Big Idea 5

Impact of Computing

The World Wide Web

  • Originated in the early 1960s designed initially for the exchange of information within the scientific community.

  • First message sent over ARPAnet, originally named the internet, was "LO" when attempting to send "LOGIN," but the connection crashed.

  • Distinction: Internet is a global network of interconnected networks; World Wide Web is a collection of accessible information via the internet.

  • The internet transformed business operations and communication patterns globally, leading to the concept of global villages with both positives and negatives.

  • Low investment in internet infrastructure allows users to access large audiences through various digital platforms (webpages, social media, etc.).

  • Variation in internet access due to socioeconomic factors and demographics across countries.

Digital Divide

  • Definition: Digital divide refers to disparities in access to technology, including computers and internet connectivity.

  • Factors influencing the digital divide:
      - Infrastructure: Some regions lack internet access.
      - Education: Access doesn't equate to the ability to utilize the internet effectively.
      - Indifference: Individuals may have access but choose not to engage.
      - Cost: Expenses related to internet access can be prohibitive.

  • Ongoing efforts to bridge the gap:
      - Google's Project Loon implemented balloons to provide internet in underserved communities.
      - Local initiatives offering educational classes and free Wi-Fi.

  • Ethical concerns regarding governmental policies that require internet access keep those without it uninformed about crucial policy changes.

Beneficial and Harmful Effects of Computing Innovations

  • Definitions:
      - Effect: Can be perceived as beneficial or harmful, contextual and interpretive.
      - Identification: Classification requires justification for the designation as beneficial or harmful.

  • Example of dual perception:
      - GPS technology: Helps a driver estimate arrival time but can also provide data to law enforcement.

  • Changing task completion with computing innovations:
      - AP exam grading has shifted to video conferencing, reducing costs and logistical issues.

Unintended Innovations

  • Innovations can emerge from careful planning or occur by accident (e.g., microwave, bubble wrap, X-rays).

  • Example: The Greedy algorithm, created in 1956, is now adapted for navigation systems to find optimal paths.

  • The internet has evolved from a research tool to a widely accessible platform with over 3 billion users.

Examples of Modern Computing Innovations

  • Includes applications and platforms:
      - Social Media: Snapchat, Facebook, X, WhatsApp, Instagram, YouTube
      - GPS systems, e-commerce, Cloud Services
      - Transportation services: Uber, UberEats

Social and Economic Effects of Computing

  • Varies in impact depending on geographic and socioeconomic disparities.

  • Networking and infrastructure supported by commercial and governmental initiatives.

  • Creators of computing innovations must anticipate unintended uses that can lead to beneficial or harmful outcomes (e.g., misinformation).

  • Example: GoFundMe has positively impacted fundraising but also facilitated fraud.

  • Example: GoFundMe facilitated raising nearly $5 million for victims of the Pulse nightclub shooting

  • Harmful side: Cases of fraudulent campaigns leading to loss of donor trust.

Human Bias in Computing Innovations

  • Computing innovations can reinforce existing human biases.

  • Algorithms can discriminate based on significant variables if not monitored correctly (e.g., using salary history in recruitment introduces gender bias).

Crowdsourcing

  • Definition: Utilizing the internet to gather input or information from a vast number of users.

  • Example: The UK government crowdsourced suggestions for boat names, resulting in the name "Boaty McBoatface."

  • Platforms like Stack Overflow exemplify coding crowdsourcing, where users provide help on programming queries.

Citizen Science

  • Definition: Public participation in scientific research, often lacking formal training but providing valuable data.

  • Example: Counting fireflies does not require technical expertise, illustrating broad participation.

Legal and Ethical Concerns in Computing

  • Intellectual property rights are crucial in the digital age to protect creators' works from unauthorized use.

  • Plagiarism: Unauthorized use of another's work can lead to legal ramifications.

  • Frameworks like Creative Commons allow authors to share their works legally while reserving certain rights.

  • Open source and open access further broaden the availability of digital content while ensuring rightful attribution.

Safe Computing

  • Security protects information confidentiality, integrity, and availability from cyber threats.

  • Privacy refers to controlling one's data and its movement.

  • Repercussions of compromised security: Loss of consumer trust (notable cases with companies like Target and Yahoo).

  • Personally Identifiable Information (PII): Sensitive data like social security numbers, financial records, etc.

  • PII has value and can inform marketing strategies (e.g., targeted ads after online interactions).

Authentication Measures
  • Strong passwords and multifactor authentication enhance security:
      - Multifactor authentication: Requires two or more forms of verification (e.g., something known, something owned, something inherent).

Encryption

  • Encryption: Measures used to secure data through cryptographic algorithms.

  • Symmetric Key Encryption: Uses a single shared key for both encryption and decryption.

  • Public Key Encryption: Involves two keys (public for encryption and private for decryption); enhances security.

Malware and Cybersecurity Threats

  • Malware: Designed to infect and damage computers, capable of causing significant economic damages; spreads through various vectors (e.g., email, software).

  • Example: Stuxnet was a cyber weapon designed to disrupt Iran's nuclear facilities.

  • Computer Viruses: Malicious programs that reproduce and spread on infected computers; some encrypt data for ransom.

  • Phishing: Directs users to deceptive sites to collect sensitive personal information.

  • Keylogging: Monitors keystrokes to capture sensitive information covertly.

  • Rogue Access Point: Unauthorized points that allow access to secure networks, risking data interception and modification.