Advertisement

Social Context of Computing

  • Joseph Migga KizzaEmail author
Chapter
Part of the Undergraduate Topics in Computer Science book series (UTICS)

Abstract

This chapter considers social issues in computing including the digital divide, workplace issues like employee monitoring, health risks due to computer use, and how these issues are changing with the changing computer technology. The chapter also covers a detailed discussion on a number of obstacles to overcoming the digital divide through digital inclusion within countries and globally. On workplace issues, the discussion focuses on the best practices to deal with the changing workplace issues resulting from the growing army of home-based workers and measuring employee productivity.

References

  1. 1.
    Kruger L, Gilroy A. Broadband internet access and the digital divide: federal assistance programs. Congressional Research Service. http://www.nationalaglawcenter.org/assets/crs/RL30719.pdf; https://digital.library.unt.edu/ark:/67531/metadc958717/m1/1/
  2. 2.
  3. 3.
    Wayne T (2010) Digital divide is a matter of income, er 12, 2010. The New York Times. 12 Dec 2010. http://www.nytimes.com/2010/12/13/business/media/13drill.html?_r=1
  4. 4.
    Jansen J (2010) The better-off online. Pew Research Center Internet and American Life Project. 24 Nov 2010. http://pewresearch.org/pubs/1809/internet-usage-higher-incomeamericans
  5. 5.
    National Telecommunications and Information Administration, Technical Report 2000 (NTIA) (2000) Falling through the net: toward digital inclusion. http://www.ntia.doc.gov.ntiahome/ftfn00/front00.htm; https://www.ntia.doc.gov/files/ntia/publications/fttn00.pdf
  6. 6.
    Washington J (2011) For minorities, new ‘digital divide’ seen. Associated Press. 1 Nov 2011 http://www.rolandsmartin.com/blog/index.php/2011/01/11/for-minorities-new-digital-divide-seen/
  7. 7.
    Smith A (2010) Mobile access 2010. Pew Research Center Internet and American Life Project. 7 Jul 2010. http://www.pewinternet.org/Reports/2010/Mobile-Access-2010/Summary-of--Findings.aspx
  8. 8.
    Clark I. Age disability and the digital divide. Infoism. 16 Apr 2012. http://infoism.co.uk/blog/2012/04/age-disabilityand-the-digital-divide/
  9. 9.
    Irving RH, Higgins CA, Safayeni FR (1986) Computerized performance monitoring systems: use and abuse. Commun ACM 29(8):794–801CrossRefGoogle Scholar
  10. 10.
    Rickert A (2000) The dollar divide: web usage patterns by household income. Media Metrix. Aug 2000. http://www.mediametrix.com/data/MMXI-USHHI-0600.pdf
  11. 11.
  12. 12.
    World Bank global economic prospects 2008: technology diffusion in the developing world. http://en.wikipedia.org/wiki/Global_digital_divide
  13. 13.
  14. 14.
    Rodriguez F, Wilson EJ (1999) Are poor countries losing the information revolution? Info DEV. The World Bank, Washington, DCGoogle Scholar
  15. 15.
    Bankole F, Shirazi F, Brown I (2011) Investigating the impact of ICT investments on human development. Electron J Info Syst Dev Countries 48(8):1–19Google Scholar
  16. 16.
    DIGOPP Working Group of the Education Development Center. http://www.edc.org/GLG/Markle/dotforce/digopp/
  17. 17.
    Kim YJ, Kang H, Sanders GL, Lee ST (2008) Differential effects of IT investments: complementarity and the effect of GDP level. Int J Inf Manage 28(8):508–516CrossRefGoogle Scholar
  18. 18.
    Krech R (2001) Email communication to DIGOPP. 8 Mar 2001. http://www.edc.org/GLG/Markle/dotforce/digopp/
  19. 19.
    Gottieb CC, Borodin A (1973) Social issues in computing. Academic Press, New YorkGoogle Scholar
  20. 20.
    Olson M, Lucas H (1982) The impact of office automation on the organization: some implications for research and practice. Commun ACM 25(11):838–847CrossRefGoogle Scholar
  21. 21.
    Snizek W (1995) Virtual office: some neglected considerations. Commun ACM 38(9):15–17CrossRefGoogle Scholar
  22. 22.
  23. 23.
    Kraut R (1994) Predicting the use of technology: the case of telework. In: Huff C, Finholt T (eds) Social issues in computing: putting computing in its place. McGraw-Hill, New York, pp 312–334Google Scholar
  24. 24.
    US workforce. JALA International. http://www.jala.com/usworkers.php
  25. 25.
    Benefits of telecommuting. U.S. Department of Transportation’s Departmental Office of Human Resource Management. http://dothr.ost.dot.gov/Telecommuting/benefits_of_telecommuting.htm
  26. 26.
  27. 27.
    Attewell P, Rule J (1984) Computing and organization: what we know and what we don’t know. Commun ACM 27(12):1184–1193CrossRefGoogle Scholar
  28. 28.
    Driscoll J (1982) Office automation: the dynamics of a technological boondoggle. In: Landau RM, Bair JH, Siegman JH (eds) Emerging office systems. Ablex, NorwoodGoogle Scholar
  29. 29.
    Nussbaum K (1991) Computer monitoring: a threat to the right to privacy. In: Dejoie R, Fowler G, Paradice D (eds) Ethical issues in information systems. Boyd & Fraser, BostonGoogle Scholar
  30. 30.
    Adler PA, Parsons LK, Zolke SB (1994) Employee privacy: legal and research developments and implications for personal administration. In: Huff C, Finholt T (eds) Social issues in computing: putting computing in its place. McGraw-Hill, New York, pp 312–334Google Scholar
  31. 31.
    Grant R, Higgins C, Irving R (1994) Computerized performance monitors: are they costing you customers? In: Huff C, Finholt T (eds) Social issues in computing: putting computing in its place. McGraw-Hill, New York, pp 312–334Google Scholar
  32. 32.
    Shepard J (1971) Automation and alienation. MIT Press, Cambridge, MAGoogle Scholar
  33. 33.
    Grandjean E (1987) Ergonomics in computerized offices. Taylor and Francis, LondonGoogle Scholar
  34. 34.
    Ivancevich J, Napier A, Wetherbe J (1983) Occupation stress, attitudes, and health: problems in the information systems professions. Commun ACM 26(10):800–806CrossRefGoogle Scholar

Further Reading

  1. 35.
    Bailyn L (1989) Towards a perfect workplace. Commun ACM 32(4):460–471CrossRefGoogle Scholar
  2. 36.
    Flynn L (1993) They are watching you: electronic surveillance of workers raises privacy concerns. San Jose Mercury News. 13 June 1993, p 1FGoogle Scholar
  3. 37.
    Payser M (1995) When e-mail is oops-mail: think your private messages are private? Think again. Newsweek. 16 Oct 1995, p 82Google Scholar
  4. 38.
    Sauter S, Gottlieb M, Jones K, Dodson V, Rohner K (1983) Job and health implications of VDT use: initial results of the Wisconsin NIOSH study. Commun ACM 26(4):284–294CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.College of Engineering and Computer ScienceUniversity of TennesseeChattanoogaUSA

Personalised recommendations