Advertisement

Twenty Years on: A Second Look at 10 Important Social Impact Characteristics of Computer Technology

  • Blaise W. LiffickEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9186)

Abstract

Twenty years ago, Liffick [38] explored 10 characteristics of computer technology that contributed to their impact on societal issues of that era. The purpose of this exploration was to “anticipate the social consequences of a new product and mitigate any potential negative effects it may have on society.” Furthermore, “the intent of developing a list of these characteristics is that it could lead to a better understanding of the nature of the social impact of computers. In this way, it might be possible to examine a new computer project at the time of its design … to determine its potential impacts as a social change agent”. The purpose of this current paper is to review the characteristics originally proposed to determine whether they are more or less relevant, given the enormous changes in computer technology (CT) in the last 20 years.

Keywords

Human-computer interaction HCI Social impact Computers and society 

References

  1. 1.
    13 Revelations from the Sony hack. Seth Rosenblatt. C/Net, 13 December 2014. http://www.cnet.com/news/13-revelations-from-the-sony-hack/. Accessed 17 Dec 2015
  2. 2.
  3. 3.
    Apple Watch Unveiled. C/Net, 11 September 2014. http://www.cnet.com/products/apple-watch/. Accessed 20 Oct 2014
  4. 4.
  5. 5.
    Global mobile statistics 2014 Part A: Mobile subscribers; handset market share; mobile operators, 16 May 2014. http://mobiforge.com/research-analysis/global-mobile-statistics-2014-part-a-mobile-subscribers-handset-market-share-mobile-operators
  6. 6.
  7. 7.
  8. 8.
    The history of cyber attacks – a timeline. NATO Review Magazine. http://www.nato.int/docu/review/2013/cyber/timeline/EN/index.htm. Accessed 17 Dec 2014
  9. 9.
    The history of social networking. Digital Trends. http://www.digitaltrends.com/features/the-history-of-social-networking/. Accessed 9 Jan 2015
  10. 10.
    iPhone, iPad and iPod Sales from 1st Quarter 2006 to 4th Quarter 2014. Statista. http://www.statista.com/statistics/253725/iphone-ipad-and-ipod-sales-comparison/. Accessed 27 Dec 2014
  11. 11.
  12. 12.
    Print me a Stradivarius. The Economist, 10 February 2011. http://www.economist.com/node/18114327?story_id=18114327. Accessed 8 Jan 2015
  13. 13.
    REAL ID Implementation Review: Few Benefits, Staggering Costs. EPIC, May 2008. https://epic.org/privacy/id_cards/
  14. 14.
  15. 15.
    The size of the World Wide Web (The Internet). http://www.worldwidewebsize.com/. Accessed 21 Dec 2014
  16. 16.
    The Smartwatch that’s also a Smartphone. C/Net, 17 November 2014. http://www.cnet.com/products/samsung-gear-s/. Accessed 1 Dec 2014
  17. 17.
    Statistics and Facts about Online Shopping. Statista. http://www.statista.com/topics/871/online-shopping/. Accessed 3 Jan 2015
  18. 18.
    Ahuja, G.: Does web site promote celebrity stalking? ABC News, 15 March 2006. http://abcnews.go.com/GMA/story?id=1729270. Accessed 4 Jan 2015
  19. 19.
    Anderson, L.: Seduced by ‘perfect’ pitch: how Auto-Tune conquered pop music. The Verger, 27 February 2013. http://www.theverge.com/2013/2/27/3964406/seduced-by-perfect-pitch-how-auto-tune-conquered-pop-music. Accessed 9 Jan 2015
  20. 20.
    Angwin, J., Valentino-DeVries, J.: Google’s iPhone tracking. Wall Street J., 17 February 2012Google Scholar
  21. 21.
  22. 22.
    Araujo, I., Araujo, I.: Developing trust in internet commerce. In: Proceedings of the 2003 Conference of the Centre for Advanced Studies on Collaborative Research, pp 1–15. IBM Press (2003)Google Scholar
  23. 23.
    Baker, M., Hong, J., Billinhurst, M.: Wearable computing from jewels to joules. Pervasive Comput. 13(4), 20–22 (2014). http://dx.doi.ieeecomputersociety.org/10.1109/MPRV.2014.81 CrossRefGoogle Scholar
  24. 24.
    Biggs, J.: TC50: FitBit, A Fitness Gadget that Makes Us Want to Exercise. TechCrunch, 9 September 2008. http://techcrunch.com/2008/09/09/tc50-fitbit-fitness-gadget-the-makes-us-want-to-exercise/. Accessed 27 Dec 2014
  25. 25.
    Campbell, T.: Internet Trolls. Internet Archives, 13 July 2001. http://web.archive.org/web/20011026130853/http://members.aol.com/intwg/trolls.htm. Accessed 6 Jan 2015
  26. 26.
    Condon, B.: Sony Hacking Fallout Explodes as Theaters Cancel ‘The Interview’ Showings. The Huffington Post, 17 December 2014. http://www.huffingtonpost.com/2014/12/17/sony-hack-theaters_n_6338246.html
  27. 27.
    Curtis, A.: The Brief History of Social Media. http://www2.uncp.edu/home/acurtis/NewMedia/SocialMedia/SocialMediaHistory.html. Accessed 9 Jan 2015
  28. 28.
    Cutler, K.: Apple Has Sold 600 M iOS Devices, But Android Is Not Impressed. TechCrunch. http://techcrunch.com/2013/06/10/apple-android-2/. Accessed 27 Dec 2014
  29. 29.
    Ferenstein, G.: The science of building trust with social media. Mashable, 24 February 2010. http://mashable.com/2010/02/24/social-media-trust/. Accessed 10 Jan 2015
  30. 30.
    Fitzgerald, B.: Social Media is Causing Anxiety, Study finds. Huffington Post. http://www.huffingtonpost.com/2012/07/10/social-media-anxiety_n_1662224.html. Accessed 3 Jan 2015
  31. 31.
    Flood, A.: Where did the story of ebooks begin? The Guardian, 12 March 2014. http://www.theguardian.com/books/2014/mar/12/ebooks-begin-medium-reading-peter-james. Accessed 4 Jan 2015
  32. 32.
    Greenwald, G., MacAskill, E.: NSA Prism program taps in to user data of Apple, Google and others. The Guardian, 7 June 2013. http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data. Accessed 19 Dec 2014
  33. 33.
    Gross, M.J.: Silent War. Vanity Fair. July 2013. http://www.vanityfair.com/culture/2013/07/new-cyberwar-victims-american-business. Accessed 17 Dec 2014
  34. 34.
    Grudin, J.: Has the ice man arrived? tact on the Internet. IEEE Intell. Syst. 14(1), 8–9 (1999)CrossRefGoogle Scholar
  35. 35.
    Hearst, M.A.: When information technology “goes social”. IEEE Intell. Syst. 13(1), 10–15 (1999)Google Scholar
  36. 36.
    Hochheiser, H., Lazar, J.: HCI and societal issues: a framework for engagement. Int. J. Hum. Comput. Interact. 23(3), 339–374 (2007). Lawrence Erlbaum AssociatesCrossRefGoogle Scholar
  37. 37.
    Kassner, M.: Search engine bias: What search results are telling you (and what they’re not). TechRepublic, 23 September 2013. http://www.techrepublic.com/blog/it-security/search-engine-bias-what-search-results-are-telling-you-and-what-theyre-not/. Accessed 9 Jan 2015
  38. 38.
    Knapp, E.: A Brief History of Apple’s iTunes. Wall St. Cheat Sheet, 16 June 2011. http://wallstcheatsheet.com/breaking-news/a-brief-history-of-apples-itunes.html/. Accessed 3 Jan 2015
  39. 39.
    Liffick, B.: Social impact characteristics of computer technology. In: Proceedings of ETHICOMP95 International Conference, De Montfort University, Leicester, March 28–30 (1995)Google Scholar
  40. 40.
    Liffick, B.: Cruising the E-Mall: Shopping by Computer. In a Reader in Ethical Computing and Business. Blackwell Publishers, London (1997)Google Scholar
  41. 41.
    MacCormick, J.: Nine Algorithms that Changed the Future. Princeton University Press, New Jersey (2013)Google Scholar
  42. 42.
    McDonald, S.N.: Everyone hates Auto-Tune. The Washington Post, 31 October 2014. http://www.washingtonpost.com/news/morning-mix/wp/2014/10/31/everyone-hates-auto-tune-t-pain-may-have-finally-put-us-all-out-of-our-misery/. Accessed 9 Jan 2015
  43. 43.
    McGregor, J.: The Top 5 Most Brutal Cyber Attacks of 2014 So Far. Forbes, 28 July 2014. http://www.forbes.com/sites/jaymcgregor/2014/07/28/the-top-5-most-brutal-cyber-attacks-of-2014-so-far/. Accessed 17 Dec 2015
  44. 44.
    Owen, L.H.: PwC: The US consumer ebook market will be bigger than the print book market by 2017. Gigaom Research, 4 June 2013. https://gigaom.com/2013/06/04/pwc-the-u-s-consumer-ebook-market-will-be-bigger-than-the-print-book-market-by-2017/. Accessed 3 Jan 2015
  45. 45.
    Peng, W., Lin, Y.: Ranking web search results from personalized perspective. In: Proceedings of the International Conference on E-Commerce Technology. IEEE Computer Society, San Francisco, June 26–29 (2006)Google Scholar
  46. 46.
    Ramanathan, L.: High-tech gifts: You should love them. If only you knew how to use them. Washington Post, 26 December 2015. http://www.washingtonpost.com/lifestyle/style/high-tech-gifts-you-should-love-them-if-only-you-knew-how-to-use-them/2014/12/26/9d7c6adc-8d35-11e4-8ff4-fb93129c9c8b_story.html. Accessed 30 Dec 2015
  47. 47.
    Reges, S., Stepp, M.: Building Java Programs, 4th edn. Addison-Wesley Publishing, Boston (2014)Google Scholar
  48. 48.
    Rosenblatt, S.: Revelations from the Sony hack. C/Net, 13 December 2014. http://www.cnet.com/news/13-revelations-from-the-sony-hack/. Accessed 17 Dec 2015
  49. 49.
    Shaer, M.: Google gets $25 K fine for ‘impeding’ FCC probe into Street View, 17 April 2012. The Christian Science Monitor. http://www.csmonitor.com/Innovation/Horizons/2012/0417/Google-gets-25K-fine-for-impeding-FCC-probe-into-Street-View. Accessed 19 Dec 2014
  50. 50.
    Shneiderman, B.: Universal usability. Commun. ACM. 43(5), 84–91 (2000). http://dl.acm.org/citation.cfm?id=332843 CrossRefGoogle Scholar
  51. 51.
    Stephanidis, C.: Adaptive techniques for universal access. User Model. User-Adap. Inter. 11, 159–179 (2001)CrossRefGoogle Scholar
  52. 52.
    Stossel, J.: How the Internet helps society be more trusting. The Washington Examiner, 6 January 2015. http://www.washingtonexaminer.com/how-the-internet-helps-society-be-more-trusting/article/2558247. Accessed 10 Jan 2015
  53. 53.
    Takei, G.: Oh, Myyy (There Goes the Internet). Limited Liability Company (2013)Google Scholar
  54. 54.
    Tavani, H.: Search engines and ethics. The Stanford Encyclopedia of Philosophy (Spring 2014 Edition). http://plato.stanford.edu/entries/ethics-search/. Accessed 9 Jan 2015
  55. 55.
    Temperton, J.: NASA just emailed a wrench to space. Wired, 19 December 2014. http://www.wired.co.uk/news/archive/2014-12/19/3d-printed-space-wrench Accessed 20 Dec 2014
  56. 56.
    Van Natta, D., Becker, J., Bowley, G.: Tabloid Hack Attack on Royals, and Beyond. The New York Times Magazine, 1 September 2010. http://topics.nytimes.com/top/reference/timestopics/organizations/n/news_of_the_world/index.html. Accessed 17 Dec 2014

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Department of Computer ScienceMillersville UniversityMillersvilleUSA

Personalised recommendations