ITC2212 17 18 Session
ITC2212 17 18 Session
ITC2212 17 18 Session
Society: Group of people who live in a definable community and share same culture.
Culture: related to people sharing belief, interest and value.
Preindustrial Societies: very small, rural, absence of machine use and depend
largely on local resources. Economic production is based on human labour. First
occupation was Hunter-Gatherer, Pastoral Societies, Horticulture, Agriculture and
feudal.
Hunter-Gatherer kinship and tribes, relied on their sorroundings for survival (Wild
animal and foraged plants).
ITC2212 (COMPUTER SCIENTIST AND SOCIETY)
Pastoral Societies rely on domestic animal breeding and plants cultivation for survival,
transportation, clothing and surplus goods. Nomadic and specialized occupation (Trading with local
groups)
Horticultural Societies rose due to depletion of region crops or water supply. Relocated where
rainfall was in abundance (permanent settlement, more stability & material goods).
Agricultural Societies Pastoral and Horticultural societies used small and temporary tools such as
sticks and hoes.
permanent metal tools were used ( rotation of crops, using fertilizer)
human settlements grew into towns, cities and regions.
Resources preservation became concern.
called “ dawn of civilization”
ITC2212 (COMPUTER SCIENTIST AND SOCIETY)
• Futurists prognosticate that computers will continue to be smaller, faster, more powerful
that they would be used in every facet of peoples lives.
On the other hand, Scheer contends that in as much as the same way the changes to society
computers will bring may be as harmful as beneficial. For instance, the communication that
takes place over computer networks is equated to real human interaction. Since computers
tend to decrease actual human contact, he argues, their use may weaken people’s sense of
community and widen existing social division
Examples of such areas of human activites affected by technology and the proc and cons of this technology
advancements in these areas are:
• Internet: The Internet has let millions of people get to know electronic documents that
move from one computer to another. Because computers can do more than paper can, these 8
documents often are more useful to you. The idea of a "document" will change. Information
on the internet, ideas, and messages could be easily shared. On the other hand internet has
contributed a lot to the degradation of moral values in the society through pornography, hate
speech, fake news, cyber crimes, remote terrorism etc.
• Games: Before, most computer games are on special compact discs. Every player starts
with the same game but he changes it by choosing what he will do with the game. But as the
Internet grows, people are beginning to play against other computer users, not just by
themselves. The games are now incorporated with educative materials and are made for
different age groups. However the availability of games on mobile phones, and portable
devices made it a distraction on kids. Also gaming characters became more violent thereby
putting ideas on the kids minds.
• Virtual Reality (VR): is a system of pictures and sounds the computer uses to make a
"place". The place isn't real, but it seems real, and you think you're in it. You can look to
the right and the left, and the system knows you're turning your head and it changes the
9
pictures. You see these "places" through special computer glasses. With VR, you will be
able to learn what it's like to fly an airplane, drive a car, or maybe go inside a body to
see the heart working, all without getting off a chair in your living room. Pilots and
doctors use VR to master their profession. However VR can not replace the real thing
and thereby creates a barrier for human contact.
• Movies: Movies of various kind are on internet in such a way that user can download
and watch later, or watch online. User can share or recommend it to other online users.
However the availability of these movies online led to piracy and a lot of other
intellectual property rights.
Many other areas are affected!
HOW WILL COMPUTERS TRANSFORM SOCIETY?
1. - Books:
4000 years back societies relied on books as their source of memory and depth 10
until now when the current electronic revolution overtake everything and
become their vehicle where they see themselves.
Therefore, Bill Gates foresee that information revolution will impact the book
apart from privacy, copyright, libel and computer theft.
Books are taking new form such as interactive multimedia books (sounds,
images) algebra, spoken words etc.
HOW WILL COMPUTERS TRANSFORM SOCIETY?
sales of e-books becomes the order of the day as multiple libraries are
connected 11
sales of e-books becomes the order of the day as multiple libraries are
connected 12
Money moves easily, stocks, currency and bonds traded world wide
electronically. 3 trillion dollars in circulation daily. Today’s Fiber Optics cables can carry >
500,000 conversations. Why?
Because of Lower Cost.
This information economy favors small entrepreneurs that can quickly adapt to
new technologies. In Los Angels, 2/3 of cos did not exist in 1970.
“Number of workers will take, manipulate and market information” Peter Drucker.
Computers and International Economy (contd)
• Information changes democracy issues are being presented quickly with visual aids. As such govt., academics, expert no
longer have monopoly oninformation. Eg., pot holes on Kaduna-kano road that is under construction now
Some governments, particularly in the developing world, try to mix economic openness with authoritarian politics.
They may enjoy temporary success. But in the long run— as Taiwan, Chile, and others demonstrate—free-flowing
information nurtures democracy. At the same time, massive amounts of information are changing democracy itself;
• Availability of information can have an immediate impact on pubic policy. If people know certain information 16
regarding the government they might act against it collectively to produce a result. An example is the case the
Right-to-Know-Network by dialing 202-234-8570 on a modem, register for a free account, and then instantly find
out which of some 300 toxic chemicals have been emitted in your area. This information had been buried within
regulatory bureaucracies but now stimulates lawsuits, local action, and government responsiveness. Kathy
Grandfield, a paralegal in Sedalia, Missouri, wondered whether a nearby chemical plant caused her family’s flu-
like illnesses and the death of birds in her yard. She discovered from Right-to-Know that chemical emissions may
have been a contributing cause. She and her neighbors—who also had similar symptoms for years—worked
together to help clean up the plan.
• The Internet grew out of a Defense Department communications system designed in the 1960s to survive nuclear
war. Because such rationales no longer exist, marketplace forces have replaced government funding. The Internet
could become advertiser driven like broadcast TV and radio, but no one knows how this would affect the
accessibility and content of services.
|
2nd generation computers
|
3rd generation computers
|
4th generation computers
|
5th generation computers
Now, watches, tea cups, cuff links and earrings communicate with each other via
satellite with processing power than our traditional PC.
Mass media will be influence by systems in receiving and transmitting personalized
contents
PERSONALIZED COMPUTERS WILL TRANSFORM THE HOME
Kitchen PC-TV reacted for your coffee (just hearing your voice)
the screen also scans and arrange your mails according to priority
checking flight schedule and book appointment with doctor and have
interaction (videoconferencing).
“ away mode” automatically off the light and closing drapes.
while at work, received messages from home security “ windows is broken”
and “ security company informed”
PERSONALIZED COMPUTERS WILL TRANSFORM THE HOME
dialed into home remotely, pronouncing ID using voice then Security console 22
was activated and observed Tree limb on the window.
“all-clear” signal to security company
“ Find nearby glass repair service and dial the number”
after two hours, technician arrives the yard and Home security sends another
signal to you that “ Someone is in front of the door”
logged in again and see the technician and remotely unlock the door for him
After the repairs, bill appears on to your screen with the amount to pay to service
company.
COMPUTERS WILL NOT SIGNIFICANTLY TRANSFORM SOCIETY
Computers are often more alluring than television, which already has a grip on us. Young Americans today spend
about as much time in front of a television as in a classroom. At midnight 1.8 million children under age 12 are
still watching television. The average adult American watches more than 30 hours every week.
Parents could restrict their children’s electronic consumption. But we, too, are addicted. Give up electronic links
for a day? No telephone, television, or computer? Try a week. Few can do it. Momentum is in the opposite
direction. When a two-year-old clicks at the keyboard and the next day says, “Mommy, Daddy, more ’puter,” his
parents feel something good is happening.
FUTURE SOCIETAL TRANSFORMATIONS CANNOT BE
PREDICTED
Software can do some of the work of Lawyers, doctors, accountants, travel agency, 28
Doctors are being affected by Expert system (Iliad software which knows 1,000
diseases)
A computer mentioned in Technopoly book (know lies, truth, sexual attraction, marriage
compatibility etc)
Computerized control which replaces car engine tune-up (in auto mechanic)
DEBATE 1
COMPUTERS WILL CREATE UNEMPLOYMENT; SOFTWARE AS CAREER THREAT
law, medicine, insurance, accounting, travel agency, financial planning and library
science are facing a way with the development of computer software and robots.
They will not replace them completely, but rather do a lot of damages to them.
• Software Can Provide Legal Forms and Research: a lot of legal work is now in
form of programs. Legal contract such as trust, incorporation and partnership is now
easy to produce which are routine in nature.
COMPUTERS DO NOT CREATE UNEMPLOYMENT
Economics sees it that computers bring inequality in society, where 1979 College students get
salary 30% more than his secondary school . And 1993, it was 70% gap.
Reason
Demand for workers who can use PCs
Infromation technology is able to create more self employed venture thereby boosting the
economy at large, people now get many opportunities from networking, assembling, repairs,
analyst, technicians, software geeks, medical field and human expertise, consultants e.t.c the list
is endless. Computers create employment in every aspect of human endeavor with ease. One
can create an application and get daily income from it without hard labor. A person in Nigeria
can work with a multi national company online and get paid for it at the comfort of his living
room.
COMPUTERS WILL CREATE UNEMPLOYMENT
Inequality is Due to Business, Not Computers
Profound change in business climate in 1970s. When Arab oil countries put 31
b4 you learn how to use software program, cyber geeks come with new one. Therefore,
your knowledge becomes old.
Time to learn is greater than it saved
The problem is not Technology, but rather how to use it and rate of its change
HOW WILL COMPUTER TECHNOLOGY AFFECT the RIGHT
to PRIVACY 33
Financial transactions conducted electronically and kept electronically.
People find the online transaction very convenient.
Issues
Privacy Advocates worry about how Banks & Credit agencies sells people information
2 marketers.
Any time you use credit card profiling you is easy
Computer Technology Violates People’s Privacy
Question About Privacy in the Computer Age
34
Information Privacy: ability to control the acquisition and release of information about
oneself.
Privacy destroying technologies
1. those that facilitate the acquisition of raw data and,
2. those that allow one to process and collate that data in interesting ways
Other Taxonomies
1. base on social context, or base on characteristics of subject ( eg. Citizen,
employee, driver, consumer etc.). Or base on disparate types of observers such as
( intelligence agencies, law enforcement, tax authorities, insurance companies,
supermarket securities, e-commerce sites, concerned parents, ex-husband, nosy-
neighbors)
Privacy Concerns: How computers enable violation of peoples privacy
• Personal-privacy rights: to be protected when data collection that formerly would
have taken months of a private detective’s time now can be accomplished with a few
keystrokes? 35
• Digital Encryption: is the act of translating data into another form or code so that only people with access (to a
secret key or password) can read it. E.g the RSA algorithm encryption technique.
• Anonymous Email: is an email which the sender address and personal identifying information cannot be viewed by
the recipient. This is possible by using a burner email account or VPN to prevent a person’s identity. E.g the Proton
Mail.
• Content Blocking Programs (Internet Filter): is a software that restricts or controls the content an internet user is
capable to access especially when utilized to restrict materials delivered over the internet via the web, email, or other
means. E.g parental Control settings, block-adds etc,
• Software companies already produce programs to block Website ads, Chapman points out, and others produce
programs to block pornography that can be adapted to block ads.
Further, he maintains, according to already existing laws, individuals must be notified when their financial information
is disclosed to someone, and people can simply request that their names be removed from marketers ‘mailing lists.
Therefore, Chapman and others conclude, computers do not pose a serious threat to privacy.
Equality Through Lack of Privacy
• Tiny Cameras on highway: to check traffic, robbery ,thuggery, corrupt policemen, missing child
• Speed limit tracker : for over speeding 37
• Tax return & politician bank statement could be observed
Making the inevitable cameras accessible so anyone can check traffic at First and Main, look for a lost
kid.
Any citizen can read the billionaire’s tax return or the politician’s bank statement. Policeman can ever
be sure his actions are unobserved.
Street robbery and thuggery could also be under watch and control.
Again, no government agency or corporate boardroom is safe from whistle-blowers.
highway.
Computer enforces accountability in the sense that each and every individual that access
information superhighway his record will remain forever and ever. Accessing a database
also keep user logs such as activity, report, edit, log in and transaction log. Hate speech
could also be tracked against individual on social media as it stores information
permanently somewhere not apparent to ordinary users
Crime in the Future
Anyone who is computer literate can become cyber crook
39
For now: murder, rape & robbery are being tackled by CCTV & cashless society.
house burglary is also tackled by smart houses/ home management systems
vehicle theft is under control by car tracker
• Cyberstalking: they surfs computer bulletin boards, filled with bright young boys and girls, in search of victims. They develop a
cyberspace relationship and then seeks to meet the child in person to pursue his sexual intentions. Already recognized as a serious
problem, cyberstalking has spawned the cyber cop—a police officer assigned to computer bulletin boards in search of these
pedophiles. Once a suspect is spotted, the cyber cop plays the role of a naive youngster and makes himself or herself available for
a meeting with the suspect in hopes of gaining evidence for an arrest. Emotionally disturbed loner, computer por sellers, mind
stalking.
• Government: cyber crooks breaks into government system in order to steal classified information. Military system are the main
target in this. For example, during Operation Desert Storm, hackers were able to track both actual and planned troop movements.
Another example is when James V. Christy II, director of an Air Force unit of computer-crime investigators, set up a team of
hackers to test the security of military computer systems. He reported that the hackers broke into Pentagon systems “within 15
seconds” and went on to break into over 200 Air Force systems with no one reporting or even recognizing the break-ins.
• Business: as e-commerce is exploding day-by-day and internet banking is getting ground, most of these systems are the targets by
hackers. Access to these computers is equated to access to money. For example, founder of “Master of deception” said that he
could buy limousine, air ticket, distribute software programs, change credit bank balances and book hotel rooms remotely and
free.
Communication crimes:
• Cellular theft and phone fraud
• Use of binoculars to steal calling card access numbers in aiports and bus terminals
• Steal cellular phone access code from air using vans equipped with tapping machines or from
41
Phone company employees.
Remote terrorism(RT):
Remote terrorism is the capability by individual or group to detonate explosives in another country by means
of computers and radio signals. For example, In London a couple of years ago, terrorists placed deadly
missiles in the back of a truck and remotely sent them flying toward the home of the British prime minister.
The missiles exploded on the lawn without harm to the prime minister or the house, but they could have
killed him and created an international crisis. Other forms of RT are;
• Computer virus and other info destroying instruments can be hurled at govt database from anywhere in
the world.
• Terrorists can cut communication off to a certain country or state therby causing panic.
• Terrorist can recruit unsuspecting members of the public online by sublimal conditioning.
• Audiovisual messages aimed directly at individuals with brain implanted computers
Virtual Crimes:
As virtual reality becomes increasingly sophisticated, it is the young adults in the first decade of the twenty-first century
who—having grown up with virtual reality—will create the software and determine the legal and criminal uses of this
technology. And with virtual reality potentially reaching directly into the brains of recipients via “organic” computers,
the ability to separate cyberspace reality from truth outside cyberspace will be one of the greatest challenges of the 42
twenty-first century. Stocks and bond fraud: Stock and bond fraud is already appearing in cyberspace—stocks and bonds
that appear on the markets are actively traded for a short time, and then disappear. The stocks and bonds are nonexistent;
only the electronic impulses are real.
Censorship
Censorship is the attempt to suppress or regulate public access to materials considered offensive or harmful.
The coming of printing press broke the virtual monoploly held by governments and religious institutions on
distributing materials to a large audience which in turn led to an increase in the number of literate people. 43
Types of censorship:
Direct censorship: the government has absolute control of every information that goes public. It is of
two form;
• Government monopolization: where the govt owned all media organization and not a single private
media organization is present in this govts can effectively suppress the flow of information. It is mo
linger applicable in our society.
• Prepublication review: essential for materials the govt need to keep secrst e.g information on nuclear
activities, or information injurious to reputation of leaders.
Licensing and Registration: Typically used to control media with limited bandwidth i.e. radio and TV
have limited number to be accommodated on a given electromagnetic spectrum, hence they must obtain
license to broadcast a particular frequency.
Self-Censorship: A private media org deciding not to publish material by itself to avoid prosecution or
denied access to information by the government.
Should Internet contents be censored? And by who?
• Profile cloning
• Cyber crimes
• Hate speech
44
• Pornography
• Terrorism
• Parental control
• Piracy
• Child abuse (pedophiles)
• Fake news
Are these reasons enough? If not the internet contents should not be censored to avoid free flow of
information!
Information Technology and Ethics
Ethics is the philosophical study of morality, a rational examination into people’s moral beliefs and behaviour.
Ethics can also be termed as rational systematic analysis of conduct that can cause benefit or harm. The society
has experienced rapid changes as it incorporates the latest advances in information technology. Ethics is focused
45
on the voluntary moral choices people make because they have decided to take one course of action rather than its
alternative.
There is nothing intrinsically immoral about copying a CD. However, our society has chosen to enact laws that
grant intellectual property rights to people who do creative work and distribute it on CDs. From the perspective of
social contract theory and Kantianism, we have a prima facie obligation to obey the law and respect everyone’s
property rights. From the viewpoint of rule utilitarianism, the beneficial consequences of following the moral rule
“Obey the law” greatly exceed the harmful consequences. Copying a disc to save a few dollars or help a friend
does not fall into that category. From an act utilitarian viewpoint, it is possible to come up with a circumstance
where making a copy of a copyrighted CD is the right action. However, it would be wrong to extrapolate from this
particular case and conclude that an act utilitarian analysis would always determine CD copying to be morally
acceptable.
Data collection and information technology and internet are unregulated, there are no easy answers about ethics in
IT nor who should be the arbiter of whether those ethics are employed. Ultimately the problem is that technology
moves so fast that laws and lawmakers cant possibly keep up with the speed of innovation, and society is left
hoping that those who write the programs err on the side of what’s ethical.
INTELLECTUAL PROPERTY RIGHTS
Intellectual property right (IPR) is the exclusive right of a person or organization to use its own plans,
ideas,or other intangible assests without worry of competition or mis use at least for a specific period of time.
46
These rights include copyrights, patents, trademarks, and trade secrets. These rights may be enforced by a
court via lawsuits, the reason for intellectual property is to encourage innovation without fear that a
competitor will steal the idea or take credit for it. In digital content distribution IPR can be achieved through
technical protection (TP) such as security and integrity feautures of computer operating system, Rights
management languages, persistent Encryption, watermarking