Computers in Polite Society

advertisement
Chapter 8 - Computers
In Polite Society:
Social Implications of IT
• Discuss examples of how social networking
technology can improve society
• Describe several tips associated with netiquette
and explain the benefits of following them
• Give the requirements of a good password, and
how to achieve them
• Name three permitted/not permitted uses of
licensed software
• Discuss what rights are granted to
owners/creators of material that is copyrighted
The Power of the Crowd
• The Internet has brought substantial
changes to society
• Positive or Negative?
• Social interactions have been extended well
beyond the experiences that previous
generations could have.
• We will consider a few examples that have
ostensibly brought “positive change”
Crowdsourcing
• Refers to solving a problem or achieving a
goal by combining the contributions of a
large, unconstrained volunteer population
• Wikipedia is perhaps the most famous of the
crowdsourcing enterprises
• The goal is to build a database of all (?)
knowledge through a global effort
• Issues: Control, Cliques, Deletionism
Be a Martian
• Volunteers help NASA by tagging images
from the Mars rovers
• Crowdsourcing is a new phenomenon
made possible by the “free” and easy
communication enabled by the Internet
• “Crowd” is obviously important because it
increases the number of people working
on a project, a benefit for the people with
the problem
• Issues?
Be a Martian
• By opening up the project to a wide
variety of people, participants will have
a wide variety of skill sets
• Volunteers might actually be faster and
more efficient at the task!
• Their skills and knowledge might lead to
a better solution, as Wikipedia proves in
most cases
Crowdsourcing
• So, what’s in it for the participants?
– It’s fun
– Earn points, win prizes
– Participants receive a sense of satisfaction
that they are contributing to a project
– Many projects require skills that are more
challenging than watching TV
– Issues?
Foldit
• Foldit is a game program in which
teams compete to fold a protein
• Proteins get all twisted as they float
around in cells.
• How they fold largely determines how
they work (medicine doesn’t “know a
protein” until it knows how it folds)
Foldit
• Foldit program
works on proteins
that are important to
AIDS, cancer, and
Alzheimer’s
research
• Using Foldit, the
structure of the
protein associated
with the AIDS virus
was solved in three
weeks
Freerice
• Freerice has a
vocabulary game
(also others) :
• The player is given
an English word
and four possible
definitions
• Picking the right
answer donates 10
grains of rice
Kickstarter
• People with creative projects pitch their
ideas:
– They say what they’ll do
– How much money they need to do it
– Why it’s important, etc.
• Donors can contribute toward the goal
• If the goal is achieved the project is
funded; otherwise, the donors get their
money back
Out on Good Behavior
• The online world we live in today is
different in many ways than the real world
many grew up in
• Our range of interactions is much broader;
we may never meet face-to-face with the
online people
• Families and relatives usually influence
our online behavior very little
• Unintended consequences? Concerns?
Out on Good Behavior
• We can be anonymous on the Internet,
so no one knows if we behave
badly…Right?
• We are not entirely anonymous online.
There are means to get the identities of
people on the Internet
• We all want to enjoy the benefits the
Internet gives us, so our daily uses of the
Internet should encourage us to behave
Improving the Effectiveness of Email
• Problems with email and online comms:
– Conveying emotion
– Emphasis
– Conversational pace
– Ambiguity
– Flame-a-thons
– Spam
– Scams
Conveying Emotion
• Difficult to convey subtle emotions
using email
– Medium is too informal, impersonal,
and casually written.
– Conversational cues are missing
– Good Writing still important - consider classic
letters
• Emoticons are (somewhat) popular
– Tags a sentence indicating the emotion we
mean to communicate
Emphasis
• Typing for emphasis can convey the
wrong meaning
– Text in all caps can be interpreted
as yelling
• Email is still largely ASCII based and
may not allow italics or underlining
– Asterisks or underscores can
replace underlining
Conversational Pace
• Asynchronous medium makes
dialog difficult
– For interactive purposes (like negotiation)
synchronous medium like telephone may
be best
Ambiguity
• Text can be interpreted in ways we
don't intend
– People often don't proofread what they
write in email to avoid ambiguity
Flames
• Flame is slang for inflammatory
exchanges
• Flame-a-thon is ongoing exchange of
angry emails
• When angered by email, it's best to
delay answering until you cool down
Netiquette (more rules in the book)
• Originally rules to promote civilized email usage
• Now interpreted more broadly: civilized behavior in
any of the social settings on the Internet
– Ask about one topic at a time
– Include context (quote previous text as needed)
– Use an automated reply when away (careful!)
– Get sender's permission before forwarding email
– Use targeted distribution lists (don't send latest joke
to everyone you've ever emailed)
– Posted Content lives forever! Like a bulletin board.
Please, Don’t Be Offended
• The “Offensensitivity” perspective can
be summarized as follows:
1. Your post will be seen by people all over
the world, and you will see posts from
people all over the world
2. You can easily and unintentionally offend
them; they can easily and unintentionally
offend you
Please, Don’t Be Offended
• The “Offensensitivity” perspective can
be summarized as follows:
3. The “problem” is our different cultures,
social norms, backgrounds, religions,
assumptions, and so forth. You’re not
wrong; they’re not wrong. And they are no
more likely to change their thinking than
you are. Be tolerant. Be respectful.
4. Are norms and standards relative or
absolute?
Expect the Unexpected
• Expecting the unexpected is a valuable
survival skill in life and in computing.
• When something unexpected happens,
we should ask
– “Why did that happen?”
– “What’s going on?”
• An essential skill in the social world of
computing is, Expect the Unexpected
The Onion
• The Onion is a humor magazine
specializing in news satire
• It produces “news” stories that are
almost believable
• Rather than checking an unbelievable
story by asking if it makes sense many
people simply believe it and repeat it
Suspicious Activity
• Other kinds of online activity are of greater
concern.
• Is your software:
– “acting”
strange?
– “behaving” unusually?
• These could be indicators of a software problem
such as disk fragmentation, or a computer virus
infection
• If the behavior continues after a reboot, you might
need some help
Authentication and Passwords:
Are, Have, Know
• The Role of Passwords
– To limit computer or system access to only those
who know a sequence of keyboard characters
– To help track who did what - protect the innocent
• Breaking into a Computer without a Password
– Trying all possible passwords algorithmically
would eventually find correct password, but
software usually limits the number of tries
• Forgetting a Password
– Passwords are scrambled or encrypted and
stored, so system administrator usually can't tell
you your password if you forget it
Guidelines for Selecting a Password
• Don’tchoose something easily guessed
• Should have at least 8 characters (if possible)
• Mix of uppercase and lowercase letters,
numbers, punctuation characters, symbols like
% and *).
• Avoid “dictionary words”
• No personal association (like your name)
• Phrase-to-password “algorithm”
Heuristics for picking a password
• Select a personally interesting topic
– Always select passwords related to topic
• Develop a password from a phrase rather
than a single word. (Or use phrase)
• Encode the password phrase
– Make it short by abbreviating, replace
letters and syllables with alternate
characters or spellings
Changing Passwords
• Should be changed periodically
• Resets/ “Security” Questions
• Managing Passwords
– Using a single password for everything is
risky; using a different password for
everything is hard to remember
– Passwords can be recycled
• Make good changes to good passwords or
• Rotate passwords
– Password safe or “keychain”
Viruses and Worms
• Virus - a program that "infects" another program by
embedding a copy of itself. When the infected
program runs, the virus copies itself and infects other
programs
• Worm is an independent program that copies itself
across network connections
• Trojan is a program that hides inside another useful
program, and performs secret operations
– May record keystrokes or other sensitive data, or load
malicious software
• Exploit is a program that takes advantage of security
hole (Say in an Internet browser )
– Backdoor access enters computer and reconfigures it for
remote control
How to "Catch" a Virus
• Email attachments. Do not open attachments
before checking:
– Is this email from someone I know?
– Is the message a sensible follow-up to the last
message from the sender?
– Is the content of the message something the
sender would say to me?
– Is there a reason for the sender to include an
attachment?
• When in doubt, be cautious - save and scan
How to "Catch" a Virus (cont'd)
• Copying software from an infected computer
• Peer-to-Peer Exchange
– Downloading files from unreliable sources
• New Software
– Any software is a potential source of
infected code
– Most software distributors are careful to
avoid infection
Virus-Checking Software
• Free and Shareware scanners exist - AVG
• Three companies are McAfee, Norton, and
Sophos, Inc.
• Programs check for known viruses, worms,
etc. May also use heuristics.
• New viruses are created all the time, so
update often
Phishing
• Password harvesting fishing
• “Social Engineering”
• Users are sent SPAM emails asking for credit card
or banking information, or even just passwords.
• Message is disguised to appear to be from
a bank or other company
– Often reports a security problem the user needs
to address
– When the user clicks legitimate looking link,
they are linked to bogus sites set up to steal the
information entered
What Can Be Done About Phishing?
• Never respond to requests for personal
information like passwords via email; legitimate
businesses do not request information this way
• Do not click on links or pre-typed addresses. They
can be spoofed (faked); type the URL yourself.
• Check to make sure the website is using
encryption - Lock Icon, etc.
• Routinely review credit card and bank statements
for unusual activity
• Report suspected abuses to proper authorities
Protecting Intellectual Property
• Intellectual property is any human creation like
photograph, music, textbooks, cartoons, etc.
• Licensing of software
– You don't buy most software; you lease it
– Commercial Licenses gives you the right to use
personally, but not sell or give away
• Try before you buy
– Shareware allows you to download and try software for
free, then pay the person who built it if you like it (honor
system)
• GPL - alternate license, allows almost any use, as long as
you distribute the source code of any changes you make.
(Based on Copyright Law)
Copyright on the Web
• A person automatically owns copyright of what he
creates in the U.S. and most nations
• Copyright “temporarily” protects owner's right to
– Make a copy of the work
– Use a work as the basis for a new work
(derivative work) (exception for satire/parody)
– Distribute or publish the work, including
electronically
– Publicly perform the work
– Publicly display the work
Copyright on the Web (cont'd)
• Free Personal Use
– You are free to read, view or listen to
protected work
• When is permission needed?
– Information placed in public domain is free
for anyone to use (Creative Commons.)
– Otherwise you must get permission
from the owner of the copyright
Copyright on the Web (cont'd)
• The Concept of Fair Use
– Allows use of copyrighted material for educational or
scholarly purposes, to allow limited quotation for review or
criticism, to permit parody
• When Is It Fair Use? Depends on several factors:
– What is the planned use?
– What is the nature of the work in which the material is to
be used?
– How much of the work will be used?
– What effect would this use have on the market for the
work, if the use were widespread?
Copyright on the Web (cont'd)
• Violating the Copyright Law
– You break the law whether you give away
copyrighted material or sell it
– Commercial use usually results in
higher fines (Could even result in criminal
penalties - but rare.)
• Alternatives: Public Domain. Creative
Commons, Original material, Others?
Ensuring the Reliability of Software
• Safety-Critical Applications (systems that support
life or control hazardous devices
or materials)
– Hardware failures can be avoided or resolved
using redundancy
• Have three computers perform all
computations of safety-critical system
• Compare results - 2 out of 3 rule
– Burn-in
• Most errors show up after a few hours of
operation
Software Failures
• How can programmers be sure their
programs work correctly?
– All reachable configurations (states the
software can get into), cannot be
examined for correctness—there are too
many
– A program is said to be correct if its
behavior exactly matches its specification
– What can we do about the fact that we
can't prove correctness?
Software Failures (cont'd)
• The Challenge
– Accept that software may contain bugs.
Monitor usage, be alert to unusual
behavior and be prepared to limit the harm
they can do
– Demand high-quality software, refuse
buggy software, and be prepared to
change to better software
Software Failures (cont'd)
• Fail-Soft and Fail-Safe Software
– Fail-soft means the program continues to
operate under stress, providing a possibly
degraded level of functionality
– Fail-safe means the system stops functioning to
avoid causing harm
• Perfectly safe software is just as impossible as
perfectly correct software; there is always a risk
Download