ITC2212 17 18 Session

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 46

ITC2212 (COMPUTER SCIENTIST AND SOCIETY)

Society: Group of people who live in a definable community and share same culture.
Culture: related to people sharing belief, interest and value.

Classification of Society depends on level of PREINDUSTRILIZATION,


INDUSTRILIZATION and POSTINDUSTRILIZATION.

Preindustrial Societies: very small, rural, absence of machine use and depend
largely on local resources. Economic production is based on human labour. First
occupation was Hunter-Gatherer, Pastoral Societies, Horticulture, Agriculture and
feudal.

Hunter-Gatherer  kinship and tribes, relied on their sorroundings for survival (Wild
animal and foraged plants).
ITC2212 (COMPUTER SCIENTIST AND SOCIETY)
Pastoral Societies  rely on domestic animal breeding and plants cultivation for survival,
transportation, clothing and surplus goods. Nomadic and specialized occupation (Trading with local
groups)

Horticultural Societies  rose due to depletion of region crops or water supply. Relocated where
rainfall was in abundance (permanent settlement, more stability & material goods).

Agricultural Societies  Pastoral and Horticultural societies used small and temporary tools such as
sticks and hoes.
 permanent metal tools were used ( rotation of crops, using fertilizer)
 human settlements grew into towns, cities and regions.
 Resources preservation became concern.
 called “ dawn of civilization”
ITC2212 (COMPUTER SCIENTIST AND SOCIETY)

Feudal Societies  based on hierarchical system of power based around Land


ownership and Protection.

Industrial Societies: in 18th Century, Europe experienced rise technological


invention that could influenced people daily lives.
 B4, work was person or animal-based
 Steam engine and other textile machine were experienced which gave rise to
more farm products (glass and paper were also affordable)
COMPUTERS AND SOCIETY
• The introduction of computer to the society judging by the early history of computers was
to solve a particular problem at hand; from the early mechanical computers for arithmetic,
logarithmic calculations, navigation and as aiding devices in weaving (jacquards loom) to
earlier electrical devices military purposes (WWII). Then computers progressed to Desktop
where the size drastically reduced and the technology advanced for better computational
capacity and faster operation, from a single purpose to multiple purposes. Laptops came
into the picture bringing about more solutions and ease to everyday problems.

• Futurists prognosticate that computers will continue to be smaller, faster, more powerful
that they would be used in every facet of peoples lives.

• The introduction of the ‘information higway’ (internet) was a major breakthought


in the transforming the society and information became cheap and readily available
within a press of a button.
COMPUTERS AND SOCIETY
• These changes as the result of internet are in
o business,
o health
o education,
o social interaction,
o widespread sharing of knowledge
o wealth
o world wide cultural renewal.
COMPUTERS AND SOCIETY
However, social critics argue that can the apparent benefits of the comp technology
outweigh the potential harm?
According to Christopher Sheer ( a freelance writer and editor)
“Technology has done nothing to lessen our all too immediate social problems such as:
environmental degradation, economic inequality, decline of cites”
In his view technology exacerbates the issues above. He asserts that ;
• Communication over computer networks pales in comparison to real human
interaction,
• The use o f technology may weaken peoples sense of community and widen existing
social divison.
HOW WILL COMPUTERS TRANSFORM SOCIETY?
Bill Gates believes that “The changes to society will be as revolutionary as those of the
Industrial Age and the Renaissance. Not only will people shop and conduct business through
their computers, but they will also engage in every type of human activity”. Not only will
people shop and conduct business through their computers, he says, but they will also engage
in every type of human activity from reading to simply hanging out with friends. In Gates’s
vision, the increased level of communication made possible by computer networks will bring
many benefits in the areas of business, education, and social interaction, producing
widespread sharing of knowledge and wealth and a worldwide cultural renewal.

On the other hand, Scheer contends that in as much as the same way the changes to society
computers will bring may be as harmful as beneficial. For instance, the communication that
takes place over computer networks is equated to real human interaction. Since computers
tend to decrease actual human contact, he argues, their use may weaken people’s sense of
community and widen existing social division
Examples of such areas of human activites affected by technology and the proc and cons of this technology
advancements in these areas are:
• Internet: The Internet has let millions of people get to know electronic documents that
move from one computer to another. Because computers can do more than paper can, these 8

documents often are more useful to you. The idea of a "document" will change. Information
on the internet, ideas, and messages could be easily shared. On the other hand internet has
contributed a lot to the degradation of moral values in the society through pornography, hate
speech, fake news, cyber crimes, remote terrorism etc.

• Games: Before, most computer games are on special compact discs. Every player starts
with the same game but he changes it by choosing what he will do with the game. But as the
Internet grows, people are beginning to play against other computer users, not just by
themselves. The games are now incorporated with educative materials and are made for
different age groups. However the availability of games on mobile phones, and portable
devices made it a distraction on kids. Also gaming characters became more violent thereby
putting ideas on the kids minds.
• Virtual Reality (VR): is a system of pictures and sounds the computer uses to make a
"place". The place isn't real, but it seems real, and you think you're in it. You can look to
the right and the left, and the system knows you're turning your head and it changes the
9
pictures. You see these "places" through special computer glasses. With VR, you will be
able to learn what it's like to fly an airplane, drive a car, or maybe go inside a body to
see the heart working, all without getting off a chair in your living room. Pilots and
doctors use VR to master their profession. However VR can not replace the real thing
and thereby creates a barrier for human contact.

• Movies: Movies of various kind are on internet in such a way that user can download
and watch later, or watch online. User can share or recommend it to other online users.
However the availability of these movies online led to piracy and a lot of other
intellectual property rights.
Many other areas are affected!
HOW WILL COMPUTERS TRANSFORM SOCIETY?

1. - Books:
4000 years back societies relied on books as their source of memory and depth 10

until now when the current electronic revolution overtake everything and
become their vehicle where they see themselves.

Therefore, Bill Gates foresee that information revolution will impact the book
apart from privacy, copyright, libel and computer theft.

Technology now encourages reliance of written word as billions of words


moves on the internet on daily basis, as such this raises usage of electronic
storage instead of paper usage.

Books are taking new form such as interactive multimedia books (sounds,
images) algebra, spoken words etc.
HOW WILL COMPUTERS TRANSFORM SOCIETY?

sales of e-books becomes the order of the day as multiple libraries are
connected 11

But on-screen reading is slower 20 to 30 percent and less comfortable due to


glare and flickering images and many more.

TV and computers are increasing aliteracy among societies.

 New Types of Books Inspired by Computers

Traditional notion of “ author and origin” now disappears on internet as every


reader adds new material to what he she reads.
HOW WILL COMPUTERS TRANSFORM SOCIETY?

sales of e-books becomes the order of the day as multiple libraries are
connected 12

But on-screen reading is slower 20 to 30 percent and less comfortable due to


glare and flickering images and many more.

TV and computers are increasing aliteracy among societies.

 New Types of Books Inspired by Computers

Traditional notion of “ author and origin” now disappears on internet as every


reader adds new material to what he she reads. As such, most stories have
neither middle nor end.
HOW WILL COMPUTERS TRANSFORM SOCIETY?
2. Computers and International Economy
13

Two generations ago, a political analyst gauged global economic relationships


and development by counting railcars (train) between countries. But now
relies on network traffic in respective of time and space.

Money moves easily, stocks, currency and bonds traded world wide
electronically. 3 trillion dollars in circulation daily. Today’s Fiber Optics cables can carry >
500,000 conversations. Why?
Because of Lower Cost.

This information economy favors small entrepreneurs that can quickly adapt to
new technologies. In Los Angels, 2/3 of cos did not exist in 1970.

“Number of workers will take, manipulate and market information” Peter Drucker.
Computers and International Economy (contd)

As computer and technology keeps developing, so also the nature of societal


14
transactions evolves towards the direction of the technology. Geographic location of
resources, labor and capital means nothing in an information age as people can shop,
transfer funds and buy products online instantly. Before, economic growth relied on
counting of railcars, trucks and cargoes between countries and the like’s matters a lot, but
now, counting computer and network traffics and keystroke matters. Computer and IT
make it possible that operating cost reduce and profit increases and transactions happens
across the world without minding the border or country
 Information Technology and Democracy / Politics
• To stay competitive in international economy, country, government, organizations and cos must open itself to information &
ideas.
15
• Government attempt to control information but fail. Example Romania(Typewriter), Iran (Charlie’s Angel), Mexico (rebels in
Chiapas), Indonesia (Pramoedya Ananta Toer) china and Burma.

• Information changes democracy  issues are being presented quickly with visual aids. As such govt., academics, expert no
longer have monopoly oninformation. Eg., pot holes on Kaduna-kano road that is under construction now

Some governments, particularly in the developing world, try to mix economic openness with authoritarian politics.
They may enjoy temporary success. But in the long run— as Taiwan, Chile, and others demonstrate—free-flowing
information nurtures democracy. At the same time, massive amounts of information are changing democracy itself;

• Personality and publicity have superseded political parties


• Issues must be presented quickly with visual aids (issues that will capture public attention.
• Govt officials , academics leaders have less monopoly on information, public opinion plays a larger role in public
policy and diplomacy.
HOW WILL COMPUTERS TRANSFORM SOCIETY?
 Information Technology Affects Public Policy

• Availability of information can have an immediate impact on pubic policy. If people know certain information 16
regarding the government they might act against it collectively to produce a result. An example is the case the
Right-to-Know-Network by dialing 202-234-8570 on a modem, register for a free account, and then instantly find
out which of some 300 toxic chemicals have been emitted in your area. This information had been buried within
regulatory bureaucracies but now stimulates lawsuits, local action, and government responsiveness. Kathy
Grandfield, a paralegal in Sedalia, Missouri, wondered whether a nearby chemical plant caused her family’s flu-
like illnesses and the death of birds in her yard. She discovered from Right-to-Know that chemical emissions may
have been a contributing cause. She and her neighbors—who also had similar symptoms for years—worked
together to help clean up the plan.

• The Internet grew out of a Defense Department communications system designed in the 1960s to survive nuclear
war. Because such rationales no longer exist, marketplace forces have replaced government funding. The Internet
could become advertiser driven like broadcast TV and radio, but no one knows how this would affect the
accessibility and content of services.

Another example is the Kano Film Village


HOW WILL COMPUTERS TRANSFORM SOCIETY?

 No One Knows the Future of Computers


17

Technology evolves and society is experiencing devices that can


mimic human reasoning and perception.

No one knows what type of network will replace internet or what


computer processing power could be like in the near future.

We should not exchange morality with technology while aiming


for future with technology.
COMPUTERS WILL SIGNIFICANTLY TRANSFORM SOCIETY

 Exchange of Goods vs Exchange of Information


18

Transfer of electronic data universally  e-commerce, bank transfer, VTU etc.

 Exponential Growth of Computer Use

Small differences of yesterday can lead to tremendous consequences tomorrow


(Technology).

Computers is part of us and dependence on it keep increasing with population


(Computer Owners & Internet Users)
COMPUTERS WILL SIGNIFICANTLY TRANSFORM SOCIETY

 Computers in the Future


1st generation computers 19

|
2nd generation computers
|
3rd generation computers
|
4th generation computers
|
5th generation computers
Now, watches, tea cups, cuff links and earrings communicate with each other via
satellite with processing power than our traditional PC.
Mass media will be influence by systems in receiving and transmitting personalized
contents
PERSONALIZED COMPUTERS WILL TRANSFORM THE HOME

 The Evolution and Growth of Computer Use


20

 Computers become communication by connecting and coordinating


 When connected with internet, PCs change personal, business
communication, commerce, education, healthcare services, entertainment,
government and home automation.

 Pcs as multipurpose machine (telephone, fax, modem, scanner and TV)


PERSONALIZED COMPUTERS WILL TRANSFORM THE HOME

 The Computerized Home of the Future


 Smart home – door recognizes visitors, kitchen ceiling speaks about bills due
21

for payment and robots for collecting dirt on floor.

 Home Computers of the Very Near Future

 Kitchen PC-TV reacted for your coffee (just hearing your voice)
 the screen also scans and arrange your mails according to priority
 checking flight schedule and book appointment with doctor and have
interaction (videoconferencing).
 “ away mode” automatically off the light and closing drapes.
 while at work, received messages from home security “ windows is broken”
and “ security company informed”
PERSONALIZED COMPUTERS WILL TRANSFORM THE HOME

 dialed into home remotely, pronouncing ID using voice then Security console 22
was activated and observed Tree limb on the window.
 “all-clear” signal to security company
 “ Find nearby glass repair service and dial the number”

 after two hours, technician arrives the yard and Home security sends another
signal to you that “ Someone is in front of the door”

 logged in again and see the technician and remotely unlock the door for him
 After the repairs, bill appears on to your screen with the amount to pay to service
company.
COMPUTERS WILL NOT SIGNIFICANTLY TRANSFORM SOCIETY

 Computer Hype vs Reality


 with all the computer and internet publicity no online database will replace
23
traditional newspaper
 can online transaction is far more than local transaction in Rimi, Kantin Kwari,
Dawanau market? NO
 or books written in CD-ROM can replace competent and experience teachers
WHY?
Because of Unedited and unfiltered data on internet

 Computers and Education


 Computers are now in classrooms and make learning easy by animated software
agent.
 can we rely on these software without needing assistance and rigorous training from
experience teacher?
 can you remember any role model educational software? What of role model teacher?
COMPUTERS WILL NOT SIGNIFICANTLY TRANSFORM SOCIETY
 Computers foster human contact
 Human contact is missing.
 Virtual communities isolate us from one another – (chat apps).
24
People who correspond with each other electronically often feel the need for skin and try to meet in what they call
real life. The desire for skin can be seen in downtowns and shopping malls—people want human contact even
when they could buy things via television or the telephone. Although computers and fax machines make it easier
to work at home, business districts continue to grow. More people than ever crowd into major cities, in large part
because companies that provide goods and services benefit from being near one another. Employees also seek the
relationships that come only from being with other people. Need for skin does not negate the electronic screen’s
power to mesmerize. No brain scan or biochemical study has identified a physical basis for our seemingly
insatiable hunger for electronic stimulation.

Computers are often more alluring than television, which already has a grip on us. Young Americans today spend
about as much time in front of a television as in a classroom. At midnight 1.8 million children under age 12 are
still watching television. The average adult American watches more than 30 hours every week.
Parents could restrict their children’s electronic consumption. But we, too, are addicted. Give up electronic links
for a day? No telephone, television, or computer? Try a week. Few can do it. Momentum is in the opposite
direction. When a two-year-old clicks at the keyboard and the next day says, “Mommy, Daddy, more ’puter,” his
parents feel something good is happening.
FUTURE SOCIETAL TRANSFORMATIONS CANNOT BE
PREDICTED

 The concept of Virtual Reality 25

Simulation close to reality that you may not need reality


Examples, game, driving, flight, motor racing

 The Questionable Benefits of Other Technological Innovations


Jay Ambrose sees it that Bill Gates prediction could be mistaken by citing example of how
TV metamorphosed beyond thinkers. He quotes “ No One, Not Mr. Gates, Not me, not you
can predict how PCs can affect society” refer to “Technopoly” by Neils
COMPUTERS WILL CREATE UNEMPLOYMENT

 Information Highway Roadkill


26
 In 1994, Bell- Atlantic staff wore T-shirts protesting “Information Highway
Roadkill”
 Company urged to remove the T-shirt or get suspended due 2 fear of the tag
“Information highway roadkill” the 1st step towards unemployment

 Media Hysteria(exaggeration) over the Information Highway


 Govt. connived with media to seek individual, societal and public support.
 Because information highway is the future “u join or be left behind”
 The Propaganda never used or mentioned the word roadkill (unemployment)
 society were deceived by new tools and diversion -- home-shopping, home-
learning, home- video, home-entertainment
COMPUTERS WILL CREATE UNEMPLOYMENT

 Technology Replaces and Displaces Workers


 Working harder and longer, greater anxiety, stress, accidents, less skills, less 27
security, less independence, less salary and pension.
 Canada recorded unemployment decade after decade
 Technology takeover finance, money markets, communications, Govt. etc.
 Technology was developed intentionally to de-skill society and to widen gap
between Rich and Poor.

 Computer Benefits Few


 Because of mass unemployment, investors take away the benefits of computer
 Bell-Atlantic employees confirmed their foresight and “Progress without People is
not a Progress
DEBATE 1
COMPUTERS WILL CREATE UNEMPLOYMENT; SOFTWARE AS CAREER THREAT

 Software can do some of the work of Lawyers, doctors, accountants, travel agency, 28

insurance coys. etc.

Law (Legal work and research– by non expert using software)

Doctors are being affected by Expert system (Iliad software which knows 1,000
diseases)

A computer mentioned in Technopoly book (know lies, truth, sexual attraction, marriage
compatibility etc)

Computerized control which replaces car engine tune-up (in auto mechanic)
DEBATE 1
COMPUTERS WILL CREATE UNEMPLOYMENT; SOFTWARE AS CAREER THREAT

• Computer Software Can Replace the Knowledge Worker: computer and


software makes laymen, potential customers to become paraprofessionals. Skills in 29

law, medicine, insurance, accounting, travel agency, financial planning and library
science are facing a way with the development of computer software and robots.
They will not replace them completely, but rather do a lot of damages to them.

• Software Can Provide Legal Forms and Research: a lot of legal work is now in
form of programs. Legal contract such as trust, incorporation and partnership is now
easy to produce which are routine in nature.
COMPUTERS DO NOT CREATE UNEMPLOYMENT

 The Prevailing Theory of Computers and Inequality


30

Economics sees it that computers bring inequality in society, where 1979 College students get
salary 30% more than his secondary school . And 1993, it was 70% gap.
Reason
Demand for workers who can use PCs
Infromation technology is able to create more self employed venture thereby boosting the
economy at large, people now get many opportunities from networking, assembling, repairs,
analyst, technicians, software geeks, medical field and human expertise, consultants e.t.c the list
is endless. Computers create employment in every aspect of human endeavor with ease. One
can create an application and get daily income from it without hard labor. A person in Nigeria
can work with a multi national company online and get paid for it at the comfort of his living
room.
COMPUTERS WILL CREATE UNEMPLOYMENT
Inequality is Due to Business, Not Computers
 Profound change in business climate in 1970s. When Arab oil countries put 31

embergo on selling oil to USA, UK, Holland, Russia, Rhodesia.

 Economic hardship due to inflation, recession, tougher completion, cooperate


debt and reduction of profit were all experienced
 Companies retain valuable workers and sacked less valuable
COMPUTER TECHNOLOGY REDUCES WORKER PRODUCTIVITY
 As Technology Increases, Productivity Decreases
 Shift from Manufacturing to services by most of the companies. 32

 Though production becomes efficient due to machine.

 Learning to Use New Programs Wastes Time

 b4 you learn how to use software program, cyber geeks come with new one. Therefore,
your knowledge becomes old.
 Time to learn is greater than it saved
The problem is not Technology, but rather how to use it and rate of its change
HOW WILL COMPUTER TECHNOLOGY AFFECT the RIGHT
to PRIVACY 33
 Financial transactions conducted electronically and kept electronically.
 People find the online transaction very convenient.
Issues
 Privacy Advocates worry about how Banks & Credit agencies sells people information
2 marketers.
 Any time you use credit card profiling you is easy
Computer Technology Violates People’s Privacy
 Question About Privacy in the Computer Age
34

Information Privacy: ability to control the acquisition and release of information about
oneself.
Privacy destroying technologies
1. those that facilitate the acquisition of raw data and,
2. those that allow one to process and collate that data in interesting ways

Other Taxonomies
1. base on social context, or base on characteristics of subject ( eg. Citizen,
employee, driver, consumer etc.). Or base on disparate types of observers such as
( intelligence agencies, law enforcement, tax authorities, insurance companies,
supermarket securities, e-commerce sites, concerned parents, ex-husband, nosy-
neighbors)
Privacy Concerns: How computers enable violation of peoples privacy
• Personal-privacy rights: to be protected when data collection that formerly would
have taken months of a private detective’s time now can be accomplished with a few
keystrokes? 35

• limited personal jurisdiction


• Information intercepted through the net: How can the Internet become a viable
marketplace when any information sent over it, including copyrighted works, credit-
card numbers and other sensitive material, can be imperceptibly intercepted?
• Managing Encryption to avoid mis-use: Should encryption technology that could
solve many of these problems be banned because of the possibility that it could end up
in the hands of terrorists and gangsters? And does it matter that the terrorists and the
gangsters are going to get it anyway?
• Possible government use of database information: Transactions are being monitored,
Credit cards can be mapped.
Gary Chapman, director of the Twenty-First Century Project at the University of Texas, Austin, notes, “Digital
technologies are providing many new ways for people to become anonymous”—including digital encryption,
anonymous e-mail networks, and content blocking programs;
36

• Digital Encryption: is the act of translating data into another form or code so that only people with access (to a
secret key or password) can read it. E.g the RSA algorithm encryption technique.
• Anonymous Email: is an email which the sender address and personal identifying information cannot be viewed by
the recipient. This is possible by using a burner email account or VPN to prevent a person’s identity. E.g the Proton
Mail.
• Content Blocking Programs (Internet Filter): is a software that restricts or controls the content an internet user is
capable to access especially when utilized to restrict materials delivered over the internet via the web, email, or other
means. E.g parental Control settings, block-adds etc,
• Software companies already produce programs to block Website ads, Chapman points out, and others produce
programs to block pornography that can be adapted to block ads.

Further, he maintains, according to already existing laws, individuals must be notified when their financial information
is disclosed to someone, and people can simply request that their names be removed from marketers ‘mailing lists.
Therefore, Chapman and others conclude, computers do not pose a serious threat to privacy.
Equality Through Lack of Privacy
• Tiny Cameras on highway: to check traffic, robbery ,thuggery, corrupt policemen, missing child
• Speed limit tracker : for over speeding 37
• Tax return & politician bank statement could be observed
Making the inevitable cameras accessible so anyone can check traffic at First and Main, look for a lost
kid.
Any citizen can read the billionaire’s tax return or the politician’s bank statement. Policeman can ever
be sure his actions are unobserved.
Street robbery and thuggery could also be under watch and control.
Again, no government agency or corporate boardroom is safe from whistle-blowers.

All these above make transparent society possible

Computers Enforce Accountability


Sending email, posting on social media, electronic transactions keep the record
permanently with no denial.
Everybody is accountable for what s/he did on information highway.
Computers Enforce Accountability
Sending email, posting on social media, electronic transactions keep the record
permanently with no denial. Everybody is accountable for what he/she does on information 38

highway.
Computer enforces accountability in the sense that each and every individual that access
information superhighway his record will remain forever and ever. Accessing a database
also keep user logs such as activity, report, edit, log in and transaction log. Hate speech
could also be tracked against individual on social media as it stores information
permanently somewhere not apparent to ordinary users
Crime in the Future
 Anyone who is computer literate can become cyber crook
39

 For now: murder, rape & robbery are being tackled by CCTV & cashless society.
house burglary is also tackled by smart houses/ home management systems
vehicle theft is under control by car tracker

Computers make Crimes Easier


• Communication
• Government
• Business
• Cyberstalking
• Terrorism
• Virtual crimes
Computers make Crimes Easier
Cyberspace offenders are Computer literates (geeks) of different age group who have ample opportunities to violate citizens’ rights for
fun or for profit. Mostly seen as nuisance or even admired as innovators or computer whizzes. I.e. hackers, crackers etc. They are
practically unstoppable.
40

• Cyberstalking: they surfs computer bulletin boards, filled with bright young boys and girls, in search of victims. They develop a
cyberspace relationship and then seeks to meet the child in person to pursue his sexual intentions. Already recognized as a serious
problem, cyberstalking has spawned the cyber cop—a police officer assigned to computer bulletin boards in search of these
pedophiles. Once a suspect is spotted, the cyber cop plays the role of a naive youngster and makes himself or herself available for
a meeting with the suspect in hopes of gaining evidence for an arrest. Emotionally disturbed loner, computer por sellers, mind
stalking.

• Government: cyber crooks breaks into government system in order to steal classified information. Military system are the main
target in this. For example, during Operation Desert Storm, hackers were able to track both actual and planned troop movements.
Another example is when James V. Christy II, director of an Air Force unit of computer-crime investigators, set up a team of
hackers to test the security of military computer systems. He reported that the hackers broke into Pentagon systems “within 15
seconds” and went on to break into over 200 Air Force systems with no one reporting or even recognizing the break-ins.

• Business: as e-commerce is exploding day-by-day and internet banking is getting ground, most of these systems are the targets by
hackers. Access to these computers is equated to access to money. For example, founder of “Master of deception” said that he
could buy limousine, air ticket, distribute software programs, change credit bank balances and book hotel rooms remotely and
free.
Communication crimes:
• Cellular theft and phone fraud
• Use of binoculars to steal calling card access numbers in aiports and bus terminals
• Steal cellular phone access code from air using vans equipped with tapping machines or from
41
Phone company employees.
Remote terrorism(RT):
Remote terrorism is the capability by individual or group to detonate explosives in another country by means
of computers and radio signals. For example, In London a couple of years ago, terrorists placed deadly
missiles in the back of a truck and remotely sent them flying toward the home of the British prime minister.
The missiles exploded on the lawn without harm to the prime minister or the house, but they could have
killed him and created an international crisis. Other forms of RT are;
• Computer virus and other info destroying instruments can be hurled at govt database from anywhere in
the world.
• Terrorists can cut communication off to a certain country or state therby causing panic.
• Terrorist can recruit unsuspecting members of the public online by sublimal conditioning.
• Audiovisual messages aimed directly at individuals with brain implanted computers
Virtual Crimes:
As virtual reality becomes increasingly sophisticated, it is the young adults in the first decade of the twenty-first century
who—having grown up with virtual reality—will create the software and determine the legal and criminal uses of this
technology. And with virtual reality potentially reaching directly into the brains of recipients via “organic” computers,
the ability to separate cyberspace reality from truth outside cyberspace will be one of the greatest challenges of the 42

twenty-first century. Stocks and bond fraud: Stock and bond fraud is already appearing in cyberspace—stocks and bonds
that appear on the markets are actively traded for a short time, and then disappear. The stocks and bonds are nonexistent;
only the electronic impulses are real.
Censorship
Censorship is the attempt to suppress or regulate public access to materials considered offensive or harmful.
The coming of printing press broke the virtual monoploly held by governments and religious institutions on
distributing materials to a large audience which in turn led to an increase in the number of literate people. 43
Types of censorship:
 Direct censorship: the government has absolute control of every information that goes public. It is of
two form;
• Government monopolization: where the govt owned all media organization and not a single private
media organization is present in this govts can effectively suppress the flow of information. It is mo
linger applicable in our society.
• Prepublication review: essential for materials the govt need to keep secrst e.g information on nuclear
activities, or information injurious to reputation of leaders.
 Licensing and Registration: Typically used to control media with limited bandwidth i.e. radio and TV
have limited number to be accommodated on a given electromagnetic spectrum, hence they must obtain
license to broadcast a particular frequency.
 Self-Censorship: A private media org deciding not to publish material by itself to avoid prosecution or
denied access to information by the government.
Should Internet contents be censored? And by who?
• Profile cloning
• Cyber crimes
• Hate speech
44
• Pornography
• Terrorism
• Parental control
• Piracy
• Child abuse (pedophiles)
• Fake news
Are these reasons enough? If not the internet contents should not be censored to avoid free flow of
information!
Information Technology and Ethics
Ethics is the philosophical study of morality, a rational examination into people’s moral beliefs and behaviour.
Ethics can also be termed as rational systematic analysis of conduct that can cause benefit or harm. The society
has experienced rapid changes as it incorporates the latest advances in information technology. Ethics is focused
45
on the voluntary moral choices people make because they have decided to take one course of action rather than its
alternative.
There is nothing intrinsically immoral about copying a CD. However, our society has chosen to enact laws that
grant intellectual property rights to people who do creative work and distribute it on CDs. From the perspective of
social contract theory and Kantianism, we have a prima facie obligation to obey the law and respect everyone’s
property rights. From the viewpoint of rule utilitarianism, the beneficial consequences of following the moral rule
“Obey the law” greatly exceed the harmful consequences. Copying a disc to save a few dollars or help a friend
does not fall into that category. From an act utilitarian viewpoint, it is possible to come up with a circumstance
where making a copy of a copyrighted CD is the right action. However, it would be wrong to extrapolate from this
particular case and conclude that an act utilitarian analysis would always determine CD copying to be morally
acceptable.

Data collection and information technology and internet are unregulated, there are no easy answers about ethics in
IT nor who should be the arbiter of whether those ethics are employed. Ultimately the problem is that technology
moves so fast that laws and lawmakers cant possibly keep up with the speed of innovation, and society is left
hoping that those who write the programs err on the side of what’s ethical.
INTELLECTUAL PROPERTY RIGHTS

Intellectual property right (IPR) is the exclusive right of a person or organization to use its own plans,
ideas,or other intangible assests without worry of competition or mis use at least for a specific period of time.
46
These rights include copyrights, patents, trademarks, and trade secrets. These rights may be enforced by a
court via lawsuits, the reason for intellectual property is to encourage innovation without fear that a
competitor will steal the idea or take credit for it. In digital content distribution IPR can be achieved through
technical protection (TP) such as security and integrity feautures of computer operating system, Rights
management languages, persistent Encryption, watermarking

You might also like