EFFector Online 4.2 12/17/1992

 


              //////////////  //////////////// //////////////         

            ////             ////             ////                    

_________ /////////________ /////////_______ /////////________________

        ////               ////             ////                      

      //////////////////  ////             ////                       

                                                                      

//////////////////////////////////////////////////////////////////////

EFFector Online 4.2           12/17/1992               editors@eff.org

A Publication of the Electronic Frontier Foundation     ISSN 1062-9424

                     -==--==--==-<>-==--==--==-

                    MEGATRENDS OR MEGAMISTAKES?

        What Ever Happened to the Information Society?

  (Part 2 of 2 Parts.) Part 1 was published in EFFector Online 4.1)


              by Tom Forester, Senior Lecturer,

         School of Computing & Information Technology,

             Griffith University, Queensland, Australia


                [Continued from EFFector Online 4.1]

                      UNINTENDED CONSEQUENCES 


NEW SOCIAL VULNERABILITIES 


The IT revolution has created a whole new range of problems for

society - problems which were largely unexpected.  Some arise from

the propensity of computers to malfunction, others arise from their

misuse by humans.   


As complex industrial societies become more dependent on computers,

they become more vulnerable to technological failure because

computers have often proved to be unreliable, insecure and

unmanageable. Malfunctioning hardware and software is much more

common than many (especially those in the computer industry!) would

have us believe. There is little doubt that we put too much faith in

these supposedly-infallible machines. Computers are permeating almost

every aspect of our lives, but unlike other pervasive technologies

such as electricity, television and the motor car, computers are on

the whole less reliable and less predictable in their behaviour. This

is because they are discrete state digital electronic devices which

are prone to total and catastrophic failure. Computer systems, when

they are "down," are completely down, unlike analog or mechanical

devices which may only be partially down and are thus still partially

usable.    


Popular areas for computer malfunctions include telephone billing and

telephone switching software, bank statements and bank teller

machines, electronic funds transfer systems and motor vehicle licence

databases. Industrial robots have been known to go berserk, while

heart pacemakers and automatic garage door openers have been rendered

useless by electro-magnetic radiation or "electronic smog" emitted

from point-of-sale terminals, personal computers and video games. 

Although computers have often taken the "blame" on these occasions,

the ultimate cause of failure in most cases is, in fact, human error.

The cost of all this downtime is huge: for example, it has been

reported that British businesses suffer around 30 major mishaps a

year, involving losses of millions of pounds. The cost of software

failures alone in the UK is conservatively estimated at $900 million

per year (Woolnough 1988). In 1989, a British Computer Society

committee reported that much software was now so complex that current

skills in safety assessment were inadequate and therefore the safety

of people could not be guaranteed (Mellor 1989). 


Computers enable enormous quantities of information to be stored,

retrieved and transmitted at great speed on a scale not possible

before. This is all very well, but it has serious implications for

data security and personal privacy because computer networks are

inherently insecure. The recent activities of hackers and data

thieves in the US, Germany and Britain have shown how all-too-easy it

still is to break into even the most sophisticated financial and

military systems.  Malicious virus creators have wreaked havoc on

important academic and government communication networks. The list of

scams perpetrated by the new breed of high-tech criminals, ranging

from airline ticket reservation fraud to the reprogramming of the

chips inside mobile phones, is growing daily.  Some people have had

their careers and lives ruined by unauthorized users gaining access

to supposedly-confidential databases containing medical, financial

and criminal records.   


Computer systems are often incredibly complex - so complex, in fact,

that they are not always understood even by their creators (although

few are willing to admit it!). This often makes them completely

unmanageable. Unmanageable complexity can result in massive foul-ups

or spectacular budget "runaways."  For example, Bank of America in

1988 had to abandon a $20 million computer system after spending five

years and a further $60 million trying to make it work!  Allstate

Insurance saw the cost of its new system rise from $8 million to a

staggering $100 million and estimated completion delayed from 1987 to

1993!  Moreover, the problem seems to be getting worse: in 1988 the

American Arbitration Association took on 190 computer disputes, most

of which involved defective systems. The claims totalled $200 million

- up from only $31 million in 1984. 


Complexity can also result in disaster: no computer is 100 per cent

guaranteed because it is virtually impossible to anticipate all

sources of failure. Yet computers are regularly being used for all

sorts of critical applications such as saving lives, flying aircraft,

running nuclear power stations, transferring vast sums of money and

controlling missile systems - and this can sometimes have tragic

consequences.  For example, between 1982 and 1987, some 22 US

servicemen died in five separate crashes of the USAF's sophisticated

Blackhawk helicopter before the problem was traced to its computer-

based 'fly-by-wire' system (Forester and Morrison 1990). At least two

people were killed after receiving overdoses of radiation

administered by the computerized Therac 25 X-ray machines, and there

are many other examples of computer foul-ups causing death and injury

(Forester and Morrison 1990). 


Just to rub it in, I should also point out that computer systems are

equally  vulnerable to fires, floods, earthquakes and even quite

short power outages or voltage drops caused by "dirty power", as well

as attacks by outside hackers and sabotage from inside employees. For

example, in Chicago in 1986, a disgruntled employee at Encyclopedia

Britannica , angry at having been laid-off, merely tapped into the

encyclopedia's database and made a few alterations to the text being

prepared for a new edition of the renowned work - like changing

references to Jesus Christ to Allah and inserting the names of

company executives in odd positions. As one executive commented, "In

the computer age, this is exactly what we have nightmares about". 


A year later, another saboteur shut down the entire National

Association of Securities Dealers' automatic quotation service

(NASDAQ) for 82 minutes, keeping 20 million shares from being traded.

The saboteur in question was an adventurous squirrel, who had caused

a short circuit in Trumbull, Connecticut, where NASDAQ's main

computer is situated.  In Australia, foxes have taken to digging up

new optical fibre cables to eat the plastic cover, while sharks have

been doing the same to submarine fibre optic telephone cables on the

floor of the Pacific ocean.  In Denmark, a strike by 600 computer

personnel paralysed the government for four months in 1987, causing

the ruling party to call an early general election (UPI 1987), while

in the same year an Australian saboteur carefully severed 24 cables

in a Sydney tunnel and knocked out 35,000 telephone, fax and point-

of-sale lines, putting hundreds of businesses in 40 suburbs out of

action for up to 48 hours (The Australian, 23 November 1987, page 1). 


As society becomes more dependent on computers, we also become more

vulnerable to the misuse of computers by human beings. The theft of

copyright software is widespread, while recent, well-publicized

incidents of hacking, virus creation, computer-based fraud and

invasion of privacy have been followed by a rising chorus of calls

for improved "ethics" in computing and new laws to protect citizens

from computerized anarchy.  


It can be argued that the "information" or "knowledge" society cannot

possibly flourish unless better protection is offered to individuals

and companies who generate wealth from information.  Yet copying of

software is allegedly costing US producers alone $10-12 billion a

year, according to the Business Software Association (BSA).  In

Europe, where software piracy is costing producers $4.5 billion a

year according to EC figures, the BSA has been forced to mount raids

on major users in Italy and France. Even in Germany, "When you

compare the number of pcs sold with the amount of legitimate software

sold, two-thirds of the computers must be used as expensive

doorstops," says a Microsoft spokesman.  


In Asia, software piracy is rampant. It has been estimated that 7 or

8 copies of well-known packages exist for every legitimate copy sold

in Singapore, where the local economy benefits to the tune of

millions of dollars a year from the counterfeiting of Western

products. In Taiwan, police raids in 1990 netted more than 5,000

counterfeit packages of MS-DOS, 6,000 counterfeit MS-DOS manuals in

English, French and German, and 12,500 disks with bogus Microsoft

labels on them (Jinman 1991).  Hong Kong police busted a software

mail order racket, seizing no less than 109,000 disks, manuals and

other counterfeit kit from a wooden hut on a remote hillside. They

had a street value of $3 million. It is estimated that 97% of all the

software in Thailand has been copied, while copying is also rife in

Pakistan, Malaysia, South Korea and mainland China. So much for the

economic "miracles" of those "little Dragons" of Asia!  


Unless more is done to curb software copying, we are likely to see,

first, a sharp decline in software production. With the erosion of

the potential rewards from software development, programmers are

likely to move into more lucrative areas of the IT industry. And less

software producers will mean less innovative software being produced. 

Second, continued copying will lead to continued rises in software

prices. Already, developers have to recoup the anticipated losses

from copying by charging more than would be necessary if people did

not copy in the first place. Because copying software is so easy and

so widespread, the law - whether it be copyright law, patent law or

contract law - is not a lot of use. Copying is hard to prove in court

and it is nigh impossible to catch copiers in the act. The best hope

for the IT industry is to try to change social attitudes and

individual consciences. 


"Hackers" are another unplanned product of the IT revolution.  Mostly

young males, these computer enthusiasts specialize in gaining

unauthorized access to other peoples' computer systems for fun and

for profit.  Some like the challenge of computer "cracking", some are

little more than electronic vandals who set out to cause damage,

while others have ended up betraying their country - like the members

of the Chaos Computer Club of West Germany who stole US military

secrets which they sold to the KGB in order to fund their expensive

drug habits (the charred body of one of their number, Karl Koch, was

later found in a forest outside Hannover).  In the last couple of

years, enormous time and effort has also been spent making good the

damage caused by malicious computer anarchists who have let loose

"viruses" which have infected thousands of systems and millions of

disks around the world.  


The IT revolution has also made it easier to put people under

electronic surveillance and it has increased the likelihood of

individuals having their privacy invaded.  Burnham (1983) pointed out

that IT enables governments and commercial organisations to store

vast amounts of "transactional data", such as details of phone calls,

financial payments, air travel, and so on.  From these, a composite

picture of an individual's friendships, spending habits and movements

can be built up.  New IT gadgetry makes it much easier to spy on

people with hidden bugs and other eavesdropping devices, to gather

information by, for example, illicit phone taps, and to directly

monitor the performance of employees  with videos and computers.

Electronic databases containing vital medical, financial and criminal

records - which are often inaccurate - have been accessed by

unauthorized users. As Linowes (1989) and Flaherty (1990) argue, this

creates a major problem of how to protect privacy in "information"

societies - a problem which the law has been slow to tackle. 


 

NEW PSYCHOLOGICAL MALADIES 


The IT revolution has brought with it a number of psychological

problems associated with computer-mediated communication. These have

implications for both organisational productivity and human

relationships.  


One major problem is that of "information overload" or so-called

"infoglut". This arises because modern society generates so much new

information that we are overwhelmed by it all and become unable to

distinguish between what is useful and what is not-so-useful. In

essence, it is a problem of not being able to see the wood for the

trees. For example, 14,000 book publishers in the US release onto the

market 50,000 new titles every year. There are now at least 40,000

scientific journals publishing more than 1 million new papers each

year - that's nearly 3,000 per day - and the scientific literature is

doubling every 10-15 years. Clearly, it is impossible for any one

individual to keep up with the literature, except for very small

areas.  The book and research paper explosion has been assisted by

the "publish or perish" ethic in academia, which encourages the

production of mediocre, repetitive and largely useless work. It also

creates a serious headache for cash-strapped libraries.  


Improvements in IT enable us to gather, store and transmit

information in vast quantity, but not to interpret it.  But what are

we going to do with all that information?  We have plenty of

information technology - what is perhaps needed now is more

intelligence technology, to help us make sense of the growing volume

of information stored in the form of statistical data, documents,

messages, and so on.  For example, not many people know that the

infamous hole in the ozone layer remained undetected for seven years

as a result of infoglut. The hole had in fact been identified by a US

weather satellite in 1979, but nobody realised this at the time

because the information was buried - along with 3 million other

unread tapes - in the archives of the National Records Centre in

Washington DC. It was only when British scientists were analysing the

data much later in 1986 that the hole in the ozone was first

"discovered".  


In commerce and in government, it is alleged that infloglut is

affecting decision-making to such an extent that some organisations

now suffer from "analysis paralysis."  Managers and administrators

become overloaded and prevaricate by calling for more studies,

reports, etc, instead of actually making a decision.  But as someone

once said, "waiting for all the facts to come in" can be damn

frustrating if the facts never stop coming!  In the military sphere,

information overload has caused pilots to crash fighter aircraft.  It

has also played a role in civilian and military disasters such as

Bhopal and the downing of an Iranian airbus over the Persian Gulf by

the USS Vincennes. The US military is now having to spend large sums

of money on "human factors" research - that is, studying how humans

can adequately relate to complex, high-tech weapons systems which

operate at lightning-fast speeds.   


There is also serious concern that media infoglut is having a

damaging effect on society - in particular the younger generation. 

As Chesebro and Bonsall (1989) show, the television set is on in the

average American household for 7 hours and 7 minutes a day. In

addition, recorded video tapes are watched for a further 5 hours 8

minutes a week on average (1987 figures).  Young Americans can also

tune in to any of 9,300 radio stations in the US, on one of the 5.3

radios in the average American household.  In these and other ways,

the typical American encounters no less than 1,600 advertisements

each day.  By the age of 17, the average American child would have

seen over one-third of a million ads. It is little wonder that US

academics are talking about America "amusing itself to death", its

collective mind numbed by video-pulp, 10-second sound bites and 30-

second video clips.  A recent report by the Times Mirror group

concluded that the current under-30s generation in the US - despite

the benefits of a higher standard of living, better education,

information technology, etc - "knows less, cares less and reads

newspapers less than any generation in the past five decades" (Zoglin

1990).  


A second set of problems concerns the way some people use the new

computer-based communication technologies and how they relate to

other people as a result.  For instance, some managers have been

diagnosed "communicaholic" because of their obsessive desire to keep

in touch and to constantly communicate using their car phones and fax

machines. Some have allegedly become "spreadsheet junkies", playing

endless what-if? games on their computers, or "e.mail addicts"

spending hours sending and answering trivial e.mail messages. But

does this "hyperconnectedness" mean that they are doing their jobs

any better and are they making wiser decisions?  There is some

evidence that too much "in touch" may actually be destructive of work

relationships - subordinates usually want to be left alone to get on

with the job.  Calling people at home for progress reports can

increase stress by further blurring the boundaries between work and

nonwork. And what of those car phone conversations?  Many have long

suspected the quality of such communication and now research at

Loughborough University in the UK has confirmed that car phones can

seriously impair negotiating and decision-making skills.  Rather like

US president Gerald Ford (about whom it was said that he couldn't

think and chew gum at the same time), it seems that 4 out of 5 UK

executives cannot think and drive at the same time. For car phone

users, both their businesses and their cars were more likely to

crash. 


A further problem is "technobabble". This modern malady has two

aspects. The first is the inability of computer personnel to explain

in plain English just what they or their systems can do - or the

value in business terms of investing more money in IT equipment. In

many organisations, top management and IT departments still speak a

different language and this has serious consequences for

organisational efficiency.  Second, Barry (1991) has described the

way in which computer terminology and techno-jargon is being applied

indiscriminately to areas of life which have nothing at all to do

with technology. Thus, people these days do not merely converse with

each other, they interface.  It is not uncommon to hear people refer

to their leisure hours as downtime.  In California's Silicon Valley,

getting something off ones's chest is even known as core-dumping. 

Just as some people are coming to think of themselves as computers,

so they are also beginning to view computers as "intelligent" or

"thinking" people - and yet the analogy between conventional Von

Neumann computers and the human brain has long been discredited.


PUTTING HUMANS BACK IN THE PICTURE  


We have seen that many of the predictions made about the impact of

computers on society have been wide of the mark, primarily because

they have accorded too great a role to technology and too little a

role to human needs and abilities.  At the same time, there have been

a number of unanticipated problems thrown up by the IT revolution,

most of which involve the human factor.  


Perhaps the time has come for a major reassessment of our

relationship to technology, especially the new information and

communication technologies. After all, haven't manufacturers

belatedly discovered that expensive high-tech solutions are not

always appropriate for production problems, that robots are more

troublesome than people and that the most "flexible manufacturing

system" available to them is something called a human operator? 

Didn't one study of a government department conclude that the only

databases worth accessing were those carried around in the heads of

long-serving employees?  And is it not the case that the most

sophisticated communication technology available to us is still

something called speaking to each other?  One conclusion to be drawn

from this is that technological advances in computing seem to have

outpaced our ability to make use of them.  


Computers have also de-humanized many social activities ranging from

commercial transactions to hospital care. Human interaction has

tended to decline in the computerized workplace. ATMs have de-

personalized banking. Even crime has been de-personalized by the

computer - pressing a few keys to siphon-off funds is not the same as

bashing someone over the head and running-off with the cash!  To

many, the recent military conflict in the Gulf resembled a giant

video game and even became known as the "Nintendo War". There is also

little doubt that many computer scientists and other computer

enthusiasts have low needs for social interaction and seem to relate

better to their machines than they do to other human beings - the so-

called "nerd" syndrome.  Further, computers have speeded-up the pace

of life, leaving little time for calm reflection and contemplation.

This can lead to "technostress", fatigue, anxiety and burnout.  Most

people now know that slow is healthier, but there is little evidence

that people are slowing down.  


Perhaps we should go back to basics and first decide what we really

want out of life - a decent home, a satisfying family life, a

reasonable standard of living, a clean environment, an interesting

job with a healthy workstyle - and then direct technology toward

these simple, human ends. It would be nice to think that our schools

and colleges are helping make future generations more aware of the

choices and the possibilities, rather than fatalistically joining in

the uncritical, headlong rush toward an ill-defined and ill-thought-

out high-tech future.  


                         ===========

Opening Address to International Conference on the Information

Society, Gottlieb Duttweiler Institute / Green Meadow Foundation,

Zurich, Switzerland, 18 November 1991

                         ===========


                   -==--==--==-<>-==--==--==-



         THE SECOND ANNUAL INTERNATIONAL EFF PIONEER AWARDS:

                       CALL FOR NOMINATIONS

                     Deadline: December 31,1992


In every field of human endeavor,there are those dedicated to expanding

knowledge,freedom,efficiency and utility. Along the electronic frontier,

this is especially true. To recognize this,the Electronic Frontier

Foundation has established the Pioneer Awards for deserving individuals

and organizations.


The Pioneer Awards are international and nominations are open to all.


In March of 1992, the first EFF Pioneer Awards were given in Washington

D.C. The winners were: Douglas C. Engelbart of Fremont, California;

Robert Kahn of Reston, Virginia; Jim Warren of Woodside, California; Tom

Jennings of San Francisco, California; and Andrzej Smereczynski of

Warsaw, Poland.


The Second Annual Pioneer Awards will be given in San Francisco,

California at the 3rd Conference on Computers, Freedom, and Privacy

in March of 1993.


All valid nominations will be reviewed by a panel of impartial judges

chosen for their knowledge of computer-based communications and the

technical, legal, and social issues involved in networking.


There are no specific categories for the Pioneer Awards, but the

following guidelines apply:


   1) The nominees must have made a substantial contribution to the

      health, growth, accessibility, or freedom of computer-based

      communications.


   2) The contribution may be technical, social, economic or cultural.


   3) Nominations may be of individuals, systems, or organizations in

      the private or public sectors.


   4) Nominations are open to all, and you may nominate more than one

      recipient. You may nominate yourself or your organization.


   5) All nominations, to be valid, must contain your reasons, however

      brief, on why you are nominating the individual or organization,

      along with a means of contacting the nominee, and your own contact

      number. No anonymous nominations will be allowed.


   6) Every person or organization, with the single exception of EFF

      staff members, are eligible for Pioneer Awards.


   7) Persons or representatives of organizations receiving a Pioneer

      Award will be invited to attend the ceremony at the Foundation's

      expense.


You may nominate as many as you wish, but please use one form per

nomination. You may return the forms to us via email to


             pioneer@eff.org


You may mail them to us at:

             Pioneer Awards, EFF,

             155 Second Street

             Cambridge MA 02141.


You may FAX them to us at:

             +1 617 864 0866


Just tell us the name of the nominee, the phone number or email address

at which the nominee can be reached, and, most important, why you feel

the nominee deserves the award.  You may attach supporting

documentation.  Please include your own name, address, and phone number.


We're looking for the Pioneers of the Electronic Frontier that have made

and are making a difference. Thanks for helping us find them,


The Electronic Frontier Foundation

                   -==--==--==-<>-==--==--==-


         MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION


If you support our goals and our work, you can show that support by

becoming a member now. Members receive our bi-weekly electronic

newsletter, EFFector Online, the @eff.org newsletter

and special releases and other notices on our activities.  But because

we believe that support should be freely given, you can receive these

things even if you do not elect to become a member.


Our memberships are $20.00 per year for students, $40.00 per year for

regular members.  You may, of course, donate more if you wish.


Our privacy policy: The Electronic Frontier Foundation will never, under

any circumstances, sell any part of its membership list.  We will, from

time to time, share this list with other non-profit organizations whose

work we determine to be in line with our goals. If you do not grant

explicit permission, we assume that you do not wish your membership

disclosed to any group for any reason.


---------------- EFF MEMBERSHIP FORM ---------------


Mail to: The Electronic Frontier Foundation, Inc.

    155 Second St. #41

    Cambridge, MA 02141


I wish to become a member of the EFF  I enclose:$__________

    $20.00 (student or low income membership)

    $40.00 (regular membership)

    $100.00(Corporate or company membership.

    This allows any organization to

    become a member of EFF. It allows

    such an organization, if it wishes

    to designate up to five individuals

    within the organization as members.)


    I enclose an additional donation of $


Name:


Organization:


Address:


City or Town:


State:     Zip:    Phone:(    )     (optional)


FAX:(    )    (optional)


Email address:


I enclose a check [  ]   .

Please charge my membership in the amount of $

to my Mastercard [  ]     Visa [  ]    American Express [ ]


Number:


Expiration date:


Signature:


Date:


I hereby grant permission to the EFF to share my name with

other non-profit groups from time to time as it deems

appropriate   [  ]  .

      Initials:


Your membership/donation is fully tax deductible.

=====================================================================

     EFFector Online is published by

     The Electronic Frontier Foundation

     155 Second Street, Cambridge MA 02141

     Phone: +1 617 864 0665 FAX: +1 617 864 0866

     Internet Address: eff@eff.org

 Reproduction of this publication in electronic media is encouraged.

 Signed articles do not necessarily represent the view of the EFF.

 To reproduce signed articles individually, please contact the authors

 for their express permission.

=====================================================================

     This newsletter is printed on 100% recycled electrons.



Comments

Popular posts from this blog

BOTTOM LIVE script

Evidence supporting quantum information processing in animals

ARMIES OF CHAOS