[fa.human-nets] HUMAN-NETS Digest V7 #18

Human-Nets-Request%rutgers@brl-bmd.UUCP (Human-Nets-Request@rutgers) (02/11/84)

HUMAN-NETS Digest        Friday, 10 Feb 1984       Volume 7 : Issue 18

Today's Topics:
                 Query - Programming Aptitude Tests,
          Computers and the Law - New Access Law (2 msgs) &
                 Database Entry Disclosure (3 msgs),
        Computers and People - Big Computer is Watching You &
               Hackers & Telecollaboration Simulation,
                 Computers and the Media - Hacker/ing,
                Information - CMU Interaction Program
----------------------------------------------------------------------

Date: Wed,  8 Feb 84 19:26:38 CST
From: Stan Barber <sob@rice>
Subject: Testing Programming Aptitude or Compentence
To: AIlist@SRI-ai, telecom@mit-mc
Cc: stan@RICE, wert@RICE, va@RICE, fbag@RICE, rbbb@RICE, dave@RICE,
Cc: dbj@RICE,

I am interested in information on the following tests that have been
or are currently administered to determine Programming Aptitude or
Compentence.

1. Aptitude Assessment Battery:Programming (AABP) created by Jack M.
Wolfe and made available to employers only from Programming
Specialists, Inc.  Brooklyn NY.

2. Programmer Aptitude/Compentence Test System sold by Haverly
Systems, Inc. (Introduced in 1970)

3. Computer Programmer Aptitude Battery by SRA (Science Research
Associates), Inc. (Examined in by F.L. Schmidt et.al. in Journal of
Applied Psychology, Volume 65 [1980] p 643-661)

4. CLEP Exam on Computers and Data Processing. The College Board and
the Educational Testing Service.

5. Graudate Record Exam Advanced Test in Computer Science by the
Education Testing Service.

Please send the answers to the following questions if you have taken
or had experience with any of these tests:

1. How many scores and what titles did they used for the version of
the exam that you took?

2. Did you feel the test actually measured your ability to learn to
program or your current programming competence (that is, did you feel
it asked relevant questions)?

3. What are your general impressions about testing and more
specifically about testing special abilities or skills (like
programming, writing, etc.)

I will package up the results and send them to Human-nets.

My thanks.


               Stan Barber
               Department of Psychology
               Rice University
               Houston TX 77251

               sob@rice                        (arapnet,csnet)
               sob.rice@rand-relay             (broken arpa mailers)
               ...!{parsec,lbl-csam}!rice!sob  (uucp)
               (713) 660-9252                  (bulletin board)

------------------------------

Date: 3 Feb 1984 1939-PST
From: CAULKINS at USC-ECL.ARPA
Subject: California Computer Crime Bill
To: human-nets at RUTGERS

A new computer crime bill just introduced in Sacramento could shut
down all free, public access computer-based bulletin board systems
(BBS) in California.  The bill (AB2551) makes it a misdemeanor to
knowingly access a computer "without authorization" for any reason,
even with no malicious intent.  The reason for the misdemeanor is to
make it easier to prosecute "hackers" who break into computers but do
no damage.  Vandalism, theft of information, etc. are already felonies
under an existing California crime bill.

The problem free and open BBSs is that users cannot know if they are
committing a crime until they log on a BBS, and by then the crime has
occurred.  The BBSs have neither $ nor personnel to mail notices to
users; even if they did there is no list of user addresses for the
mailing.

The bill was introduced by Sam Farr (D, Carmel).  For more info
contact John James (author of the Communitree software used on many
BBSs), PO Box 1807 Los Gatos, CA 95031 (408))335-9250

The above appeared on the BBS I operate in Palo Alto, CA.

------------------------------

Date: Sat, 4 Feb 84 13:33:19 PST
From: Matthew J. Weinstein <matt@UCLA-LOCUS>
Subject: More Laws?

[L A Times  2/3/84  p. 2]

``Computer  "hackers",  experts  who  electronically   infiltrate
private  computer  systems,  would  be  charged with misdemeanors
under legislation proposed in the state Assembly.   The  measure,
proposed by Assemblyman Sam Farr (D-Monterey) and backed by Atty.
Gen. John Van de Kamp, is aimed at youthful computer  enthusiasts
who  enter  computer  systems  without malicious intent.  Current
laws provide felony penalties for those who infiltrate malicious-
ly.   In  recent  months,  authorities  have investigated several
cases in which teenagers have gained entry into private computer
banks.''

------------------------------

Date: 6 February 1984 03:53 EST
From: Robert Elton Maas <REM @ MIT-MC>
Subject: Laws about keeping info about people in databases
Cc: DEVON @ MIT-MC

    [MESSAGE FROM DEVON at MIT-MC  3:15am]
    ... I'd say that such laws generally only address information that
    you give out to other people, not info that you keep for yourself.
Good point, and a relief if correct. So it's perfectly legal to keep
my personal name&address list on a computer, providing I don't start
distributing it to outsiders (especially if I sell it to anybody with
the money!!) and providing I take reasonable measures to read-protect
it.

That would seem to answer the fears about somebody raiding his prsonal
computer just because he keeps his personal mailing list on it.

------------------------------

Date: Thu, 9 Feb 84 08:38 EST
From: MJackson.Wbst@PARC-MAXC.ARPA
Subject: Re: Database notification and privacy
To: willis@Rand-Unix.ARPA
Cc: REM@MIT-MC.ARPA, MJackson.Wbst@PARC-MAXC.ARPA

In response to Willis Ware's comments on the cost-benefit aspects of
REM's proposal for mandatory, annual notification of individuals by
database maintainers:

Your points are interesting, but I'm not sure that they are
convincing.  Granted that a mailing of ~150 million is nontrivial,
it's not obvious to me how serious the incremental burden on the mail
system would be.  (The IRS forms mailing is indeed similar; how about
Publishers' Clearing House or Reader's Digest promotions?  Remember,
too, that we're talking about at most one or two additional pieces of
mail per household--how many do you get in a day already?)

        The basic point is sound though; one does not have a good
        mechanism for knowing where records about him exist or what
        they contain. It's a hit and miss proposition and even
        individuals who are well informed and adroit in tracking down
        things will occasionally be startled to uncover a new and
        unexpected collection of data.

Perhaps we have a basis for a clearly feasible proposal.  If in fact
the burden of annual individual notification is determined (how?) to
be excessive relative to the {benefit of | public demand for} such
service, how about the establishment of a central facility, to which
all individual databases are required to make themselves known, which
forwards requests by individuals to all such databases, to which they
must respond (directly, or through some sort of pooling) "yes, we have
you/no, we've never heard of you"?

Mark

------------------------------

Date: 10 February 1984 05:23 EST
From: Jerry E. Pournelle <POURNE @ MIT-MC>
Subject: HUMAN-NETS Digest   V7 #16
To: TREITEL @ SUMEX-AIM
Cc: dehn @ MIT-MULTICS



people wioth eidetctic memories shall be lobotomized if they
learn anything about you...
        How's that agin?

------------------------------

Date: 10 Feb 1984 1150-EST
From: Wang Zeep <G.ZEEP at MIT-EECS at MIT-MC>
Subject: A frightening Thought

The latest issue of "Infoworld" mentions that a think tank believes
that in a few years, all students will be required to have portables.
These (lap-sized, I guess) portables would have a "write-only memory"
recording all test scores and exams.  Only school officials would be
able to read the results in the WOM and would use these results to
determine competency and graduation.  They predict that this will
eventually replace SAT's and such; universities would recieve
transcripts of all this data and decide admissions on such a basis.
                        wz

------------------------------

Date: Fri, 3 Feb 84 16:52:51 PST
From: Matthew J. Weinstein <matt@UCLA-LOCUS>
To: ddern@bbn-unix
Subject: A Hacker by Any Other Name ...

Other locales have developed names for the same (sane?) type of
behavior.  When I was an undergrad, (real) hackers were often called
`munchers', and the verb was `to munch' (of course, we might have had
`munchkins', and you know what we did when we had `the munchies')...

                        - Matt


***Sender closed connection***

=== brl netread error from RUTGERS at Sat Feb 11 04:16:06  ===

Human-Nets-Request%rutgers@brl-bmd.UUCP (Human-Nets-Request@rutgers) (02/11/84)

HUMAN-NETS Digest        Friday, 10 Feb 1984       Volume 7 : Issue 18

Today's Topics:
                 Query - Programming Aptitude Tests,
          Computers and the Law - New Access Law (2 msgs) &
                 Database Entry Disclosure (3 msgs),
        Computers and People - Big Computer is Watching You &
               Hackers & Telecollaboration Simulation,
                 Computers and the Media - Hacker/ing,
                Information - CMU Interaction Program
----------------------------------------------------------------------

Date: Wed,  8 Feb 84 19:26:38 CST
From: Stan Barber <sob@rice>
Subject: Testing Programming Aptitude or Compentence
To: AIlist@SRI-ai, telecom@mit-mc
Cc: stan@RICE, wert@RICE, va@RICE, fbag@RICE, rbbb@RICE, dave@RICE,
Cc: dbj@RICE,

I am interested in information on the following tests that have been
or are currently administered to determine Programming Aptitude or
Compentence.

1. Aptitude Assessment Battery:Programming (AABP) created by Jack M.
Wolfe and made available to employers only from Programming
Specialists, Inc.  Brooklyn NY.

2. Programmer Aptitude/Compentence Test System sold by Haverly
Systems, Inc. (Introduced in 1970)

3. Computer Programmer Aptitude Battery by SRA (Science Research
Associates), Inc. (Examined in by F.L. Schmidt et.al. in Journal of
Applied Psychology, Volume 65 [1980] p 643-661)

4. CLEP Exam on Computers and Data Processing. The College Board and
the Educational Testing Service.

5. Graudate Record Exam Advanced Test in Computer Science by the
Education Testing Service.

Please send the answers to the following questions if you have taken
or had experience with any of these tests:

1. How many scores and what titles did they used for the version of
the exam that you took?

2. Did you feel the test actually measured your ability to learn to
program or your current programming competence (that is, did you feel
it asked relevant questions)?

3. What are your general impressions about testing and more
specifically about testing special abilities or skills (like
programming, writing, etc.)

I will package up the results and send them to Human-nets.

My thanks.


               Stan Barber
               Department of Psychology
               Rice University
               Houston TX 77251

               sob@rice                        (arapnet,csnet)
               sob.rice@rand-relay             (broken arpa mailers)
               ...!{parsec,lbl-csam}!rice!sob  (uucp)
               (713) 660-9252                  (bulletin board)

------------------------------

Date: 3 Feb 1984 1939-PST
From: CAULKINS at USC-ECL.ARPA
Subject: California Computer Crime Bill
To: human-nets at RUTGERS

A new computer crime bill just introduced in Sacramento could shut
down all free, public access computer-based bulletin board systems
(BBS) in California.  The bill (AB2551) makes it a misdemeanor to
knowingly access a computer "without authorization" for any reason,
even with no malicious intent.  The reason for the misdemeanor is to
make it easier to prosecute "hackers" who break into computers but do
no damage.  Vandalism, theft of information, etc. are already felonies
under an existing California crime bill.

The problem free and open BBSs is that users cannot know if they are
committing a crime until they log on a BBS, and by then the crime has
occurred.  The BBSs have neither $ nor personnel to mail notices to
users; even if they did there is no list of user addresses for the
mailing.

The bill was introduced by Sam Farr (D, Carmel).  For more info
contact John James (author of the Communitree software used on many
BBSs), PO Box 1807 Los Gatos, CA 95031 (408))335-9250

The above appeared on the BBS I operate in Palo Alto, CA.

------------------------------

Date: Sat, 4 Feb 84 13:33:19 PST
From: Matthew J. Weinstein <matt@UCLA-LOCUS>
Subject: More Laws?

[L A Times  2/3/84  p. 2]

``Computer  "hackers",  experts  who  electronically   infiltrate
private  computer  systems,  would  be  charged with misdemeanors
under legislation proposed in the state Assembly.   The  measure,
proposed by Assemblyman Sam Farr (D-Monterey) and backed by Atty.
Gen. John Van de Kamp, is aimed at youthful computer  enthusiasts
who  enter  computer  systems  without malicious intent.  Current
laws provide felony penalties for those who infiltrate malicious-
ly.   In  recent  months,  authorities  have investigated several
cases in which teenagers have gained entry into private computer
banks.''

------------------------------

Date: 6 February 1984 03:53 EST
From: Robert Elton Maas <REM @ MIT-MC>
Subject: Laws about keeping info about people in databases
Cc: DEVON @ MIT-MC

    [MESSAGE FROM DEVON at MIT-MC  3:15am]
    ... I'd say that such laws generally only address information that
    you give out to other people, not info that you keep for yourself.
Good point, and a relief if correct. So it's perfectly legal to keep
my personal name&address list on a computer, providing I don't start
distributing it to outsiders (especially if I sell it to anybody with
the money!!) and providing I take reasonable measures to read-protect
it.

That would seem to answer the fears about somebody raiding his prsonal
computer just because he keeps his personal mailing list on it.

------------------------------

Date: Thu, 9 Feb 84 08:38 EST
From: MJackson.Wbst@PARC-MAXC.ARPA
Subject: Re: Database notification and privacy
To: willis@Rand-Unix.ARPA
Cc: REM@MIT-MC.ARPA, MJackson.Wbst@PARC-MAXC.ARPA

In response to Willis Ware's comments on the cost-benefit aspects of
REM's proposal for mandatory, annual notification of individuals by
database maintainers:

Your points are interesting, but I'm not sure that they are
convincing.  Granted that a mailing of ~150 million is nontrivial,
it's not obvious to me how serious the incremental burden on the mail
system would be.  (The IRS forms mailing is indeed similar; how about
Publishers' Clearing House or Reader's Digest promotions?  Remember,
too, that we're talking about at most one or two additional pieces of
mail per household--how many do you get in a day already?)

        The basic point is sound though; one does not have a good
        mechanism for knowing where records about him exist or what
        they contain. It's a hit and miss proposition and even
        individuals who are well informed and adroit in tracking down
        things will occasionally be startled to uncover a new and
        unexpected collection of data.

Perhaps we have a basis for a clearly feasible proposal.  If in fact
the burden of annual individual notification is determined (how?) to
be excessive relative to the {benefit of | public demand for} such
service, how about the establishment of a central facility, to which
all individual databases are required to make themselves known, which
forwards requests by individuals to all such databases, to which they
must respond (directly, or through some sort of pooling) "yes, we have
you/no, we've never heard of you"?

Mark

------------------------------

Date: 10 February 1984 05:23 EST
From: Jerry E. Pournelle <POURNE @ MIT-MC>
Subject: HUMAN-NETS Digest   V7 #16
To: TREITEL @ SUMEX-AIM
Cc: dehn @ MIT-MULTICS



people wioth eidetctic memories shall be lobotomized if they
learn anything about you...
        How's that agin?

------------------------------

Date: 10 Feb 1984 1150-EST
From: Wang Zeep <G.ZEEP at MIT-EECS at MIT-MC>
Subject: A frightening Thought

The latest issue of "Infoworld" mentions that a think tank believes
that in a few years, all students will be required to have portables.
These (lap-sized, I guess) portables would have a "write-only memory"
recording all test scores and exams.  Only school officials would be
able to read the results in the WOM and would use these results to
determine competency and graduation.  They predict that this will
eventually replace SAT's and such; universities would recieve
transcripts of all this data and decide admissions on such a basis.
                        wz

------------------------------

Date: Fri, 3 Feb 84 16:52:51 PST
From: Matthew J. Weinstein <matt@UCLA-LOCUS>
To: ddern@bbn-unix
Subject: A Hacker by Any Other Name ...

Other locales have developed names for the same (sane?) type of
behavior.  When I was an undergrad, (real) hackers were often called
`munchers', and the verb was `to munch' (of course, we might have had
`munchkins', and you know what we did when we had `the munchies')...

                        - Matt

------------------------------

Date: 9-Feb-84 00:36 PST
From: Kirk Kelley  <KIRK.TYM@OFFICE-2>
Subject: Re: nuclear winter simulation collaboration
To: Robert Elton Maas <REM @ MIT-MC>
Cc: Arms-D@MIT-MC

This refers to a dialogue in Human Nets V7 #14 - #16.

From: Robert Elton Maas <REM @ MIT-MC>

   Or quicker, just write one of those early-type BASIC programs that
   simulates the volcano and WW3, so kiddies can play with the
   parameters and get flamboyant printouts of the results.

World III (Limits to Growth) simulations in BASIC and Dynamo have
existed for Apples and TRS-80s for a few years now.  But it is not
clear that, for disseminating simulations, the disk/cartridge
technology by itself is the best way to encourage user
support/collaboration on the simulation.  Computer networking may need
to play an important part in such an augmented global consciousness.
At least, that is one of the things I would expect to find out from a
telecollaborated simulation project like the Gaia Adventure.

I went to the Palo Alto CPSR meeting tonight and listened to the talk
by one of the NASA Nuclear Winter modelers that published in Dec 23
Science.  In a private conversation after the talk, I learned some
interesting facts.  It is impossible to get any public funding to
build or improve a model because results take a year or more.  They
had NO official support for any of their work!  They even got their
budget cut because NASA decided they must have too much money if they
had time for such a project.  Any future research may be done
exclusively by the DoD at Livermore (classified?).  Their model takes
60 seconds on their Cray for one run but they have very primitive and
flaky network access to the Cray.  None of the people on the project
have access to an electronic mailbox.

The effort it would take to make their simulation available for use
and collaboration by a paying (EM) public, such as in the Gaia
Adventure, would be great, but it could be the only way it will ever
get the resources necessary to produce convincing results.

 -- kirk

------------------------------

Date: 5 February 1984 00:59 EST
From: Robert Elton Maas <REM @ MIT-MC>
Subject: Correct use of "hack" on "Whiz Kids" tonight, and wiretap

Ritchie said <approximately> "I'm going to try to hack something
together in 5 minutes" meaning he was going to do a rush job of
programming, not care about subtle bugs or user interface or
structured programing etc., just try to get it working in an
emergency.  Indeed he found a way to transfer a digitized photo from
the Aethena-society computer over the phone to the newspaper
reporter's portable computer with printer. The Aethena-society fellow
whose computer he was going to do this on looked worried, and Ritchie
assured him he wasn't going to damage anything.

It sounds like the script writer is making some attempt to bring back
the correct definition of "hack" at least.

By the way, earlier in the program a maidservice pretended Ritchie's
mother had won a prize, a monty's maid service, and the "maid" planted
bugging devices including on Ritchie's phone, used for his modem. I
was thinking this would develop into some kind of plot to record the
data when Ritchie logs into remote hosts, obtaining login procedure
and passwords, but that part of the plot was dropped for no apparent
reason.

------------------------------

Date: Friday, 03 Feb 84 23:41:02 EST
From: reiser (brian reiser) @ cmu-psy-a
Reply-to: Brian Reiser < Reiser%CMU-PSY-A@CMU-CS-PT >
Subject: CMU Human-Computer Interaction Program



                       ***** ANNOUNCEMENT *****

            Graduate Program in Human-Computer Interaction
                    at Carnegie-Mellon University

The field of  human-computer interaction brings  to bear theories  and
methodologies from cognitive  psychology and computer  science to  the
design of computer  systems, to  instruction about  computers, and  to
computer-assisted instruction.   The  new  Human-Computer  Interaction
program at CMU is geared toward the development of cognitive models of
the  complex  interaction  between  learning,  memory,  and   language
mechanisms involved in using computers.  Students in the program apply
their psychology and  computer science  training to  research in  both
academic and industry settings.

Students  in  the  Human-Computer  Interaction  program  design  their
educational curricula with  the advice  of three  faculty members  who
serve as the  student's committee.  The  intent of the  program is  to
guarantee that  students  have  the right  combination  of  basic  and
applied research experience and coursework so that they can do leading
research  in   the   rapidly  developing   field   of   human-computer
interaction.  Students typically  take one psychology  course and  one
computer science course  each semester  for the first  two years.   In
addition,  students  participate  in   a  seminar  on   human-computer
interaction held during the summer of the first year in which  leading
industry researchers are invited to describe their current projects.

Students are  also  actively  involved in  research  throughout  their
graduate career.  Research  training begins with  a collaborative  and
apprentice relationship with a  faculty member in laboratory  research
for the  first one  or two  years of  the program.   Such  involvement
allows the student several repeated exposures to the whole sequence of
research in  cognitive  psychology  and  computer  science,  including
conceptualization of a problem,  design and execution of  experiments,
analyzing data,  design and  implementation of  computer systems,  and
writing scientific reports.

In the second half of  their graduate career, students participate  in
seminars, teaching, and an extensive research project culminating in a
dissertation.   In  addition,  an  important  component  of  students'
training involves an internship working on an applied project  outside
the academic  setting.  Students  and  faculty in  the  Human-Computer
Interaction program are  currently studying  many different  cognitive
tasks involving  computers,  including:  construction  of  algorithms,
design of  instruction for  computer  users, design  of  user-friendly
systems, and  the  application of  theories  of learning  and  problem
solving to the design of systems for computer-assisted instruction.

Carnegie-Mellon University is exceptionally well suited for a  program
in human-computer interaction.  It combines a strong computer  science
department with a strong psychology  department and has many lines  of
communication between  them.   There  are  many  shared  seminars  and
research projects.   They  also  share in  a  computational  community
defined by a  large network of  computers.  In addition,  CMU and  IBM
have committed to a major effort to integrate personal computers  into
college education.   By 1986,  every  student on  campus will  have  a
powerful state-of-the-art personal computer.   It is anticipated  that
members of the Human-Computer Interaction program will be involved  in
various aspects of this effort.

The following faculty  from the  CMU Psychology  and Computer  Science
departments  are  participating  in  the  Human-Computer   Interaction
Program: John R. Anderson, Jaime  G. Carbonell, John R. Hayes,  Elaine
Kant, David  Klahr, Jill  H. Larkin,  Philip L.  Miller, Alan  Newell,
Lynne M. Reder, and Brian J. Reiser.

Our  deadline  for  receiving   applications,  including  letters   of
recommendation, is March 1st.   Further information about our  program
and application materials may be obtained from:

     John R. Anderson
     Department of Psychology
     Carnegie-Mellon University
     Pittsburgh, PA  15213

------------------------------

End of HUMAN-NETS Digest
************************