571 research outputs found

    Evaluating the social and cultural implications of the internet

    Get PDF
    Since the Internet's breakthrough as a mass medium, it has become a topic of discussion because of its implications for society. At one extreme, one finds those who only see great benefits and consider the Internet a tool for freedom, commerce, connectivity, and other societal benefits. At the other extreme, one finds those who lament the harms and disadvantages of the Internet, and who consider it a grave danger to existing social structures and institutions, to culture, morality and human relations. In between one finds the majority, those who recognize both benefits and harms in the Internet as it currently exists and who recognize its usefulness while worrying about some of its negative impacts.As an example of a positive appraisal of the Internet, consider what Esther Dyson, one of the early enthusiasts for the Internet, states in her book Release 2.0. There, she claims: "The Net offers us a chance to take charge of our own lives and to redefine our role as citizens of local communities and of a global society. It also hands us the responsibility to govern ourselves, to think for ourselves, to educate our children, to do business honestly, and to work with fellow citizens to design rules we want to live by." (Dyson, 1997). Dyson argues that the Internet offers us the chance to build exciting communities of likeminded individuals, enables people to redefine their work as they see fit, fosters truth-telling and information disclosure, helps build trust between people, and can function for people as a second home.For a negative appraisal, consider the opinion of the Council of Torah Sages, a group of leading orthodox rabbis in Israel who in 2000 issued a ruling banning the Internet from Jewish homes. The Council claimed that the Internet is "1,000 times more dangerous than television" (which they banned thirty years earlier). The Council described the Internet as "the world's leading cause of temptation" and "a deadly poison which burns souls" that "incites and encourages sin and abomination of the worst kind." The Council explained that it recognized benefits in the Internet, but saw no way of balancing these with the potential cost, which they defined as exposure to "moral pollution" and possible addiction to Internet use that could quash the motivation to learn Torah, especially among children. ( See Ha'aretz, January 7, 2000.)Even the greatest critics of the Internet, like the Council of Torah Sages, see benefits in the technology, and even the greatest advocates recognize that there are drawbacks to the medium. People have different opinions on what the benefits and disadvantages are and also differ in the way in which they balance them against each other. Underlying these different assessments of the Internet are different value systems. Esther Dyson holds a libertarian value system in which the maximization of individual freedom, property rights and free market capitalism are central values. Her positive assessment of the Internet is based on the potential she sees in this technology to promote these values. In contrast, the values Council of Torah Sages are values of Hareidi, a variety of orthodox Judaism, according to which the highest good is obedience to God's law as laid out in the Torah, and they concluded, based on these values, that the Internet is harmful.Yet, it is not just differences in value systems that determine one's appraisal of a technology like the Internet. Such an appraisal is also determined by one's empirical understanding of how the technology works and what its consequences or implications are. People often come to unduly positive or negative appraisals of technology because they assess its consequences wrongly. For instance, some people believe that Internet use increases the likelihood of social isolation, but empirical research could conceivably show that in fact the opposite is the case. Disagreements about the positive and negative aspects of the internet may therefore be either normative disagreements (disagreements about values) or empirical disagreements (disagreements about facts). Of course, it is not always easy to disentangle values and empirical facts, as these are often strongly interwoven.Next to contested benefits and harms of the Internet, there are also perceived harms and benefits that are fairly broadly acknowledged. For instance, nearly everyone agrees that the Internet has the benefit of making a large amount of useful information easily available, and nearly everyone agrees that the Internet can also be harmful by making dangerous, libelous and hateful information available. People have shared values and shared empirical beliefs by which they can come to such collective assessments.My purpose in this essay is to contribute to a better understanding of existing positive and negative appraisals of the Internet, as a first step towards a more methodical assessment of Internet technology. My focus will be on the appraisal of social and cultural implications of the Internet. Whether we like it or not, policy towards the Internet is guided by beliefs about its social and cultural benefits and harms. It is desirable, therefore, to have methods for making such beliefs explicit in order to analyze the values and empirical claims that are presupposed in them.In the next two sections (2 and 3), I will catalogue major perceived social and cultural benefits and harms of the Internet, that have been mentioned frequently in public discussions and academic studies. I will focus on perceived benefits and harms that do not seem to rest on idiosyncratic values, meaning that they seem to rest on values that are shared by most people. For instance, most people believe that individual autonomy is good, so if it can be shown that a technology enhances individual autonomy, most people would agree that this technology has this benefit. Notice, however, that even when they share this value, people may disagree on the benefits of the technology in question, because they may have different empirical beliefs on whether the technology actually enhanced individual autonomy.Cataloguing such perceived cultural benefits and harms is, I believe, an important first step towards a social and cultural technology assessment of the Internet and its various uses. An overview of perceived benefits and harms may provide a broader perspective on the Internet that could be to the benefit of both friends and foes, and can contribute to a better mutual understanding between them. More importantly, it provides a potential starting point for a reasoned and methodical analysis of benefits and harms. Ideas on how such an analysis may be possible, in light of the already mentioned facts that assessments are based on different value systems, will be developed in section 4. In a concluding section, I sketch the prospects for a future social and cultural technology assessment of the Internet

    Era of Big Data: Danger of Descrimination

    Get PDF
    We live in a world of data collection where organizations and marketers know our income, our credit rating and history, our love life, race, ethnicity, religion, interests, travel history and plans, hobbies, health concerns, spending habits and millions of other data points about our private lives. This data, mined for our behaviors, habits, likes and dislikes, is referred to as the “creep factor” of big data [1]. It is estimated that data generated worldwide will be 1.3 zettabytes (ZB) by 2016. The rise of computational power plus cheaper and faster devices to capture, collect, store and process data, translates into the “datafication” of society [4]. This paper will examine a side effect of datafication: discrimination

    Usability versus privacy instead of usable privacy

    Get PDF
    A smartphone is an indispensible device that also holds a great deal of personal and private data. Contact details, party or holiday photos and emails --- all carried around in our pockets and easily lost. On Android, the most widely-used smartphone operating system, access to this data is regulated by permissions. Apps request these permissions at installation, and they ideally only ask for permission to access data they really need to carry out their functions. The user is expected to check, and grant, requested permissions before installing the app. Their privacy can potentially be violated if they fail to check the permissions carefully. In June 2014 Google changed the Android permission screen, perhaps attempting to improve its usability. Does this mean that all is well in the Android eco-system, or was this update a retrograde move? This article discusses the new permission screen and its possible implications for smartphone owner privacy

    Enhancing the social issues components in our computing curriculum: Computing for the social good

    Get PDF
    The acceptance and integration of social issues into computing curricula is still a work in progress twenty years after it was first incorporated into the ACM Computing Curricula. Through an international survey of computing instructors, this paper corroborates prior work showing that most institutions include the societal impact of ICT in their programs. However, topics often concentrate on computer history, codes of ethics and intellectual property, while neglecting broader issues of societal impact. This paper explores how these neglected topics can be better developed through a subtle change of focus to the significant role that ICT plays in addressing the needs of the community. Drawing on the survey and a set of implementation cases, the paper provides guidance by means of examples and resources to empower teaching teams to engage students in the application of ICT to bring about positive social outcomes – computing for the social good

    Should we campaign against sex robots?

    Get PDF
    In September 2015 a well-publicised Campaign Against Sex Robots (CASR) was launched. Modelled on the longer-standing Campaign to Stop Killer Robots, the CASR opposes the development of sex robots on the grounds that the technology is being developed with a particular model of female-male relations (the prostitute-john model) in mind, and that this will prove harmful in various ways. In this chapter, we consider carefully the merits of campaigning against such a technology. We make three main arguments. First, we argue that the particular claims advanced by the CASR are unpersuasive, partly due to a lack of clarity about the campaign’s aims and partly due to substantive defects in the main ethical objections put forward by campaign’s founder(s). Second, broadening our inquiry beyond the arguments proferred by the campaign itself, we argue that it would be very difficult to endorse a general campaign against sex robots unless one embraced a highly conservative attitude towards the ethics of sex, which is likely to be unpalatable to those who are active in the campaign. In making this argument we draw upon lessons from the campaign against killer robots. Finally, we conclude by suggesting that although a generalised campaign against sex robots is unwarranted, there are legitimate concerns that one can raise about the development of sex robots

    ON BITCOIN AND SIMMEL’S IDEA OF PERFECT MONEY

    Get PDF
    Georg Simmel in his book Philosophy of Money, described how money evolves through history and predicted that it will evolve to the point where it no longer relies on any substance. He called this stage “perfect money,” which he described as “money detached from every substantial value”. Today we are faced with the development of cryptocurrencies, of which Bitcoin is the best known. Bitcoin presents a new system of transaction which does not require governments or middlemen to regulate trade. Since such currencies are completely beyond substantial value, the philosophical question emerges whether Bitcoin is “perfect money.” This essay will argue that Bitcoin can be understood in connection with Simmel’s idea of “perfect money.” But will also consider Simmel’s claim that perfect money is only possible in a stable society and will show the limitations of cyrptocurrencies and Bitcoin in light of this

    Dark clouds on the horizon:the challenge of cloud forensics

    Get PDF
    We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing. All potentially render current approaches to digital forensic investigation unusable. We explain how the Cloud, due to its global distribution and multi-jurisdictional nature, exacerbates these challenges. The latest developments in the computing milieu threaten a complete “evidence blackout” with severe implications for the detection, investigation and prosecution of cybercrime. In this paper, we review the current landscape of cloud-based forensics investigations. We posit a number of potential solutions. Cloud forensic difficulties can only be addressed if we acknowledge its socio-technological nature, and design solutions that address both human and technological dimensions. No firm conclusion is drawn; rather the objective is to present a position paper, which will stimulate debate in the area and move the discipline of digital cloud forensics forward. Thus, the paper concludes with an invitation to further informed debate on this issue

    Big Data Privacy Context: Literature Effects On Secure Informational Assets

    Get PDF
    This article's objective is the identification of research opportunities in the current big data privacy domain, evaluating literature effects on secure informational assets. Until now, no study has analyzed such relation. Its results can foster science, technologies and businesses. To achieve these objectives, a big data privacy Systematic Literature Review (SLR) is performed on the main scientific peer reviewed journals in Scopus database. Bibliometrics and text mining analysis complement the SLR. This study provides support to big data privacy researchers on: most and least researched themes, research novelty, most cited works and authors, themes evolution through time and many others. In addition, TOPSIS and VIKOR ranks were developed to evaluate literature effects versus informational assets indicators. Secure Internet Servers (SIS) was chosen as decision criteria. Results show that big data privacy literature is strongly focused on computational aspects. However, individuals, societies, organizations and governments face a technological change that has just started to be investigated, with growing concerns on law and regulation aspects. TOPSIS and VIKOR Ranks differed in several positions and the only consistent country between literature and SIS adoption is the United States. Countries in the lowest ranking positions represent future research opportunities.Comment: 21 pages, 9 figure
    • …
    corecore