[CONTACT]

[ABOUT]

[POLICY]

EFFector Online org Publication of

Found at: gopher.meulie.net:70/EFFector/effector4.02


              //////////////  //////////////// //////////////         
            ////             ////             ////                    
_________ /////////________ /////////_______ /////////________________
        ////               ////             ////                      
      //////////////////  ////             ////                       
                                                                      
//////////////////////////////////////////////////////////////////////
EFFector Online 4.2           12/17/1992               editors@eff.org
A Publication of the Electronic Frontier Foundation     ISSN 1062-9424
                     -==--==--==-<>-==--==--==-
                    MEGATRENDS OR MEGAMISTAKES?
        What Ever Happened to the Information Society?
  (Part 2 of 2 Parts.) Part 1 was published in EFFector Online 4.1)

              by Tom Forester, Senior Lecturer,
         School of Computing & Information Technology,
             Griffith University, Queensland, Australia

                [Continued from EFFector Online 4.1]
                      UNINTENDED CONSEQUENCES 

NEW SOCIAL VULNERABILITIES 

The IT revolution has created a whole new range of problems for
the propensity of computers to malfunction, others arise from their
misuse by humans.   

As complex industrial societies become more dependent on computers,
they become more vulnerable to technological failure because
computers have often proved to be unreliable, insecure and
unmanageable. Malfunctioning hardware and software is much more
common than many (especially those in the computer industry!) would
these supposedly-infallible machines. Computers are permeating almost
every aspect of our lives, but unlike other pervasive technologies
the whole less reliable and less predictable in their behaviour. This
s because they are discrete state digital electronic devices which
are prone to total and catastrophic failure. Computer systems, when
they are "down," are completely down, unlike analog or mechanical
usable.    

telephone switching software, bank statements and bank teller
machines, electronic funds transfer systems and motor vehicle licence
useless by electro-magnetic radiation or "electronic smog" emitted
from point-of-sale terminals, personal computers and video games. 
Although computers have often taken the "blame" on these occasions,
the ultimate cause of failure in most cases is, in fact, human error.
The cost of all this downtime is huge: for example, it has been
year, involving losses of millions of pounds. The cost of software
failures alone in the UK is conservatively estimated at $900 million
committee reported that much software was now so complex that current
of people could not be guaranteed (Mellor 1989). 

Computers enable enormous quantities of information to be stored,
before. This is all very well, but it has serious implications for
nherently insecure. The recent activities of hackers and data
thieves in the US, Germany and Britain have shown how all-too-easy it
military systems.  Malicious virus creators have wreaked havoc on
mportant academic and government communication networks. The list of
from airline ticket reservation fraud to the reprogramming of the
chips inside mobile phones, is growing daily.  Some people have had
their careers and lives ruined by unauthorized users gaining access
to supposedly-confidential databases containing medical, financial
and criminal records.   

Computer systems are often incredibly complex - so complex, in fact,
that they are not always understood even by their creators (although
few are willing to admit it!). This often makes them completely
unmanageable. Unmanageable complexity can result in massive foul-ups
or spectacular budget "runaways."  For example, Bank of America in
years and a further $60 million trying to make it work!  Allstate
American Arbitration Association took on 190 computer disputes, most
of which involved defective systems. The claims totalled $200 million
- up from only $31 million in 1984. 

Complexity can also result in disaster: no computer is 100 per cent
controlling missile systems - and this can sometimes have tragic
consequences.  For example, between 1982 and 1987, some 22 US
Blackhawk helicopter before the problem was traced to its computer-
based 'fly-by-wire' system (Forester and Morrison 1990). At least two
administered by the computerized Therac 25 X-ray machines, and there
are many other examples of computer foul-ups causing death and injury
(Forester and Morrison 1990). 

Just to rub it in, I should also point out that computer systems are
equally  vulnerable to fires, floods, earthquakes and even quite
as attacks by outside hackers and sabotage from inside employees. For
example, in Chicago in 1986, a disgruntled employee at Encyclopedia
Britannica , angry at having been laid-off, merely tapped into the
encyclopedia's database and made a few alterations to the text being
company executives in odd positions. As one executive commented, "In
the computer age, this is exactly what we have nightmares about". 

A year later, another saboteur shut down the entire National
Association of Securities Dealers' automatic quotation service
(NASDAQ) for 82 minutes, keeping 20 million shares from being traded.
The saboteur in question was an adventurous squirrel, who had caused
a short circuit in Trumbull, Connecticut, where NASDAQ's main
computer is situated.  In Australia, foxes have taken to digging up
new optical fibre cables to eat the plastic cover, while sharks have
been doing the same to submarine fibre optic telephone cables on the
floor of the Pacific ocean.  In Denmark, a strike by 600 computer
the ruling party to call an early general election (UPI 1987), while
n the same year an Australian saboteur carefully severed 24 cables
n a Sydney tunnel and knocked out 35,000 telephone, fax and point-
of-sale lines, putting hundreds of businesses in 40 suburbs out of
action for up to 48 hours (The Australian, 23 November 1987, page 1). 

As society becomes more dependent on computers, we also become more
vulnerable to the misuse of computers by human beings. The theft of
copyright software is widespread, while recent, well-publicized
ncidents of hacking, virus creation, computer-based fraud and
nvasion of privacy have been followed by a rising chorus of calls
for improved "ethics" in computing and new laws to protect citizens
from computerized anarchy.  

and companies who generate wealth from information.  Yet copying of
year, according to the Business Software Association (BSA).  In
Europe, where software piracy is costing producers $4.5 billion a
year according to EC figures, the BSA has been forced to mount raids
on major users in Italy and France. Even in Germany, "When you
compare the number of pcs sold with the amount of legitimate software

n Singapore, where the local economy benefits to the tune of
millions of dollars a year from the counterfeiting of Western
counterfeit packages of MS-DOS, 6,000 counterfeit MS-DOS manuals in
English, French and German, and 12,500 disks with bogus Microsoft
labels on them (Jinman 1991).  Hong Kong police busted a software
mail order racket, seizing no less than 109,000 disks, manuals and
other counterfeit kit from a wooden hut on a remote hillside. They
economic "miracles" of those "little Dragons" of Asia!  

Unless more is done to curb software copying, we are likely to see,
first, a sharp decline in software production. With the erosion of
the potential rewards from software development, programmers are
likely to move into more lucrative areas of the IT industry. And less
Second, continued copying will lead to continued rises in software
from copying by charging more than would be necessary if people did
not copy in the first place. Because copying software is so easy and
contract law - is not a lot of use. Copying is hard to prove in court
and it is nigh impossible to catch copiers in the act. The best hope
for the IT industry is to try to change social attitudes and
ndividual consciences.

"Hackers" are another unplanned product of the IT revolution.  Mostly
young males, these computer enthusiasts specialize in gaining
unauthorized access to other peoples' computer systems for fun and
for profit.  Some like the challenge of computer "cracking", some are
little more than electronic vandals who set out to cause damage,
of the Chaos Computer Club of West Germany who stole US military
later found in a forest outside Hannover).  In the last couple of
years, enormous time and effort has also been spent making good the
"viruses" which have infected thousands of systems and millions of

The IT revolution has also made it easier to put people under
electronic surveillance and it has increased the likelihood of
ndividuals having their privacy invaded.  Burnham (1983) pointed out
that IT enables governments and commercial organisations to store
vast amounts of "transactional data", such as details of phone calls,
financial payments, air travel, and so on.  From these, a composite
can be built up.  New IT gadgetry makes it much easier to spy on
nformation by, for example, illicit phone taps, and to directly
monitor the performance of employees  with videos and computers.
Electronic databases containing vital medical, financial and criminal
unauthorized users. As Linowes (1989) and Flaherty (1990) argue, this
creates a major problem of how to protect privacy in "information"

 
NEW PSYCHOLOGICAL MALADIES 

The IT revolution has brought with it a number of psychological
mplications for both organisational productivity and human

One major problem is that of "information overload" or so-called
"infoglut". This arises because modern society generates so much new
nformation that we are overwhelmed by it all and become unable to
essence, it is a problem of not being able to see the wood for the
trees. For example, 14,000 book publishers in the US release onto the
market 50,000 new titles every year. There are now at least 40,000
year - that's nearly 3,000 per day - and the scientific literature is
ndividual to keep up with the literature, except for very small
areas.  The book and research paper explosion has been assisted by
the "publish or perish" ethic in academia, which encourages the
creates a serious headache for cash-strapped libraries.  

nformation in vast quantity, but not to interpret it.  But what are
nformation technology - what is perhaps needed now is more
ntelligence technology, to help us make sense of the growing volume
of information stored in the form of statistical data, documents,
messages, and so on.  For example, not many people know that the
nfamous hole in the ozone layer remained undetected for seven years
as a result of infoglut. The hole had in fact been identified by a US
because the information was buried - along with 3 million other
unread tapes - in the archives of the National Records Centre in
Washington DC. It was only when British scientists were analysing the
"discovered".  

affecting decision-making to such an extent that some organisations
now suffer from "analysis paralysis."  Managers and administrators
become overloaded and prevaricate by calling for more studies,
once said, "waiting for all the facts to come in" can be damn
frustrating if the facts never stop coming!  In the military sphere,
nformation overload has caused pilots to crash fighter aircraft.  It
Bhopal and the downing of an Iranian airbus over the Persian Gulf by
the USS Vincennes. The US military is now having to spend large sums
of money on "human factors" research - that is, studying how humans
can adequately relate to complex, high-tech weapons systems which
operate at lightning-fast speeds.   

There is also serious concern that media infoglut is having a
As Chesebro and Bonsall (1989) show, the television set is on in the
average American household for 7 hours and 7 minutes a day. In
addition, recorded video tapes are watched for a further 5 hours 8
minutes a week on average (1987 figures).  Young Americans can also
tune in to any of 9,300 radio stations in the US, on one of the 5.3
the typical American encounters no less than 1,600 advertisements
each day.  By the age of 17, the average American child would have
academics are talking about America "amusing itself to death", its
collective mind numbed by video-pulp, 10-second sound bites and 30-
concluded that the current under-30s generation in the US - despite
the benefits of a higher standard of living, better education,
nformation technology, etc - "knows less, cares less and reads
newspapers less than any generation in the past five decades" (Zoglin

A second set of problems concerns the way some people use the new
computer-based communication technologies and how they relate to
other people as a result.  For instance, some managers have been
n touch and to constantly communicate using their car phones and fax
machines. Some have allegedly become "spreadsheet junkies", playing
endless what-if? games on their computers, or "e.mail addicts"
any better and are they making wiser decisions?  There is some
evidence that too much "in touch" may actually be destructive of work
ncrease stress by further blurring the boundaries between work and
nonwork. And what of those car phone conversations?  Many have long
Loughborough University in the UK has confirmed that car phones can
US president Gerald Ford (about whom it was said that he couldn't
think and chew gum at the same time), it seems that 4 out of 5 UK
executives cannot think and drive at the same time. For car phone
users, both their businesses and their cars were more likely to
crash. 

A further problem is "technobabble". This modern malady has two
aspects. The first is the inability of computer personnel to explain
n plain English just what they or their systems can do - or the
value in business terms of investing more money in IT equipment. In
many organisations, top management and IT departments still speak a
organisational efficiency.  Second, Barry (1991) has described the
ndiscriminately to areas of life which have nothing at all to do
each other, they interface.  It is not uncommon to hear people refer
to their leisure hours as downtime.  In California's Silicon Valley,
Just as some people are coming to think of themselves as computers,
"thinking" people - and yet the analogy between conventional Von
Neumann computers and the human brain has long been discredited.


We have seen that many of the predictions made about the impact of
computers on society have been wide of the mark, primarily because
they have accorded too great a role to technology and too little a
a number of unanticipated problems thrown up by the IT revolution,
most of which involve the human factor.  

communication technologies. After all, haven't manufacturers
belatedly discovered that expensive high-tech solutions are not
always appropriate for production problems, that robots are more
troublesome than people and that the most "flexible manufacturing
Didn't one study of a government department conclude that the only
long-serving employees?  And is it not the case that the most
from this is that technological advances in computing seem to have
outpaced our ability to make use of them.  

Computers have also de-humanized many social activities ranging from
commercial transactions to hospital care. Human interaction has
tended to decline in the computerized workplace. ATMs have de-
computer - pressing a few keys to siphon-off funds is not the same as
bashing someone over the head and running-off with the cash!  To
many, the recent military conflict in the Gulf resembled a giant
video game and even became known as the "Nintendo War". There is also
little doubt that many computer scientists and other computer
enthusiasts have low needs for social interaction and seem to relate
better to their machines than they do to other human beings - the so-
called "nerd" syndrome.  Further, computers have speeded-up the pace
of life, leaving little time for calm reflection and contemplation.
This can lead to "technostress", fatigue, anxiety and burnout.  Most
that people are slowing down.  

these simple, human ends. It would be nice to think that our schools
and colleges are helping make future generations more aware of the
choices and the possibilities, rather than fatalistically joining in
the uncritical, headlong rush toward an ill-defined and ill-thought-
out high-tech future.  

                         ===========
Opening Address to International Conference on the Information
Society, Gottlieb Duttweiler Institute / Green Meadow Foundation,
Zurich, Switzerland, 18 November 1991
                         ===========

                   -==--==--==-<>-==--==--==-


         THE SECOND ANNUAL INTERNATIONAL EFF PIONEER AWARDS:
                       CALL FOR NOMINATIONS
                     Deadline: December 31,1992

knowledge,freedom,efficiency and utility. Along the electronic frontier,
this is especially true. To recognize this,the Electronic Frontier
Foundation has established the Pioneer Awards for deserving individuals
and organizations.

The Pioneer Awards are international and nominations are open to all.

D.C. The winners were: Douglas C. Engelbart of Fremont, California;
Robert Kahn of Reston, Virginia; Jim Warren of Woodside, California; Tom
Jennings of San Francisco, California; and Andrzej Smereczynski of
Warsaw, Poland.

The Second Annual Pioneer Awards will be given in San Francisco,
California at the 3rd Conference on Computers, Freedom, and Privacy
n March of 1993.

All valid nominations will be reviewed by a panel of impartial judges
chosen for their knowledge of computer-based communications and the
technical, legal, and social issues involved in networking.

There are no specific categories for the Pioneer Awards, but the
following guidelines apply:

   1) The nominees must have made a substantial contribution to the
      health, growth, accessibility, or freedom of computer-based
      communications.

   2) The contribution may be technical, social, economic or cultural.

   3) Nominations may be of individuals, systems, or organizations in
      the private or public sectors.

   4) Nominations are open to all, and you may nominate more than one
      recipient. You may nominate yourself or your organization.

   5) All nominations, to be valid, must contain your reasons, however
      brief, on why you are nominating the individual or organization,
      along with a means of contacting the nominee, and your own contact
      number. No anonymous nominations will be allowed.

   6) Every person or organization, with the single exception of EFF
      staff members, are eligible for Pioneer Awards.

   7) Persons or representatives of organizations receiving a Pioneer
      Award will be invited to attend the ceremony at the Foundation's
      expense.

You may nominate as many as you wish, but please use one form per
nomination. You may return the forms to us via email to

             pioneer@eff.org

You may mail them to us at:
             Pioneer Awards, EFF,
             155 Second Street
             Cambridge MA 02141.

You may FAX them to us at:
             +1 617 864 0866

Just tell us the name of the nominee, the phone number or email address
at which the nominee can be reached, and, most important, why you feel
the nominee deserves the award.  You may attach supporting

We're looking for the Pioneers of the Electronic Frontier that have made
and are making a difference. Thanks for helping us find them,

The Electronic Frontier Foundation
                   -==--==--==-<>-==--==--==-

         MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION

becoming a member now. Members receive our bi-weekly electronic
newsletter, EFFector Online, the @eff.org newsletter
and special releases and other notices on our activities.  But because
things even if you do not elect to become a member.

Our memberships are $20.00 per year for students, $40.00 per year for

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list.  We will, from
time to time, share this list with other non-profit organizations whose
explicit permission, we assume that you do not wish your membership

---------------- EFF MEMBERSHIP FORM ---------------

Mail to: The Electronic Frontier Foundation, Inc.
    155 Second St. #41
    Cambridge, MA 02141

    $20.00 (student or low income membership)
    $40.00 (regular membership)
    $100.00(Corporate or company membership.
    This allows any organization to
    become a member of EFF. It allows
    such an organization, if it wishes
    to designate up to five individuals
    within the organization as members.)

    I enclose an additional donation of $

Name:

Organization:

Address:

City or Town:

State:     Zip:    Phone:(    )     (optional)

FAX:(    )    (optional)

Email address:

to my Mastercard [  ]     Visa [  ]    American Express [ ]

Number:

Expiration date:

Signature:

Date:

other non-profit groups from time to time as it deems
appropriate   [  ]  .
      Initials:

Your membership/donation is fully tax deductible.
=====================================================================
     EFFector Online is published by
     The Electronic Frontier Foundation
     155 Second Street, Cambridge MA 02141
     Phone: +1 617 864 0665 FAX: +1 617 864 0866
     Internet Address: eff@eff.org
 Reproduction of this publication in electronic media is encouraged.
 Signed articles do not necessarily represent the view of the EFF.
 To reproduce signed articles individually, please contact the authors
 for their express permission.
=====================================================================
     This newsletter is printed on 100% recycled electrons.




AD: