SlideShare una empresa de Scribd logo
1 de 41
The Social ImplicationsThe Social Implications
of Computingof Computing
"The most profound technologies are"The most profound technologies are
those that disappear. They weavethose that disappear. They weave
themselves into the fabric of everyday lifethemselves into the fabric of everyday life
until they are indistinguishable from it.”until they are indistinguishable from it.”
-Mark Weiser, Xerox PARC-Mark Weiser, Xerox PARC
Computer Contributions toComputer Contributions to
SocietySociety
 E-mailE-mail
 Instant MessagingInstant Messaging
 The WebThe Web
 Cellular PhonesCellular Phones
 Video GamesVideo Games
Social Implications ofSocial Implications of
NetworkedNetworked
CommunicationsCommunications
Estimated Users on the 'Net asEstimated Users on the 'Net as
of March 1999of March 1999
 88.3 million in the US and Canada88.3 million in the US and Canada
 37.15 million in Europe37.15 million in Europe
 26.97 million in Asia26.97 million in Asia
 4.63 million in South America4.63 million in South America
 1.14 million in Africa1.14 million in Africa
The Internet as aThe Internet as a
Communications MediumCommunications Medium
 Electronic PublicationsElectronic Publications
 Library ArchivesLibrary Archives
 NewsgroupsNewsgroups
 EmailEmail
 AdvertisementsAdvertisements
 NewsNews
 P2P networksP2P networks
Public SpheresPublic Spheres
Prior NetworkedPrior Networked
Communication:Communication:
 Town HallTown Hall
 ChurchChurch
 Town SquareTown Square
Ensuing NetworkedEnsuing Networked
Communication:Communication:
 TelevisionTelevision
 NewsgroupsNewsgroups
 Online PollsOnline Polls
Virtual vs. ‘Real’ ResourcesVirtual vs. ‘Real’ Resources
 Online coursesOnline courses
 EmailEmail
 Research usingResearch using
search enginessearch engines
 Class discussionClass discussion
 Having coffee withHaving coffee with
a frienda friend
 A book which isA book which is
primary sourceprimary source
written by anwritten by an
expert in the fieldexpert in the field
Globalization vs. IsolationGlobalization vs. Isolation
 Share ideas withShare ideas with
the worldthe world
 Buy anything fromBuy anything from
anywhere,anywhere,
regardless ofregardless of
locationlocation
 Connect withConnect with
anyone in the worldanyone in the world
using 2 of yourusing 2 of your
sensessenses
 But will be taken withBut will be taken with
a grain of salta grain of salt
 Without experiencingWithout experiencing
any culture outsideany culture outside
the computer roomthe computer room
 As opposed toAs opposed to
meeting in person andmeeting in person and
communicating on allcommunicating on all
55
ConsCons
 Copyright infringementCopyright infringement
 AddictionAddiction
 Loss of social skillLoss of social skill
 InsecurityInsecurity
 DesensitizationDesensitization
ConclusionConclusion
 Great tool if not taken out of contextGreat tool if not taken out of context
Growth of, Access to, andGrowth of, Access to, and
Control of the InternetControl of the Internet
Extreme GrowthExtreme Growth
0
1
2
3
4
5
6
7
8
9
10
1971 1983 2003 2050
Computers on the ARPA/ Internet (in thousands)
Year 1971 1983 2003 2050
Number of
computers
25 1000
3000
(projection)
Who
knows?
Growth of the internetGrowth of the internet
 ARPANET - started by DoD toARPANET - started by DoD to
research networks (1969)research networks (1969)
 December 1995 - 16 million usersDecember 1995 - 16 million users
 Current:Current:
• According to NielsonAccording to Nielson
 580 million people worldwide now have580 million people worldwide now have
access to the internetaccess to the internet
 168.6 million attributed to the U.S168.6 million attributed to the U.S
The Top Five Most Popular Internet ActivitiesThe Top Five Most Popular Internet Activities
(Percent Of Internet Users)(Percent Of Internet Users)
1.1. E-mail and instant messagingE-mail and instant messaging 87.9%87.9%
2.2. Web surfing or browsingWeb surfing or browsing 76.3%76.3%
3.3. Buying onlineBuying online 48.9%48.9%
4.4. Finding entertainment informationFinding entertainment information 47.9%47.9%
5.5. Reading newsReading news 47.6%47.6%
(data from 2001)(data from 2001)
• Email usage has doubled in past threeEmail usage has doubled in past three
yearsyears
 3030  60 billion messages a year60 billion messages a year
 Another doubling expected by 2005Another doubling expected by 2005
Who controls the internetWho controls the internet
 Cyber crime definedCyber crime defined
• The dissemination of racist and xenophobicThe dissemination of racist and xenophobic
material through computer systemsmaterial through computer systems
 GovernmentsGovernments
• Citizens must use state-run ISPs in someCitizens must use state-run ISPs in some
countriescountries
 Blocked contentBlocked content
Who controls the internet (cont’d)Who controls the internet (cont’d)
 Parents and EmployersParents and Employers
• Cyber nannyCyber nanny
 Disallows graphic or violent imagesDisallows graphic or violent images
• PICSPICS
 Platform for Internet Content SelectionPlatform for Internet Content Selection
 Labels that discuss a sites contentLabels that discuss a sites content
Access to the InternetAccess to the Internet
 72.3% of Americans use the net72.3% of Americans use the net
• Others do not for lack of accessOthers do not for lack of access
 Not disinterestNot disinterest
 Men & WomenMen & Women
• Approx the same 74-70%Approx the same 74-70%
 Income and educational difsIncome and educational difs
• PhDs >85%PhDs >85% >$100k = 10 hrs>$100k = 10 hrs
vs.vs. vs.vs.
• High school 60%High school 60% <$30k = 4hrs<$30k = 4hrs
Here to stayHere to stay
 More people are using it dailyMore people are using it daily
 Look forward to equal access…Look forward to equal access…
After all, the Internet is for everyoneAfter all, the Internet is for everyone
(RFC 3721)(RFC 3721)
Gender related Issues ofGender related Issues of
ComputingComputing
Personal ExperiencePersonal Experience
 I was too quick toI was too quick to
judge.judge.
 Stereotyped.Stereotyped.
 Can such a biasedCan such a biased
stereotype bestereotype be
justified?justified?
Is there a Gender Gap?Is there a Gender Gap?
 After analyzingAfter analyzing
more than 1,000more than 1,000
research studies,research studies,
the Americanthe American
Association ofAssociation of
University WomenUniversity Women
(AAUW) has(AAUW) has
concluded thatconcluded that
when it comes towhen it comes to
technology, theretechnology, there
is an alarmingis an alarming
gender gap.gender gap.
StatisticsStatistics
 US population of menUS population of men
and women is 50:50.and women is 50:50.
 Tech jobs are growingTech jobs are growing
every year.every year.
 However womenHowever women
represent only 20% ofrepresent only 20% of
the Computer sciencethe Computer science
and engineering laborand engineering labor
force.force.
Where are all the Women?Where are all the Women?
So What?So What?
““The gender gap in computer science must beThe gender gap in computer science must be
eliminated for two reasons.eliminated for two reasons.
(1) The more obvious reason is to ensure that(1) The more obvious reason is to ensure that
fair and equal treatment is being provided to allfair and equal treatment is being provided to all
potential and current computer scientists.potential and current computer scientists.
(2) The less considered danger of the gender gap(2) The less considered danger of the gender gap
concerns the advancement of the field as aconcerns the advancement of the field as a
whole. By hindering half of the population aswhole. By hindering half of the population as
potential contributors, the field of computerpotential contributors, the field of computer
science decreases its chance of furtherscience decreases its chance of further
development.”development.”
Quoted from: http://www.expage.com/page/genderissues3
AnglesAngles
 Male-Dominated EnvironmentMale-Dominated Environment
-Are women being elbowed out?-Are women being elbowed out?
 DiscriminationDiscrimination
-HR playing favoritism?-HR playing favoritism?
 Image of ComputingImage of Computing
--Nerdy/Bad StereotypesNerdy/Bad Stereotypes
 Lack of Adequate HighLack of Adequate High
School/College PreparationSchool/College Preparation
-Do teachers-Do teachers
encourage/discourage females toencourage/discourage females to
pursue tech jobs?pursue tech jobs?
 Societal ImplicationsSocietal Implications
-Games-Games
-Role models-Role models
Lack of AdequateLack of Adequate
High School/College PreparationHigh School/College Preparation
 According to a study by theAccording to a study by the Research Foundation forResearch Foundation for
Improving the Representation of Women in the TechnologyImproving the Representation of Women in the Technology
Workforce,Workforce, the number of women who received CS bachelor'sthe number of women who received CS bachelor's
degrees, the number peaked in 1986 when womendegrees, the number peaked in 1986 when women
represented approximately 36% of the total number ofrepresented approximately 36% of the total number of
graduates. Since then numbers have only declined!graduates. Since then numbers have only declined!
 ““The gender gaps we see are evidenceThe gender gaps we see are evidence
that public schools are failing to fully preparethat public schools are failing to fully prepare
girls for the 21st century”.girls for the 21st century”.
 Concerned and embarrassed that womenConcerned and embarrassed that women
account for only 15 to 20 percent of theiraccount for only 15 to 20 percent of their
computer science majors, a number of topcomputer science majors, a number of top
colleges are looking for ways to attract more women tocolleges are looking for ways to attract more women to
careers in computers. They are adding courses that appeal tocareers in computers. They are adding courses that appeal to
women's strengths, creating mentoring programs and thinkingwomen's strengths, creating mentoring programs and thinking
harder about the gender gap.harder about the gender gap.
Societal ImplicationsSocietal Implications
- Childhood Development?- Childhood Development?
The Association for Computing Machinery'sThe Association for Computing Machinery's
Committee on Women in Computing (ACM-W) haveCommittee on Women in Computing (ACM-W) have
found that:found that:
 Role Models?Role Models? – “Fathers are more likely to be using– “Fathers are more likely to be using
computers in the home than mothers so you have thecomputers in the home than mothers so you have the
element of the role model”.element of the role model”.
 Self-confidence? - boys “exhibit higher computer self-Self-confidence? - boys “exhibit higher computer self-
confidence and a more positive attitude about computersconfidence and a more positive attitude about computers
than girls”.than girls”.
Societal ImplicationsSocietal Implications
- Video Games?- Video Games?
 Computer games, which often attract children toComputer games, which often attract children to
computers, are written by male programmers!computers, are written by male programmers!
 Generally these games consist of violence, killing andGenerally these games consist of violence, killing and
scoring points, all of which interest young boys . Thusscoring points, all of which interest young boys . Thus
girls, who are not engaged as much by these games, aregirls, who are not engaged as much by these games, are
less likely to follow this avenue into computer science.less likely to follow this avenue into computer science.
 Software produced specifically for girls?Software produced specifically for girls?
-Researchers and parents feel that so-called “pink”-Researchers and parents feel that so-called “pink”
software, such as Disney’s Princess Fashion Boutique andsoftware, such as Disney’s Princess Fashion Boutique and
Barbie Magic Hairstyler will teach girls the technology skillsBarbie Magic Hairstyler will teach girls the technology skills
and confidence building they need to narrow the digitaland confidence building they need to narrow the digital
gender gap.gender gap.
ConclusionConclusion
 As technology continues to expandAs technology continues to expand
nationally and internationally, it isnationally and internationally, it is
important that advances are equallyimportant that advances are equally
influenced by men and women.influenced by men and women.
 In order to reduce the Gender Gap, theIn order to reduce the Gender Gap, the
issue must be taken seriously. Schools,issue must be taken seriously. Schools,
video game manufacturers, and industriesvideo game manufacturers, and industries
must find a way to involve both genders.must find a way to involve both genders.
 Parents (mothers) must take an active rollParents (mothers) must take an active roll
in influencing and encouraging theirin influencing and encouraging their
daughters to pursue tech jobs/degrees.daughters to pursue tech jobs/degrees.
International IssuesInternational Issues
Issues of International BusinessIssues of International Business
 LanguageLanguage
 Time ZonesTime Zones
 Sharing of dataSharing of data
 Learning foreign Business PracticesLearning foreign Business Practices
 PresentationPresentation
LanguageLanguage
 Knowing a second languageKnowing a second language
• If not then a translator may be neededIf not then a translator may be needed
• Americans tend not to be multilingualAmericans tend not to be multilingual
 Translations may contain errorsTranslations may contain errors
TimeTime
 Time zone differencesTime zone differences
• Limited windows of communicationLimited windows of communication
 Email?Email?
• Not always a perfect solutionNot always a perfect solution
 Can be time intensiveCan be time intensive
 May not produce the best resultsMay not produce the best results
Sharing of DataSharing of Data
 Media of transport/ CommunicationMedia of transport/ Communication
• WANWAN
 Transfering projectsTransfering projects
 EmailsEmails
• Snail MailSnail Mail
Learning foreign BusinessLearning foreign Business
PracticesPractices
 Trying to treat international businessTrying to treat international business
partners like an american business is apartners like an american business is a
BAD idea...BAD idea...
• ““The appropriate ways of conducting businessThe appropriate ways of conducting business
and holding meetings vary from country toand holding meetings vary from country to
country and from culture to culture.”country and from culture to culture.”
 Good exampleGood example
• A meeting set for a certain time in China aA meeting set for a certain time in China a
person should be 15 minutes early andperson should be 15 minutes early and
preparingpreparing
• A meeting set for a certain time in MexicoA meeting set for a certain time in Mexico
might not actually start for an hour or twomight not actually start for an hour or two
Examples of Do’s and Dont’sExamples of Do’s and Dont’s
 GermanyGermany
• DoDo
 Knock before opening a closed door.Knock before opening a closed door.
• Don'tDon't
 Shake someone's hand while your otherShake someone's hand while your other
hand is in your pocket.hand is in your pocket.
Examples of Do’s and Dont’sExamples of Do’s and Dont’s
 FranceFrance
• DoDo
 Avoid calling your associates' personalAvoid calling your associates' personal
number for business related issues. If itnumber for business related issues. If it
cannot be avoided, do so before 9:00pm.cannot be avoided, do so before 9:00pm.
 For corporate letters or e-mail, use a veryFor corporate letters or e-mail, use a very
formal and business-like approach.formal and business-like approach.
• Don'tDon't
 Use first names during a business meeting.Use first names during a business meeting.
 Show up late for meetings.Show up late for meetings.
 Bring up business at the start of aBring up business at the start of a
dinner/meeting.dinner/meeting.
Examples of Do’s and Dont’sExamples of Do’s and Dont’s
 JapanJapan
• Forget it I don’t have enough time...Forget it I don’t have enough time...
LiteratureLiterature
 Books found @ barnesandnoble.comBooks found @ barnesandnoble.com
• Doing Business in ChinaDoing Business in China
• Business Korea: A Practical Guide toBusiness Korea: A Practical Guide to
Understanding South Korean Business CultureUnderstanding South Korean Business Culture
• International BusinessInternational Business
• International Business and Trade: Theory,International Business and Trade: Theory,
Practice, and PolicyPractice, and Policy
PresentationPresentation
 OrganizationOrganization
 AppearanceAppearance
 ““Be civil, neat and listen to what theyBe civil, neat and listen to what they
are saying. Since we areare saying. Since we are
representing our company, we needrepresenting our company, we need
to project the best image to ourto project the best image to our
customer.” –Ralph Flataucustomer.” –Ralph Flatau
ReferencesReferences
• http://www.zakon.org/robert/internet/timeline/
• http://www.isp-planet.com/research/
• Number of users: http://cyberatlas.internet.com/big_picture/geographics/article/0,,5911_1593591,00.html (feb
2003)
• IPv4: http://www.isoc.org/briefings/001/
• Crime: http://www.cyber-rights.org/cybercrime/
• Demographics: http://ccp.ucla.edu/pdf/UCLA-Internet-Report-2001.pdf
• Gov’t control: http://www.rferl.org/nca/special/enemies.html
• The map of the world: http://www.ipsos-reid.com/us/services/syndicated/dsp_face.cfm
• Armando Gomez. (2003, February 24). Business Travel Etiquette. [World Wide Web] Available:
http://www.askmen.com/money/career/20_career.html
• Flatau, Ralph. (2003, February 25). Infimed Inc Manager. [Email Interview]
• http://portal.acm.org/citation.cfm?id=320264<http://portal.acm.org/citation.cfm?
id=320264&;coll=portal&dl=ACM&CFID=8149335&CFTOKEN=12007127>&coll=portal&dl=ACM&CFID=8149
335&CFTOKEN=12007127
• Brainball: http://portal.acm.org/toc.cfm?id=604575<http://portal.acm.org/toc.cfm?
id=604575&;idx=J373&type=issue&coll=portal&dl=ACM&part=magazine&WantType=Magazines&title=interac
tions&CFID=8149042&CFTOKEN=44437748>&idx=J373&type=issue&coll=portal&dl=ACM&part=magazine&
WantType=Magazines&title=interactions&CFID=8149042&CFTOKEN=44437748
• Number of Cell Phone Customers: http://www.emc-
database.com/website.nsf/index/pr020319http://inventors.about.com/gi/dynamic/offsite.htm?site=
• http://www.pbs.org/internet/timeline/timeline%2Dtxt.html
• http://www.oreillynet.com/pub/a/wireless/2001/09/28/relay.html
References (Cont.)References (Cont.)
• http://www.acm.org/women/
• http://www.expage.com/page/genderissues3
• http://www.cpsr.org/program/gender/index.html
• http://www.pbs.org/newshour/bb/youth/jan-june99/gendergap_1-29.html
• http://www.iota.org/Winter00/gendergap.html
• http://www.ucalgary.ca/~northcot/380-2/lec12.html
• http://www.ucalgary.ca/%7Ekawwalsh/introduction.htm
• http://www.interweb-tech.com/nsmnet/docs/updated_numbers.htm
• http://www.anu.edu.au/people/Roger.Clarke/II/NetN3.html
• http://www.uclic.ucl.ac.uk/harold/srf/networked.pdf
• http://www.caul.edu.au/org/commsdoc.htm

Más contenido relacionado

La actualidad más candente

Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurancebdemchak
 
LO 02 Network Cabling.ppt
LO 02 Network Cabling.pptLO 02 Network Cabling.ppt
LO 02 Network Cabling.ppthailayhadush2
 
Robotic Process Automation
Robotic Process Automation Robotic Process Automation
Robotic Process Automation VenkateshBandi8
 
Fundamental of information technology
Fundamental of information technologyFundamental of information technology
Fundamental of information technologyBVP university
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 
Generative AI Risks & Concerns
Generative AI Risks & ConcernsGenerative AI Risks & Concerns
Generative AI Risks & ConcernsAjitesh Kumar
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptxssusere578aa
 
AI: Myth vs Reality (November 2017)
AI: Myth vs Reality (November 2017)AI: Myth vs Reality (November 2017)
AI: Myth vs Reality (November 2017)Julien SIMON
 
Philosophy of Artificial Intelligence
Philosophy of Artificial IntelligencePhilosophy of Artificial Intelligence
Philosophy of Artificial IntelligenceJuho Vaiste
 
Artificial intelligence (ai) and its impact to business
Artificial intelligence (ai) and its impact to businessArtificial intelligence (ai) and its impact to business
Artificial intelligence (ai) and its impact to businesspaul young cpa, cga
 
Automation Anywhere Control Room | Control Room Administration Tutorial | Edu...
Automation Anywhere Control Room | Control Room Administration Tutorial | Edu...Automation Anywhere Control Room | Control Room Administration Tutorial | Edu...
Automation Anywhere Control Room | Control Room Administration Tutorial | Edu...Edureka!
 
HCI LAB MANUAL
HCI LAB MANUAL HCI LAB MANUAL
HCI LAB MANUAL Um e Farwa
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Team Finland Future Watch
 
Social Context of Computing
Social Context of ComputingSocial Context of Computing
Social Context of ComputingUpekha Vandebona
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2MLG College of Learning, Inc
 

La actualidad más candente (20)

Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
Privacy act
Privacy actPrivacy act
Privacy act
 
LO 02 Network Cabling.ppt
LO 02 Network Cabling.pptLO 02 Network Cabling.ppt
LO 02 Network Cabling.ppt
 
Robotic Process Automation
Robotic Process Automation Robotic Process Automation
Robotic Process Automation
 
Fundamental of information technology
Fundamental of information technologyFundamental of information technology
Fundamental of information technology
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Generative AI Risks & Concerns
Generative AI Risks & ConcernsGenerative AI Risks & Concerns
Generative AI Risks & Concerns
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptx
 
AI: Myth vs Reality (November 2017)
AI: Myth vs Reality (November 2017)AI: Myth vs Reality (November 2017)
AI: Myth vs Reality (November 2017)
 
Philosophy of Artificial Intelligence
Philosophy of Artificial IntelligencePhilosophy of Artificial Intelligence
Philosophy of Artificial Intelligence
 
Artificial intelligence (ai) and its impact to business
Artificial intelligence (ai) and its impact to businessArtificial intelligence (ai) and its impact to business
Artificial intelligence (ai) and its impact to business
 
Automation Anywhere Control Room | Control Room Administration Tutorial | Edu...
Automation Anywhere Control Room | Control Room Administration Tutorial | Edu...Automation Anywhere Control Room | Control Room Administration Tutorial | Edu...
Automation Anywhere Control Room | Control Room Administration Tutorial | Edu...
 
HCI LAB MANUAL
HCI LAB MANUAL HCI LAB MANUAL
HCI LAB MANUAL
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
1 ICT in Society
1 ICT in Society1 ICT in Society
1 ICT in Society
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer Interaction
 
Emerging Technologies in IT
Emerging Technologies in ITEmerging Technologies in IT
Emerging Technologies in IT
 
Social Context of Computing
Social Context of ComputingSocial Context of Computing
Social Context of Computing
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
 

Destacado (16)

Presentacion jorge peñalver medios alternos SAIA I
Presentacion jorge peñalver medios alternos SAIA IPresentacion jorge peñalver medios alternos SAIA I
Presentacion jorge peñalver medios alternos SAIA I
 
All About Dental Implants
All About Dental ImplantsAll About Dental Implants
All About Dental Implants
 
Contract law intermediate level
Contract law intermediate level Contract law intermediate level
Contract law intermediate level
 
Audience feedback summary
Audience feedback summaryAudience feedback summary
Audience feedback summary
 
Mediacion
MediacionMediacion
Mediacion
 
Lección 8. recursos contra la sentencia(1)
Lección 8. recursos contra la sentencia(1)Lección 8. recursos contra la sentencia(1)
Lección 8. recursos contra la sentencia(1)
 
Boe a-2017-2778
Boe a-2017-2778Boe a-2017-2778
Boe a-2017-2778
 
Lección 7. proceso ordinario de declaración de nulidad de matrimonio, parte...
Lección 7. proceso ordinario de declaración de nulidad de matrimonio, parte...Lección 7. proceso ordinario de declaración de nulidad de matrimonio, parte...
Lección 7. proceso ordinario de declaración de nulidad de matrimonio, parte...
 
VR for change
VR for changeVR for change
VR for change
 
Eclipse Kura Shoot a-pi
Eclipse Kura Shoot a-piEclipse Kura Shoot a-pi
Eclipse Kura Shoot a-pi
 
Soluciones examen tipo 2ºBach
Soluciones examen tipo 2ºBachSoluciones examen tipo 2ºBach
Soluciones examen tipo 2ºBach
 
Xiii material viernes 24 de marzo del 2017
Xiii material viernes 24 de marzo del 2017Xiii material viernes 24 de marzo del 2017
Xiii material viernes 24 de marzo del 2017
 
Teacch conducta
Teacch conductaTeacch conducta
Teacch conducta
 
The Anatomy of a Design Argument
The Anatomy of a Design ArgumentThe Anatomy of a Design Argument
The Anatomy of a Design Argument
 
Крушунските водопади
Крушунските водопадиКрушунските водопади
Крушунските водопади
 
Las peores excusas para no tirar los trastos
Las peores excusas para no tirar los trastosLas peores excusas para no tirar los trastos
Las peores excusas para no tirar los trastos
 

Similar a The social-implications-of-computing

Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Esam Abulkhirat
 
Evolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge OrganisationEvolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge OrganisationCollabor8now Ltd
 
Internet, People, Information and Knowledge
Internet, People, Information and KnowledgeInternet, People, Information and Knowledge
Internet, People, Information and KnowledgeClaudio Laferla
 
World of Social Hardware
World of Social HardwareWorld of Social Hardware
World of Social HardwareEngauge
 
Social Interaction within 10 yrs considering the Impact of Technology on Huma...
Social Interaction within 10 yrs considering the Impact of Technology on Huma...Social Interaction within 10 yrs considering the Impact of Technology on Huma...
Social Interaction within 10 yrs considering the Impact of Technology on Huma...Rahul Puranik
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital DivideDeniz Cengiz
 
12. WHY THE FUTURE DOES NOT NEED US.pptx
12. WHY THE FUTURE DOES NOT NEED US.pptx12. WHY THE FUTURE DOES NOT NEED US.pptx
12. WHY THE FUTURE DOES NOT NEED US.pptxArmut1
 
Creating the Future: Tomorrow's World: a Smart Strategy for Human Evolution
Creating the Future: Tomorrow's World: a Smart Strategy for Human EvolutionCreating the Future: Tomorrow's World: a Smart Strategy for Human Evolution
Creating the Future: Tomorrow's World: a Smart Strategy for Human EvolutionAzamat Abdoullaev
 
The State Of Cyber Security & What We Might Do About It
The State Of Cyber Security & What We Might Do About ItThe State Of Cyber Security & What We Might Do About It
The State Of Cyber Security & What We Might Do About ItJane Frankland
 
Melki, Jad - Myths and tensions of digital age
Melki, Jad - Myths and tensions of digital ageMelki, Jad - Myths and tensions of digital age
Melki, Jad - Myths and tensions of digital ageSalzburg Global Seminar
 
Facing the future of technology and learning mizzou jan 2022
Facing the future of technology and learning mizzou jan 2022Facing the future of technology and learning mizzou jan 2022
Facing the future of technology and learning mizzou jan 2022Maria H. Andersen
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty PresentationRay Brannon
 
Why LLMs should be handled with care
Why LLMs should be handled with careWhy LLMs should be handled with care
Why LLMs should be handled with careSpeck&Tech
 
All In: The Internet's Turbulent Next Decade
All In: The Internet's Turbulent Next DecadeAll In: The Internet's Turbulent Next Decade
All In: The Internet's Turbulent Next DecadeCynthia G. Wagner
 
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech oneHeavy, Messy, Misleading: why Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech onePulsar
 
Tech and Internet Industry News
Tech and Internet Industry NewsTech and Internet Industry News
Tech and Internet Industry Newsluxuriantcushio33
 

Similar a The social-implications-of-computing (20)

Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
NTXISSACSC4 - World of Discovery
NTXISSACSC4 - World of DiscoveryNTXISSACSC4 - World of Discovery
NTXISSACSC4 - World of Discovery
 
Evolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge OrganisationEvolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge Organisation
 
Internet, People, Information and Knowledge
Internet, People, Information and KnowledgeInternet, People, Information and Knowledge
Internet, People, Information and Knowledge
 
World of Social Hardware
World of Social HardwareWorld of Social Hardware
World of Social Hardware
 
Social Interaction within 10 yrs considering the Impact of Technology on Huma...
Social Interaction within 10 yrs considering the Impact of Technology on Huma...Social Interaction within 10 yrs considering the Impact of Technology on Huma...
Social Interaction within 10 yrs considering the Impact of Technology on Huma...
 
ES_16 Author- Niyati Khandelwal
ES_16 Author- Niyati KhandelwalES_16 Author- Niyati Khandelwal
ES_16 Author- Niyati Khandelwal
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital Divide
 
12. WHY THE FUTURE DOES NOT NEED US.pptx
12. WHY THE FUTURE DOES NOT NEED US.pptx12. WHY THE FUTURE DOES NOT NEED US.pptx
12. WHY THE FUTURE DOES NOT NEED US.pptx
 
Creating the Future: Tomorrow's World: a Smart Strategy for Human Evolution
Creating the Future: Tomorrow's World: a Smart Strategy for Human EvolutionCreating the Future: Tomorrow's World: a Smart Strategy for Human Evolution
Creating the Future: Tomorrow's World: a Smart Strategy for Human Evolution
 
The State Of Cyber Security & What We Might Do About It
The State Of Cyber Security & What We Might Do About ItThe State Of Cyber Security & What We Might Do About It
The State Of Cyber Security & What We Might Do About It
 
Melki, Jad - Myths and tensions of digital age
Melki, Jad - Myths and tensions of digital ageMelki, Jad - Myths and tensions of digital age
Melki, Jad - Myths and tensions of digital age
 
Facing the future of technology and learning mizzou jan 2022
Facing the future of technology and learning mizzou jan 2022Facing the future of technology and learning mizzou jan 2022
Facing the future of technology and learning mizzou jan 2022
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
Why LLMs should be handled with care
Why LLMs should be handled with careWhy LLMs should be handled with care
Why LLMs should be handled with care
 
The internet’s turbulent next decade
The internet’s turbulent next decadeThe internet’s turbulent next decade
The internet’s turbulent next decade
 
All In: The Internet's Turbulent Next Decade
All In: The Internet's Turbulent Next DecadeAll In: The Internet's Turbulent Next Decade
All In: The Internet's Turbulent Next Decade
 
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech oneHeavy, Messy, Misleading: why Big Data is a human problem, not a tech one
Heavy, Messy, Misleading: why Big Data is a human problem, not a tech one
 
Tech and Internet Industry News
Tech and Internet Industry NewsTech and Internet Industry News
Tech and Internet Industry News
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Último (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

The social-implications-of-computing

  • 1. The Social ImplicationsThe Social Implications of Computingof Computing "The most profound technologies are"The most profound technologies are those that disappear. They weavethose that disappear. They weave themselves into the fabric of everyday lifethemselves into the fabric of everyday life until they are indistinguishable from it.”until they are indistinguishable from it.” -Mark Weiser, Xerox PARC-Mark Weiser, Xerox PARC
  • 2. Computer Contributions toComputer Contributions to SocietySociety  E-mailE-mail  Instant MessagingInstant Messaging  The WebThe Web  Cellular PhonesCellular Phones  Video GamesVideo Games
  • 3. Social Implications ofSocial Implications of NetworkedNetworked CommunicationsCommunications
  • 4. Estimated Users on the 'Net asEstimated Users on the 'Net as of March 1999of March 1999  88.3 million in the US and Canada88.3 million in the US and Canada  37.15 million in Europe37.15 million in Europe  26.97 million in Asia26.97 million in Asia  4.63 million in South America4.63 million in South America  1.14 million in Africa1.14 million in Africa
  • 5. The Internet as aThe Internet as a Communications MediumCommunications Medium  Electronic PublicationsElectronic Publications  Library ArchivesLibrary Archives  NewsgroupsNewsgroups  EmailEmail  AdvertisementsAdvertisements  NewsNews  P2P networksP2P networks
  • 6. Public SpheresPublic Spheres Prior NetworkedPrior Networked Communication:Communication:  Town HallTown Hall  ChurchChurch  Town SquareTown Square Ensuing NetworkedEnsuing Networked Communication:Communication:  TelevisionTelevision  NewsgroupsNewsgroups  Online PollsOnline Polls
  • 7. Virtual vs. ‘Real’ ResourcesVirtual vs. ‘Real’ Resources  Online coursesOnline courses  EmailEmail  Research usingResearch using search enginessearch engines  Class discussionClass discussion  Having coffee withHaving coffee with a frienda friend  A book which isA book which is primary sourceprimary source written by anwritten by an expert in the fieldexpert in the field
  • 8. Globalization vs. IsolationGlobalization vs. Isolation  Share ideas withShare ideas with the worldthe world  Buy anything fromBuy anything from anywhere,anywhere, regardless ofregardless of locationlocation  Connect withConnect with anyone in the worldanyone in the world using 2 of yourusing 2 of your sensessenses  But will be taken withBut will be taken with a grain of salta grain of salt  Without experiencingWithout experiencing any culture outsideany culture outside the computer roomthe computer room  As opposed toAs opposed to meeting in person andmeeting in person and communicating on allcommunicating on all 55
  • 9. ConsCons  Copyright infringementCopyright infringement  AddictionAddiction  Loss of social skillLoss of social skill  InsecurityInsecurity  DesensitizationDesensitization
  • 10. ConclusionConclusion  Great tool if not taken out of contextGreat tool if not taken out of context
  • 11. Growth of, Access to, andGrowth of, Access to, and Control of the InternetControl of the Internet
  • 12. Extreme GrowthExtreme Growth 0 1 2 3 4 5 6 7 8 9 10 1971 1983 2003 2050 Computers on the ARPA/ Internet (in thousands) Year 1971 1983 2003 2050 Number of computers 25 1000 3000 (projection) Who knows?
  • 13. Growth of the internetGrowth of the internet  ARPANET - started by DoD toARPANET - started by DoD to research networks (1969)research networks (1969)  December 1995 - 16 million usersDecember 1995 - 16 million users  Current:Current: • According to NielsonAccording to Nielson  580 million people worldwide now have580 million people worldwide now have access to the internetaccess to the internet  168.6 million attributed to the U.S168.6 million attributed to the U.S
  • 14. The Top Five Most Popular Internet ActivitiesThe Top Five Most Popular Internet Activities (Percent Of Internet Users)(Percent Of Internet Users) 1.1. E-mail and instant messagingE-mail and instant messaging 87.9%87.9% 2.2. Web surfing or browsingWeb surfing or browsing 76.3%76.3% 3.3. Buying onlineBuying online 48.9%48.9% 4.4. Finding entertainment informationFinding entertainment information 47.9%47.9% 5.5. Reading newsReading news 47.6%47.6% (data from 2001)(data from 2001) • Email usage has doubled in past threeEmail usage has doubled in past three yearsyears  3030  60 billion messages a year60 billion messages a year  Another doubling expected by 2005Another doubling expected by 2005
  • 15. Who controls the internetWho controls the internet  Cyber crime definedCyber crime defined • The dissemination of racist and xenophobicThe dissemination of racist and xenophobic material through computer systemsmaterial through computer systems  GovernmentsGovernments • Citizens must use state-run ISPs in someCitizens must use state-run ISPs in some countriescountries  Blocked contentBlocked content
  • 16. Who controls the internet (cont’d)Who controls the internet (cont’d)  Parents and EmployersParents and Employers • Cyber nannyCyber nanny  Disallows graphic or violent imagesDisallows graphic or violent images • PICSPICS  Platform for Internet Content SelectionPlatform for Internet Content Selection  Labels that discuss a sites contentLabels that discuss a sites content
  • 17. Access to the InternetAccess to the Internet  72.3% of Americans use the net72.3% of Americans use the net • Others do not for lack of accessOthers do not for lack of access  Not disinterestNot disinterest  Men & WomenMen & Women • Approx the same 74-70%Approx the same 74-70%  Income and educational difsIncome and educational difs • PhDs >85%PhDs >85% >$100k = 10 hrs>$100k = 10 hrs vs.vs. vs.vs. • High school 60%High school 60% <$30k = 4hrs<$30k = 4hrs
  • 18. Here to stayHere to stay  More people are using it dailyMore people are using it daily  Look forward to equal access…Look forward to equal access… After all, the Internet is for everyoneAfter all, the Internet is for everyone (RFC 3721)(RFC 3721)
  • 19. Gender related Issues ofGender related Issues of ComputingComputing
  • 20. Personal ExperiencePersonal Experience  I was too quick toI was too quick to judge.judge.  Stereotyped.Stereotyped.  Can such a biasedCan such a biased stereotype bestereotype be justified?justified?
  • 21. Is there a Gender Gap?Is there a Gender Gap?  After analyzingAfter analyzing more than 1,000more than 1,000 research studies,research studies, the Americanthe American Association ofAssociation of University WomenUniversity Women (AAUW) has(AAUW) has concluded thatconcluded that when it comes towhen it comes to technology, theretechnology, there is an alarmingis an alarming gender gap.gender gap.
  • 22. StatisticsStatistics  US population of menUS population of men and women is 50:50.and women is 50:50.  Tech jobs are growingTech jobs are growing every year.every year.  However womenHowever women represent only 20% ofrepresent only 20% of the Computer sciencethe Computer science and engineering laborand engineering labor force.force. Where are all the Women?Where are all the Women?
  • 23. So What?So What? ““The gender gap in computer science must beThe gender gap in computer science must be eliminated for two reasons.eliminated for two reasons. (1) The more obvious reason is to ensure that(1) The more obvious reason is to ensure that fair and equal treatment is being provided to allfair and equal treatment is being provided to all potential and current computer scientists.potential and current computer scientists. (2) The less considered danger of the gender gap(2) The less considered danger of the gender gap concerns the advancement of the field as aconcerns the advancement of the field as a whole. By hindering half of the population aswhole. By hindering half of the population as potential contributors, the field of computerpotential contributors, the field of computer science decreases its chance of furtherscience decreases its chance of further development.”development.” Quoted from: http://www.expage.com/page/genderissues3
  • 24. AnglesAngles  Male-Dominated EnvironmentMale-Dominated Environment -Are women being elbowed out?-Are women being elbowed out?  DiscriminationDiscrimination -HR playing favoritism?-HR playing favoritism?  Image of ComputingImage of Computing --Nerdy/Bad StereotypesNerdy/Bad Stereotypes  Lack of Adequate HighLack of Adequate High School/College PreparationSchool/College Preparation -Do teachers-Do teachers encourage/discourage females toencourage/discourage females to pursue tech jobs?pursue tech jobs?  Societal ImplicationsSocietal Implications -Games-Games -Role models-Role models
  • 25. Lack of AdequateLack of Adequate High School/College PreparationHigh School/College Preparation  According to a study by theAccording to a study by the Research Foundation forResearch Foundation for Improving the Representation of Women in the TechnologyImproving the Representation of Women in the Technology Workforce,Workforce, the number of women who received CS bachelor'sthe number of women who received CS bachelor's degrees, the number peaked in 1986 when womendegrees, the number peaked in 1986 when women represented approximately 36% of the total number ofrepresented approximately 36% of the total number of graduates. Since then numbers have only declined!graduates. Since then numbers have only declined!  ““The gender gaps we see are evidenceThe gender gaps we see are evidence that public schools are failing to fully preparethat public schools are failing to fully prepare girls for the 21st century”.girls for the 21st century”.  Concerned and embarrassed that womenConcerned and embarrassed that women account for only 15 to 20 percent of theiraccount for only 15 to 20 percent of their computer science majors, a number of topcomputer science majors, a number of top colleges are looking for ways to attract more women tocolleges are looking for ways to attract more women to careers in computers. They are adding courses that appeal tocareers in computers. They are adding courses that appeal to women's strengths, creating mentoring programs and thinkingwomen's strengths, creating mentoring programs and thinking harder about the gender gap.harder about the gender gap.
  • 26. Societal ImplicationsSocietal Implications - Childhood Development?- Childhood Development? The Association for Computing Machinery'sThe Association for Computing Machinery's Committee on Women in Computing (ACM-W) haveCommittee on Women in Computing (ACM-W) have found that:found that:  Role Models?Role Models? – “Fathers are more likely to be using– “Fathers are more likely to be using computers in the home than mothers so you have thecomputers in the home than mothers so you have the element of the role model”.element of the role model”.  Self-confidence? - boys “exhibit higher computer self-Self-confidence? - boys “exhibit higher computer self- confidence and a more positive attitude about computersconfidence and a more positive attitude about computers than girls”.than girls”.
  • 27. Societal ImplicationsSocietal Implications - Video Games?- Video Games?  Computer games, which often attract children toComputer games, which often attract children to computers, are written by male programmers!computers, are written by male programmers!  Generally these games consist of violence, killing andGenerally these games consist of violence, killing and scoring points, all of which interest young boys . Thusscoring points, all of which interest young boys . Thus girls, who are not engaged as much by these games, aregirls, who are not engaged as much by these games, are less likely to follow this avenue into computer science.less likely to follow this avenue into computer science.  Software produced specifically for girls?Software produced specifically for girls? -Researchers and parents feel that so-called “pink”-Researchers and parents feel that so-called “pink” software, such as Disney’s Princess Fashion Boutique andsoftware, such as Disney’s Princess Fashion Boutique and Barbie Magic Hairstyler will teach girls the technology skillsBarbie Magic Hairstyler will teach girls the technology skills and confidence building they need to narrow the digitaland confidence building they need to narrow the digital gender gap.gender gap.
  • 28. ConclusionConclusion  As technology continues to expandAs technology continues to expand nationally and internationally, it isnationally and internationally, it is important that advances are equallyimportant that advances are equally influenced by men and women.influenced by men and women.  In order to reduce the Gender Gap, theIn order to reduce the Gender Gap, the issue must be taken seriously. Schools,issue must be taken seriously. Schools, video game manufacturers, and industriesvideo game manufacturers, and industries must find a way to involve both genders.must find a way to involve both genders.  Parents (mothers) must take an active rollParents (mothers) must take an active roll in influencing and encouraging theirin influencing and encouraging their daughters to pursue tech jobs/degrees.daughters to pursue tech jobs/degrees.
  • 30. Issues of International BusinessIssues of International Business  LanguageLanguage  Time ZonesTime Zones  Sharing of dataSharing of data  Learning foreign Business PracticesLearning foreign Business Practices  PresentationPresentation
  • 31. LanguageLanguage  Knowing a second languageKnowing a second language • If not then a translator may be neededIf not then a translator may be needed • Americans tend not to be multilingualAmericans tend not to be multilingual  Translations may contain errorsTranslations may contain errors
  • 32. TimeTime  Time zone differencesTime zone differences • Limited windows of communicationLimited windows of communication  Email?Email? • Not always a perfect solutionNot always a perfect solution  Can be time intensiveCan be time intensive  May not produce the best resultsMay not produce the best results
  • 33. Sharing of DataSharing of Data  Media of transport/ CommunicationMedia of transport/ Communication • WANWAN  Transfering projectsTransfering projects  EmailsEmails • Snail MailSnail Mail
  • 34. Learning foreign BusinessLearning foreign Business PracticesPractices  Trying to treat international businessTrying to treat international business partners like an american business is apartners like an american business is a BAD idea...BAD idea... • ““The appropriate ways of conducting businessThe appropriate ways of conducting business and holding meetings vary from country toand holding meetings vary from country to country and from culture to culture.”country and from culture to culture.”  Good exampleGood example • A meeting set for a certain time in China aA meeting set for a certain time in China a person should be 15 minutes early andperson should be 15 minutes early and preparingpreparing • A meeting set for a certain time in MexicoA meeting set for a certain time in Mexico might not actually start for an hour or twomight not actually start for an hour or two
  • 35. Examples of Do’s and Dont’sExamples of Do’s and Dont’s  GermanyGermany • DoDo  Knock before opening a closed door.Knock before opening a closed door. • Don'tDon't  Shake someone's hand while your otherShake someone's hand while your other hand is in your pocket.hand is in your pocket.
  • 36. Examples of Do’s and Dont’sExamples of Do’s and Dont’s  FranceFrance • DoDo  Avoid calling your associates' personalAvoid calling your associates' personal number for business related issues. If itnumber for business related issues. If it cannot be avoided, do so before 9:00pm.cannot be avoided, do so before 9:00pm.  For corporate letters or e-mail, use a veryFor corporate letters or e-mail, use a very formal and business-like approach.formal and business-like approach. • Don'tDon't  Use first names during a business meeting.Use first names during a business meeting.  Show up late for meetings.Show up late for meetings.  Bring up business at the start of aBring up business at the start of a dinner/meeting.dinner/meeting.
  • 37. Examples of Do’s and Dont’sExamples of Do’s and Dont’s  JapanJapan • Forget it I don’t have enough time...Forget it I don’t have enough time...
  • 38. LiteratureLiterature  Books found @ barnesandnoble.comBooks found @ barnesandnoble.com • Doing Business in ChinaDoing Business in China • Business Korea: A Practical Guide toBusiness Korea: A Practical Guide to Understanding South Korean Business CultureUnderstanding South Korean Business Culture • International BusinessInternational Business • International Business and Trade: Theory,International Business and Trade: Theory, Practice, and PolicyPractice, and Policy
  • 39. PresentationPresentation  OrganizationOrganization  AppearanceAppearance  ““Be civil, neat and listen to what theyBe civil, neat and listen to what they are saying. Since we areare saying. Since we are representing our company, we needrepresenting our company, we need to project the best image to ourto project the best image to our customer.” –Ralph Flataucustomer.” –Ralph Flatau
  • 40. ReferencesReferences • http://www.zakon.org/robert/internet/timeline/ • http://www.isp-planet.com/research/ • Number of users: http://cyberatlas.internet.com/big_picture/geographics/article/0,,5911_1593591,00.html (feb 2003) • IPv4: http://www.isoc.org/briefings/001/ • Crime: http://www.cyber-rights.org/cybercrime/ • Demographics: http://ccp.ucla.edu/pdf/UCLA-Internet-Report-2001.pdf • Gov’t control: http://www.rferl.org/nca/special/enemies.html • The map of the world: http://www.ipsos-reid.com/us/services/syndicated/dsp_face.cfm • Armando Gomez. (2003, February 24). Business Travel Etiquette. [World Wide Web] Available: http://www.askmen.com/money/career/20_career.html • Flatau, Ralph. (2003, February 25). Infimed Inc Manager. [Email Interview] • http://portal.acm.org/citation.cfm?id=320264<http://portal.acm.org/citation.cfm? id=320264&;coll=portal&dl=ACM&CFID=8149335&CFTOKEN=12007127>&coll=portal&dl=ACM&CFID=8149 335&CFTOKEN=12007127 • Brainball: http://portal.acm.org/toc.cfm?id=604575<http://portal.acm.org/toc.cfm? id=604575&;idx=J373&type=issue&coll=portal&dl=ACM&part=magazine&WantType=Magazines&title=interac tions&CFID=8149042&CFTOKEN=44437748>&idx=J373&type=issue&coll=portal&dl=ACM&part=magazine& WantType=Magazines&title=interactions&CFID=8149042&CFTOKEN=44437748 • Number of Cell Phone Customers: http://www.emc- database.com/website.nsf/index/pr020319http://inventors.about.com/gi/dynamic/offsite.htm?site= • http://www.pbs.org/internet/timeline/timeline%2Dtxt.html • http://www.oreillynet.com/pub/a/wireless/2001/09/28/relay.html
  • 41. References (Cont.)References (Cont.) • http://www.acm.org/women/ • http://www.expage.com/page/genderissues3 • http://www.cpsr.org/program/gender/index.html • http://www.pbs.org/newshour/bb/youth/jan-june99/gendergap_1-29.html • http://www.iota.org/Winter00/gendergap.html • http://www.ucalgary.ca/~northcot/380-2/lec12.html • http://www.ucalgary.ca/%7Ekawwalsh/introduction.htm • http://www.interweb-tech.com/nsmnet/docs/updated_numbers.htm • http://www.anu.edu.au/people/Roger.Clarke/II/NetN3.html • http://www.uclic.ucl.ac.uk/harold/srf/networked.pdf • http://www.caul.edu.au/org/commsdoc.htm