← X10: Software Models ↑ Table of Contents ↑  

C11: Impacts of Computing

I went to my first computer conference at the New York Hilton about 20 years ago. When somebody there predicted the market for microprocessors would eventually be in the millions, someone else said, "Where are they all going to go? It's not like you need a computer in every doorknob!" Years later, I went back to the same hotel. I noticed the room keys had been replaced by electronic cards you slide into slots in the doors. There was a computer in every doorknob. — Danny Hillis (circa 1999)

Technology is, of course, a double edged sword. Fire can cook our food but also burn us. — Jason Silva

 

Computers have changed our society over the last 80 years — helping to end wars, creating tools that have led to advances in medicine, making jobs safer, placing vast amounts of knowledge at our fingertips, and enabling people to connect in ways that would have been unthinkable just a few decades ago. Overall, the changes brought about by computer technology have been extremely positive, and it is difficult to imagine a society that is not connected and tech-pervasive. But not all change is good, and like any tool, computers can be used to harm as well as help. Many people are becoming dependent on technology, often to the detriment of personal relationships. Online activities and credit card purchases can be used to collect information on many aspects of a person's private life. The same technology that automates dangerous or tedious tasks can cost workers their jobs.

Hopefully, reading this book has helped you to better understand computer technology — where it came from, how it works, and how difficult it is to get it perfect. This deeper understanding should guide you as you make choices about how to adopt technology in your life, and how to balance the benefits and the dangers that computer technology presents.

      Technology and Society

In 2024, WT Wealth Management published a white paper written by John Hellner. This paper, titled 10 Inventions that Have Changed the World, identified and ranked "ten of the most impactful inventions that have changed the world." Although any such list leaves room for debate, there is no doubt that the inventions listed by Hellner (FIGURE 1) have influenced the way in which society is structured. For example, the printing press allowed for knowledge to be preserved and shared, leading to widespread literacy and scientific advancement. The availability of telephone service contributed to the decentralization of society, in that phones enabled people to communicate and conduct business over large distances. The automobile changed the face of society by increasing personal mobility. When people obtained their own affordable mode of transportation, they were able to move away from urban areas and still drive to their jobs, which led to suburbanization and the rise of today's "commuter culture." It is interesting to note that the last four entries in his list are computing innovations: (7) the personal computer, (8) the Internet, (9) the mobile phone, and (10) artificial intelligence.

 Top 10 Inventions 
  1. Printing Press
  2. Steam Engine
  3. Telephone
  4. Photographic Film
  5. Automobile
  6. Airplane
  7. Personal Computer
  8. Internet
  9. Mobile Phone
  10. Artificial Intelligence      

FIGURE 1. 10 Inventions that have Changed the World. (John Hellner)

Computing technologies are still evolving, which means that they continue to impact society in new ways. The personal computer revolution of the late 1970s and early 1980s put computers in the hands of individuals. The Internet changed the ways in which we communicate and drives today's information-based economy. The mobile phone, especially the smart phone, has put the power of communication and information processing in the hands of individuals on the move. Artificial Intelligence is changing the way we write, create, and access information. As computer scientists continue to augment existing technologies and develop new applications, the potential for computer technology to influence daily life appears limitless.

FIGURE 2 shows an interesting comparison of technology adoptions over the last century. Note that the three early inventions listed (electric power, radio and the automobile) were adopted slowly over decades. For example, the automobile required 55 years to reach 80% of American households. In contrast, more recent computer-related technologies were adopted at highly accelerated rates. For example, the personal computer grew from 20% to 80% of U.S. households in 21 years; the cell phone grew from 10% to 84% of households in 15 years; the smartphone grew from 35% to 81% of households in just 8 years.

tech adoption rates

FIGURE 2. Adoption rates of various technologies. (OurWorldInData.org, 2019).

QUICK-CHECK 11.1: Do you think that Hellner's list (FIGURE 1) represents the 10 most important and/or impactful inventions? If not, what inventions do you think are missing from this list? What possible developments in computer technology might increase the relative importance of computers?

      Digital Banking

One obvious example of the computer's impact on society is the changing nature of money. As recently as 50 years ago, the United States was largely a cash-based society. Workers were paid with paper checks, which they would take to their local bank and exchange for cash. Most purchases were made with cash or check. Banks made agreements to cash each other's checks, but each check required a physical transfer of cash between the banks to maintain balance.

Two developments in the 1980s changed the way we view money. First, the development of microprocessors led to devices for scanning and processing transactions. These made credit cards more convenient for customers and cost-effective for retailers. When combined with government deregulation, these advances led to nationwide service networks and the widespread adoption of credit cards. Second, the growth of the Internet enabled banks to communicate and transfer funds seamlessly. Banks discovered that the transfer of physical money was often unnecessary. Instead, transfers could be done electronically over the network, essentially replacing cash with electronic IOUs between the banks. If the accounts became too unbalanced, then the banks could still transfer cash, but for the most part they just treated money as numbers in files. Automated Teller Machines (ATMs), which had been around since the late 1960s, exploded as a result of this development. A customer could go to any bank's ATM, regardless of location, and withdraw cash. The transaction would be shared across the network with both the ATM's bank and the customer's bank and the electronic transfer of funds between those banks would be recorded. As a result, debit cards that could be used to access ATMs and make purchases linked to bank accounts also grew in popularity in the 1980s.

Because of the widespread availability of credit/debit card scanners and ATMs, people can now access their money around the clock from almost any location (FIGURE 3). As a result, they are no longer dependent on cash reserves to purchase goods. From pay-at-the-pump gas stations to vending machines with credit card readers, computing technology makes it easier for customers to make cashless purchases. A 2024 survey conducted by DepositAccounts found that 61% of respondents made five or fewer cash purchases in the previous month, 66% don't always carry cash, and 73% typically carry $50 or less. CapitalOne estimated a total of 56.2 billion domestic credit card transactions in 2024, with the worldwide total surpassing 791 billion.

tech adoption rates tech adoption rates

FIGURE 3. ATMs and debit-card readers allow consumers to access cash or pay directly in stores.

Another factor in the move away from cash is online banking. Most banks provide Web sites where customers can transfer funds or make payments without needing checks or even access to a bank branch. Most banks provide apps that enable customers to take a snapshot of a check and deposit it directly into their account. Similarly, employees can have their paychecks directly deposited to a bank account and schedule automatic bank transfers to pay monthly bills.

The past decade has seen the introduction of cryptocurrencies, entirely electronic forms of money that are not backed by any government or financial institution. Instead, the value of a cryptocurrency such as Bitcoin or Ethereum is entirely determined by the free market. Investors can trade crypto-coins the same as stock investments, and their value fluctuates based on consumer demand and acceptance by retail outlets. Cryptocurrencies rely heavily on advanced encryption algorithms (Chapter C7) for security and offer advantages with respect to privacy, including truly anonymous purchasing. However, they can also be extremely speculative, with value fluctuating wildly based on market demand. At this early stage, it is not clear whether cryptocurrencies will become serious alternatives to traditional currencies or will instead be viewed as a temporary fad.

 

 

QUICK-CHECK 11.2: TRUE or FALSE? Computer technology has greatly impacted the banking industry, to the extent that credit cards and debit cards have reduced consumers' reliance on cash.

    Debt and Online Theft

As with most technologies, the advantages of electronic alternatives to cash also bring the potential for abuse or negative consequences. Since most people always carry a debit/credit card with them, the opportunity to spend is constant. Studies have shown that people spend more freely when using a credit or debit card as opposed to cash. Credit card interest rates are the highest for any type of debt, making it all too easy for consumers to become buried in debt. For example, the average credit card interest rate as of July 2025 was 22.25% (U.S. Federal Reserve Board). In contrast, the average interest rate for a 30-year fixed-rate mortgage was 6.24% (Freddie Mac) and the interest earned on a 5-year CD (certificate of deposit) was only 1.69% (BankRate).

Credit card debt continues to be a major concern for many consumers, especially in the U.S. where credit cards are widely used because of their convenience. In November 2025, the Federal Bank of New York estimated the total U.S. credit card debt to be $1.23 trillion, for an average of $9,276 per household. For many families, credit card debt exceeds their savings, leading to a spiral in which they can only make a minimal payment each month and the interest continues to accumulate.

Interestingly, the shift from physical to electronic money has had both positive and negative impacts on crime. With people carrying less cash, muggings in the U.S. have decreased steadily in recent decades. However, physical theft has been replaced by new forms of robbery. Identity theft is a relatively new crime in which the thief steals personal information (e.g., credit/debit card numbers or ATM passwords) and poses as the legitimate cardholder to extract cash or make purchases (FIGURE 4). The U.S. Federal Trade Commission reported 1.1 million cases of identity theft in 2024, with a total loss of over $12.7 billion. Fortunately, the risk to consumers is mitigated by bank and credit card company policies that do not hold the cardholder responsible for fraudulent purchases. If a credit card customer notes a fraudulent charge on their bill, they can report it to the credit card company and are no longer responsible for that charge. Shifting the costs of fraud away from the consumer costs companies in the short term. However, the confidence that consumers experience due to their lack of risk leads to increased spending and greater profits for the company in the long term.

tech adoption rates

FIGURE 4. Examples of identity theft and fraud (U.S. Government Accountability Office).

QUICK-CHECK 11.3: TRUE or FALSE? Credit card interest rates are comparable to other loan rates, such as mortgages.

      Computers and Software for Everyday Tasks

Although ATMs and debit/credit card readers serve as visible reminders of our reliance on technology, modern life also depends on thousands of less obvious, hidden computer applications. Embedded processors, computer chips built into appliances and machinery to control their workings, account for 98% of all computer processors manufactured. Modern houses contain hundreds of embedded processors, concealed in devices such as microwave ovens, television remote controls, wi-fi routers, and automatic thermostats. Similarly, automobiles employ embedded processors to control fuel injectors, antilock brakes, and other components (FIGURE 5).

Embedded processors in a car

FIGURE 5. Common uses of embedded microprocessors in automobiles.

Society has also been affected by the availability commercial software that enables individuals to accomplish tasks previously reserved for highly trained professionals. For example, word processing and desktop publishing software have made it simple for anyone to produce professional-looking documents, such as reports, newsletters, and flyers. Similarly, most personal computers now come with video-editing software, which enables users to create, edit, and augment digital video images on their computers. In addition, software companies market specialized applications that capture human expertise and make it available to users. For example, tax preparation programs such as H&R Block Taxes integrate graphics, sound, and video to guide users through the process of completing various tax forms (FIGURE 6, left). Online tools such as OpenAI's ChatGPT use advanced artificial intelligence techniques to assist users in writing and creating (FIGURE 6, right). Many of these software applications that capture human expertise are now available as Internet-based services. By offering access to such services over the Web on a pay-per-use basis, software companies can drastically reduce the cost to users while ensuring that all included information is regularly updated.

H&R Block tax software ChatGPT

FIGURE 4. H&R Block Tax Software; OpenAI's ChatGPT.

In recent years, new technologies have led to new categories of software. Smart phones and tablets such as the Apple iPad and Samsung Galaxy Tab have driven the development of mobile applications (or apps) that run on these devices. In November 2025, Apple's online App Store offered more than 2 million apps for the iPhone and iPad, while Google's Play Store offered 2.6 million apps for Android devices. Digital readers such as Amazon's Kindle and Sony's Reader allow users to download books and read them on small, portable displays.

QUICK-CHECK 11.4: TRUE or FALSE? Embedded processors are computer chips that are placed inside other processors to achieve faster computation.

    Reliance on Complex Systems

As society becomes dependent on complex, computer-based products and services, the effects of computer errors or system failures become far-reaching. Whereas errors in the Web pages you create in this book might cause you frustration or earn you a bad grade in an assignment, errors in software for air traffic control, electrical power relays, and banking systems can endanger lives and cost companies millions of dollars. The following list describes scenarios in which software errors produced dire and unexpected consequences.

To avoid errors such as these, the software industry employs design and testing methodologies aimed at minimizing costs while improving the quality of large applications. However, as the size and complexity of software grows, design and testing become significantly more difficult. For example, it might be feasible for an experienced programmer to carefully study a 1,000-line program and ensure that it behaves as expected. However, performing the same type of analysis on a 10,000-line program would require significantly more than 10 times as much work, because each section of code must be tested not only in isolation, but also in relation to the other sections of code. As more software components are added to a system, the number of potential interactions between them grows exponentially. Software bugs are inevitable when the scale of a project makes it too complex for detailed study. For example, when Windows 2000 was released, the operating system was known to contain more than 63,000 bugs in its 35 million lines of code. However, these bugs were not considered critical, as most were extremely unlikely to occur in everyday use and, at worst, required the user to reboot the computer. Clearly, critical systems — such as those that control aircraft or financial networks — necessitate more careful testing and debugging to protect human lives and property.

QUICK-CHECK 11.5: TRUE or FALSE? Commercial software is thoroughly tested so that it is error-free when released.

    The Internet/Web for Information

With the growth of the Internet, online resources have replaced many traditional sources of information. Unlike print media such as newspapers and magazines, Web sites can be updated 24 hours a day, allowing online publishers to report stories as soon as they break. News sites can also integrate text and pictures with other types of media, such as video footage and interactive polls. Most print and broadcast media offer Web sites, such as the New York Times (nytimes.com), CNN (cnn.com), and Fox News (foxnews.com). Each provides its own perspective on the news and may target different audiences (FIGURE 5).

CNN Web site FoxNews Web site

FIGURE 5. CNN.com and FoxNews.com sites (November 29, 2025).

As social media platforms have grown, many people are using social media sites such as Facebook and Instragram to access news. According to the Pew Research Center, more than half of all Americans get their news from social media outlets, with Facebook (38%), YouTube (35%). Instagram (20%) and TikTok (20%) being the most popular. In addition to being convenient and current, online news can be accessed anywhere in the world where the Internet is accessible. Many of the most oppressive governments, e.g., North Korea, China, and Libya, control their internal media in order to limit their citizens' access to news. While they may try to restrict access to online news, this is much harder as technical workarounds are known. In fact, the Arab Spring, a series of pro-democracy protests and uprising across the Arab world in the early 2010s, was directly aided by social media and online news.

QUICK-CHECK 11.6: TRUE or FALSE? More than 50% of Americans get their news from social media outlets.

    Fake News & Information Overload

Unlike traditional media sources, which have editors and reviewers to ensure at least some degree of accuracy and impartiality, the Web is neither monitored nor censored. Many Web sites have been created by people or organizations with specific agendas. A company might sponsor Web sites that are favorable to their products. A politician might create a site that mischaracterizes the views of their opponent. An individual might post claims of great accomplishments or use a Web site to denigrate others. The last decade has seen the rise of Web sites specializing in fake news, false or misleading information that is presented as objective news. These sites may appear legitimate but only present skewed information to support a particular political or social viewpoint. With so many news sources available, the danger is that individuals focus on sources that cater to their preexisting biases, creating an "echo chamber" where they only hear news that supports their viewpoint. This has led to an unprecedented level of partisanship and animosity between groups of people, who not only disagree on how to solve problems but, more fundamentally, on what the basic facts are. A 2025 survey by the Pew Research Foundation showed that 70% of American adults viewed fake news as a major threat.

Because anyone can be a Web author, there is always a chance that the author is uninformed, misinformed, or biased. Moreover, while professional writers are familiar with the idea that complex questions require complex answers, untrained Web authors may settle for short answers that, although not entirely inaccurate, lack context and justification. For example, a Web search on the simple question "What is the capital of Missouri?" returns numerous pages that provide the correct answer: Jefferson City. However, entering a more complex question such as "Who invented the computer?" produces pages with a variety of answers, including Alan Turing, Konrad Zuse, Charles Babbage, John Atanasoff, and John von Neumann. As we learned in Chapter C4, each of these figures contributed to the development of computing technology in a different way. Responsible researchers would need to explain these answers in context to justify them. FIGURE 6 lists several criteria that can be applied to online content to evaluate its credibility.

Fake news stats

FIGURE 6. Criteria for evaluating online content.

Although the impressive breadth of information available online can be viewed as a positive, it is also one of the medium's greatest negatives. The fact that individuals can add content to the Web ensures that all ideas and perspectives can be heard. Unfortunately, the massive volume of data created by the online community isn't particularly organized, which makes finding any single piece of information difficult. Various sources have estimated the current size of the Web in the hundreds of trillions of pages. To help navigate this vast sea of information, search engines such as Google and DuckDuckGo automatically catalog Web pages and allow users to search for data by topic or keywords (see Chapter C2 for more details). Google is by far the most popular search engine, processing more than 150,000 search queries per second (SearchEngineLand.com). It is important to note that search engine results must always be viewed critically. Companies that advertise with the search engine company are often given preferential placement on the search results page. In addition, there are techniques that Web developers can use to artificially inflate their ranking in the search results. Thus, when conducting research using a search engine, the user needs to look carefully at the source of the information and seek independent, corroborating sources when accuracy is essential.

QUICK-CHECK 11.7: TRUE or FALSE? The results provided by a search engine are verified to be correct.

      The Internet/Web for Communication

As we saw in Chapter C3, the exponential growth of the Internet during the 1980s was fueled in part by a proliferation of communications-based applications. Countless scientists, government workers and university researchers were drawn to the Internet by the availability of electronic mail and newsgroups. When Internet access became more widespread in the 1990s, a broad group of nontechnical users began going online to exchange business and personal information. In 2025, there were an estimated 4.5 billion active email users worldwide, with 40% (1.8 billion) using Google's Gmail. An average of 376.6 billion emails were sent every day, or 4.35 million emails per second. Unfortunately, approximately half of those emails were spam, unsolicited messages advertising some product or service (Statista).

The growth of the Internet and Web as communications media was greatly accelerated by the widespread adoption of mobile devices. In 2025, the Pew Research Center found that 98% of American adults owned a cell phone. Furthermore, more than 91% owned smartphones, enabling them to access the Web and various communication tools directly on their phones. Especially among younger users, text messaging, or texting, has largely replaced phone calls and email as the medium for mobile communication. An estimated 9.1 trillion texts were sent worldwide in 2025, for an average of 105 million texts per second (SellCell). Increased use of convenient mobile devices also spurred the growth of social media sites that combine information/news sources with communications and community building. FIGURE 7 shows the most popular social media platforms, broken down by age groups. The largest platform, Facebook, reported more than 3 billion users in 2025 (Statista).

Fake news stats

FIGURE 7. Social Usage by Age Groups (Statista, 2025).

QUICK-CHECK 11.8: TRUE or FALSE? Approximately half of all email messages are spam.

    Addiction & Cyberbullying

The convenience of mobile devices and the connectivity people feel via texting and social media also have a dark side. In 2025, the average adult spent more than 7 hours a day on their connected devices (Statista). Since American adults average 7 hours of sleep per night, this implies that they were spending 7 out of the remaining 17 hours, or 41% of their waking day, on their devices. Those are hours that the person could be engaging in healthier activities, such as experiencing nature, exercising, or building relationships.

Medical studies have shown that the texting and social media use can be both physically and psychologically addictive. Positive feedback on social media (e.g., likes or retweets) produce chemical reactions in the brain similar to those derived from drugs like cocaine. The fear of being detached from mobile phone connectivity is now commonly referred to as nomophobia (as in "the fear of no mobile phone"). Nomophobia is not yet officially recognized as a mental disorder by health organizations, but the phenomenon of social media users exhibiting anxiety when disconnected is well documented.

As children turn more and more to social media, negative social interactions move there as well. Bullying and harassment through texting and social media, known as cyberbullying, is a serious issue for pre-teens and teens. According to a survey by the Cyberbullying Research Center, 54% of female teens and 36% of male teens experienced online harassments in 2025. FIGURE 8 shows a range of issues that respondents reported as a result of experiencing cyberbullying. These numbers are troubling, especially the statistic that 26% of bullied youths had suicidal thoughts. This connection has been made by other studies, including one that showed the suicide rate for teen girls increased by 65% between 2010 and 2015, coinciding with the rise in smartphone social media use among teens (Science Daily).

Fake news stats

FIGURE 8. Emotional and Behavioral Impact of Cyberbullying (SQ Magazine, 2025).

Obsessive use of smartphones can lead to other unsafe behaviors. According to the National Highway Traffic Safety Administration, texting while driving is 6 times more dangerous than intoxicated driving. In 2023, more than 1.6 million crashes were caused by drivers using cell phones and texting.

QUICK-CHECK 11.9: TRUE or FALSE? Cyberbullying is a serious problem, especially among preteens and teens.

      The Internet/Web for Commerce

Another popular function of the Web is to facilitate electronic commerce, or e-commerce. Online shopping offers numerous benefits to consumers. Instead of searching through the mall and standing in long lines, shoppers can make purchases from the comfort of their homes at any time of day or night. Web-based commerce also makes it easier to comparison shop, i.e., compare the products, features, and prices offered by various companies. Furthermore, online stores provide more detailed product descriptions and reviews than would be available through conventional stores, which helps consumers make more informed purchasing decisions. Many of the largest e-commerce sites are online offshoots of traditional retailers, such as www.walmart.com, www.bestbuy.com, and www.petsmart.com. In addition, many banks and retailers provide online services such as account tracking and online bill payments for the convenience of their customers.

Although some companies use the Internet to complement their traditional sales and services, others are strictly online ventures. The largest e-commerce site in terms of yearly sales, Amazon.com, is a strictly online company that was founded by Jeff Bezos in 1994. According to the U.S. Census Bureau, online sales for the U.S. e-commerce sector exceeded $1.2 trillion in 2025, which is more than 21% of the total economy. Amazon.com accounted for 37.6% of that number (FIGURE 9).

Fake news stats

FIGURE 9. U.S. E-commerce Market Share.

The Internet and Web have provided new advertising channels for businesses and organizations. The most common method of Internet-based advertising involves the owners of popular Web sites charging fees in exchange for hosting advertising banners on their pages. These so-called banner ads are clickable images that promote a particular company's product or service. Users who click an ad are typically directed to the company's Web site, where they can make purchases or review additional product-related information. Some marketers have turned to more aggressive means of capturing the consumer's attention, such as animated, interactive ads or pop-up ads that open a new window that the user must manually close. To help combat intrusive advertising, modern browsers incorporate a variety of tools, including pop-up window blockers and fraudulent Website registries. From a publicity perspective, Internet-based advertising offers potential advantages over other, more traditional channels, as the Web's structure makes targeted marketing easier and allows direct connections between ads and related purchasing interfaces.

In addition to facilitating business-to-consumer (B2C) transactions, the Internet is widely used for communication and information exchanges within and among businesses. Business-to-business (B2B) transactions allow companies to manage inventory more dynamically, improve efficiency by linking various data channels, and form partnerships based on sharing resources and information.

QUICK-CHECK 11.10: TRUE or FALSE? Walmart.com is the largest e-commerce site in terms of online sales.

    Privacy

When using credit cards or shopping online, consumers often sacrifice their privacy for the sake of convenience. Most credit card companies and online retailers maintain detailed records of customer purchases to identify patterns and predict future sales. Although such records can be used to improve customer service, there is significant potential for misuse. By analyzing a person's purchasing history, a company can infer many otherwise private details of the person's life, including hobbies, travel patterns, and personal contacts. For example, a 2012 story made national headlines when a father complained to Target about its marketing of pregnancy products to his teenage daughter, only to discover that she was unknowingly pregnant (which the retailer had inferred from her purchase history). Compounding the privacy concerns is the fact that companies commonly sell customer profiles to marketing firms and other retailers, which makes it virtually impossible for consumers to control or even know who has access to their data. Web users can at least attempt to limit the exploitation of their personal data by interacting only with reputable online businesses. Most such companies have established privacy policies outlining the ways in which they handle customer information, and many explicitly promise not to sell data to third parties. To ensure that companies follow their own privacy policies, third-party organizations such as TRUSTe.com have been formed that evaluate companies' privacy procedures and offer accreditation seals.

Email also raises privacy concerns in our technology-driven society. As email messages travel across the Internet, they pass through numerous routers that direct the messages to their destinations. Each router represents a security risk, because someone could gain access to the router and eavesdrop on messages that are relayed. When an email message is received, it is commonly stored in a file on the recipient's computer. If that message contains sensitive personal or business information, there is also a danger that unauthorized users might get access to that file. Whereas legislation explicitly protects the privacy of letters and packages sent through the U.S. Postal Service, there are few laws that apply directly to electronic privacy. Furthermore, courts have overwhelmingly favored employers over employees in invasion-of-privacy suits involving email. Unless a company or organization explicitly states its policy on electronic privacy, it may be assumed that the company has the right to access any content on company-owned machines. This has been ruled to include emails written or received by employees, even if the emails are unrelated to company business.

In recent years, a growing threat to user privacy is phishing, the act of obtaining sensitive information (e.g., credit card numbers, usernames, or passwords) by masquerading as a trusted entity in an email. These emails may claim to be banks seeking account confirmation, Internet service providers attempting to verify account information, or lost acquaintances hoping to reconnect. By responding with sensitive information, users are susceptible to financial loss or identity theft. In addition to direct financial losses, email accounts compromised via phishing are commonly used as platforms for spam attacks.

QUICK-CHECK 11.11: TRUE or FALSE? Phishing is a marketing technique in which a commercial site offers deals to entice customers.

      The Digital Divide

In addition to the positive impacts of computers described in this chapter, there are many other ways in which technology provides advantages to individuals. With so much educational material online, access to a computer and a fast, reliable Internet connection are essential learning tools in the 21st century. As governments move information and services online, being connected also contributes to being and informed and engaged citizen. Career networking sites (e.g., LinkedIn) and job registries (e.g., Indeed, ZipRecruiter) can improve the odds for people seeking jobs or career advancement, but only if they have the access.

One troubling aspect of technological advancement is that benefits such as these are not shared equally by all. According to a 2024 report by the Pew Research Center, Americans with lower income, less education, or minority race/ethnicity may face substantial obstacles in accessing technology (FIGURE 10). This Digital Divide between those who have easy access to technology and those who don't is especially troubling as it tends to widen the existing socioeconomic gap between the advantaged and disadvantaged in our society.

Stats on smartphone and broadband adoption in the U.S. (2023)

FIGURE 10. Smartphone and broadband adoption in the U.S. (2023).

The impact of the Digital Divide was highlighted in 2020 when the COVID-19 pandemic forced the closing of many schools across the U.S. Those students with home computers and reliable Internet service were able to transition to online classes, interacting with their teachers and fellow students using video conferencing software and completing assignments using the Web and applications software. Those without easy access to computers and the Internet were severely disadvantaged. Not surprisingly, lower-income students suffered under this so-called homework gap. According to a Pew Research Center survey, 59% of lower-income parents in 2020 reported that their homebound children faced hardships completing school assignments.

Fortunately, numerous groups are addressing the Digital Divide to help ensure that all people can enjoy the benefits of technology. During the late 1990s, the U.S. government made Internet connectivity a priority in public schools. By 2002, 99% of public schools in the United States were connected to the Internet, as compared to 35% in 1994 [National Center for Education Statistics]. Following this trend, most public libraries and community centers now provide Internet-enabled computers and have been instrumental in supplying Internet access and technical assistance to minority groups and lower-income individuals. Federal programs such as Lifeline and the Emergency Broadband Benefit provide support to low-income families to subsidize cellular and Internet bills. Not-for-profit organizations are also engaged in addressing various aspects of the Digital Divide. For example:

The Digital Divide is not just an American phenomenon — the same inequities in terms of access and opportunity appear across the globe. Not surprisingly, citizens in wealthier countries are more likely to have access to computers and their benefits. Wealthy countries can afford to build the necessary infrastructure to support a high-tech society, producing a work force that is better educated and prepared to succeed in the global economy. The map in FIGURE 11 illustrates these global inequities, with wealthy countries (mostly in North America, Europe and northern Asia) colored in dark shades, representing high percentage of Internet access. Poorer countries (mostly in in Africa, South American and southern Asia) are lightly shaded, representing low percentages of access. The global imbalance is even greater with respect to Internet traffic. In 2025, Cloudflare Radar estimated that the United States accounted for 27.9% of all Internet traffic, with India (5.6), Brazil (4.6%) and Germany (4.2%) being the next highest.

Stats on technology adoption by ethnicity

FIGURE 11. The global Digital Divide.

QUICK-CHECK 11.12: TRUE or FALSE? The "Digital Divide" refers to the fact that some groups in society (e.g., lower income, less educated) may have less access to computers and the Internet and so be disadvantaged.

QUICK-CHECK 11.13: TRUE or FALSE? The Digital Divide is largely an American phenomenon, with few countries worldwide experiencing unequal access to technology among their citizens.

    Diversity in the Tech Sector

The technology industry is one of the most dynamic and exciting sectors of the global economy. No other industry has the same potential for rapidly taking ideas and turning them into devices or applications that impact the world. For example, the cell phone and its successor, the smartphone, changed the way people communicate and access information. Both of these inventions were created and then widely adopted within a decade. While these devices evolved from existing technology, many social media applications that now serve millions or billions were once the idea of a single person or small teams, e.g., Mark Zuckerberg at Facebook, Jack Dorsey at Twitter, and Kevin Systrom at Instagram. As we saw in Chapter C2, Tim Berners-Lee designed and single-handedly created the software prototypes that led to the World Wide Web of today. Marc Andreesen was a graduate student at the University of Illinois when he created the first commercial Web browser, and Larry Page and Sergey Brin were graduate students at Stanford when they built the first Google search engine. News stories are filled with examples of teens building a game or mobile app and becoming successful entrepreneurs.

While the accomplishments of the above inventors and entrepreneurs are impressive, one can't help but notice a commonality between them. They are all white males. That is not to say that women and people of color have not been successful innovators in the tech industry — there have been many. For example,

Stats on technology adoption by ethnicity

FIGURE 12. Jerry Lawson (Museum of Play), Marissa Mayer (Magnus Hoij/Wikimedia Commons), Luis von Ahn (Luisalvaz/Wikimedia Commons), Whitney Wolfe Herd (TechCrunch/Wikimedia Commons).

While the stories of these and other successful innovators and business leaders are inspiring, they are unfortunately too rare in the tech industry. Despite accounting for nearly half of the U.S. workforce in 2022, women accounted for only 26.7% of computing-related positions. Similar but narrower gaps can be seen for people of color, e.g., African Americans accounted for 9.1% of tech jobs but 13% of the overall workforce; Hispanic and Latinx Americans accounted for only 8.6% of tech jobs, despite being 19% of the overall workforce.

The tech industry has largely acknowledged the existing inequity and is instituting policies to encourage and support women and minority employees. These policies include changing corporate cultures to be more inclusive, highlighting successful women and minority employees as role models, and modifying hiring practices to place greater value on candidates who bring different perspectives. Several tech companies set goals for diversity hiring, including Intel which targeted at least 40% of new hires in to be women or underrepresented minorities starting in 2015. To encourage success, Intel tied company-wide bonuses to meeting that hiring goal. While awareness of the issues has grown and progress has been made, change has been slow at many companies.

QUICK-CHECK 11.14: TRUE or FALSE? Women are represented in the tech workforce at roughly the same percentage as in the overall workforce.

    Tech Bias

Beyond the obvious social-justice aspects, the advantages of a diverse workforce are numerous. Companies are more productive when teams are diverse in their backgrounds and viewpoints. Different viewpoints and experiences produce a diversity of ideas, which can encourage innovation. An openness to welcome workers that look and think differently means that outstanding candidates who might otherwise be overlooked are now hired. And since most technology is used across the world, a company whose workforce is diverse will be better at understanding and responding to the needs of a diverse client base.

Another compelling reason to encourage diversity is that the products designed and built by a diverse team tend to be higher quality and more equitable. The news is filled with stories of devices and software that were flawed or discriminatory because of ill-conceived design. For example, most cell phone manufacturers design their phones with male hands in mind, often failing to take into account their usability for women. Sociologist Zeynep Tufecki once reported that she was unable to document real-time events in the field since her cell phone was too large for her to take photos one-handed. In 2010, Apple helped launch the emoji craze by standardizing a set of emojis that could be embedded into texts and emails. It wasn't until 2015 that they introduced different skin tones. In 2014, Apple launched a "comprehensive" health tracking app for its mobile devices. The app tracked a wide variety of health factors, from daily movement to heart rate to copper intake. However, it did not include a feature that would have been useful to women: period tracking. These examples, while not life-threatening, show that companies (even Apple, which is known for thoughtful design) can produce biased products if diverse viewpoints do not contribute to the design.

With the growth of artificial intelligence applications and their use to solve complex real-world problems, the potential for algorithmic bias is also growing. Algorithmic bias occurs when faulty assumptions and poor design practices lead to software that produces unfair consequences. Often those consequences involve discriminatory outcomes for women and people of color, due to a lack of diversity in the design process. Recent examples in the news include:

In all these example and others like them, the algorithmic bias was not intentional. Software developers do not set out to create software that discriminates against segments of the population. However, the lack of diverse viewpoints on design teams can lead to unquestioned assumptions and flawed development processes. For example, facial recognition software can be made more inclusive simply by training the software on a more diverse set of faces. If the design team included women and people of color, it is likely that the uniformity of the training set would have been pointed out and addressed. When all the people on a team look alike, however, it is less likely that they will notice that the training faces look like them as well.

When combating any form of discrimination and inequity, awareness is the first step. In the past decade, awareness of the Digital Divide and its negative consequences, not only for the disadvantaged but also for society as a whole, has increased considerably. Efforts to bridge the divide and ensure that the benefits of technology are shared equally are being supported by governments and companies. Young women and people of color are being encouraged to consider future computing careers. Corporate cultures are adapting to be more inclusive and hiring practices are changing to produce a more diverse workforce. The recognition that implicit biases and the lack of diversity on design teams can produce products that discriminate has also had a profound effect on the tech industry, leading to new design methodologies.

QUICK-CHECK 11.15: TRUE or FALSE? Design teams in which most of the members look and think the same tend to be more efficient since disagreements tend to be minimal.

QUICK-CHECK 11.16: TRUE or FALSE? Algorithmic bias occurs when faulty assumptions and poor design practices lead to software that produces unfair consequences


      Chapter Summary


      Review Questions

  1. In addition to the examples listed in this chapter, describe two other aspects of society that have been greatly impacted by computer technology. Within these areas, what specific activities or jobs were most affected? Overall, has the impact been positive or negative? Justify your answers.
  2. In an average week, how many cash purchases do you make? How many debit or credit card purchases? Do you have any anxiety about the amount of information banks and credit card companies collect from your purchase history?
  3. Use the Web to determine the current dollar value of a bitcoin. How stable has its value been (e.g., did it change substantially in the past week or month)?
  4. Describe one advantage of specialized applications such as tax preparation software. Describe one potential disadvantage.
  5. Use the Web to identify a recent (within the last year) incident where a computer or software failure resulted in significant loss of money or lives. Was the cause of failure identified and fixed?
  6. Describe two advantages of online newspapers over their print counterparts. Do you think that electronic newspapers will completely replace printed papers in the near future? Why or why not?
  7. Perform a Web search on your name. That is, enter your name into a search engine, such as Google or DuckDuckGo, and then search the Web for occurrences of that name. How many matching pages did the search engine find? If you have your own Web page, did the search engine find it? You may need to include additional search parameters if your name is relatively common.
  8. If you own a smartphone, how many different apps do you use regularly? If not, what factors led to that choice (e.g., cost, personal preference, privacy concerns).
  9. Most smartphones track your screen time and provide a report each day or week. If you own a smartphone, access this feature and report how many hours a day (on average) that you spend on your phone. If you do not own a smartphone, log your online activities in a 24-hour period and report the number of hours you spent online.
  10. Describe two advantages of online shopping over in-person retail outlets. Do you personally prefer making purchases online versus going to stores? Explain your reasoning.
  11. In addition to the organizations listed in this chapter, use a search engine to identify an organization that is addressing the digital divide. What approach is this organization taking toward supporting women and people of color in computing?
  12. What do you believe are the major factors that have led to inequities in the tech industry? That is, why do you believe that women and people of color have been underrepresented at computing jobs? ?
  13. The section on Tech Diversity named several successful technology innovators who were women or people of color. How many of those innovators had you heard of before? Are there other such people that come to mind?
  14. Describe three advantages of having diverse experiences and viewpoints on a design team? Have you ever worked in a job or on a school project where you personally experienced any of these advantages?
  15. In addition to the examples in this chapter, use the Web to identify and report on an example of algorithmic bias in a real-world product. How did that product discriminate or negatively impact an underrepresented group?
  16. Overall, are you optimistic or pessimistic about the future of a more diverse tech industry? Try to explain why you feel as you do.

← X10: Software Models ↑ Table of Contents ↑