////////////// //////////////// ////////////// //// //// //// _________ /////////________ /////////_______ /////////________________ //// //// //// ////////////////// //// //// ////////////////////////////////////////////////////////////////////// EFFector Online 4.2 12/17/1992 editors@eff.org A Publication of the Electronic Frontier Foundation ISSN 1062-9424 -==--==--==-<>-==--==--==- MEGATRENDS OR MEGAMISTAKES? What Ever Happened to the Information Society? (Part 2 of 2 Parts.) Part 1 was published in EFFector Online 4.1) by Tom Forester, Senior Lecturer, School of Computing & Information Technology, Griffith University, Queensland, Australia [Continued from EFFector Online 4.1] UNINTENDED CONSEQUENCES NEW SOCIAL VULNERABILITIES The IT revolution has created a whole new range of problems for society - problems which were largely unexpected. Some arise from the propensity of computers to malfunction, others arise from their misuse by humans. As complex industrial societies become more dependent on computers, they become more vulnerable to technological failure because computers have often proved to be unreliable, insecure and unmanageable. Malfunctioning hardware and software is much more common than many (especially those in the computer industry!) would have us believe. There is little doubt that we put too much faith in these supposedly-infallible machines. Computers are permeating almost every aspect of our lives, but unlike other pervasive technologies such as electricity, television and the motor car, computers are on the whole less reliable and less predictable in their behaviour. This is because they are discrete state digital electronic devices which are prone to total and catastrophic failure. Computer systems, when they are "down," are completely down, unlike analog or mechanical devices which may only be partially down and are thus still partially usable. Popular areas for computer malfunctions include telephone billing and telephone switching software, bank statements and bank teller machines, electronic funds transfer systems and motor vehicle licence databases. Industrial robots have been known to go berserk, while heart pacemakers and automatic garage door openers have been rendered useless by electro-magnetic radiation or "electronic smog" emitted from point-of-sale terminals, personal computers and video games. Although computers have often taken the "blame" on these occasions, the ultimate cause of failure in most cases is, in fact, human error. The cost of all this downtime is huge: for example, it has been reported that British businesses suffer around 30 major mishaps a year, involving losses of millions of pounds. The cost of software failures alone in the UK is conservatively estimated at $900 million per year (Woolnough 1988). In 1989, a British Computer Society committee reported that much software was now so complex that current skills in safety assessment were inadequate and therefore the safety of people could not be guaranteed (Mellor 1989). Computers enable enormous quantities of information to be stored, retrieved and transmitted at great speed on a scale not possible before. This is all very well, but it has serious implications for data security and personal privacy because computer networks are inherently insecure. The recent activities of hackers and data thieves in the US, Germany and Britain have shown how all-too-easy it still is to break into even the most sophisticated financial and military systems. Malicious virus creators have wreaked havoc on important academic and government communication networks. The list of scams perpetrated by the new breed of high-tech criminals, ranging from airline ticket reservation fraud to the reprogramming of the chips inside mobile phones, is growing daily. Some people have had their careers and lives ruined by unauthorized users gaining access to supposedly-confidential databases containing medical, financial and criminal records. Computer systems are often incredibly complex - so complex, in fact, that they are not always understood even by their creators (although few are willing to admit it!). This often makes them completely unmanageable. Unmanageable complexity can result in massive foul-ups or spectacular budget "runaways." For example, Bank of America in 1988 had to abandon a $20 million computer system after spending five years and a further $60 million trying to make it work! Allstate Insurance saw the cost of its new system rise from $8 million to a staggering $100 million and estimated completion delayed from 1987 to 1993! Moreover, the problem seems to be getting worse: in 1988 the American Arbitration Association took on 190 computer disputes, most of which involved defective systems. The claims totalled $200 million - up from only $31 million in 1984. Complexity can also result in disaster: no computer is 100 per cent guaranteed because it is virtually impossible to anticipate all sources of failure. Yet computers are regularly being used for all sorts of critical applications such as saving lives, flying aircraft, running nuclear power stations, transferring vast sums of money and controlling missile systems - and this can sometimes have tragic consequences. For example, between 1982 and 1987, some 22 US servicemen died in five separate crashes of the USAF's sophisticated Blackhawk helicopter before the problem was traced to its computer- based 'fly-by-wire' system (Forester and Morrison 1990). At least two people were killed after receiving overdoses of radiation administered by the computerized Therac 25 X-ray machines, and there are many other examples of computer foul-ups causing death and injury (Forester and Morrison 1990). Just to rub it in, I should also point out that computer systems are equally vulnerable to fires, floods, earthquakes and even quite short power outages or voltage drops caused by "dirty power", as well as attacks by outside hackers and sabotage from inside employees. For example, in Chicago in 1986, a disgruntled employee at Encyclopedia Britannica , angry at having been laid-off, merely tapped into the encyclopedia's database and made a few alterations to the text being prepared for a new edition of the renowned work - like changing references to Jesus Christ to Allah and inserting the names of company executives in odd positions. As one executive commented, "In the computer age, this is exactly what we have nightmares about". A year later, another saboteur shut down the entire National Association of Securities Dealers' automatic quotation service (NASDAQ) for 82 minutes, keeping 20 million shares from being traded. The saboteur in question was an adventurous squirrel, who had caused a short circuit in Trumbull, Connecticut, where NASDAQ's main computer is situated. In Australia, foxes have taken to digging up new optical fibre cables to eat the plastic cover, while sharks have been doing the same to submarine fibre optic telephone cables on the floor of the Pacific ocean. In Denmark, a strike by 600 computer personnel paralysed the government for four months in 1987, causing the ruling party to call an early general election (UPI 1987), while in the same year an Australian saboteur carefully severed 24 cables in a Sydney tunnel and knocked out 35,000 telephone, fax and point- of-sale lines, putting hundreds of businesses in 40 suburbs out of action for up to 48 hours (The Australian, 23 November 1987, page 1). As society becomes more dependent on computers, we also become more vulnerable to the misuse of computers by human beings. The theft of copyright software is widespread, while recent, well-publicized incidents of hacking, virus creation, computer-based fraud and invasion of privacy have been followed by a rising chorus of calls for improved "ethics" in computing and new laws to protect citizens from computerized anarchy. It can be argued that the "information" or "knowledge" society cannot possibly flourish unless better protection is offered to individuals and companies who generate wealth from information. Yet copying of software is allegedly costing US producers alone $10-12 billion a year, according to the Business Software Association (BSA). In Europe, where software piracy is costing producers $4.5 billion a year according to EC figures, the BSA has been forced to mount raids on major users in Italy and France. Even in Germany, "When you compare the number of pcs sold with the amount of legitimate software sold, two-thirds of the computers must be used as expensive doorstops," says a Microsoft spokesman. In Asia, software piracy is rampant. It has been estimated that 7 or 8 copies of well-known packages exist for every legitimate copy sold in Singapore, where the local economy benefits to the tune of millions of dollars a year from the counterfeiting of Western products. In Taiwan, police raids in 1990 netted more than 5,000 counterfeit packages of MS-DOS, 6,000 counterfeit MS-DOS manuals in English, French and German, and 12,500 disks with bogus Microsoft labels on them (Jinman 1991). Hong Kong police busted a software mail order racket, seizing no less than 109,000 disks, manuals and other counterfeit kit from a wooden hut on a remote hillside. They had a street value of $3 million. It is estimated that 97% of all the software in Thailand has been copied, while copying is also rife in Pakistan, Malaysia, South Korea and mainland China. So much for the economic "miracles" of those "little Dragons" of Asia! Unless more is done to curb software copying, we are likely to see, first, a sharp decline in software production. With the erosion of the potential rewards from software development, programmers are likely to move into more lucrative areas of the IT industry. And less software producers will mean less innovative software being produced. Second, continued copying will lead to continued rises in software prices. Already, developers have to recoup the anticipated losses from copying by charging more than would be necessary if people did not copy in the first place. Because copying software is so easy and so widespread, the law - whether it be copyright law, patent law or contract law - is not a lot of use. Copying is hard to prove in court and it is nigh impossible to catch copiers in the act. The best hope for the IT industry is to try to change social attitudes and individual consciences. "Hackers" are another unplanned product of the IT revolution. Mostly young males, these computer enthusiasts specialize in gaining unauthorized access to other peoples' computer systems for fun and for profit. Some like the challenge of computer "cracking", some are little more than electronic vandals who set out to cause damage, while others have ended up betraying their country - like the members of the Chaos Computer Club of West Germany who stole US military secrets which they sold to the KGB in order to fund their expensive drug habits (the charred body of one of their number, Karl Koch, was later found in a forest outside Hannover). In the last couple of years, enormous time and effort has also been spent making good the damage caused by malicious computer anarchists who have let loose "viruses" which have infected thousands of systems and millions of disks around the world. The IT revolution has also made it easier to put people under electronic surveillance and it has increased the likelihood of individuals having their privacy invaded. Burnham (1983) pointed out that IT enables governments and commercial organisations to store vast amounts of "transactional data", such as details of phone calls, financial payments, air travel, and so on. From these, a composite picture of an individual's friendships, spending habits and movements can be built up. New IT gadgetry makes it much easier to spy on people with hidden bugs and other eavesdropping devices, to gather information by, for example, illicit phone taps, and to directly monitor the performance of employees with videos and computers. Electronic databases containing vital medical, financial and criminal records - which are often inaccurate - have been accessed by unauthorized users. As Linowes (1989) and Flaherty (1990) argue, this creates a major problem of how to protect privacy in "information" societies - a problem which the law has been slow to tackle. NEW PSYCHOLOGICAL MALADIES The IT revolution has brought with it a number of psychological problems associated with computer-mediated communication. These have implications for both organisational productivity and human relationships. One major problem is that of "information overload" or so-called "infoglut". This arises because modern society generates so much new information that we are overwhelmed by it all and become unable to distinguish between what is useful and what is not-so-useful. In essence, it is a problem of not being able to see the wood for the trees. For example, 14,000 book publishers in the US release onto the market 50,000 new titles every year. There are now at least 40,000 scientific journals publishing more than 1 million new papers each year - that's nearly 3,000 per day - and the scientific literature is doubling every 10-15 years. Clearly, it is impossible for any one individual to keep up with the literature, except for very small areas. The book and research paper explosion has been assisted by the "publish or perish" ethic in academia, which encourages the production of mediocre, repetitive and largely useless work. It also creates a serious headache for cash-strapped libraries. Improvements in IT enable us to gather, store and transmit information in vast quantity, but not to interpret it. But what are we going to do with all that information? We have plenty of information technology - what is perhaps needed now is more intelligence technology, to help us make sense of the growing volume of information stored in the form of statistical data, documents, messages, and so on. For example, not many people know that the infamous hole in the ozone layer remained undetected for seven years as a result of infoglut. The hole had in fact been identified by a US weather satellite in 1979, but nobody realised this at the time because the information was buried - along with 3 million other unread tapes - in the archives of the National Records Centre in Washington DC. It was only when British scientists were analysing the data much later in 1986 that the hole in the ozone was first "discovered". In commerce and in government, it is alleged that infloglut is affecting decision-making to such an extent that some organisations now suffer from "analysis paralysis." Managers and administrators become overloaded and prevaricate by calling for more studies, reports, etc, instead of actually making a decision. But as someone once said, "waiting for all the facts to come in" can be damn frustrating if the facts never stop coming! In the military sphere, information overload has caused pilots to crash fighter aircraft. It has also played a role in civilian and military disasters such as Bhopal and the downing of an Iranian airbus over the Persian Gulf by the USS Vincennes. The US military is now having to spend large sums of money on "human factors" research - that is, studying how humans can adequately relate to complex, high-tech weapons systems which operate at lightning-fast speeds. There is also serious concern that media infoglut is having a damaging effect on society - in particular the younger generation. As Chesebro and Bonsall (1989) show, the television set is on in the average American household for 7 hours and 7 minutes a day. In addition, recorded video tapes are watched for a further 5 hours 8 minutes a week on average (1987 figures). Young Americans can also tune in to any of 9,300 radio stations in the US, on one of the 5.3 radios in the average American household. In these and other ways, the typical American encounters no less than 1,600 advertisements each day. By the age of 17, the average American child would have seen over one-third of a million ads. It is little wonder that US academics are talking about America "amusing itself to death", its collective mind numbed by video-pulp, 10-second sound bites and 30- second video clips. A recent report by the Times Mirror group concluded that the current under-30s generation in the US - despite the benefits of a higher standard of living, better education, information technology, etc - "knows less, cares less and reads newspapers less than any generation in the past five decades" (Zoglin 1990). A second set of problems concerns the way some people use the new computer-based communication technologies and how they relate to other people as a result. For instance, some managers have been diagnosed "communicaholic" because of their obsessive desire to keep in touch and to constantly communicate using their car phones and fax machines. Some have allegedly become "spreadsheet junkies", playing endless what-if? games on their computers, or "e.mail addicts" spending hours sending and answering trivial e.mail messages. But does this "hyperconnectedness" mean that they are doing their jobs any better and are they making wiser decisions? There is some evidence that too much "in touch" may actually be destructive of work relationships - subordinates usually want to be left alone to get on with the job. Calling people at home for progress reports can increase stress by further blurring the boundaries between work and nonwork. And what of those car phone conversations? Many have long suspected the quality of such communication and now research at Loughborough University in the UK has confirmed that car phones can seriously impair negotiating and decision-making skills. Rather like US president Gerald Ford (about whom it was said that he couldn't think and chew gum at the same time), it seems that 4 out of 5 UK executives cannot think and drive at the same time. For car phone users, both their businesses and their cars were more likely to crash. A further problem is "technobabble". This modern malady has two aspects. The first is the inability of computer personnel to explain in plain English just what they or their systems can do - or the value in business terms of investing more money in IT equipment. In many organisations, top management and IT departments still speak a different language and this has serious consequences for organisational efficiency. Second, Barry (1991) has described the way in which computer terminology and techno-jargon is being applied indiscriminately to areas of life which have nothing at all to do with technology. Thus, people these days do not merely converse with each other, they interface. It is not uncommon to hear people refer to their leisure hours as downtime. In California's Silicon Valley, getting something off ones's chest is even known as core-dumping. Just as some people are coming to think of themselves as computers, so they are also beginning to view computers as "intelligent" or "thinking" people - and yet the analogy between conventional Von Neumann computers and the human brain has long been discredited. PUTTING HUMANS BACK IN THE PICTURE We have seen that many of the predictions made about the impact of computers on society have been wide of the mark, primarily because they have accorded too great a role to technology and too little a role to human needs and abilities. At the same time, there have been a number of unanticipated problems thrown up by the IT revolution, most of which involve the human factor. Perhaps the time has come for a major reassessment of our relationship to technology, especially the new information and communication technologies. After all, haven't manufacturers belatedly discovered that expensive high-tech solutions are not always appropriate for production problems, that robots are more troublesome than people and that the most "flexible manufacturing system" available to them is something called a human operator? Didn't one study of a government department conclude that the only databases worth accessing were those carried around in the heads of long-serving employees? And is it not the case that the most sophisticated communication technology available to us is still something called speaking to each other? One conclusion to be drawn from this is that technological advances in computing seem to have outpaced our ability to make use of them. Computers have also de-humanized many social activities ranging from commercial transactions to hospital care. Human interaction has tended to decline in the computerized workplace. ATMs have de- personalized banking. Even crime has been de-personalized by the computer - pressing a few keys to siphon-off funds is not the same as bashing someone over the head and running-off with the cash! To many, the recent military conflict in the Gulf resembled a giant video game and even became known as the "Nintendo War". There is also little doubt that many computer scientists and other computer enthusiasts have low needs for social interaction and seem to relate better to their machines than they do to other human beings - the so- called "nerd" syndrome. Further, computers have speeded-up the pace of life, leaving little time for calm reflection and contemplation. This can lead to "technostress", fatigue, anxiety and burnout. Most people now know that slow is healthier, but there is little evidence that people are slowing down. Perhaps we should go back to basics and first decide what we really want out of life - a decent home, a satisfying family life, a reasonable standard of living, a clean environment, an interesting job with a healthy workstyle - and then direct technology toward these simple, human ends. It would be nice to think that our schools and colleges are helping make future generations more aware of the choices and the possibilities, rather than fatalistically joining in the uncritical, headlong rush toward an ill-defined and ill-thought- out high-tech future. =========== Opening Address to International Conference on the Information Society, Gottlieb Duttweiler Institute / Green Meadow Foundation, Zurich, Switzerland, 18 November 1991 =========== -==--==--==-<>-==--==--==- THE SECOND ANNUAL INTERNATIONAL EFF PIONEER AWARDS: CALL FOR NOMINATIONS Deadline: December 31,1992 In every field of human endeavor,there are those dedicated to expanding knowledge,freedom,efficiency and utility. Along the electronic frontier, this is especially true. To recognize this,the Electronic Frontier Foundation has established the Pioneer Awards for deserving individuals and organizations. The Pioneer Awards are international and nominations are open to all. In March of 1992, the first EFF Pioneer Awards were given in Washington D.C. The winners were: Douglas C. Engelbart of Fremont, California; Robert Kahn of Reston, Virginia; Jim Warren of Woodside, California; Tom Jennings of San Francisco, California; and Andrzej Smereczynski of Warsaw, Poland. The Second Annual Pioneer Awards will be given in San Francisco, California at the 3rd Conference on Computers, Freedom, and Privacy in March of 1993. All valid nominations will be reviewed by a panel of impartial judges chosen for their knowledge of computer-based communications and the technical, legal, and social issues involved in networking. There are no specific categories for the Pioneer Awards, but the following guidelines apply: 1) The nominees must have made a substantial contribution to the health, growth, accessibility, or freedom of computer-based communications. 2) The contribution may be technical, social, economic or cultural. 3) Nominations may be of individuals, systems, or organizations in the private or public sectors. 4) Nominations are open to all, and you may nominate more than one recipient. You may nominate yourself or your organization. 5) All nominations, to be valid, must contain your reasons, however brief, on why you are nominating the individual or organization, along with a means of contacting the nominee, and your own contact number. No anonymous nominations will be allowed. 6) Every person or organization, with the single exception of EFF staff members, are eligible for Pioneer Awards. 7) Persons or representatives of organizations receiving a Pioneer Award will be invited to attend the ceremony at the Foundation's expense. You may nominate as many as you wish, but please use one form per nomination. You may return the forms to us via email to pioneer@eff.org You may mail them to us at: Pioneer Awards, EFF, 155 Second Street Cambridge MA 02141. You may FAX them to us at: +1 617 864 0866 Just tell us the name of the nominee, the phone number or email address at which the nominee can be reached, and, most important, why you feel the nominee deserves the award. You may attach supporting documentation. Please include your own name, address, and phone number. We're looking for the Pioneers of the Electronic Frontier that have made and are making a difference. Thanks for helping us find them, The Electronic Frontier Foundation -==--==--==-<>-==--==--==- MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION If you support our goals and our work, you can show that support by becoming a member now. Members receive our bi-weekly electronic newsletter, EFFector Online, the @eff.org newsletter and special releases and other notices on our activities. But because we believe that support should be freely given, you can receive these things even if you do not elect to become a member. Our memberships are $20.00 per year for students, $40.00 per year for regular members. You may, of course, donate more if you wish. Our privacy policy: The Electronic Frontier Foundation will never, under any circumstances, sell any part of its membership list. We will, from time to time, share this list with other non-profit organizations whose work we determine to be in line with our goals. If you do not grant explicit permission, we assume that you do not wish your membership disclosed to any group for any reason. ---------------- EFF MEMBERSHIP FORM --------------- Mail to: The Electronic Frontier Foundation, Inc. 155 Second St. #41 Cambridge, MA 02141 I wish to become a member of the EFF I enclose:$__________ $20.00 (student or low income membership) $40.00 (regular membership) $100.00(Corporate or company membership. This allows any organization to become a member of EFF. It allows such an organization, if it wishes to designate up to five individuals within the organization as members.) I enclose an additional donation of $ Name: Organization: Address: City or Town: State: Zip: Phone:( ) (optional) FAX:( ) (optional) Email address: I enclose a check [ ] . Please charge my membership in the amount of $ to my Mastercard [ ] Visa [ ] American Express [ ] Number: Expiration date: Signature: Date: I hereby grant permission to the EFF to share my name with other non-profit groups from time to time as it deems appropriate [ ] . Initials: Your membership/donation is fully tax deductible. ===================================================================== EFFector Online is published by The Electronic Frontier Foundation 155 Second Street, Cambridge MA 02141 Phone: +1 617 864 0665 FAX: +1 617 864 0866 Internet Address: eff@eff.org Reproduction of this publication in electronic media is encouraged. Signed articles do not necessarily represent the view of the EFF. To reproduce signed articles individually, please contact the authors for their express permission. ===================================================================== This newsletter is printed on 100% recycled electrons. Downloaded From P-80 International Information Systems 304-744-2253