knowt logo

Chapter 7: Impact of Computing

The World Wide Web

  • At its origins in the early 1960s, the World Wide Web was intended only for rapid and easy exchange of information within the scientific community.

  • The internet is a global connection of networks, while the World Wide Web is collection of information that is accessed via the Internet.

  • The uses of the internet are changing all the time and have changed forever how we do business and how people communicate.

Digital Divide

  • The digital divide is the difference in access to technology including access to computers and the internet.

  • Variables affect the digital divide:

    • Infrastructure—Some parts of the world do not have access to the internet.

    • Education—A person could have access to the internet but not have the education to use it.

    • Indifference—A person could have access to the internet but choose not to use it.

    • Cost—The cost of accessing the internet could make using it unaffordable.

Beneficial and Harmful Effects

  • A computing innovation can have both a beneficial and a harmful effect on societies, cultures, or economies.

  • An effect may be an impact, a result, or an outcome.

  • Beneficial and/or harmful effects are contextual and interpretive.

  • Identification includes both the classification of the effect as either beneficial or harmful and justification for that classification.

Human Bias

  • Computing innovations can reflect existing human bias.

  • Algorithms are helping people make decisions that can have extreme ramifications.

  • An algorithm can determine where to place police resources; it may decide who gets into a college or who will get a job.

  • Algorithms can be intentionally or unintentionally biased.

  • Algorithms can be used to determine starting salaries for large companies.

Crowdsourcing

  • Crowdsourcing is the practice of obtaining input or information from many people via the internet.

  • Crowdsourcing offers new models for connecting business with funding.

Citizen Science

  • Citizen science is scientific research using public participation in scientific research.

  • The research is conducted in whole or part by distributed individuals, many of whom may or may not be scientists.

  • They contribute relevant data to research using their own computing devices.

  • Since many of the contributors might not have scientific training, usually the data collected, although vast, are not necessarily technical.

Legal and Ethical Concerns

  • Material created on a computer is the intellectual property of the creator or organization.

  • Ease of access and distribution of digitized information raises intellectual property concerns regarding ownership, value, and use.

  • Algorithms on legitimate sharing sites have an obligation to safeguard intellectual property.

  • Sites do this by scanning for content that matches intellectual property and removing the illegally shared content from their site.

  • Computing innovations can raise legal and ethical concerns.

Safe Computing

  • Security is needed to protect the confidentiality, integrity, and availability of information.

  • Security protects that data from cyber attacks and hacking.

  • Privacy is the right to control data generated by one’s usage of computing innovations and restrict the flow of that data to third parties.

  • PII can be analyzed and processed by businesses and shared with other companies.

  • The information collected has enabled companies to gain insight into how to interact with customers better.

  • PII and other information can be used to enhance a user’s online experience.

  • PII can also be used to simplify making online purchases.

  • Cyber criminals are creative in their methods for stealing PII data.

  • Authentication measures protect devices and information from unauthorized access.

  • Multifactor authentication is a method of computer access control in which a user is granted access only after successfully presenting several pieces of evidence to an authentication mechanism, typically in at least two of the following categories:

    • Knowledge—something the user knows

    • Possession—something the user has

    • Inherence—something the user is

Encryption

  • To increase security, encryption is used.

  • Encryption uses cryptographic algorithms to encrypt data.

  • Encryption is the process of encoding data to prevent unauthorized access.

  • Decryption is the process of decoding the data.

  • Symmetric key encryption uses the same key for both encryption and decryption.

  • Public key encryption (also called asymmetric encryption) uses two keys—one private and one public.

Malware

  • Malware is malicious software intended to damage a computing system or take partial control or its operations.

  • Malware can be spread over email, executable files, instant messaging, social media, freeware, shareware, and many other methods.

Computer Viruses

  • Computer viruses are malicious programs that can copy themselves and gain access to a computer in an unauthorized way.

  • Viruses often perform some type of harmful activity on infected host computers.

  • Computer viruses often attach themselves to legitimate programs and start running independently on a computer.

Phishing

  • Phishing is a technique that directs users to unrelated sites that trick the user into giving personal data.

  • Phishing is a technique used by cyber criminals posing as a legitimate institution to lure individuals into providing sensitive data, such as PII, banking and credit card details, and passwords.

Keylogging

  • Keylogging is another method involving unauthorized access to a computer.

  • Keylogging is the use of a program to record every keystroke made by the computer user in order to gain fraudulent access to passwords and other confidential information.

Rogue Access Point

  • Data sent over public networks can be intercepted, analyzed, and modified.

  • One way that this can happen is through a rogue access point.

  • A rogue access point is a wireless access point that gives unauthorized access to secure networks.

I

Chapter 7: Impact of Computing

The World Wide Web

  • At its origins in the early 1960s, the World Wide Web was intended only for rapid and easy exchange of information within the scientific community.

  • The internet is a global connection of networks, while the World Wide Web is collection of information that is accessed via the Internet.

  • The uses of the internet are changing all the time and have changed forever how we do business and how people communicate.

Digital Divide

  • The digital divide is the difference in access to technology including access to computers and the internet.

  • Variables affect the digital divide:

    • Infrastructure—Some parts of the world do not have access to the internet.

    • Education—A person could have access to the internet but not have the education to use it.

    • Indifference—A person could have access to the internet but choose not to use it.

    • Cost—The cost of accessing the internet could make using it unaffordable.

Beneficial and Harmful Effects

  • A computing innovation can have both a beneficial and a harmful effect on societies, cultures, or economies.

  • An effect may be an impact, a result, or an outcome.

  • Beneficial and/or harmful effects are contextual and interpretive.

  • Identification includes both the classification of the effect as either beneficial or harmful and justification for that classification.

Human Bias

  • Computing innovations can reflect existing human bias.

  • Algorithms are helping people make decisions that can have extreme ramifications.

  • An algorithm can determine where to place police resources; it may decide who gets into a college or who will get a job.

  • Algorithms can be intentionally or unintentionally biased.

  • Algorithms can be used to determine starting salaries for large companies.

Crowdsourcing

  • Crowdsourcing is the practice of obtaining input or information from many people via the internet.

  • Crowdsourcing offers new models for connecting business with funding.

Citizen Science

  • Citizen science is scientific research using public participation in scientific research.

  • The research is conducted in whole or part by distributed individuals, many of whom may or may not be scientists.

  • They contribute relevant data to research using their own computing devices.

  • Since many of the contributors might not have scientific training, usually the data collected, although vast, are not necessarily technical.

Legal and Ethical Concerns

  • Material created on a computer is the intellectual property of the creator or organization.

  • Ease of access and distribution of digitized information raises intellectual property concerns regarding ownership, value, and use.

  • Algorithms on legitimate sharing sites have an obligation to safeguard intellectual property.

  • Sites do this by scanning for content that matches intellectual property and removing the illegally shared content from their site.

  • Computing innovations can raise legal and ethical concerns.

Safe Computing

  • Security is needed to protect the confidentiality, integrity, and availability of information.

  • Security protects that data from cyber attacks and hacking.

  • Privacy is the right to control data generated by one’s usage of computing innovations and restrict the flow of that data to third parties.

  • PII can be analyzed and processed by businesses and shared with other companies.

  • The information collected has enabled companies to gain insight into how to interact with customers better.

  • PII and other information can be used to enhance a user’s online experience.

  • PII can also be used to simplify making online purchases.

  • Cyber criminals are creative in their methods for stealing PII data.

  • Authentication measures protect devices and information from unauthorized access.

  • Multifactor authentication is a method of computer access control in which a user is granted access only after successfully presenting several pieces of evidence to an authentication mechanism, typically in at least two of the following categories:

    • Knowledge—something the user knows

    • Possession—something the user has

    • Inherence—something the user is

Encryption

  • To increase security, encryption is used.

  • Encryption uses cryptographic algorithms to encrypt data.

  • Encryption is the process of encoding data to prevent unauthorized access.

  • Decryption is the process of decoding the data.

  • Symmetric key encryption uses the same key for both encryption and decryption.

  • Public key encryption (also called asymmetric encryption) uses two keys—one private and one public.

Malware

  • Malware is malicious software intended to damage a computing system or take partial control or its operations.

  • Malware can be spread over email, executable files, instant messaging, social media, freeware, shareware, and many other methods.

Computer Viruses

  • Computer viruses are malicious programs that can copy themselves and gain access to a computer in an unauthorized way.

  • Viruses often perform some type of harmful activity on infected host computers.

  • Computer viruses often attach themselves to legitimate programs and start running independently on a computer.

Phishing

  • Phishing is a technique that directs users to unrelated sites that trick the user into giving personal data.

  • Phishing is a technique used by cyber criminals posing as a legitimate institution to lure individuals into providing sensitive data, such as PII, banking and credit card details, and passwords.

Keylogging

  • Keylogging is another method involving unauthorized access to a computer.

  • Keylogging is the use of a program to record every keystroke made by the computer user in order to gain fraudulent access to passwords and other confidential information.

Rogue Access Point

  • Data sent over public networks can be intercepted, analyzed, and modified.

  • One way that this can happen is through a rogue access point.

  • A rogue access point is a wireless access point that gives unauthorized access to secure networks.