protein associated with the AIDS virus was solved in three weeks

Freerice • Freerice has a vocabulary game (also others) : • The player is given

an English word and four possible definitions• Picking the right

answer donates 10 grains of rice

Kickstarter

• People with creative projects pitch their ideas:– They say what they’ll do

– How much money they need to do it

– Why it’s important, etc.

• Donors can contribute toward the goal• If the goal is achieved the project is

funded; otherwise, the donors get their money back

Out on Good Behavior

• The online world we live in today is different in many ways than the real world many grew up in

• Our range of interactions is much broader; we may never meet face-to-face with the online people

• Families and relatives usually influence our online behavior very little

• Unintended consequences? Concerns?

Out on Good Behavior

• We can be anonymous on the Internet, so no one knows if we behave badly…Right?

• We are not entirely anonymous online. There are means to get the identities of people on the Internet

• We all want to enjoy the benefits the Internet gives us, so our daily uses of the Internet should encourage us to behave

Improving the Effectiveness of Email

• Problems with email and online comms:

– Conveying emotion

– Emphasis

– Conversational pace

– Ambiguity

– Flame-a-thons

– Spam

– Scams

Conveying Emotion• Difficult to convey subtle emotions

using email

– Medium is too informal, impersonal, and casually written.

– Conversational cues are missing

– Good Writing still important - consider classic letters

• Emoticons are (somewhat) popular

– Tags a sentence indicating the emotion we mean to communicate

Emphasis

• Typing for emphasis can convey the wrong meaning– Text in all caps can be interpreted

as yelling

• Email is still largely ASCII based and may not allow italics or underlining– Asterisks or underscores can

replace underlining

Conversational Pace

• Asynchronous medium makes dialog difficult– For interactive purposes (like negotiation)

synchronous medium like telephone may be best

Ambiguity

• Text can be interpreted in ways we don't intend– People often don't proofread what they

write in email to avoid ambiguity

Flames

• Flame is slang for inflammatory exchanges

• Flame-a-thon is ongoing exchange of angry emails

• When angered by email, it's best to delay answering until you cool down

Netiquette (more rules in the book)• Originally rules to promote civilized email usage

• Now interpreted more broadly: civilized behavior in any of the social settings on the Internet

– Ask about one topic at a time

– Include context (quote previous text as needed)

– Use an automated reply when away (careful!)

– Get sender's permission before forwarding email

– Use targeted distribution lists (don't send latest joke to everyone you've ever emailed)

– Posted Content lives forever! Like a bulletin board.

Please, Don’t Be Offended

• The “Offensensitivity” perspective can be summarized as follows:1. Your post will be seen by people all over

the world, and you will see posts from people all over the world

2. You can easily and unintentionally offend them; they can easily and unintentionally offend you

Please, Don’t Be Offended

• The “Offensensitivity” perspective can be summarized as follows:3. The “problem” is our different cultures,

social norms, backgrounds, religions, assumptions, and so forth. You’re not wrong; they’re not wrong. And they are no more likely to change their thinking than you are. Be tolerant. Be respectful.

4. Are norms and standards relative or absolute?

Expect the Unexpected

• Expecting the unexpected is a valuable survival skill in life and in computing.

• When something unexpected happens, we should ask – “Why did that happen?”

– “What’s going on?”• An essential skill in the social world of

computing is, Expect the Unexpected

The Onion

• The Onion is a humor magazine specializing in news satire

• It produces “news” stories that are almost believable

• Rather than checking an unbelievable story by asking if it makes sense many people simply believe it and repeat it

Suspicious Activity

• Other kinds of online activity are of greater concern.

• Is your software:

– “acting” strange?

– “behaving” unusually?• These could be indicators of a software problem

such as disk fragmentation, or a computer virus infection

• If the behavior continues after a reboot, you might need some help

Authentication and Passwords: Are, Have, Know

• The Role of Passwords– To limit computer or system access to only those

who know a sequence of keyboard characters– To help track who did what - protect the innocent

• Breaking into a Computer without a Password– Trying all possible passwords algorithmically

would eventually find correct password, but software usually limits the number of tries

• Forgetting a Password– Passwords are scrambled or encrypted and

stored, so system administrator usually can't tell you your password if you forget it

Guidelines for Selecting a Password

• Don’tchoose something easily guessed

• Should have at least 8 characters (if possible)

• Mix of uppercase and lowercase letters, numbers, punctuation characters, symbols like % and *).

• Avoid “dictionary words”

• No personal association (like your name)

• Phrase-to-password “algorithm”

Heuristics for picking a password

• Select a personally interesting topic

– Always select passwords related to topic

• Develop a password from a phrase rather than a single word. (Or use phrase)

• Encode the password phrase

– Make it short by abbreviating, replace letters and syllables with alternate characters or spellings

Changing Passwords

• Should be changed periodically

• Resets/ “Security” Questions

• Managing Passwords

– Using a single password for everything is risky; using a different password for everything is hard to remember

– Passwords can be recycled• Make good changes to good passwords or• Rotate passwords

– Password safe or “keychain”

Viruses and Worms

• Virus - a program that "infects" another program by embedding a copy of itself. When the infected program runs, the virus copies itself and infects other programs

• Worm is an independent program that copies itself across network connections

• Trojan is a program that hides inside another useful program, and performs secret operations– May record keystrokes or other sensitive data, or load

malicious software

• Exploit is a program that takes advantage of security hole (Say in an Internet browser )– Backdoor access enters computer and reconfigures it for

remote control

How to "Catch" a Virus

• Email attachments. Do not open attachments before checking:– Is this email from someone I know?– Is the message a sensible follow-up to the last

message from the sender?– Is the content of the message something the

sender would say to me?– Is there a reason for the sender to include an

attachment?• When in doubt, be cautious - save and scan

How to "Catch" a Virus (cont'd)

• Copying software from an infected computer

• Peer-to-Peer Exchange

– Downloading files from unreliable sources

• New Software

– Any software is a potential source of infected code

– Most software distributors are careful to avoid infection

Virus-Checking Software

• Free and Shareware scanners exist - AVG

• Three companies are McAfee, Norton, and Sophos, Inc.

• Programs check for known viruses, worms, etc. May also use heuristics.

• New viruses are created all the time, so update often

Phishing• Password harvesting fishing

• “Social Engineering”

• Users are sent SPAM emails asking for credit card or banking information, or even just passwords.

• Message is disguised to appear to be from a bank or other company

– Often reports a security problem the user needs

to address

– When the user clicks legitimate looking link, they are linked to bogus sites set up to steal the information entered

What Can Be Done About Phishing?

• Never respond to requests for personal information like passwords via email; legitimate businesses do not request information this way

• Do not click on links or pre-typed addresses. They can be spoofed (faked); type the URL yourself.

• Check to make sure the website is using encryption - Lock Icon, etc.

• Routinely review credit card and bank statements for unusual activity

• Report suspected abuses to proper authorities

Protecting Intellectual Property• Intellectual property is any human creation like

photograph, music, textbooks, cartoons, etc.

• Licensing of software– You don't buy most software; you lease it– Commercial Licenses gives you the right to use

personally, but not sell or give away

• Try before you buy– Shareware allows you to download and try software for

free, then pay the person who built it if you like it (honor system)

• GPL - alternate license, allows almost any use, as long as you distribute the source code of any changes you make. (Based on Copyright Law)

Copyright on the Web• A person automatically owns copyright of what he

creates in the U.S. and most nations

• Copyright “temporarily” protects owner's right to

– Make a copy of the work

– Use a work as the basis for a new work (derivative work) (exception for satire/parody)

– Distribute or publish the work, including electronically

– Publicly perform the work

– Publicly display the work

Copyright on the Web (cont'd)

• Free Personal Use

– You are free to read, view or listen to protected work

• When is permission needed?

– Information placed in public domain is free for anyone to use (Creative Commons.)

– Otherwise you must get permission from the owner of the copyright

Copyright on the Web (cont'd)

• The Concept of Fair Use

– Allows use of copyrighted material for educational or scholarly purposes, to allow limited quotation for review or criticism, to permit parody

• When Is It Fair Use? Depends on several factors:

– What is the planned use?

– What is the nature of the work in which the material is to be used?

– How much of the work will be used?

– What effect would this use have on the market for the work, if the use were widespread?

Copyright on the Web (cont'd)

• Violating the Copyright Law– You break the law whether you give away

copyrighted material or sell it– Commercial use usually results in

higher fines (Could even result in criminal penalties - but rare.)

• Alternatives: Public Domain. Creative Commons, Original material, Others?

Ensuring the Reliability of Software

• Safety-Critical Applications (systems that support life or control hazardous devices or materials)

– Hardware failures can be avoided or resolved using redundancy

• Have three computers perform all computations of safety-critical system

• Compare results - 2 out of 3 rule

– Burn-in

• Most errors show up after a few hours of operation

Software Failures

• How can programmers be sure their programs work correctly?

– All reachable configurations (states the software can get into), cannot be examined for correctness—there are too many

– A program is said to be correct if its behavior exactly matches its specification

– What can we do about the fact that we can't prove correctness?

Software Failures (cont'd)

• The Challenge

– Accept that software may contain bugs. Monitor usage, be alert to unusual behavior and be prepared to limit the harm they can do

– Demand high-quality software, refuse buggy software, and be prepared to change to better software

Software Failures (cont'd)

• Fail-Soft and Fail-Safe Software

– Fail-soft means the program continues to operate under stress, providing a possibly degraded level of functionality

– Fail-safe means the system stops functioning to avoid causing harm

• Perfectly safe software is just as impossible as perfectly correct software; there is always a risk