Web Design and Internet Applications
Download
Report
Transcript Web Design and Internet Applications
Web Design and
Internet Applications
Introduction
The Internet
• As We May Think by Vannevar Bush
• Originally published in the July 1945 in The Atlantic magazine
• He later wrote "The Encyclopedia Britannica could be reduced
to the volume of a matchbox. A library of a million volumes
could be compressed into one end of a desk"
When was the Internet
Created?
• First computers to message each other was in the late 1950’s
(1958)
• Early 1960’s ARPANet (1969) was created by the US
Government should a nuclear attack eliminate the phone
system.
• First computer to talk to other computers had an IP address of
0.0.0.0.
Advanced Research Projects
Agency Network (ARPANET)
• First TCP/IP based
- Transmission Control Protocol/Internet Protocol
• Mimics Phone lines
• Shut down in 1989
Web Browsers
• Created in 1990 first called…
- WorldWideWeb
• Later called Nexus
• Utilized URL (Uniform Resource Identifier)
• For example:
• HTTP (HyperText Transfer Protocol)
• HTTPS (same as above with Secure at the end)
HTML
• HyperText Markup Language
• Programming Language used to create images, objects and
styles
•
•
•
•
<p> New Paragraph or Start Paragraph
</p> End Paragraph
<ul> Start List
</ul> End List
World Wide Web
• Originated by CERN (Conseil Européen pour la Recherche
Nucléaire )
- Brought forward by Tim Berners-Lee
A solution: Hypertext
• There was a problem with varying internet programing
language. This was corrected with Hypertext
• Based off of Apple’s Hypercard
• “Although lacking the fancy graphics, ran on a multiuser system,
and allowed many people to access the same data.”
Requirements
•
•
•
•
•
•
•
•
•
Remote access across networks
Heterogeneity
Non-Centralization
Access to existing data
Private links
Bells and Whistles
Data analysis
Live links
Non requirements
Definitions - Review
• Network - an interconnected or interrelated chain, group, or
system
• Intranet - a network operating like the World Wide Web but
having access restricted to a limited group of authorized users
(as employees of a company)
• Internet - an electronic communications network that
connects computer networks and organizational computer
facilities around the world
• Web (World Wide Web) - a part of the Internet accessed
through a graphical user interface and containing documents
often connected by hyperlinks
Web Browsers
•
•
•
•
•
•
1990 – WorldWideWeb (Berners-Lee) (Later named Nexus)
1993 – Mosaic (Andreessen) (Later named Netscape)
1995 – Internet Explorer (Microsoft)
1996 – Opera (Opera Software)
1998 – Mozilla (Netscape) (Later named Firefox)
2003 – Safari (Apple)
Ethics
Ethical Considerations
•
•
•
•
•
•
Access to Information
Disruption of Use
Wasted Recourses *
Integrity of Information
Identity Concerns
Techno-Progressivism
Access to Information
Also known as the Digital Divide
What is the Digital Divide
•
•
•
•
•
Subjects of Connectivity
Characteristics of Connectivity
Means of Connectivity
Intensity of Connectivity
Purpose of Connectivity
Subjects of Connectivity
• WHO has Access to the Internet
Reasons for Limited Access
• Political Considerations
• Religious Considerations
• Economic Considerations
Political Considerations
Here is a Map showing North Korea and China where internet access is somewhat limited due to government control
Religious Considerations
Here is a Map of the Middle East where due to religious influences on government, few people are allowed open
access to the internet
Economic Considerations
Individuals who can not afford to access the information ~or~ communities that can not afford infrastructure
Disruption of Use
The open use of the internet is limited due to outside
influences
Disruption of Use
• What is the intended use of the Internet?
• Save, Distribute and Communicate Information
• Migrated to Commerce and Information
•
•
•
•
•
.com (Commercial)
.net (Network)
.org (organization)
.edu (education)
.uk, .eu, .de, .com.cn
etc…
How is the Internet Disrupted?
• Hackers
• Viruses
• Unintended use?
Outcomes of Internet Disruption
• Economic Impact of Computer Viruses
• 2001 ~ $23 Billion
• 2004 ~ $52 Billion (~38 from MyDoom Virus)
• 2012 ~ $1.6 Trillion
• Non Economic Impact
• Stuxnet Virus
• Computer Virus in Iranian Nuclear Facilities
• Flame Virus
• Developed to target Military and Nuclear Facilties
• Oops it got out
• Targeted MS operating systems
Ethical Considerations - Wasted
Resources (Loss of Productivity)
• Use of internet has greatly expanded the working day and
reach of business
• But…
Cyberslacking at Work
•
•
•
•
•
•
•
•
•
•
•
•
Entertainment sites
Sports sites
Shopping sites
Stock trading sites
Gaming sites
Financial/banking sites
Auction sites
News sites
Weather sites
Music sites
Job search sites
Web e-mail.
Cyberslacking at Work
• 30 to 40 percent of employee Internet activity is non-work-related, according to IDC Research.
• Workplace Internet misuse costs U.S. businesses $63 billion in lost productivity annually, according
to Websense Inc.
• Charles Schwab reveals that 72 percent of its customers plan to buy or sell mutual funds over the
next six months, and 92 percent of these plan to do so online during work hours.
• 28 percent of individuals making gift purchases do so from their offices or cubicles, according to
Pew Internet and American Life Project.
• Nielsen studies show more than 18 hours per week is spent by workers visiting websites during
working hours.
• A study published by Snapshot Spy reflects employee admissions that the Internet is used for
personal purposes up to three hours per day.
• Snapshot Spy also reports that 64 percent of workers acknowledge use of the Internet for personal
purposes during work hours and that a significant number state that Internet use can be “addictive.”
• An Internet Data Corp. survey published by Snapshot Spy reports that up to 40 percent of workplace
Internet use is not business related.
• The same Internet Data Corp. survey reveals that up to 60 percent of all online purchases are made
during regular work hours.
• Workers spend twice as much time online at work as at home as reported by Snapshot Spy.
Who is Responsible?
• Started with the IT (Information Technology) department
• Network Analyzer programs to determine individual internet use
• Migrated to partnerships with the HR (Human Resources)
Department
• Manage employee productivity
Social Networking Facts
Social Networking by Usage (Adults 18+)
• 71% use Facebook
• 22% use LinkedIn
• 21% use Pintrest
• 19% use Twitter
• 17% use Instagram
Facebook
• By FAR the largest
• On a daily basis Facebook users:
•
•
•
•
“Like” 4.5 billion times
Upload 250 million photos
Send 10 billion messages
22 billion “liked” or “shared” pages are viewed
• Total Monthly users: 1,310,000,000 (680 million are mobile
users)
Facebook con’t
• Facebook is estimated at a total worth of 190 billion ($79+ per
share(IPO was $38))
• Total GDP for Countries
•
•
•
•
Czech Republic 196 billion
New Zealand 171 billion
Hungary 125 billion
Puerto Rico 103 billion
Integrity of Information
How valid is the information found on the internet
Purpose of the Internet
• To share learned information (academic) with all that could
access the information
• People (all) should have access within a “webbed” community
How do We Judge Integrity of
Information
• Validity of Source (Publication Type)
• National Inquirer v. JAMA (Journal of the American Medical
Association)
• Authoritative?
• Articles:
• “In Military Wards, Questions and Fears From the Wounded”
• “Hack Heaven”
Validity of Sources
•
•
•
•
•
Wikipedia?
New York Times?
New Republic?
CNN?
Fox News?
Evaluating Information on
the Internet
• Authority
• Is the name of the author/creator on the page?
• Are his/her credentials listed (occupation, years of experience,
position or education)?
• Is the author qualified to write on the given topic? Why?
• Is there contact information, such as an email address, somewhere
on the page?
• Is there a link to a homepage?
• If there is a link to a homepage, is it for an individual or for an
organization?
• If the author is with an organization, does it appear to support or
sponsor the page?
• What does the domain name/URL reveal about the source of the
information, if anything?
• If the owner is not identified, what can you tell about the origin of
the site from the address?
Evaluating Information on
the Internet
• Accuracy
• Citations
• Independently Verification
• Original Research
• Methodology must be authenticated
• Bias
• Either Direction
• Currency
• Example: An article about the current state of the Soviet Union
from 1982
Evaluating Information on the
Internet
• Audience
• Who is the intended Audience
• Political, Educational, Religious, Professional, Personal
• Beginner Knowledge v. Expert Knowledge
• WebMD v. JAMA
Identity Concerns
Are the people and companies contacted actual identities
Individual Security
• Identity Theft
• Bank information
• Social Security Numbers
• Primarily from Hackers and Viruses
• Spawned Cyber-Security firms such as LifeLock
• Information Security
• E-mails
• Pictures and other personal information
Organizational Security
• Economic Impact of Computer Viruses
• Punitive Damages
• Future Damages – Loss of IP
• Non Economic Impact
Loss of Human Contact
• Remote Workers
• Lack of Personal Assurance
• Catfishing
• Manti Te’o
• More prevaiant with On-line Dating
Security from Whom?
• Individuals?
• Corporations/Organizations?
• Government?
Information Ethics
• Who gets access?
• Anonymous
• “Hacktivist”
TechnoProgressivism
How far should technology go?
Ethical Considerations
• Techno-Progressivism - the growth of scientific knowledge or
the accumulation of technological powers will not represent
the achievement of proper progress unless and until it is
accompanied by a just distribution of the costs, risks, and
benefits of these new knowledges and capacities.
• V.
• Bio conservatism - is a stance of hesitancy about technological
development especially if it is perceived to threaten a given
social order.