– Communication Technology in a Changing World

Slides:



Advertisements
Similar presentations
IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 10.
Advertisements

An Endnote on Regulating Cyberspace: Architecture vs Law Author: Graham Greenleaf. Presented by: Oliver Bannatyne, 28 th May 2002.
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
ICT Curriculum Evening – an introduction to Wizkid.
S2 – COMMUNICATIONS UNIT
The impact of ICT on Personal Communications For students in year 11 students at Les Quennevais School. The groups I will look at will be: My Family Disabled.
Behind the Machine “The Good, The Bad, and the Ugly” Copyright © 2008 by Helene G. Kershner.
The Laws of Cyberspace Larry Lessig. Introductory Story Before Russian Revolution Tsar had system of internal passports which marked estate you came from.
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
P.6.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Read to Learn Describe the three basic economic questions each country must answer to make decisions about using their resources.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
Testing New Approaches Delivering CIS through Social Media Channels Martin Ledwick Cancer Research - UK.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Internet Safety Tips By K. Pisarik. The district’s AUP (Acceptable Use Policy) requires that you: 1.Only log on to computers when a teacher is supervising.
Lessig – Code and the Future of Ideas. Code – Intellectual Property Optimal is mix between public and private spaces Many agents can use cyberspace -
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Power and discipline Foucault, M. (1979): “Discipline and Punish”, chap 3, Vintage Books, New York, Hannemyr, G. (2000): “Foucault I kyberrommet”,
By: Brenna Langham. Netiquette: Some Basic Rules Be careful of the words chosen when writing a statement for others to read! The other person might misinterpret.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
NETWORK SECURITY. TextBook William Stallings, Cryptography and Network Security: Principles and Practice, ? Edition.
Computers in Society Electronic Voting. Team Projects What is your name? Application? Presentation? Copyright The software industry The open source business.
E-voting Bringing the voting process to the technology age.
When young people go online:  13% received unwanted sexual solicitations  34% communicate with individuals they never met  11% establish close personal.
Code & Other Laws of Cyberspace Reviewed by Thuy Nguyen November 17 th 2005 By Lawrence Lessig.
Chapter 8: Search, Privacy, Government, and Evil By: Marissa Gittelman Tuesday, March CPS 49:Google, the Computer Science within and its Impact.
Intermediate Microeconomic Theory Introduction. What is Goal of Microeconomic Theory? The primary goal of this class is to develop a model for understanding.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
Nine Elements of Digital Citizenship Isabella Freijah.
YOUR TEEN AND SOCIAL MEDIA INFORMATION FOR PARENTS ON SOCIAL MEDIA, INCLUDING SAFETY TIPS AND HOW TO HELP YOUR YOUNG TEEN NAVIGATE THE ONLINE WORLD. A.
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
Tyler Rapp.  I strongly believe anonymous posting should be legal  Why? You have the right, guaranteed to you by the 1 st Amendment in the United States.
Why you didn’t properly consent to listening to me ramble…
Judith Davis – Community Safety Officer Northumberland County Council.
Cyber Info Gathering Techniques
Introduction to Privacy
Creating your online identity
Student Communication via Social Media: Be Heard Without Being Creepy
and Succeeding Together
Computer Literacy – Grade 8
Let’s Go Surfing: Internet Safety
Chapter 5 Electronic Commerce | Security
Financial Performance and Transfer Pricing
Topic 5: Online Communities Press F5 to view!
More leads, More enquiries, More sales
Topic 6: Issues Press F5 to view!
Your Teen and Social Media
ISNE101 Dr. Ken Cosh.
E-Commerce: Regulatory, Ethical, and Social Environments
Learning Area 1 Information And Communication Technology and Society
Societal Issues Week 3.
Chapter 5 Electronic Commerce | Security
Web 2.0 Technologies and Community Building Online by
– Communication Technology in a Changing World
Computer Literacy – Grade 8
Basic Concepts of Democracy
IGraphic Social impacts of IT
Communication Technology in a Changing World
Behind the Machine “The Good, The Bad, and the Ugly”
Cyber Bullying. Cyber Bullying What is it? Cyber bullying is any form of bullying which takes place online or through smartphones and tablets. Social.
Internet Safety – Social Media
Cyber Literacy Week 9.
Company Name | Phone Number | Website | Address
Presentation transcript:

269111 – Communication Technology in a Changing World Dr. Ken Cosh Week 10

Recap… Last Week We talked about the future of ICT Ubiquitous Computing Technology blends into the environment Technology is pervasive with touchpoints throughout Augmented / Virtual Reality

This Week Originally the plan was: Politics But… And how ICT is impacting on politics But… So instead, Regulation Regulation in Cyberspace

But First Briefly, How has ICT affected Politics? Electronic Voting Machines Censorship Connection between politicians and population Tweeting What else?

Regulation Lawrence Lessig Professor of Law and Harvard Law School (previously at Stanford) Author of Free Culture The Future of Ideas Code and the other Laws of Cyberspace

The Laws of Cyberspace Lessig argues… The world is regulated by four constraints Law Social Norm Market Architecture

Law Law regulates by sanctions ex-post Don’t pay tax -> Go to jail Steal my car -> Go to jail But while Law is an obvious regulator, it is not the only regulator. You don’t always go to jail for not paying taxes.

Social Norms Regulate behaviour by “what I ought to do” I ought to wear a shirt (& tie), rather than a dress You ought to sit and listen to me for a while

The Market Markets through the mechanism of ‘price’ regulates opportunities Price dictates what I can afford The price also dictates what I can charge for various abilities People would spend less on “The greatest hits of Dr. Ken” than they would on “Madonna’s greatest hits”

Architecture The architecture of the world regulates our abilities We can’t see through walls We can’t come to class if we are in a wheelchair We can’t fly…

4 Regulators The ‘real world’ is regulated by a combination of these 4 regulators As we consider regulating the cyberspace world, the same 4 regulators have an impact

Laws in Cyberspace Laws exist in cyberspace, and are punishable Copyright law Defamation law Sexual harrassment law Behaviour is constrained by law, just as in the real world.

Social Norms in Cyberspace Social norms also constrain cyberspace Forum rules Banning / Kicking from chat rooms

Market in Cyberspace Prices in cyberspace also constrain that world. We can access a wider market, but the price still constrains us.

Architecture in Cyberspace It exists, but is different from the architecture of the real world Hardware / Software Protocols Password to gain access Encryption Tracking transactions We can’t choose whether to obey the architecture (just as in the real world) Unless we are a hacker…

Regulating Cyberspace Cyberspace then is regulated with the same 4 regulators Law Social Norm Market Architecture

Lets think about ‘Porn’ A lot of people have raised a lot of concerns about the amount of porn available on the web. And how easy it is to access it Moreover how easy it is for minors to access it But there is plenty of porn in the ‘real world’ too How is it regulated?

Real World Porn Law: It is against the law for distributors to sell porn to minors. Social Norm: Generally society looks down on distributing porn to minors. Market: Porn is priced such that minors can’t really afford it. All of these also apply to the cyberspace world. So what about architecture?

Architecture In the real world. In Cyberspace Fake moustache? Stilts? Deep voice? In Cyberspace Default anonymity

The Architecture Because the architecture of cyberspace is different from the real world, regulation of cyberspace is different But there is no one single architecture of the web Organisations / Governments have choices about what architecture to use

Choice of Architecture What happens when you try to surf the web at CMU? How is it different from my old university? If I encrypt a message, is it truly encrypted? Or could the government read it anyway? What happens if I go to a website considered ‘detrimental to society’ in Thailand?

Choice of Architecture Can I host my porn site in the US? Or my gambling site? Can anyone see my drunken tagged photos on facebook? Can I control who can see them?

Control vs Freedom Traditionally the web is considered a free space But there is a choice of architectures allowing control over that space Controlling Access Controlling Use Controlling Privacy

The Constitution A nation’s constitution then often guides the architecture Architecture of Control Architecture of Freedom Consider the architecture used in the US vs Burma vs China…

Encryption Software We’ll come back to discuss encryption again later, but The ability to (or not to) be completely anonymous in cyberspace is a big issue. It affects the regulability of cyberspace The ability for governments to regulate our activities online. It also affects basic human rights Freedom of Speech Right to Privacy

Back to the “Real World” We have passports Travel is restricted based on passports Movements are tracked by passports Criminals are identified by passports In some countries the burden of passports is greater than others Government policies to stop peasants from flooding cities during famines

Cyberworld ID Consider having online passports Great! Awful! Catch the criminals with minimal burden on the innocent Awful! Loss of freedom – complete government control What do you think?