Fears about loss of privacy in computerized societies have been central to dystopian literature. The issue has also concerned thoughtful computer scientists and lawyers since the 1960s. By then, the scope of the computer revolution was making clear that governments and corporations could keep records about almost every aspect of our lives. As data storage became virtually limitless at trivial cost, effective uses of data grew, as did risks to personal privacy. We shall define privacy, look at its manifestations and roles, and discuss current and future threats to it. We shall introduce concepts that are key to understanding privacy, such as informed consent. A major concern is the threats to information privacy or data privacy, in which a person’s confidential information has errors or becomes exposed to people who should not be able to see or use it. We shall examine situations in which privacy can be invaded by governments, organizations, and individuals. Governments amass vast stores of personal data during the everyday course of administration and regulation. Government surveillance in many nations captures information that should be private, a topic we discussed in Chapter 6. Search engines, credit rating organizations, and insurance companies also gather huge amounts of data on consumers. When data is incorrect, or is hacked, there are serious implications for information privacy. Criminals seek to gain leverage by ferreting out computer-based data about personal financial transactions. Health information is a particularly sensitive area in which many people feel especially vulnerable. These are all ‘classical’ privacy concerns, the dangers of which were evident in the 1960s. New technologies have raised more concerns. Social media holds vast quantities of personal data that we have willingly disclosed, including information that could prove embarrassing later in life. A vivid example of a privacy breech was the Cambridge Analytica/Facebook scandal of 2018. New technologies raise new privacy concerns. Chips use GPS to track our location and movements. Recent advances in computer vision and the widespread deployment of video cameras enable face recognition. Chips located in the environment and embedded as sensors and prostheses in our bodies make our activities and even our moods accessible by others.
{"title":"Privacy","authors":"R. Baecker","doi":"10.32388/0ahz4m","DOIUrl":"https://doi.org/10.32388/0ahz4m","url":null,"abstract":"Fears about loss of privacy in computerized societies have been central to dystopian literature. The issue has also concerned thoughtful computer scientists and lawyers since the 1960s. By then, the scope of the computer revolution was making clear that governments and corporations could keep records about almost every aspect of our lives. As data storage became virtually limitless at trivial cost, effective uses of data grew, as did risks to personal privacy. We shall define privacy, look at its manifestations and roles, and discuss current and future threats to it. We shall introduce concepts that are key to understanding privacy, such as informed consent. A major concern is the threats to information privacy or data privacy, in which a person’s confidential information has errors or becomes exposed to people who should not be able to see or use it. We shall examine situations in which privacy can be invaded by governments, organizations, and individuals. Governments amass vast stores of personal data during the everyday course of administration and regulation. Government surveillance in many nations captures information that should be private, a topic we discussed in Chapter 6. Search engines, credit rating organizations, and insurance companies also gather huge amounts of data on consumers. When data is incorrect, or is hacked, there are serious implications for information privacy. Criminals seek to gain leverage by ferreting out computer-based data about personal financial transactions. Health information is a particularly sensitive area in which many people feel especially vulnerable. These are all ‘classical’ privacy concerns, the dangers of which were evident in the 1960s. New technologies have raised more concerns. Social media holds vast quantities of personal data that we have willingly disclosed, including information that could prove embarrassing later in life. A vivid example of a privacy breech was the Cambridge Analytica/Facebook scandal of 2018. New technologies raise new privacy concerns. Chips use GPS to track our location and movements. Recent advances in computer vision and the widespread deployment of video cameras enable face recognition. Chips located in the environment and embedded as sensors and prostheses in our bodies make our activities and even our moods accessible by others.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122513644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1093/oso/9780198827085.003.0007
R. Baecker
Vannevar Bush envisioned a machine that would assist humanity in the creative work of writing. Doug Engelbart imagined the collaborative sharing and enhancement of knowledge. Digital media today—text, drawings, photos, audio, and video—surpass the visions of their pioneers. These media may be copied, shared, and modified in ways that challenge the legal system, because unrestricted content sharing without suitable payment to creators runs counter to intellectual property (IP) traditions and laws. Writers, musicians, artists, and inventors have long relied upon IP protection to enable them to control the use of their creations and inventions. Copyright infringement, that is, copying in violation of copyright, threatens the income that they could receive from their creations. The concept of fair use is a critical issue in such discussions, as it allows certain exceptions to copyright. One area that has received a great deal of attention is the digital copying and sharing of music; we shall examine the interplay between conventional behaviour, ethics, technical interventions to limit or block copying, laws and legal battles, and product and pricing innovation. Next, we shall look at similar issues in the domain of motion pictures. There are effective and legal streaming services, yet there are still concerns about copyright infringement. Copyright holders now automatically produce takedown notices to insist that websites remove illegally or improperly sourced material. Such notices include many errors, causing additional complications for video creators. One interesting challenge to the concept and laws of copyright occurs in the creation of mash-ups. Artists use fragments from existing musical or visual performances as well as their own material to create audio-visual works that combine multiple content sources. Artists, lawyers, and businesspeople debate the extent to which such mash-ups violate reasonable copyright protection. Copyright is also significant for academic articles and textbooks. There are two especially interesting cases to discuss. One is the widespread copying of textbooks by students due to the high price of texts. The other is the fair pricing of the publication of research results that have been funded by government grants. This issue has provided one of several stimuli to the creation of open access publications.
{"title":"Digital media and intellectual property","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0007","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0007","url":null,"abstract":"Vannevar Bush envisioned a machine that would assist humanity in the creative work of writing. Doug Engelbart imagined the collaborative sharing and enhancement of knowledge. Digital media today—text, drawings, photos, audio, and video—surpass the visions of their pioneers. These media may be copied, shared, and modified in ways that challenge the legal system, because unrestricted content sharing without suitable payment to creators runs counter to intellectual property (IP) traditions and laws. Writers, musicians, artists, and inventors have long relied upon IP protection to enable them to control the use of their creations and inventions. Copyright infringement, that is, copying in violation of copyright, threatens the income that they could receive from their creations. The concept of fair use is a critical issue in such discussions, as it allows certain exceptions to copyright. One area that has received a great deal of attention is the digital copying and sharing of music; we shall examine the interplay between conventional behaviour, ethics, technical interventions to limit or block copying, laws and legal battles, and product and pricing innovation. Next, we shall look at similar issues in the domain of motion pictures. There are effective and legal streaming services, yet there are still concerns about copyright infringement. Copyright holders now automatically produce takedown notices to insist that websites remove illegally or improperly sourced material. Such notices include many errors, causing additional complications for video creators. One interesting challenge to the concept and laws of copyright occurs in the creation of mash-ups. Artists use fragments from existing musical or visual performances as well as their own material to create audio-visual works that combine multiple content sources. Artists, lawyers, and businesspeople debate the extent to which such mash-ups violate reasonable copyright protection. Copyright is also significant for academic articles and textbooks. There are two especially interesting cases to discuss. One is the widespread copying of textbooks by students due to the high price of texts. The other is the fair pricing of the publication of research results that have been funded by government grants. This issue has provided one of several stimuli to the creation of open access publications.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132684105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1093/oso/9780198827085.003.0021
R. Baecker
I sent this manuscript to Oxford University Press on 29 August 2018. The book emerged in April 2019. Much happened in the interim. I submitted this update on 4 January 2019, summarizing matters of consequence in autumn 2018, as well as important things I learned in that period. A recent Microsoft blog suggests that I was too positive in my portrayal of a shrinking digital divide. In the USA, 35 per cent of the population report they do not use broadband communications at home. Wikipedia continued to grow, fuelled in part by its foundation’s effort to engage underrepresented ‘emerging communities’. Battles in the USA over net neutrality intensified after the federal decision to abandon the policy. The state of California passed a tough net neutrality; the New York state attorney initiated an enquiry asking whether the federal decision had been swayed by millions of fraudulent comments. There were more innovations in sensory substitution to enable digital inclusion. At Caltech, researchers developed a system that allows blind people to receive an audio description of what is in their gaze: the objects appear to describe themselves in words. Women continued their struggle for equality and against gender discrimination in high-tech firms. Despite the importance of digital technologies for seniors to help combat loneliness, and to access banking and other online services, many are still digitally disengaged. Research shows that seniors perceive risk in being online, are reluctant to invest the time needed to gain and maintain digital proficiency, and are sometimes concerned that internet use would be inconsistent with their values, for example, the desire to support local stores. I was also too positive in my analysis of the impacts of sharing and stealing digital media and the power of digital media firms such as Google, Netflix, Facebook, and Amazon (see also the discussions of corporate concentration in Sections 12.9 and 14.12). Professor Jonathan Taplin has summarized how devastating these impacts have been, not just to digital media companies such as music and newspaper publishers, but to media creators such as composers and reporters. Consumer spending on recorded music dropped from almost US$20 billion in 1999 to US$7.5 billion in 2014.
{"title":"Afterword: Developments in autumn 2018","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0021","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0021","url":null,"abstract":"I sent this manuscript to Oxford University Press on 29 August 2018. The book emerged in April 2019. Much happened in the interim. I submitted this update on 4 January 2019, summarizing matters of consequence in autumn 2018, as well as important things I learned in that period. A recent Microsoft blog suggests that I was too positive in my portrayal of a shrinking digital divide. In the USA, 35 per cent of the population report they do not use broadband communications at home. Wikipedia continued to grow, fuelled in part by its foundation’s effort to engage underrepresented ‘emerging communities’. Battles in the USA over net neutrality intensified after the federal decision to abandon the policy. The state of California passed a tough net neutrality; the New York state attorney initiated an enquiry asking whether the federal decision had been swayed by millions of fraudulent comments. There were more innovations in sensory substitution to enable digital inclusion. At Caltech, researchers developed a system that allows blind people to receive an audio description of what is in their gaze: the objects appear to describe themselves in words. Women continued their struggle for equality and against gender discrimination in high-tech firms. Despite the importance of digital technologies for seniors to help combat loneliness, and to access banking and other online services, many are still digitally disengaged. Research shows that seniors perceive risk in being online, are reluctant to invest the time needed to gain and maintain digital proficiency, and are sometimes concerned that internet use would be inconsistent with their values, for example, the desire to support local stores. I was also too positive in my analysis of the impacts of sharing and stealing digital media and the power of digital media firms such as Google, Netflix, Facebook, and Amazon (see also the discussions of corporate concentration in Sections 12.9 and 14.12). Professor Jonathan Taplin has summarized how devastating these impacts have been, not just to digital media companies such as music and newspaper publishers, but to media creators such as composers and reporters. Consumer spending on recorded music dropped from almost US$20 billion in 1999 to US$7.5 billion in 2014.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128071774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1093/oso/9780198827085.003.0019
R. Baecker
The widespread digitization of technologies, materials, and processes, and the constant use of the internet for communication and consumption, have led to dramatic changes in our lifestyle. We begin Chapter 12 with the internet and social media’s enabling people to better connect with family, friends, acquaintances, and communities. There can be more mutual awareness and closeness. Yet we may never be able to ‘unplug’; the line between work and play can become increasingly blurred. Having no down time is one manifestation of a broader corrosive phenomenon—technology or social media addiction. We shall see how a battle is being waged between those who want to engage us with more seductive user experiences, and those who would counsel a saner life in which technology and media play a more modest role. We then move from electronic communications to the physical world. We shall consider the effect of ubiquitous digital media, especially the so-called Internet of Things, in which almost all objects become digital. Such objects can sense people near them and general aspects of the world. They behave based on what they sense. One form of this is the rapid integration of voice assistants in everyday objects such as speakers and lamps. People can also transcend the real world by moving into virtual worlds, via augmented reality and virtual reality. The former allows the world to be enhanced with computer-generated visuals and sounds, while the latter allows immersion into worlds that are totally synthetic. We look at how people meet one another nowadays, and the increasingly important role of internet dating. For those who find intimacy or romance with people too challenging or insufficiently satisfying, and as robots become more and more lifelike, there are new opportunities for intimacy and for sexual satisfaction using sex robots, a development in which there are passionate advocates on both sides. How we do financial transactions is also changing. Cash is disappearing; money is becoming increasingly digital and intangible. Investors speculate in cryptocurrencies such as bitcoin, which are implemented with an ingenious secure networked digital ledger known as blockchain.
{"title":"Lifestyle","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0019","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0019","url":null,"abstract":"The widespread digitization of technologies, materials, and processes, and the constant use of the internet for communication and consumption, have led to dramatic changes in our lifestyle. We begin Chapter 12 with the internet and social media’s enabling people to better connect with family, friends, acquaintances, and communities. There can be more mutual awareness and closeness. Yet we may never be able to ‘unplug’; the line between work and play can become increasingly blurred. Having no down time is one manifestation of a broader corrosive phenomenon—technology or social media addiction. We shall see how a battle is being waged between those who want to engage us with more seductive user experiences, and those who would counsel a saner life in which technology and media play a more modest role. We then move from electronic communications to the physical world. We shall consider the effect of ubiquitous digital media, especially the so-called Internet of Things, in which almost all objects become digital. Such objects can sense people near them and general aspects of the world. They behave based on what they sense. One form of this is the rapid integration of voice assistants in everyday objects such as speakers and lamps. People can also transcend the real world by moving into virtual worlds, via augmented reality and virtual reality. The former allows the world to be enhanced with computer-generated visuals and sounds, while the latter allows immersion into worlds that are totally synthetic. We look at how people meet one another nowadays, and the increasingly important role of internet dating. For those who find intimacy or romance with people too challenging or insufficiently satisfying, and as robots become more and more lifelike, there are new opportunities for intimacy and for sexual satisfaction using sex robots, a development in which there are passionate advocates on both sides. How we do financial transactions is also changing. Cash is disappearing; money is becoming increasingly digital and intangible. Investors speculate in cryptocurrencies such as bitcoin, which are implemented with an ingenious secure networked digital ledger known as blockchain.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124999971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1093/oso/9780198827085.003.0014
R. Baecker
Safety is often confused with security. A system or an environment may be secure, but if its normal operation does not achieve the intended goals, it may not be safe. Events will not progress as intended, and could go horribly wrong, even to the extent of grave injuries and loss of life. The more society relies upon digital technologies, the more we count on software to assure our safety. The issue of safety arises in a great variety of circumstances. Our discussion will start with dangers to the individual, then we will widen our focus to the organization, to society, and, finally, to the world. The digital divide that discourages internet use among older adults is due in part to threats posed to safe use of computers by ‘evil’ software such as programs that ‘phish’ for personal information, thereby gaining access to finances and committing identity theft, as we have discussed in the previous chapter. We shall enlarge upon this discussion by speaking of another risk—computer rage, which is caused by frustration when users cannot understand or manage the technology. Such instances are especially dangerous for senior citizens. We shall also discuss two ways in which the internet may not be safe for younger people: cyberbullying and revenge porn. We then examine a topic that arises in daily life: safety threats caused to pedestrians, bicyclists, and drivers by the continual use of distracting mobile devices. Our inability to control the costs of large-scale data processing implementations is a threat to the safety and health of organizations and governments, as is our inability to understand, modify, and fix large software systems that are no longer maintained by their creators. We shall describe several software disasters, both during their development and after they have been deployed and used. These include the software crisis at the turn of the century—the Y2K threat—which actually was averted, and several cases in which up to billions of dollars or pounds were wasted, including the decades-long saga of air traffic control in the USA.
{"title":"Safety","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0014","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0014","url":null,"abstract":"Safety is often confused with security. A system or an environment may be secure, but if its normal operation does not achieve the intended goals, it may not be safe. Events will not progress as intended, and could go horribly wrong, even to the extent of grave injuries and loss of life. The more society relies upon digital technologies, the more we count on software to assure our safety. The issue of safety arises in a great variety of circumstances. Our discussion will start with dangers to the individual, then we will widen our focus to the organization, to society, and, finally, to the world. The digital divide that discourages internet use among older adults is due in part to threats posed to safe use of computers by ‘evil’ software such as programs that ‘phish’ for personal information, thereby gaining access to finances and committing identity theft, as we have discussed in the previous chapter. We shall enlarge upon this discussion by speaking of another risk—computer rage, which is caused by frustration when users cannot understand or manage the technology. Such instances are especially dangerous for senior citizens. We shall also discuss two ways in which the internet may not be safe for younger people: cyberbullying and revenge porn. We then examine a topic that arises in daily life: safety threats caused to pedestrians, bicyclists, and drivers by the continual use of distracting mobile devices. Our inability to control the costs of large-scale data processing implementations is a threat to the safety and health of organizations and governments, as is our inability to understand, modify, and fix large software systems that are no longer maintained by their creators. We shall describe several software disasters, both during their development and after they have been deployed and used. These include the software crisis at the turn of the century—the Y2K threat—which actually was averted, and several cases in which up to billions of dollars or pounds were wasted, including the decades-long saga of air traffic control in the USA.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130864437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1093/oso/9780198827085.003.0017
R. Baecker
The effect of automation on employment and jobs has engaged thoughtful computer scientists and economists since the earliest days of computing. Yet there have been concerns about the effects of technology on employment since ancient times, and notably during the First Industrial Revolution in the nineteenth century by a group of workers known as the ‘Luddites’. Our first topic is the role of algorithms in enabling more efficient processing of job applicants and the selection of candidates to interview. This now includes the automatic filtering out of huge numbers of résumés that are never seen by human resource professionals. Next, we look at how technology is used in monitoring job performance, with the goal of encouraging or requiring enhanced performance. Oftentimes, these practices have the opposite effect, as it makes workers feel like ‘Big Brother’ is watching. Companies have long used contractors to provide flexibility in the availability of workers as well as to circumvent costs such as medical benefits and liabilities such as severance pay. This practice has recently changed dramatically: internet communication can now rapidly link seekers of services to providers of the services. This is typically called the gig economy or sharing economy, yet a better name is on-demand services. We shall then examine areas where automation threatens to replace human workers with machines. Fear is rampant, as typified by a 2017 New York Times article, ‘Will Robots Take Our Children’s Jobs?’ Between 2014 and 2016, future prospects were analysed in five scholarly books. We examine the phenomenon of unemployment by looking at specific areas: agriculture, manufacturing, service industries, and the professions. We highlight how new robotic technology, incorporating sensing, reasoning, and manipulating abilities, is enabling significant automation. Of particular importance is the extent to which new machine learning systems are enabling the automation of thinking and reasoning, which were previously considered infeasible for machines. Arguably the most interesting, challenging, and risky application is that of automatic diagnosis of disease, and, more speculatively, robot doctors.
{"title":"Automation, work, and jobs","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0017","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0017","url":null,"abstract":"The effect of automation on employment and jobs has engaged thoughtful computer scientists and economists since the earliest days of computing. Yet there have been concerns about the effects of technology on employment since ancient times, and notably during the First Industrial Revolution in the nineteenth century by a group of workers known as the ‘Luddites’. Our first topic is the role of algorithms in enabling more efficient processing of job applicants and the selection of candidates to interview. This now includes the automatic filtering out of huge numbers of résumés that are never seen by human resource professionals. Next, we look at how technology is used in monitoring job performance, with the goal of encouraging or requiring enhanced performance. Oftentimes, these practices have the opposite effect, as it makes workers feel like ‘Big Brother’ is watching. Companies have long used contractors to provide flexibility in the availability of workers as well as to circumvent costs such as medical benefits and liabilities such as severance pay. This practice has recently changed dramatically: internet communication can now rapidly link seekers of services to providers of the services. This is typically called the gig economy or sharing economy, yet a better name is on-demand services. We shall then examine areas where automation threatens to replace human workers with machines. Fear is rampant, as typified by a 2017 New York Times article, ‘Will Robots Take Our Children’s Jobs?’ Between 2014 and 2016, future prospects were analysed in five scholarly books. We examine the phenomenon of unemployment by looking at specific areas: agriculture, manufacturing, service industries, and the professions. We highlight how new robotic technology, incorporating sensing, reasoning, and manipulating abilities, is enabling significant automation. Of particular importance is the extent to which new machine learning systems are enabling the automation of thinking and reasoning, which were previously considered infeasible for machines. Arguably the most interesting, challenging, and risky application is that of automatic diagnosis of disease, and, more speculatively, robot doctors.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129787142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1093/oso/9780198827085.003.0010
R. Baecker
Politics and government are undergoing dramatic changes through the advent of new technology. The early developers of community networks (mentioned in Section 1.2) had hopeful visions of information technology (IT)-facilitating participatory democracy. Yet the most memorable visions have been literary dystopias, where surveillance is omnipresent and governments have absolute control. We shall begin by highlighting some of these important writings. We shall then consider a current and present topic—the cultural and legal frameworks governing free speech and other forms of expression on the internet. We review several kinds of ‘undesirable’ speech that test our commitment to free speech—messages that are viewed as obscene, hateful, seditious, or encouraging of terrorism. Next, we examine methods governments worldwide use to censor web content and prevent digital transmission of messages of which they disapprove, as well as a similar role for social media firms in what is now known as content moderation. We shall also mention one new form of rampant and very harmful internet speech— fake news. Fake news becomes especially troubling when it is released into and retransmitted widely into filter bubbles that select these messages and echo chambers that focus and sensationalize such points of view to the exclusion of other contradictory ideas. The prevalence and dangers of fake news became obvious during post facto analyses of the 2016 US presidential campaign. The internet and social media enable greater civic participation, which is usually called e-democracy or civic tech. Most such uses of social media are relatively benign, as in online deliberations about the desired size of a bond issue, or internet lobbying to get libraries to stay open longer during the summer. However, for more significant issues, such as violations of fundamental human rights, or unpopular political decisions that incite public unrest, social media communications may facilitate political protest that can lead to political change. IT also plays a role in elections—social media can be used to mobilize the electorate and build enthusiasm for a candidate. Correspondingly, surveys and big data are used to target potential voters during political campaigns and to tailor specific messages to key voters.
{"title":"Free speech, politics, and government","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0010","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0010","url":null,"abstract":"Politics and government are undergoing dramatic changes through the advent of new technology. The early developers of community networks (mentioned in Section 1.2) had hopeful visions of information technology (IT)-facilitating participatory democracy. Yet the most memorable visions have been literary dystopias, where surveillance is omnipresent and governments have absolute control. We shall begin by highlighting some of these important writings. We shall then consider a current and present topic—the cultural and legal frameworks governing free speech and other forms of expression on the internet. We review several kinds of ‘undesirable’ speech that test our commitment to free speech—messages that are viewed as obscene, hateful, seditious, or encouraging of terrorism. Next, we examine methods governments worldwide use to censor web content and prevent digital transmission of messages of which they disapprove, as well as a similar role for social media firms in what is now known as content moderation. We shall also mention one new form of rampant and very harmful internet speech— fake news. Fake news becomes especially troubling when it is released into and retransmitted widely into filter bubbles that select these messages and echo chambers that focus and sensationalize such points of view to the exclusion of other contradictory ideas. The prevalence and dangers of fake news became obvious during post facto analyses of the 2016 US presidential campaign. The internet and social media enable greater civic participation, which is usually called e-democracy or civic tech. Most such uses of social media are relatively benign, as in online deliberations about the desired size of a bond issue, or internet lobbying to get libraries to stay open longer during the summer. However, for more significant issues, such as violations of fundamental human rights, or unpopular political decisions that incite public unrest, social media communications may facilitate political protest that can lead to political change. IT also plays a role in elections—social media can be used to mobilize the electorate and build enthusiasm for a candidate. Correspondingly, surveys and big data are used to target potential voters during political campaigns and to tailor specific messages to key voters.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122121568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1093/oso/9780198827085.003.0009
R. Baecker
As with the chapter on learning, we begin our discussion of health applications by examining influential early visions of the possible role of computers in improving health care and medicine. We then look at the great variety of roles played by current digital technologies in this field. We first consider the online availability of health information. There are two possible sources: one from respected centres of expertise, the other from consumers of medical care, that is, patients, who in working together form what may be viewed as communities of care. There is strong evidence that people are using these online medical resources to become more intelligent guardians of their own health and to support themselves when seeking help from physicians. Next, we examine the care improvements promised by personal health and electronic medical records. Progress here has been disappointingly slow; we shall discuss the mix of technical, cultural, administrative, interpersonal, and financial reasons for the sluggishness in development and deployment. Two particularly interesting cases of medical information are data dealing with adverse drug reactions and interactions, commonly known as adverse drug events (ADEs), and the use of big data and social media in epidemic surveillance and control, by which we are becoming better equipped to indicate, predict, and track outbreaks of disease. Computers have made a huge impact on medical education through the development of human body simulators. There also continue to be more and more advanced uses of technology embedded within the human body, either to augment the functioning of organs or to replace body parts that no longer work, which could possibly result in bionic people or androids in the future. We shall present some examples indicating the pace at which these technologies are developing. Recent advances in understanding the human genome have enabled a new form of medicine called precision medicine. The goal is to use genetic screening of patients to enable more specific treatments than were hitherto possible. Precision medicine also enables what some call designer babies. We shall introduce policy and ethical issues raised by this concept.
{"title":"Computers in medicine and health care","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0009","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0009","url":null,"abstract":"As with the chapter on learning, we begin our discussion of health applications by examining influential early visions of the possible role of computers in improving health care and medicine. We then look at the great variety of roles played by current digital technologies in this field. We first consider the online availability of health information. There are two possible sources: one from respected centres of expertise, the other from consumers of medical care, that is, patients, who in working together form what may be viewed as communities of care. There is strong evidence that people are using these online medical resources to become more intelligent guardians of their own health and to support themselves when seeking help from physicians. Next, we examine the care improvements promised by personal health and electronic medical records. Progress here has been disappointingly slow; we shall discuss the mix of technical, cultural, administrative, interpersonal, and financial reasons for the sluggishness in development and deployment. Two particularly interesting cases of medical information are data dealing with adverse drug reactions and interactions, commonly known as adverse drug events (ADEs), and the use of big data and social media in epidemic surveillance and control, by which we are becoming better equipped to indicate, predict, and track outbreaks of disease. Computers have made a huge impact on medical education through the development of human body simulators. There also continue to be more and more advanced uses of technology embedded within the human body, either to augment the functioning of organs or to replace body parts that no longer work, which could possibly result in bionic people or androids in the future. We shall present some examples indicating the pace at which these technologies are developing. Recent advances in understanding the human genome have enabled a new form of medicine called precision medicine. The goal is to use genetic screening of patients to enable more specific treatments than were hitherto possible. Precision medicine also enables what some call designer babies. We shall introduce policy and ethical issues raised by this concept.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129574579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1093/oso/9780198827085.003.0008
R. Baecker
As we have already hinted, computers and the internet have made profound changes in how we learn. We begin this topic by reviewing influential visions and early prototypes suggesting how technology could revolutionize education. Early on, computers were used by educators to deliver online tutorials about subject material, administer drill-and-practice exercises on rote skills, act as supportive environments for creatively exploring ideas through programming in English-like languages, and function as inexpensive, ubiquitous, and dynamic audio-visual resources. We shall then discuss other newer methods for using digital technologies to transform how students approach subject matter and how classrooms are organized. By using interactive simulation games, students learn by taking actions with respect to certain scenarios. Presentation aids such as PowerPoint and Prezi have replaced blackboards to present and elucidate concepts. Smart classrooms allow instructors and students access to technology that facilitates learning; inverted classrooms allow more effective use of classroom time by enabling students to prepare for lectures in advance and focus on working together with their teachers in class. Intelligent tutors are artificial intelligence (AI) programs that actively support student learning, diagnose student difficulties with the material, and then adapt tutoring strategies based on these findings. Next, we shall review how online learning has opened up new opportunities for adult and continuing education, whereby students can learn in their own time and at their own pace. The challenge online learning technology developers now face is to provide discussion forums, real-time chat capabilities, and methods for instructor feedback so that advantages of face-to-face interaction are not lost in web-based learning. Particularly exciting is the growth of worldwide learning communities via Massive Open Online Courses (MOOCs), an area of current expansion and creativity. While technology is now seen as instrumental in learning, there are still debates on the extent to which it should be used and how it should be used in education. A particularly prevalent dilemma is in middle and secondary schools. The issue is whether or not and how to encourage or disallow the use of mobile phones and other devices in classrooms.
{"title":"Computers in education and learning","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0008","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0008","url":null,"abstract":"As we have already hinted, computers and the internet have made profound changes in how we learn. We begin this topic by reviewing influential visions and early prototypes suggesting how technology could revolutionize education. Early on, computers were used by educators to deliver online tutorials about subject material, administer drill-and-practice exercises on rote skills, act as supportive environments for creatively exploring ideas through programming in English-like languages, and function as inexpensive, ubiquitous, and dynamic audio-visual resources. We shall then discuss other newer methods for using digital technologies to transform how students approach subject matter and how classrooms are organized. By using interactive simulation games, students learn by taking actions with respect to certain scenarios. Presentation aids such as PowerPoint and Prezi have replaced blackboards to present and elucidate concepts. Smart classrooms allow instructors and students access to technology that facilitates learning; inverted classrooms allow more effective use of classroom time by enabling students to prepare for lectures in advance and focus on working together with their teachers in class. Intelligent tutors are artificial intelligence (AI) programs that actively support student learning, diagnose student difficulties with the material, and then adapt tutoring strategies based on these findings. Next, we shall review how online learning has opened up new opportunities for adult and continuing education, whereby students can learn in their own time and at their own pace. The challenge online learning technology developers now face is to provide discussion forums, real-time chat capabilities, and methods for instructor feedback so that advantages of face-to-face interaction are not lost in web-based learning. Particularly exciting is the growth of worldwide learning communities via Massive Open Online Courses (MOOCs), an area of current expansion and creativity. While technology is now seen as instrumental in learning, there are still debates on the extent to which it should be used and how it should be used in education. A particularly prevalent dilemma is in middle and secondary schools. The issue is whether or not and how to encourage or disallow the use of mobile phones and other devices in classrooms.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124331517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-24DOI: 10.1093/oso/9780198827085.003.0018
R. Baecker
There have been several challenges to our view of our position and purpose as human beings. The scientist Charles Darwin’s research demonstrated evolutionary links between man and other animals. Psychoanalysis founder Sigmund Freud illuminated the power of the subconscious. Recent advances in artificial intelligence (AI) have challenged our identity as the species with the greatest ability to think. Whether machines can now ‘think’ is no longer interesting. What is important is to critically consider the degree to which they are called upon to make decisions and act in significant and often life-critical situations. We have already discussed the increasing roles of AI in intelligent tutoring, medicine, news stories and fake news, autonomous weapons, smart cars, and automation. Chapter 11 focuses on other ways in which our lives are changing because of advances in AI, and the accompanying opportunities and risks. AI has seen a paradigm shift since the year 2000. Prior to this, the focus was on knowledge representation and the modelling of human expertise in particular domains, in order to develop expert systems that could solve problems and carry out rudimentary tasks. Now, the focus is on the neural networks capable of machine learning (ML). The most successful approach is deep learning, whereby complex hierarchical assemblies of processing elements ‘learn’ using millions of samples of training data. They can then often make correct decisions in new situations. We shall also present a radical, and for most of us a scary, concept of AI with no limits—the technological singularity or superintelligence. Even though superintelligence is for now sciencefiction, humanity is asking if there is any limit to machine intelligence. We shall therefore discuss the social and ethical consequences of widespread use of ML algorithms. It is helpful in this analysis to better understand what intelligence is, so we present two insightful formulations of the concept developed by renowned psychologists.
{"title":"Artificial intelligence, explanations, trust, responsibility, and justice","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0018","DOIUrl":"https://doi.org/10.1093/oso/9780198827085.003.0018","url":null,"abstract":"There have been several challenges to our view of our position and purpose as human beings. The scientist Charles Darwin’s research demonstrated evolutionary links between man and other animals. Psychoanalysis founder Sigmund Freud illuminated the power of the subconscious. Recent advances in artificial intelligence (AI) have challenged our identity as the species with the greatest ability to think. Whether machines can now ‘think’ is no longer interesting. What is important is to critically consider the degree to which they are called upon to make decisions and act in significant and often life-critical situations. We have already discussed the increasing roles of AI in intelligent tutoring, medicine, news stories and fake news, autonomous weapons, smart cars, and automation. Chapter 11 focuses on other ways in which our lives are changing because of advances in AI, and the accompanying opportunities and risks. AI has seen a paradigm shift since the year 2000. Prior to this, the focus was on knowledge representation and the modelling of human expertise in particular domains, in order to develop expert systems that could solve problems and carry out rudimentary tasks. Now, the focus is on the neural networks capable of machine learning (ML). The most successful approach is deep learning, whereby complex hierarchical assemblies of processing elements ‘learn’ using millions of samples of training data. They can then often make correct decisions in new situations. We shall also present a radical, and for most of us a scary, concept of AI with no limits—the technological singularity or superintelligence. Even though superintelligence is for now sciencefiction, humanity is asking if there is any limit to machine intelligence. We shall therefore discuss the social and ethical consequences of widespread use of ML algorithms. It is helpful in this analysis to better understand what intelligence is, so we present two insightful formulations of the concept developed by renowned psychologists.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128718175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}