1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
COMPUTER Protection & PRIVACY ISSUES Selected examples using concepts from Computer Concepts by Pusins & Ambrose, South-Western Education Division, 2001.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
JCSD-aw Citizenship in an e-World Johnston Community School District.
Computer Security and Risks 11.  2001 Prentice Hall11.2 Chapter Outline On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy,
Analyzing Technology Issues 8 th Grade Exploring Business and Marketing.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
How is Technology Changing the Workplace and Society?
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.
Living Online Module Lesson 29 — Security, Privacy, and Ethics Online
Chapter 11 Security and Privacy: Computers and the Internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
General Purpose Packages
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Living Online Module Lesson 28 — Technology and Society Computer Literacy BASICS.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Cyber crime & Security Prepared by : Rughani Zarana.
Understand applications and issues of technology. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Objective 2.04 Understand applications and issues of technology. 1.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Essential Standard 2.00 Understand the nature of business. 1.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Understand the nature of business. 1. Understand applications and issues of technology. 2.
Computer Crimes Career & Technology Education Department.
 Understand the nature of business. 1.  Understand applications and issues of technology. 2.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Essential Standard 2.00 Understand the nature of business. 1.
Topic 5: Basic Security.
Essential Standard 2.00 Understand the nature of business. 1.
Privacy, Security and Ethics
Security and Ethics Safeguards and Codes of Conduct.
Living Online Module Lesson 28 — Technology and Society Computer Literacy BASICS.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ESSENTIAL STANDARD 2.00 Understand the nature of business. 1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Essential Standard 2.00 UNDERSTAND THE NATURE OF BUSINESS. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Essential Standard 2.00 Understand the nature of business. 1.
Technical Implementation: Security Risks
Understand the nature of business.
How is Technology Changing the United states and the world?
Computer Basics Technology’s Impact.
Chapter 11 crime and security in the networked economy
BCT 2.00 Analyze Technology Issues
Understand the nature of business.
Understand the nature of business.
Presentation transcript:

1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells

Lesson 17 WellsComputer Concepts BASICS 22 Objectives Describe the impact of technology on education Describe the impact of technology on science and medicine Describe the impact of technology on work and play Identify types of computer crimes

Lesson 17 WellsComputer Concepts BASICS 33 Objectives (continued) Identify computer viruses Identify various security measures Identify computer-related laws Identify the "work" of hackers Describe how privacy is invaded with computer use

Lesson 17 WellsComputer Concepts BASICS 44 Vocabulary artificial intelligence (AI) biometric security measures computer-based learning computer crime computer fraud computer hacking copyright data diddling digital cash electronic commerce genetic engineering groupware

Lesson 17 WellsComputer Concepts BASICS 55 Vocabulary (continued) nanotechnology online learning optical computing plagiarism quantum computing simulation software piracy time bomb virtual reality (VR) virus worm

Lesson 17 WellsComputer Concepts BASICS 66 Education The Internet and the World Wide Web are the biggest factors affecting education today Students use the Internet for class research The Internet has become a way to deliver online learning Computer-based learning and computer- assisted instruction (CAI) are methods where the teacher uses the computer to deliver instruction

Lesson 17 WellsComputer Concepts BASICS Education (continued) HowStuffWorks Web page 7

Lesson 17 WellsComputer Concepts BASICS 88 Education (continued) Simulations are models of real-world activities, designed to allow students to experiment and explore environments that might be dangerous, unavailable, or inaccessible

Lesson 17 WellsComputer Concepts BASICS 99 Scientific Discovery and Technological Innovations The goal of artificial intelligence software is to process information on its own without human intervention Genetic engineering refers to changing the DNA in a living organism and has positively impacted our life span Virtual reality is an artificial environment that feels like a real environment created with computer hardware and software

Lesson 17 WellsComputer Concepts BASICS Scientific Discovery and Technological Innovations (continued) Genetic engineering 10

Lesson 17 WellsComputer Concepts BASICS 11 Scientific Discovery and Technological Innovations (continued) Nanotechnology relates to creating computer components that are less than 100 nanometers in size Optical computing uses light beams for the internal circuits instead of electricity Quantum computing uses the laws of quantum mechanics and the way that atoms can be in more than one state at once to do computational tasks

Lesson 17 WellsComputer Concepts BASICS 12 Work and Play Technology is affecting the way information and money is transmitted Electronic commerce, or e-commerce, means having an online business The digital cash system allows someone to pay by transmitting a number from one computer to another

Lesson 17 WellsComputer Concepts BASICS 13 Work and Play (continued) A computer network can be a vital tool for helping work run more smoothly Groupware refers to programs and software that help people work together despite location – One of the more common types of groupware is . Computers play an important role in our life from ordering pizza to using the ATM

Lesson 17 WellsComputer Concepts BASICS 14 Technological Issues Computers have made our daily lives much easier, but there are risks and problems Plagiarism is presenting someone else’s ideas or work as your own, without authorization Copyright is legal protection for authors of their creative works Computer crime is a criminal act committed through the use of a computer

Lesson 17 WellsComputer Concepts BASICS 15 Technological Issues (continued) Computer fraud involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss – Computer hacking involves invading someone else’s computer – A virus is a program written to cause the corruption of data – A worm makes copies of itself and slows down a PC – A time bomb causes damage at a time in the future – A Trojan horse is harmful software that does the unexpected – An virus uses messages to carry the virus

Lesson 17 WellsComputer Concepts BASICS Technological Issues (continued) Security scan and virus detection 16

Lesson 17 WellsComputer Concepts BASICS 17 Technological Issues (continued) Theft of computer time is a crime committed regularly in the workplace Changing data before or after it is entered into the computer is called data diddling Computer equipment and data are subject to hazards such as fire and flood Illegally copying and using software is called software piracy Working on computers for long periods of time can cause ergonomic-related health issues

Lesson 17 WellsComputer Concepts BASICS 18 Technological Issues (continued) Information submitted on the Internet can be used in computer crime The best way to protect data is to control access of the data, most often through passwords Other security measures include using ID cards, firewalls, antivirus software, selective hiring practices, and data backups Biometric security measures examine a fingerprint, a voice pattern, or the iris or retina of the eye and compare them against employee records

Lesson 17 WellsComputer Concepts BASICS Summary Technology is having a tremendous impact on education. Many people predict that technology will change the entire structure of education. The Internet and the World Wide Web are the biggest factors affecting education today. Some people predict an antitechnology backlash. Electronic commerce is the buying and selling of goods and services using the Internet. 19

Lesson 17 WellsComputer Concepts BASICS Summary (continued) Digital cash allows someone to pay online by transmitting a number from one computer to another. New jobs and new job categories are being developed because of the Internet and electronic commerce. Some technological advances are voice recognition, nonlethal weapons, space travel, flying cars, smart shoes and smart seats, clothes that fight odors, and electronic shopping. Computer crime has become a major problem, costing companies billions of dollars annually. 20

Lesson 17 WellsComputer Concepts BASICS Summary (continued) Computer fraud is conduct that involves the manipulation of a computer or computer data for dishonest profit. Computer hacking involves invading someone else’s computer. Sometimes it is done for financial gain and sometimes just as a prank. A computer virus is a program that has been written to cause corruption of data on a computer. To protect against viruses, install and keep an antivirus program running on your computer. Be sure to update it regularly. 21

Lesson 17 WellsComputer Concepts BASICS Summary (continued) Computer security is necessary to keep hardware, software, and data safe from harm or destruction. The most common way to control access to data is to use passwords. Illegally copying and using software is called software piracy. It has cost companies millions of dollars in lost sales. Laws have been passed in an effort to assist those who have been injured by computer crimes and offenses. Many computer crimes are difficult to prove and prosecute. 22