SOCIAL IMPACT OF COMPUTERS

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Effects of IT on Supermarkets The Kingsway School.
Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Unit 18 Data Security 1.
Security, Privacy, and Ethics Online Computer Crimes.
Life in the Information Age
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Issues Raised by ICT.
Introduction to Business Organisations
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Human-Computer Interface Course 2. Content The use of IT in everyday life Electronic Commerce Security Computer Viruses Copyright and the Law File Systems.
Standard Grade Computing COMMERCIAL DATA PROCESSING CHAPTER 13.
The Social Effect of Information System
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
Social Impact of Computers
in Information Systems and the Internet
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
The Impact of Communication Technology Part 2. Economic Impact Today, businesses rely on computers, high tech telephones, fax machines and local area.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
©Holm Publications Security Awareness Presentation.
Unethical use of Computers and Networks
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
INFORMATION TECHNOLOGY The implications of IT. The general effect of IT on our lives There have been a number of general trends in it:  computers have.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
Brief History of Computers and Computer Languages.
Computer Crimes Career & Technology Education Department.
Advantage of File-oriented system: it provides useful historical information about how data are managed earlier. File-oriented systems create many problems.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Incident Security & Confidentiality Integrity Availability.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Using Information Technology
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Social Issues. Employment change Computer Ethics Privacy Piracy Computer Crime Computer Viruses Data Protection and security.
CONTROLLING INFORMATION SYSTEMS
Social effects of information systems.  Many of the old boring jobs can now be done by a computer, which leaves workers to do more interesting tasks.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
GCSE ICT Social effects of information systems. Is ICT a good thing? Many of the old boring jobs can now be done by a computer, which leaves workers to.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Online Shopping. Learning Objectives To learn how society has been affected by online shopping (e-Commerce)
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Welcome to the ICT Department Unit 3_5 Security Policies.
Technical Implementation: Security Risks
The impact of I.T on society
Definition, DIS/Advantages & Services
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Ethical Use of Computers
Presentation transcript:

SOCIAL IMPACT OF COMPUTERS Cashless Society Computers & Employment Easier-to-use computer systems Presentation of Information Issues of Computer Ethics

Cashless Society where NO one pays with CASH all you need is a CARD one large database contains all accounts it is no totally cashless now, except credit cards autopay systems automatic teller machines payment express terminals

Advantages & Disadvantages reduces the risk of being robbed saves time (queuing) it is easy to spend more than you can afford fraud

Computers & Employment New jobs are created, for example: data processing manager systems analyst applications programmer systems programmer database administrator computer operator data entry operator

Computers & Employment However, it is expected that the no. of computer professionals will decline in future years computers are made easier to use unemployment will probably increase more computers are used

Easier-to-use Computer Systems hardware & software are being designed to meet the needs of a wider range of users computer user-interface becomes more ‘user-friendly’ special skills & training are not required Advantages cheaper computing saving time in training staff greater computer literacy

Presentation of Information in the past a design professional is needed now a presentation graphic software is enough

Issues of Computer Ethics about what is right & what is wrong many computer users adopt a code of ethics, for example do not violate the confidentially of your employer maintain system integrity at all times do not violate the rights or privacy of others do not break the law

Issues of Computer Ethics Privacy our personal information is store in many places, e.g., government departments it may be misused Confidentiality Easy transfer Accuracy

Issues of Computer Ethics Piracy the copyright law is broken when people copying copyrighted software and then even selling it except for the purpose of back up, any reproduction of software is prohibited Have you ever seen any pirated software for sale in Hong Kong?

Issues of Computer Ethics Computer crime is increasing every year for example a programmer change a program to transfer the money left in old accounts to his account an employee at the public examinations office change his daughter’s results its potential impact is huge more thorough laws & better system security

Issues of Computer Ethics Computer viruses a subversive computer program that can corrupt or erase data files replicates itself & spread to other systems can be imported to computer system through disks data transmission over networks have many types (act quickly, slowly or like a time bomb)

Issues of Computer Ethics Computer crimes cost of retrieving lost programs & data is huge to minimize the danger avoid using disks that contain software from a doubtful source scan the floppy disk with an anti-virus or ‘doctor’ program to prevent infection through networks, only allow authorized users access, e.g., using passwords