首页 > 最新文献

Computers and Society最新文献

英文 中文
Privacy 隐私
Pub Date : 2019-04-24 DOI: 10.32388/0ahz4m
R. Baecker
Fears about loss of privacy in computerized societies have been central to dystopian literature. The issue has also concerned thoughtful computer scientists and lawyers since the 1960s. By then, the scope of the computer revolution was making clear that governments and corporations could keep records about almost every aspect of our lives. As data storage became virtually limitless at trivial cost, effective uses of data grew, as did risks to personal privacy. We shall define privacy, look at its manifestations and roles, and discuss current and future threats to it. We shall introduce concepts that are key to understanding privacy, such as informed consent. A major concern is the threats to information privacy or data privacy, in which a person’s confidential information has errors or becomes exposed to people who should not be able to see or use it. We shall examine situations in which privacy can be invaded by governments, organizations, and individuals. Governments amass vast stores of personal data during the everyday course of administration and regulation. Government surveillance in many nations captures information that should be private, a topic we discussed in Chapter 6. Search engines, credit rating organizations, and insurance companies also gather huge amounts of data on consumers. When data is incorrect, or is hacked, there are serious implications for information privacy. Criminals seek to gain leverage by ferreting out computer-based data about personal financial transactions. Health information is a particularly sensitive area in which many people feel especially vulnerable. These are all ‘classical’ privacy concerns, the dangers of which were evident in the 1960s. New technologies have raised more concerns. Social media holds vast quantities of personal data that we have willingly disclosed, including information that could prove embarrassing later in life. A vivid example of a privacy breech was the Cambridge Analytica/Facebook scandal of 2018. New technologies raise new privacy concerns. Chips use GPS to track our location and movements. Recent advances in computer vision and the widespread deployment of video cameras enable face recognition. Chips located in the environment and embedded as sensors and prostheses in our bodies make our activities and even our moods accessible by others.
对计算机化社会中隐私丧失的担忧一直是反乌托邦文学的核心内容。自20世纪60年代以来,这个问题也引起了深思熟虑的计算机科学家和律师的关注。到那时,计算机革命的范围已经很清楚,政府和公司可以记录我们生活的几乎每一个方面。随着数据存储以微不足道的成本变得几乎无限,对数据的有效利用也在增加,对个人隐私的风险也在增加。我们将定义隐私,看看它的表现形式和作用,并讨论当前和未来对它的威胁。我们将介绍理解隐私的关键概念,例如知情同意。一个主要的担忧是对信息隐私或数据隐私的威胁,其中一个人的机密信息有错误或暴露给不应该看到或使用它的人。我们将研究隐私可能被政府、组织和个人侵犯的情况。政府在日常管理和监管过程中积累了大量的个人数据。许多国家的政府监控获取了本应属于私人的信息,这是我们在第六章讨论过的话题。搜索引擎、信用评级机构和保险公司也收集了大量的消费者数据。当数据不正确或被黑客攻击时,会对信息隐私产生严重影响。犯罪分子试图通过搜寻有关个人金融交易的计算机数据来获得杠杆作用。健康信息是一个特别敏感的领域,许多人感到特别脆弱。这些都是“经典的”隐私问题,其危险在20世纪60年代是显而易见的。新技术引发了更多的担忧。社交媒体上有大量我们自愿披露的个人数据,包括可能在以后的生活中让人尴尬的信息。2018年剑桥分析公司/Facebook丑闻是隐私泄露的一个生动例子。新技术引发了新的隐私问题。芯片利用GPS追踪我们的位置和活动。计算机视觉的最新进展和摄像机的广泛部署使人脸识别成为可能。植入环境中的芯片以传感器和假肢的形式植入我们的身体,使我们的活动甚至情绪都能被他人接触到。
{"title":"Privacy","authors":"R. Baecker","doi":"10.32388/0ahz4m","DOIUrl":"https://doi.org/10.32388/0ahz4m","url":null,"abstract":"Fears about loss of privacy in computerized societies have been central to dystopian literature. The issue has also concerned thoughtful computer scientists and lawyers since the 1960s. By then, the scope of the computer revolution was making clear that governments and corporations could keep records about almost every aspect of our lives. As data storage became virtually limitless at trivial cost, effective uses of data grew, as did risks to personal privacy. We shall define privacy, look at its manifestations and roles, and discuss current and future threats to it. We shall introduce concepts that are key to understanding privacy, such as informed consent. A major concern is the threats to information privacy or data privacy, in which a person’s confidential information has errors or becomes exposed to people who should not be able to see or use it. We shall examine situations in which privacy can be invaded by governments, organizations, and individuals. Governments amass vast stores of personal data during the everyday course of administration and regulation. Government surveillance in many nations captures information that should be private, a topic we discussed in Chapter 6. Search engines, credit rating organizations, and insurance companies also gather huge amounts of data on consumers. When data is incorrect, or is hacked, there are serious implications for information privacy. Criminals seek to gain leverage by ferreting out computer-based data about personal financial transactions. Health information is a particularly sensitive area in which many people feel especially vulnerable. These are all ‘classical’ privacy concerns, the dangers of which were evident in the 1960s. New technologies have raised more concerns. Social media holds vast quantities of personal data that we have willingly disclosed, including information that could prove embarrassing later in life. A vivid example of a privacy breech was the Cambridge Analytica/Facebook scandal of 2018. New technologies raise new privacy concerns. Chips use GPS to track our location and movements. Recent advances in computer vision and the widespread deployment of video cameras enable face recognition. Chips located in the environment and embedded as sensors and prostheses in our bodies make our activities and even our moods accessible by others.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122513644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital media and intellectual property 数字媒体和知识产权
Pub Date : 2019-04-24 DOI: 10.1093/oso/9780198827085.003.0007
R. Baecker
Vannevar Bush envisioned a machine that would assist humanity in the creative work of writing. Doug Engelbart imagined the collaborative sharing and enhancement of knowledge. Digital media today—text, drawings, photos, audio, and video—surpass the visions of their pioneers. These media may be copied, shared, and modified in ways that challenge the legal system, because unrestricted content sharing without suitable payment to creators runs counter to intellectual property (IP) traditions and laws. Writers, musicians, artists, and inventors have long relied upon IP protection to enable them to control the use of their creations and inventions. Copyright infringement, that is, copying in violation of copyright, threatens the income that they could receive from their creations. The concept of fair use is a critical issue in such discussions, as it allows certain exceptions to copyright. One area that has received a great deal of attention is the digital copying and sharing of music; we shall examine the interplay between conventional behaviour, ethics, technical interventions to limit or block copying, laws and legal battles, and product and pricing innovation. Next, we shall look at similar issues in the domain of motion pictures. There are effective and legal streaming services, yet there are still concerns about copyright infringement. Copyright holders now automatically produce takedown notices to insist that websites remove illegally or improperly sourced material. Such notices include many errors, causing additional complications for video creators. One interesting challenge to the concept and laws of copyright occurs in the creation of mash-ups. Artists use fragments from existing musical or visual performances as well as their own material to create audio-visual works that combine multiple content sources. Artists, lawyers, and businesspeople debate the extent to which such mash-ups violate reasonable copyright protection. Copyright is also significant for academic articles and textbooks. There are two especially interesting cases to discuss. One is the widespread copying of textbooks by students due to the high price of texts. The other is the fair pricing of the publication of research results that have been funded by government grants. This issue has provided one of several stimuli to the creation of open access publications.
Vannevar Bush设想了一种帮助人类进行创造性写作的机器。道格·恩格尔巴特(Doug Engelbart)设想了知识的协作共享和增强。今天的数字媒体——文本、图画、照片、音频和视频——超越了它们的先驱者的愿景。这些媒体可能以挑战法律制度的方式被复制、共享和修改,因为不向创作者支付适当费用的无限制内容共享违反了知识产权传统和法律。长期以来,作家、音乐家、艺术家和发明家一直依靠知识产权保护来控制对其创作和发明的使用。版权侵权,即侵犯版权的复制,威胁着他们从自己的创作中获得的收入。合理使用的概念在此类讨论中是一个关键问题,因为它允许版权的某些例外。其中一个领域受到了极大的关注,那就是音乐的数字复制和共享;我们将研究传统行为、道德、限制或阻止复制的技术干预、法律和法律之争以及产品和定价创新之间的相互作用。接下来,我们将看看电影领域的类似问题。虽然有有效且合法的流媒体服务,但仍存在侵犯版权的问题。版权所有者现在自动发出删除通知,要求网站删除非法或来源不当的材料。这样的通知包含许多错误,给视频创作者带来了额外的麻烦。对版权概念和法律的一个有趣挑战发生在mashup的创建过程中。艺术家利用现有音乐或视觉表演的片段以及他们自己的材料来创作结合多种内容来源的视听作品。艺术家、律师和商界人士都在争论这种混搭在多大程度上违反了合理的版权保护。版权对学术文章和教科书也很重要。有两个特别有趣的案例需要讨论。一是由于课本价格高昂,学生普遍抄袭课本。另一个是对政府资助的研究成果的出版进行公平定价。这个问题为开放获取出版物的创建提供了几个刺激因素之一。
{"title":"Digital media and intellectual property","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0007","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0007","url":null,"abstract":"Vannevar Bush envisioned a machine that would assist humanity in the creative work of writing. Doug Engelbart imagined the collaborative sharing and enhancement of knowledge. Digital media today—text, drawings, photos, audio, and video—surpass the visions of their pioneers. These media may be copied, shared, and modified in ways that challenge the legal system, because unrestricted content sharing without suitable payment to creators runs counter to intellectual property (IP) traditions and laws. Writers, musicians, artists, and inventors have long relied upon IP protection to enable them to control the use of their creations and inventions. Copyright infringement, that is, copying in violation of copyright, threatens the income that they could receive from their creations. The concept of fair use is a critical issue in such discussions, as it allows certain exceptions to copyright. One area that has received a great deal of attention is the digital copying and sharing of music; we shall examine the interplay between conventional behaviour, ethics, technical interventions to limit or block copying, laws and legal battles, and product and pricing innovation. Next, we shall look at similar issues in the domain of motion pictures. There are effective and legal streaming services, yet there are still concerns about copyright infringement. Copyright holders now automatically produce takedown notices to insist that websites remove illegally or improperly sourced material. Such notices include many errors, causing additional complications for video creators. One interesting challenge to the concept and laws of copyright occurs in the creation of mash-ups. Artists use fragments from existing musical or visual performances as well as their own material to create audio-visual works that combine multiple content sources. Artists, lawyers, and businesspeople debate the extent to which such mash-ups violate reasonable copyright protection. Copyright is also significant for academic articles and textbooks. There are two especially interesting cases to discuss. One is the widespread copying of textbooks by students due to the high price of texts. The other is the fair pricing of the publication of research results that have been funded by government grants. This issue has provided one of several stimuli to the creation of open access publications.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132684105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Afterword: Developments in autumn 2018 后记:2018年秋季的发展
Pub Date : 2019-04-24 DOI: 10.1093/oso/9780198827085.003.0021
R. Baecker
I sent this manuscript to Oxford University Press on 29 August 2018. The book emerged in April 2019. Much happened in the interim. I submitted this update on 4 January 2019, summarizing matters of consequence in autumn 2018, as well as important things I learned in that period. A recent Microsoft blog suggests that I was too positive in my portrayal of a shrinking digital divide. In the USA, 35 per cent of the population report they do not use broadband communications at home. Wikipedia continued to grow, fuelled in part by its foundation’s effort to engage underrepresented ‘emerging communities’. Battles in the USA over net neutrality intensified after the federal decision to abandon the policy. The state of California passed a tough net neutrality; the New York state attorney initiated an enquiry asking whether the federal decision had been swayed by millions of fraudulent comments. There were more innovations in sensory substitution to enable digital inclusion. At Caltech, researchers developed a system that allows blind people to receive an audio description of what is in their gaze: the objects appear to describe themselves in words. Women continued their struggle for equality and against gender discrimination in high-tech firms. Despite the importance of digital technologies for seniors to help combat loneliness, and to access banking and other online services, many are still digitally disengaged. Research shows that seniors perceive risk in being online, are reluctant to invest the time needed to gain and maintain digital proficiency, and are sometimes concerned that internet use would be inconsistent with their values, for example, the desire to support local stores. I was also too positive in my analysis of the impacts of sharing and stealing digital media and the power of digital media firms such as Google, Netflix, Facebook, and Amazon (see also the discussions of corporate concentration in Sections 12.9 and 14.12). Professor Jonathan Taplin has summarized how devastating these impacts have been, not just to digital media companies such as music and newspaper publishers, but to media creators such as composers and reporters. Consumer spending on recorded music dropped from almost US$20 billion in 1999 to US$7.5 billion in 2014.
我于2018年8月29日将此稿寄给牛津大学出版社。这本书于2019年4月出版。在此期间发生了很多事情。我于2019年1月4日提交了这份更新,总结了2018年秋季的重要事项,以及我在此期间学到的重要知识。微软最近的一篇博客表明,我对数字鸿沟缩小的描述过于乐观了。在美国,35%的人口报告说他们在家里不使用宽带通信。维基百科继续增长,部分原因是其基金会致力于吸引代表性不足的“新兴社区”。在联邦政府决定放弃网络中立政策后,美国围绕网络中立的斗争愈演愈烈。加利福尼亚州通过了严格的网络中立;纽约州检察官发起了一项调查,询问联邦政府的决定是否受到数百万欺诈性评论的影响。在感官替代方面有更多的创新,以实现数字包容。在加州理工学院,研究人员开发了一种系统,可以让盲人接收到他们所凝视的物体的音频描述:物体似乎用语言描述了自己。妇女继续在高科技公司争取平等和反对性别歧视。尽管数字技术在帮助老年人消除孤独感、获取银行和其他在线服务方面发挥了重要作用,但许多人仍然对数字脱节。研究表明,老年人意识到上网的风险,不愿意投入时间来获得和保持数字技能,有时还担心互联网的使用与他们的价值观不一致,例如,支持当地商店的愿望。在分析共享和窃取数字媒体的影响以及谷歌、Netflix、Facebook和亚马逊等数字媒体公司的力量时,我也过于乐观了(参见12.9节和14.12节中关于企业集中的讨论)。乔纳森·塔普林(Jonathan Taplin)教授总结了这些影响的破坏性,不仅是对音乐和报纸出版商等数字媒体公司,对作曲家和记者等媒体创作者也是如此。消费者在录制音乐上的支出从1999年的近200亿美元下降到2014年的75亿美元。
{"title":"Afterword: Developments in autumn 2018","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0021","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0021","url":null,"abstract":"I sent this manuscript to Oxford University Press on 29 August 2018. The book emerged in April 2019. Much happened in the interim. I submitted this update on 4 January 2019, summarizing matters of consequence in autumn 2018, as well as important things I learned in that period. A recent Microsoft blog suggests that I was too positive in my portrayal of a shrinking digital divide. In the USA, 35 per cent of the population report they do not use broadband communications at home. Wikipedia continued to grow, fuelled in part by its foundation’s effort to engage underrepresented ‘emerging communities’. Battles in the USA over net neutrality intensified after the federal decision to abandon the policy. The state of California passed a tough net neutrality; the New York state attorney initiated an enquiry asking whether the federal decision had been swayed by millions of fraudulent comments. There were more innovations in sensory substitution to enable digital inclusion. At Caltech, researchers developed a system that allows blind people to receive an audio description of what is in their gaze: the objects appear to describe themselves in words. Women continued their struggle for equality and against gender discrimination in high-tech firms. Despite the importance of digital technologies for seniors to help combat loneliness, and to access banking and other online services, many are still digitally disengaged. Research shows that seniors perceive risk in being online, are reluctant to invest the time needed to gain and maintain digital proficiency, and are sometimes concerned that internet use would be inconsistent with their values, for example, the desire to support local stores. I was also too positive in my analysis of the impacts of sharing and stealing digital media and the power of digital media firms such as Google, Netflix, Facebook, and Amazon (see also the discussions of corporate concentration in Sections 12.9 and 14.12). Professor Jonathan Taplin has summarized how devastating these impacts have been, not just to digital media companies such as music and newspaper publishers, but to media creators such as composers and reporters. Consumer spending on recorded music dropped from almost US$20 billion in 1999 to US$7.5 billion in 2014.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128071774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lifestyle 生活方式
Pub Date : 2019-04-24 DOI: 10.1093/oso/9780198827085.003.0019
R. Baecker
The widespread digitization of technologies, materials, and processes, and the constant use of the internet for communication and consumption, have led to dramatic changes in our lifestyle. We begin Chapter 12 with the internet and social media’s enabling people to better connect with family, friends, acquaintances, and communities. There can be more mutual awareness and closeness. Yet we may never be able to ‘unplug’; the line between work and play can become increasingly blurred. Having no down time is one manifestation of a broader corrosive phenomenon—technology or social media addiction. We shall see how a battle is being waged between those who want to engage us with more seductive user experiences, and those who would counsel a saner life in which technology and media play a more modest role. We then move from electronic communications to the physical world. We shall consider the effect of ubiquitous digital media, especially the so-called Internet of Things, in which almost all objects become digital. Such objects can sense people near them and general aspects of the world. They behave based on what they sense. One form of this is the rapid integration of voice assistants in everyday objects such as speakers and lamps. People can also transcend the real world by moving into virtual worlds, via augmented reality and virtual reality. The former allows the world to be enhanced with computer-generated visuals and sounds, while the latter allows immersion into worlds that are totally synthetic. We look at how people meet one another nowadays, and the increasingly important role of internet dating. For those who find intimacy or romance with people too challenging or insufficiently satisfying, and as robots become more and more lifelike, there are new opportunities for intimacy and for sexual satisfaction using sex robots, a development in which there are passionate advocates on both sides. How we do financial transactions is also changing. Cash is disappearing; money is becoming increasingly digital and intangible. Investors speculate in cryptocurrencies such as bitcoin, which are implemented with an ingenious secure networked digital ledger known as blockchain.
技术、材料和工艺的广泛数字化,以及互联网在交流和消费中的不断使用,导致了我们生活方式的巨大变化。我们从互联网和社交媒体让人们更好地与家人、朋友、熟人和社区联系开始。可以有更多的相互意识和亲密。然而,我们可能永远无法“拔掉插头”;工作和娱乐之间的界限变得越来越模糊。没有休息时间是一种更广泛的有害现象——科技或社交媒体成瘾——的表现之一。我们将看到一场斗争是如何展开的,一方希望用更诱人的用户体验吸引我们,另一方则建议我们过一种更理智的生活,在这种生活中,技术和媒体扮演更温和的角色。然后,我们从电子通信转向物理世界。我们将考虑无处不在的数字媒体的影响,特别是所谓的物联网,几乎所有的物体都变成了数字。这些物体可以感知附近的人以及世界的各个方面。他们的行为基于他们的感觉。其中一种形式是语音助手在扬声器和灯具等日常物品中的快速集成。人们也可以超越现实世界,通过增强现实和虚拟现实进入虚拟世界。前者可以通过计算机生成的视觉效果和声音来增强游戏世界,而后者则可以让玩家沉浸在完全人工合成的世界中。我们来看看现在人们是如何认识彼此的,以及网络约会日益重要的作用。对于那些觉得与人建立亲密关系或浪漫关系太有挑战性或不够满足的人来说,随着机器人变得越来越逼真,使用性爱机器人有了新的亲密关系和性满足的机会,这一发展在双方都有热情的倡导者。我们进行金融交易的方式也在发生变化。现金正在消失;金钱正变得越来越数字化和无形。投资者投机比特币等加密货币,这些货币是通过一种被称为区块链的巧妙的安全网络数字分类账实现的。
{"title":"Lifestyle","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0019","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0019","url":null,"abstract":"The widespread digitization of technologies, materials, and processes, and the constant use of the internet for communication and consumption, have led to dramatic changes in our lifestyle. We begin Chapter 12 with the internet and social media’s enabling people to better connect with family, friends, acquaintances, and communities. There can be more mutual awareness and closeness. Yet we may never be able to ‘unplug’; the line between work and play can become increasingly blurred. Having no down time is one manifestation of a broader corrosive phenomenon—technology or social media addiction. We shall see how a battle is being waged between those who want to engage us with more seductive user experiences, and those who would counsel a saner life in which technology and media play a more modest role. We then move from electronic communications to the physical world. We shall consider the effect of ubiquitous digital media, especially the so-called Internet of Things, in which almost all objects become digital. Such objects can sense people near them and general aspects of the world. They behave based on what they sense. One form of this is the rapid integration of voice assistants in everyday objects such as speakers and lamps. People can also transcend the real world by moving into virtual worlds, via augmented reality and virtual reality. The former allows the world to be enhanced with computer-generated visuals and sounds, while the latter allows immersion into worlds that are totally synthetic. We look at how people meet one another nowadays, and the increasingly important role of internet dating. For those who find intimacy or romance with people too challenging or insufficiently satisfying, and as robots become more and more lifelike, there are new opportunities for intimacy and for sexual satisfaction using sex robots, a development in which there are passionate advocates on both sides. How we do financial transactions is also changing. Cash is disappearing; money is becoming increasingly digital and intangible. Investors speculate in cryptocurrencies such as bitcoin, which are implemented with an ingenious secure networked digital ledger known as blockchain.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124999971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safety 安全
Pub Date : 2019-04-24 DOI: 10.1093/oso/9780198827085.003.0014
R. Baecker
Safety is often confused with security. A system or an environment may be secure, but if its normal operation does not achieve the intended goals, it may not be safe. Events will not progress as intended, and could go horribly wrong, even to the extent of grave injuries and loss of life. The more society relies upon digital technologies, the more we count on software to assure our safety. The issue of safety arises in a great variety of circumstances. Our discussion will start with dangers to the individual, then we will widen our focus to the organization, to society, and, finally, to the world. The digital divide that discourages internet use among older adults is due in part to threats posed to safe use of computers by ‘evil’ software such as programs that ‘phish’ for personal information, thereby gaining access to finances and committing identity theft, as we have discussed in the previous chapter. We shall enlarge upon this discussion by speaking of another risk—computer rage, which is caused by frustration when users cannot understand or manage the technology. Such instances are especially dangerous for senior citizens. We shall also discuss two ways in which the internet may not be safe for younger people: cyberbullying and revenge porn. We then examine a topic that arises in daily life: safety threats caused to pedestrians, bicyclists, and drivers by the continual use of distracting mobile devices. Our inability to control the costs of large-scale data processing implementations is a threat to the safety and health of organizations and governments, as is our inability to understand, modify, and fix large software systems that are no longer maintained by their creators. We shall describe several software disasters, both during their development and after they have been deployed and used. These include the software crisis at the turn of the century—the Y2K threat—which actually was averted, and several cases in which up to billions of dollars or pounds were wasted, including the decades-long saga of air traffic control in the USA.
安全常常与保安混淆。系统或环境可能是安全的,但如果其正常运行不能达到预期目标,则可能不安全。事件不会如预期的那样发展,可能会出现可怕的错误,甚至造成严重的伤害和生命损失。社会对数字技术的依赖程度越高,我们就越依赖软件来确保我们的安全。安全问题在各种各样的情况下都会出现。我们的讨论将从个人面临的危险开始,然后我们将把焦点扩大到组织、社会,最后是世界。数字鸿沟阻碍了老年人使用互联网,部分原因是由于“邪恶”软件对安全使用计算机构成了威胁,例如“网络钓鱼”获取个人信息的程序,从而获得财务和身份盗窃,正如我们在前一章所讨论的那样。我们将在此基础上进一步讨论另一种风险——计算机愤怒,即当用户无法理解或管理技术时产生的挫败感。这种情况对老年人尤其危险。我们还将讨论互联网对年轻人可能不安全的两种方式:网络欺凌和报复性色情。然后我们研究了一个在日常生活中出现的话题:持续使用分散注意力的移动设备对行人、骑自行车的人和司机造成的安全威胁。我们无法控制大规模数据处理实现的成本,这对组织和政府的安全和健康构成了威胁,就像我们无法理解、修改和修复那些不再由其创建者维护的大型软件系统一样。我们将描述几个软件灾难,包括在开发过程中以及部署和使用之后。其中包括世纪之交的软件危机——千年虫威胁——实际上得到了避免,还有几个浪费了数十亿美元或英镑的案例,包括美国长达数十年的空中交通管制传奇。
{"title":"Safety","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0014","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0014","url":null,"abstract":"Safety is often confused with security. A system or an environment may be secure, but if its normal operation does not achieve the intended goals, it may not be safe. Events will not progress as intended, and could go horribly wrong, even to the extent of grave injuries and loss of life. The more society relies upon digital technologies, the more we count on software to assure our safety. The issue of safety arises in a great variety of circumstances. Our discussion will start with dangers to the individual, then we will widen our focus to the organization, to society, and, finally, to the world. The digital divide that discourages internet use among older adults is due in part to threats posed to safe use of computers by ‘evil’ software such as programs that ‘phish’ for personal information, thereby gaining access to finances and committing identity theft, as we have discussed in the previous chapter. We shall enlarge upon this discussion by speaking of another risk—computer rage, which is caused by frustration when users cannot understand or manage the technology. Such instances are especially dangerous for senior citizens. We shall also discuss two ways in which the internet may not be safe for younger people: cyberbullying and revenge porn. We then examine a topic that arises in daily life: safety threats caused to pedestrians, bicyclists, and drivers by the continual use of distracting mobile devices. Our inability to control the costs of large-scale data processing implementations is a threat to the safety and health of organizations and governments, as is our inability to understand, modify, and fix large software systems that are no longer maintained by their creators. We shall describe several software disasters, both during their development and after they have been deployed and used. These include the software crisis at the turn of the century—the Y2K threat—which actually was averted, and several cases in which up to billions of dollars or pounds were wasted, including the decades-long saga of air traffic control in the USA.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130864437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automation, work, and jobs 自动化、工作和工作
Pub Date : 2019-04-24 DOI: 10.1093/oso/9780198827085.003.0017
R. Baecker
The effect of automation on employment and jobs has engaged thoughtful computer scientists and economists since the earliest days of computing. Yet there have been concerns about the effects of technology on employment since ancient times, and notably during the First Industrial Revolution in the nineteenth century by a group of workers known as the ‘Luddites’. Our first topic is the role of algorithms in enabling more efficient processing of job applicants and the selection of candidates to interview. This now includes the automatic filtering out of huge numbers of résumés that are never seen by human resource professionals. Next, we look at how technology is used in monitoring job performance, with the goal of encouraging or requiring enhanced performance. Oftentimes, these practices have the opposite effect, as it makes workers feel like ‘Big Brother’ is watching. Companies have long used contractors to provide flexibility in the availability of workers as well as to circumvent costs such as medical benefits and liabilities such as severance pay. This practice has recently changed dramatically: internet communication can now rapidly link seekers of services to providers of the services. This is typically called the gig economy or sharing economy, yet a better name is on-demand services. We shall then examine areas where automation threatens to replace human workers with machines. Fear is rampant, as typified by a 2017 New York Times article, ‘Will Robots Take Our Children’s Jobs?’ Between 2014 and 2016, future prospects were analysed in five scholarly books. We examine the phenomenon of unemployment by looking at specific areas: agriculture, manufacturing, service industries, and the professions. We highlight how new robotic technology, incorporating sensing, reasoning, and manipulating abilities, is enabling significant automation. Of particular importance is the extent to which new machine learning systems are enabling the automation of thinking and reasoning, which were previously considered infeasible for machines. Arguably the most interesting, challenging, and risky application is that of automatic diagnosis of disease, and, more speculatively, robot doctors.
自计算机诞生之初,自动化对就业和就业的影响就一直困扰着深思熟虑的计算机科学家和经济学家。然而,自古以来就有人担心技术对就业的影响,特别是在19世纪第一次工业革命期间,一群被称为“勒德分子”的工人。我们的第一个主题是算法在更有效地处理求职者和选择面试候选人方面的作用。现在,这包括自动过滤掉人力资源专业人士从未见过的大量的薪金和薪金。接下来,我们将了解如何使用技术来监控工作绩效,以鼓励或要求提高绩效。通常情况下,这些做法会产生相反的效果,因为这会让员工觉得“老大哥”在看着他们。长期以来,公司一直使用承包商来提供灵活的工人供应,并规避医疗福利等成本和遣散费等责任。这种做法最近发生了巨大变化:互联网通信现在可以迅速将寻求服务的人与服务的提供者联系起来。这通常被称为零工经济或共享经济,但更好的名字是按需服务。然后,我们将研究自动化有可能用机器取代人类工人的领域。恐惧无处不在,2017年《纽约时报》的一篇文章《机器人会抢走我们孩子的工作吗?》2014年至2016年间,五本学术书籍对未来前景进行了分析。我们通过观察特定领域来研究失业现象:农业、制造业、服务业和专业。我们强调新的机器人技术,包括传感、推理和操纵能力,是如何实现重要的自动化的。特别重要的是,新的机器学习系统在多大程度上实现了思考和推理的自动化,这在以前被认为是机器不可行的。可以说,最有趣、最具挑战性和最具风险的应用是疾病的自动诊断,更有可能是机器人医生。
{"title":"Automation, work, and jobs","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0017","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0017","url":null,"abstract":"The effect of automation on employment and jobs has engaged thoughtful computer scientists and economists since the earliest days of computing. Yet there have been concerns about the effects of technology on employment since ancient times, and notably during the First Industrial Revolution in the nineteenth century by a group of workers known as the ‘Luddites’. Our first topic is the role of algorithms in enabling more efficient processing of job applicants and the selection of candidates to interview. This now includes the automatic filtering out of huge numbers of résumés that are never seen by human resource professionals. Next, we look at how technology is used in monitoring job performance, with the goal of encouraging or requiring enhanced performance. Oftentimes, these practices have the opposite effect, as it makes workers feel like ‘Big Brother’ is watching. Companies have long used contractors to provide flexibility in the availability of workers as well as to circumvent costs such as medical benefits and liabilities such as severance pay. This practice has recently changed dramatically: internet communication can now rapidly link seekers of services to providers of the services. This is typically called the gig economy or sharing economy, yet a better name is on-demand services. We shall then examine areas where automation threatens to replace human workers with machines. Fear is rampant, as typified by a 2017 New York Times article, ‘Will Robots Take Our Children’s Jobs?’ Between 2014 and 2016, future prospects were analysed in five scholarly books. We examine the phenomenon of unemployment by looking at specific areas: agriculture, manufacturing, service industries, and the professions. We highlight how new robotic technology, incorporating sensing, reasoning, and manipulating abilities, is enabling significant automation. Of particular importance is the extent to which new machine learning systems are enabling the automation of thinking and reasoning, which were previously considered infeasible for machines. Arguably the most interesting, challenging, and risky application is that of automatic diagnosis of disease, and, more speculatively, robot doctors.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129787142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Free speech, politics, and government 言论自由、政治自由和政府自由
Pub Date : 2019-04-24 DOI: 10.1093/oso/9780198827085.003.0010
R. Baecker
Politics and government are undergoing dramatic changes through the advent of new technology. The early developers of community networks (mentioned in Section 1.2) had hopeful visions of information technology (IT)-facilitating participatory democracy. Yet the most memorable visions have been literary dystopias, where surveillance is omnipresent and governments have absolute control. We shall begin by highlighting some of these important writings. We shall then consider a current and present topic—the cultural and legal frameworks governing free speech and other forms of expression on the internet. We review several kinds of ‘undesirable’ speech that test our commitment to free speech—messages that are viewed as obscene, hateful, seditious, or encouraging of terrorism. Next, we examine methods governments worldwide use to censor web content and prevent digital transmission of messages of which they disapprove, as well as a similar role for social media firms in what is now known as content moderation. We shall also mention one new form of rampant and very harmful internet speech— fake news. Fake news becomes especially troubling when it is released into and retransmitted widely into filter bubbles that select these messages and echo chambers that focus and sensationalize such points of view to the exclusion of other contradictory ideas. The prevalence and dangers of fake news became obvious during post facto analyses of the 2016 US presidential campaign. The internet and social media enable greater civic participation, which is usually called e-democracy or civic tech. Most such uses of social media are relatively benign, as in online deliberations about the desired size of a bond issue, or internet lobbying to get libraries to stay open longer during the summer. However, for more significant issues, such as violations of fundamental human rights, or unpopular political decisions that incite public unrest, social media communications may facilitate political protest that can lead to political change. IT also plays a role in elections—social media can be used to mobilize the electorate and build enthusiasm for a candidate. Correspondingly, surveys and big data are used to target potential voters during political campaigns and to tailor specific messages to key voters.
由于新技术的出现,政治和政府正在发生巨大的变化。社区网络的早期开发者(在1.2节中提到)对信息技术(IT)抱有希望——促进参与性民主。然而,最令人难忘的景象是文学上的反乌托邦,在那里监视无处不在,政府拥有绝对控制权。我们将首先强调其中一些重要的著作。然后,我们将考虑当前和当前的主题——管理互联网上言论自由和其他形式表达的文化和法律框架。我们回顾了几种“不受欢迎的”言论,它们考验着我们对言论自由的承诺——被视为淫秽、仇恨、煽动性或鼓励恐怖主义的信息。接下来,我们研究了世界各国政府用来审查网络内容和防止他们不赞成的信息的数字传输的方法,以及社交媒体公司在现在被称为内容审核中的类似作用。我们还应该提到一种新的形式的猖獗和非常有害的网络言论-假新闻。当假新闻被释放并广泛传播到过滤气泡中,过滤气泡选择了这些信息和回音室,这些回音室聚焦并耸人听闻这些观点,而排除了其他矛盾的观点,假新闻就会变得特别令人不安。在对2016年美国总统竞选的事后分析中,假新闻的普遍性和危险性变得显而易见。互联网和社交媒体使更多的公民参与成为可能,这通常被称为电子民主或公民科技。社交媒体的大多数此类用途相对来说是良性的,比如在网上讨论债券发行的理想规模,或者在网上游说让图书馆在夏季延长开放时间。然而,对于更重大的问题,如侵犯基本人权或不受欢迎的政治决定引发公众动乱,社交媒体通信可能会促进政治抗议,从而导致政治变革。信息技术在选举中也发挥着作用——社交媒体可以用来动员选民,培养对候选人的热情。相应地,在政治竞选期间,调查和大数据被用来瞄准潜在选民,并为关键选民量身定制具体信息。
{"title":"Free speech, politics, and government","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0010","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0010","url":null,"abstract":"Politics and government are undergoing dramatic changes through the advent of new technology. The early developers of community networks (mentioned in Section 1.2) had hopeful visions of information technology (IT)-facilitating participatory democracy. Yet the most memorable visions have been literary dystopias, where surveillance is omnipresent and governments have absolute control. We shall begin by highlighting some of these important writings. We shall then consider a current and present topic—the cultural and legal frameworks governing free speech and other forms of expression on the internet. We review several kinds of ‘undesirable’ speech that test our commitment to free speech—messages that are viewed as obscene, hateful, seditious, or encouraging of terrorism. Next, we examine methods governments worldwide use to censor web content and prevent digital transmission of messages of which they disapprove, as well as a similar role for social media firms in what is now known as content moderation. We shall also mention one new form of rampant and very harmful internet speech— fake news. Fake news becomes especially troubling when it is released into and retransmitted widely into filter bubbles that select these messages and echo chambers that focus and sensationalize such points of view to the exclusion of other contradictory ideas. The prevalence and dangers of fake news became obvious during post facto analyses of the 2016 US presidential campaign. The internet and social media enable greater civic participation, which is usually called e-democracy or civic tech. Most such uses of social media are relatively benign, as in online deliberations about the desired size of a bond issue, or internet lobbying to get libraries to stay open longer during the summer. However, for more significant issues, such as violations of fundamental human rights, or unpopular political decisions that incite public unrest, social media communications may facilitate political protest that can lead to political change. IT also plays a role in elections—social media can be used to mobilize the electorate and build enthusiasm for a candidate. Correspondingly, surveys and big data are used to target potential voters during political campaigns and to tailor specific messages to key voters.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122121568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computers in medicine and health care 医学和卫生保健中的计算机
Pub Date : 2019-04-24 DOI: 10.1093/oso/9780198827085.003.0009
R. Baecker
As with the chapter on learning, we begin our discussion of health applications by examining influential early visions of the possible role of computers in improving health care and medicine. We then look at the great variety of roles played by current digital technologies in this field. We first consider the online availability of health information. There are two possible sources: one from respected centres of expertise, the other from consumers of medical care, that is, patients, who in working together form what may be viewed as communities of care. There is strong evidence that people are using these online medical resources to become more intelligent guardians of their own health and to support themselves when seeking help from physicians. Next, we examine the care improvements promised by personal health and electronic medical records. Progress here has been disappointingly slow; we shall discuss the mix of technical, cultural, administrative, interpersonal, and financial reasons for the sluggishness in development and deployment. Two particularly interesting cases of medical information are data dealing with adverse drug reactions and interactions, commonly known as adverse drug events (ADEs), and the use of big data and social media in epidemic surveillance and control, by which we are becoming better equipped to indicate, predict, and track outbreaks of disease. Computers have made a huge impact on medical education through the development of human body simulators. There also continue to be more and more advanced uses of technology embedded within the human body, either to augment the functioning of organs or to replace body parts that no longer work, which could possibly result in bionic people or androids in the future. We shall present some examples indicating the pace at which these technologies are developing. Recent advances in understanding the human genome have enabled a new form of medicine called precision medicine. The goal is to use genetic screening of patients to enable more specific treatments than were hitherto possible. Precision medicine also enables what some call designer babies. We shall introduce policy and ethical issues raised by this concept.
与学习这一章一样,我们通过研究计算机在改善医疗保健和医学方面可能发挥的作用的有影响力的早期愿景,开始讨论健康应用。然后我们看看当前数字技术在这一领域所扮演的各种各样的角色。我们首先考虑健康信息的在线可用性。有两种可能的来源:一种来自受人尊敬的专业知识中心,另一种来自医疗保健的消费者,即患者,他们共同努力形成了可被视为护理社区的东西。有强有力的证据表明,人们正在使用这些在线医疗资源,成为自己健康的更聪明的监护人,并在寻求医生帮助时支持自己。接下来,我们检查个人健康和电子医疗记录所承诺的护理改进。这里的进展缓慢得令人失望;我们将讨论开发和部署缓慢的技术、文化、管理、人际关系和财务原因。医疗信息的两个特别有趣的案例是处理药物不良反应和相互作用的数据,通常称为药物不良事件(ADEs),以及在流行病监测和控制中使用大数据和社交媒体,通过这些数据,我们可以更好地指示、预测和跟踪疾病的爆发。通过人体模拟器的开发,计算机对医学教育产生了巨大的影响。植入人体内的技术也有越来越多的先进用途,要么增强器官的功能,要么取代不再工作的身体部位,这可能会在未来产生仿生人或机器人。我们将举出一些例子来说明这些技术的发展速度。最近在了解人类基因组方面取得的进展使一种新的医学形式成为可能,这种医学被称为精准医学。目标是利用患者的基因筛选,使比迄今为止可能的更具体的治疗成为可能。精准医疗还使一些人所说的“设计婴儿”成为可能。我们将介绍这个概念所引起的政策和道德问题。
{"title":"Computers in medicine and health care","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0009","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0009","url":null,"abstract":"As with the chapter on learning, we begin our discussion of health applications by examining influential early visions of the possible role of computers in improving health care and medicine. We then look at the great variety of roles played by current digital technologies in this field. We first consider the online availability of health information. There are two possible sources: one from respected centres of expertise, the other from consumers of medical care, that is, patients, who in working together form what may be viewed as communities of care. There is strong evidence that people are using these online medical resources to become more intelligent guardians of their own health and to support themselves when seeking help from physicians. Next, we examine the care improvements promised by personal health and electronic medical records. Progress here has been disappointingly slow; we shall discuss the mix of technical, cultural, administrative, interpersonal, and financial reasons for the sluggishness in development and deployment. Two particularly interesting cases of medical information are data dealing with adverse drug reactions and interactions, commonly known as adverse drug events (ADEs), and the use of big data and social media in epidemic surveillance and control, by which we are becoming better equipped to indicate, predict, and track outbreaks of disease. Computers have made a huge impact on medical education through the development of human body simulators. There also continue to be more and more advanced uses of technology embedded within the human body, either to augment the functioning of organs or to replace body parts that no longer work, which could possibly result in bionic people or androids in the future. We shall present some examples indicating the pace at which these technologies are developing. Recent advances in understanding the human genome have enabled a new form of medicine called precision medicine. The goal is to use genetic screening of patients to enable more specific treatments than were hitherto possible. Precision medicine also enables what some call designer babies. We shall introduce policy and ethical issues raised by this concept.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129574579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computers in education and learning 计算机在教育和学习中的应用
Pub Date : 2019-04-24 DOI: 10.1093/oso/9780198827085.003.0008
R. Baecker
As we have already hinted, computers and the internet have made profound changes in how we learn. We begin this topic by reviewing influential visions and early prototypes suggesting how technology could revolutionize education. Early on, computers were used by educators to deliver online tutorials about subject material, administer drill-and-practice exercises on rote skills, act as supportive environ­ments for creatively exploring ideas through programming in English-like languages, and function as inexpensive, ubiquitous, and dynamic audio-visual resources. We shall then discuss other newer methods for using digital technologies to transform how students approach subject matter and how classrooms are organized. By using interactive simulation games, students learn by taking actions with respect to certain scenarios. Presentation aids such as PowerPoint and Prezi have replaced blackboards to present and elucidate concepts. Smart classrooms allow instructors and students access to technology that facilitates learning; inverted classrooms allow more effective use of class­room time by enabling students to prepare for lectures in advance and focus on working together with their teachers in class. Intelligent tutors are artificial intelligence (AI) programs that actively support student learning, diagnose student difficulties with the material, and then adapt tutoring strategies based on these findings. Next, we shall review how online learning has opened up new opportunities for adult and continuing education, whereby students can learn in their own time and at their own pace. The challenge online learning technology developers now face is to provide discussion forums, real-time chat capabilities, and methods for instructor feedback so that advantages of face-to-face interaction are not lost in web-based learning. Particularly exciting is the growth of worldwide learning communities via Massive Open Online Courses (MOOCs), an area of current expansion and creativity. While technology is now seen as instrumental in learning, there are still debates on the extent to which it should be used and how it should be used in education. A particularly prevalent dilemma is in middle and secondary schools. The issue is whether or not and how to encourage or disallow the use of mobile phones and other devices in classrooms.
正如我们已经暗示过的,计算机和互联网已经深刻地改变了我们的学习方式。我们通过回顾一些有影响力的愿景和早期的原型来开始这个话题,这些愿景和原型表明技术如何改变教育。早期,计算机被教育工作者用来提供关于主题材料的在线教程,管理死记硬背技能的操练和练习,作为通过类似英语的语言编程创造性地探索思想的支持性环境,以及作为廉价、无处不在和动态的视听资源。然后,我们将讨论其他使用数字技术来改变学生学习主题和教室组织方式的新方法。通过使用交互式模拟游戏,学生通过在特定场景中采取行动来学习。ppt和Prezi等演示辅助工具已经取代了黑板来展示和阐明概念。智能教室使教师和学生能够使用促进学习的技术;倒置教室可以更有效地利用课堂时间,使学生能够提前备课,并专注于课堂上与老师的合作。智能导师是一种人工智能(AI)程序,它积极支持学生的学习,诊断学生在材料上的困难,然后根据这些发现调整辅导策略。接下来,我们将回顾在线学习如何为成人和继续教育开辟了新的机会,学生可以在自己的时间和自己的节奏学习。在线学习技术开发人员现在面临的挑战是提供讨论论坛、实时聊天功能和讲师反馈方法,以便在基于网络的学习中不会失去面对面互动的优势。尤其令人兴奋的是,通过大规模开放在线课程(MOOCs),全球学习社区的增长,这是一个目前正在扩张和创新的领域。虽然技术现在被视为学习的工具,但在多大程度上应该使用它以及如何在教育中使用它仍然存在争议。一个特别普遍的困境是在初中和中学。问题是是否以及如何鼓励或禁止在教室里使用手机和其他设备。
{"title":"Computers in education and learning","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0008","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0008","url":null,"abstract":"As we have already hinted, computers and the internet have made profound changes in how we learn. We begin this topic by reviewing influential visions and early prototypes suggesting how technology could revolutionize education. Early on, computers were used by educators to deliver online tutorials about subject material, administer drill-and-practice exercises on rote skills, act as supportive environ­ments for creatively exploring ideas through programming in English-like languages, and function as inexpensive, ubiquitous, and dynamic audio-visual resources. We shall then discuss other newer methods for using digital technologies to transform how students approach subject matter and how classrooms are organized. By using interactive simulation games, students learn by taking actions with respect to certain scenarios. Presentation aids such as PowerPoint and Prezi have replaced blackboards to present and elucidate concepts. Smart classrooms allow instructors and students access to technology that facilitates learning; inverted classrooms allow more effective use of class­room time by enabling students to prepare for lectures in advance and focus on working together with their teachers in class. Intelligent tutors are artificial intelligence (AI) programs that actively support student learning, diagnose student difficulties with the material, and then adapt tutoring strategies based on these findings. Next, we shall review how online learning has opened up new opportunities for adult and continuing education, whereby students can learn in their own time and at their own pace. The challenge online learning technology developers now face is to provide discussion forums, real-time chat capabilities, and methods for instructor feedback so that advantages of face-to-face interaction are not lost in web-based learning. Particularly exciting is the growth of worldwide learning communities via Massive Open Online Courses (MOOCs), an area of current expansion and creativity. While technology is now seen as instrumental in learning, there are still debates on the extent to which it should be used and how it should be used in education. A particularly prevalent dilemma is in middle and secondary schools. The issue is whether or not and how to encourage or disallow the use of mobile phones and other devices in classrooms.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124331517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial intelligence, explanations, trust, responsibility, and justice 人工智能、解释、信任、责任和正义
Pub Date : 2019-04-24 DOI: 10.1093/oso/9780198827085.003.0018
R. Baecker
There have been several challenges to our view of our position and purpose as human beings. The scientist Charles Darwin’s research demonstrated evolutionary links between man and other animals. Psychoanalysis founder Sigmund Freud illuminated the power of the subconscious. Recent advances in artificial intelligence (AI) have challenged our identity as the species with the greatest ability to think. Whether machines can now ‘think’ is no longer interesting. What is important is to critically consider the degree to which they are called upon to make decisions and act in significant and often life-critical situations. We have already discussed the increasing roles of AI in intelligent tutoring, medicine, news stories and fake news, autonomous weapons, smart cars, and automation. Chapter 11 focuses on other ways in which our lives are changing because of advances in AI, and the accompanying opportunities and risks. AI has seen a paradigm shift since the year 2000. Prior to this, the focus was on knowledge representation and the modelling of human expertise in particular domains, in order to develop expert systems that could solve problems and carry out rudimentary tasks. Now, the focus is on the neural networks capable of machine learning (ML). The most successful approach is deep learning, whereby complex hierarchical assemblies of processing elements ‘learn’ using millions of samples of training data. They can then often make correct decisions in new situations. We shall also present a radical, and for most of us a scary, concept of AI with no limits—the technological singularity or superintelligence. Even though superintelligence is for now sciencefiction, humanity is asking if there is any limit to machine intelligence. We shall therefore discuss the social and ethical consequences of widespread use of ML algorithms. It is helpful in this analysis to better understand what intelligence is, so we present two insightful formulations of the concept developed by renowned psychologists.
我们对自己作为人类的地位和目的的看法受到了一些挑战。科学家查尔斯·达尔文的研究证明了人类和其他动物之间的进化联系。精神分析学创始人西格蒙德·弗洛伊德阐明了潜意识的力量。人工智能(AI)的最新进展挑战了人类作为最具思考能力物种的身份。机器现在是否会“思考”已经不再有趣了。重要的是要批判性地考虑他们在多大程度上被要求在重大的、往往是生命攸关的情况下做出决定和采取行动。我们已经讨论了人工智能在智能辅导、医学、新闻报道和假新闻、自主武器、智能汽车和自动化方面日益重要的作用。第11章关注的是由于人工智能的进步而改变我们生活的其他方式,以及随之而来的机遇和风险。自2000年以来,人工智能已经发生了范式转变。在此之前,重点是在特定领域的知识表示和人类专业知识的建模,以便开发能够解决问题和执行基本任务的专家系统。现在,重点是能够进行机器学习(ML)的神经网络。最成功的方法是深度学习,即处理元素的复杂分层组合使用数百万个训练数据样本进行“学习”。这样他们就能在新情况下做出正确的决定。我们还将提出一个激进的、对我们大多数人来说是可怕的、没有限制的人工智能概念——技术奇点或超级智能。尽管超级智能目前仍是科幻小说,但人类正在问,机器智能是否有任何限制。因此,我们将讨论广泛使用ML算法的社会和伦理后果。这种分析有助于更好地理解智力是什么,所以我们提出了由著名心理学家提出的两个有见地的概念。
{"title":"Artificial intelligence, explanations, trust, responsibility, and justice","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0018","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0018","url":null,"abstract":"There have been several challenges to our view of our position and purpose as human beings. The scientist Charles Darwin’s research demonstrated evolutionary links between man and other animals. Psychoanalysis founder Sigmund Freud illuminated the power of the subconscious. Recent advances in artificial intelligence (AI) have challenged our identity as the species with the greatest ability to think. Whether machines can now ‘think’ is no longer interesting. What is important is to critically consider the degree to which they are called upon to make decisions and act in significant and often life-critical situations. We have already discussed the increasing roles of AI in intelligent tutoring, medicine, news stories and fake news, autonomous weapons, smart cars, and automation. Chapter 11 focuses on other ways in which our lives are changing because of advances in AI, and the accompanying opportunities and risks. AI has seen a paradigm shift since the year 2000. Prior to this, the focus was on knowledge representation and the modelling of human expertise in particular domains, in order to develop expert systems that could solve problems and carry out rudimentary tasks. Now, the focus is on the neural networks capable of machine learning (ML). The most successful approach is deep learning, whereby complex hierarchical assemblies of processing elements ‘learn’ using millions of samples of training data. They can then often make correct decisions in new situations. We shall also present a radical, and for most of us a scary, concept of AI with no limits—the technological singularity or superintelligence. Even though superintelligence is for now sciencefiction, humanity is asking if there is any limit to machine intelligence. We shall therefore discuss the social and ethical consequences of widespread use of ML algorithms. It is helpful in this analysis to better understand what intelligence is, so we present two insightful formulations of the concept developed by renowned psychologists.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128718175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Computers and Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1