Big Idea 5
Impact of Computing
The World Wide Web
Originated in the early 1960s designed initially for the exchange of information within the scientific community.
First message sent over ARPAnet, originally named the internet, was "LO" when attempting to send "LOGIN," but the connection crashed.
Distinction: Internet is a global network of interconnected networks; World Wide Web is a collection of accessible information via the internet.
The internet transformed business operations and communication patterns globally, leading to the concept of global villages with both positives and negatives.
Low investment in internet infrastructure allows users to access large audiences through various digital platforms (webpages, social media, etc.).
Variation in internet access due to socioeconomic factors and demographics across countries.
Digital Divide
Definition: Digital divide refers to disparities in access to technology, including computers and internet connectivity.
Factors influencing the digital divide:
- Infrastructure: Some regions lack internet access.
- Education: Access doesn't equate to the ability to utilize the internet effectively.
- Indifference: Individuals may have access but choose not to engage.
- Cost: Expenses related to internet access can be prohibitive.Ongoing efforts to bridge the gap:
- Google's Project Loon implemented balloons to provide internet in underserved communities.
- Local initiatives offering educational classes and free Wi-Fi.Ethical concerns regarding governmental policies that require internet access keep those without it uninformed about crucial policy changes.
Beneficial and Harmful Effects of Computing Innovations
Definitions:
- Effect: Can be perceived as beneficial or harmful, contextual and interpretive.
- Identification: Classification requires justification for the designation as beneficial or harmful.Example of dual perception:
- GPS technology: Helps a driver estimate arrival time but can also provide data to law enforcement.Changing task completion with computing innovations:
- AP exam grading has shifted to video conferencing, reducing costs and logistical issues.
Unintended Innovations
Innovations can emerge from careful planning or occur by accident (e.g., microwave, bubble wrap, X-rays).
Example: The Greedy algorithm, created in 1956, is now adapted for navigation systems to find optimal paths.
The internet has evolved from a research tool to a widely accessible platform with over 3 billion users.
Examples of Modern Computing Innovations
Includes applications and platforms:
- Social Media: Snapchat, Facebook, X, WhatsApp, Instagram, YouTube
- GPS systems, e-commerce, Cloud Services
- Transportation services: Uber, UberEats
Social and Economic Effects of Computing
Varies in impact depending on geographic and socioeconomic disparities.
Networking and infrastructure supported by commercial and governmental initiatives.
Creators of computing innovations must anticipate unintended uses that can lead to beneficial or harmful outcomes (e.g., misinformation).
Example: GoFundMe has positively impacted fundraising but also facilitated fraud.
Example: GoFundMe facilitated raising nearly $5 million for victims of the Pulse nightclub shooting
Harmful side: Cases of fraudulent campaigns leading to loss of donor trust.
Human Bias in Computing Innovations
Computing innovations can reinforce existing human biases.
Algorithms can discriminate based on significant variables if not monitored correctly (e.g., using salary history in recruitment introduces gender bias).
Crowdsourcing
Definition: Utilizing the internet to gather input or information from a vast number of users.
Example: The UK government crowdsourced suggestions for boat names, resulting in the name "Boaty McBoatface."
Platforms like Stack Overflow exemplify coding crowdsourcing, where users provide help on programming queries.
Citizen Science
Definition: Public participation in scientific research, often lacking formal training but providing valuable data.
Example: Counting fireflies does not require technical expertise, illustrating broad participation.
Legal and Ethical Concerns in Computing
Intellectual property rights are crucial in the digital age to protect creators' works from unauthorized use.
Plagiarism: Unauthorized use of another's work can lead to legal ramifications.
Frameworks like Creative Commons allow authors to share their works legally while reserving certain rights.
Open source and open access further broaden the availability of digital content while ensuring rightful attribution.
Safe Computing
Security protects information confidentiality, integrity, and availability from cyber threats.
Privacy refers to controlling one's data and its movement.
Repercussions of compromised security: Loss of consumer trust (notable cases with companies like Target and Yahoo).
Personally Identifiable Information (PII): Sensitive data like social security numbers, financial records, etc.
PII has value and can inform marketing strategies (e.g., targeted ads after online interactions).
Authentication Measures
Strong passwords and multifactor authentication enhance security:
- Multifactor authentication: Requires two or more forms of verification (e.g., something known, something owned, something inherent).
Encryption
Encryption: Measures used to secure data through cryptographic algorithms.
Symmetric Key Encryption: Uses a single shared key for both encryption and decryption.
Public Key Encryption: Involves two keys (public for encryption and private for decryption); enhances security.
Malware and Cybersecurity Threats
Malware: Designed to infect and damage computers, capable of causing significant economic damages; spreads through various vectors (e.g., email, software).
Example: Stuxnet was a cyber weapon designed to disrupt Iran's nuclear facilities.
Computer Viruses: Malicious programs that reproduce and spread on infected computers; some encrypt data for ransom.
Phishing: Directs users to deceptive sites to collect sensitive personal information.
Keylogging: Monitors keystrokes to capture sensitive information covertly.
Rogue Access Point: Unauthorized points that allow access to secure networks, risking data interception and modification.