Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8.

Similar presentations


Presentation on theme: "Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8."— Presentation transcript:

1 Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

2 Quit 9.2 Our Information Society Monthly Technology Update The Workplace EthicsEthics Security Issues

3 Quit 9.3 The Workplace Cumulative trauma disorder Carpal tunnel syndrome Repetitive stress injuries Video operator’s distress syndrome Ergonomics: Study of the relationships between people and the things we use. Ergonomics

4 Quit 9.4 Workplace Design  Include flexibility  OSHA requirements  Ergonomic considerations  Employee training A healthy, happy worker is a more productive worker.

5 Quit 9.5 Common Abuses of IT   Send/receive frivolous e-mail   Non-business Internet browsing   Gaming on company time   Toying with technology

6 Quit 9.6 Green Computing  Environmentally sensible computing  Energy Star guidelines  Less printing  Recycle whenever possible

7 Quit 9.7 Who Knows What About You?  Tax data  Education data  Medical data  Driver and crime data  Census data  Insurance data  Lifestyle data  Credit data  WWW data  Miscellaneous Social Security Number is Link!

8 Quit 9.8 Privacy of Personal Information  Sources of Personal Data Credit cards provide lifestyle profile Credit cards provide lifestyle profile Phone calls Phone calls Internet Internet  Violating Privacy Selling your information Selling your information Cookies Cookies

9 Quit 9.9 Privacy of Personal Information  Computer Matching Used to identify individuals common to separate databases that are engaged in wrongdoing Used to identify individuals common to separate databases that are engaged in wrongdoing Garnishing wages for student loans Garnishing wages for student loans IRS creates lifestyle profiles IRS creates lifestyle profiles  New applications Background checks for airline passengers Background checks for airline passengers  Securing integrity There are no easy answers to the Privacy question

10 Quit 9.10 Privacy of Personal Information  Computer monitoring Most controversial application Most controversial application Measure worker performance Measure worker performance Often without worker’s knowledge Often without worker’s knowledge E-mail monitoring E-mail monitoring

11 Quit 9.11 Software Piracy  Theft of intellectual property  Federal copyright law automatically protects software  Install on only one computer  Site license for LAN  Pilferage  $250,000/5 years in jail possible  Net poses big problems

12 Quit 9.12 Security Issues  White-collar crime  Computer viruses  Natural disasters  Vandalism  Carelessness 4 of every 5 business computer systems has been violated in some way.

13 Quit 9.13 Computer-Center Security  Hardware Use fault-tolerant design Use fault-tolerant design Install uninterruptible power source (UPS) for backup Install uninterruptible power source (UPS) for backup  Software Minimize opportunities for unlawful modification of software Minimize opportunities for unlawful modification of software Use antiviral programs Use antiviral programs IBM’s electronic immune system IBM’s electronic immune system Generations of backups Generations of backups Serendipitous Surfing: Music

14 Quit 9.14 Computer-Center Security  Data Communications Employ cryptography technology Employ cryptography technology Encryption/Decryption Encryption/Decryption Secure Sockets Layer - SSL Secure Sockets Layer - SSL Digital ID Digital ID E-signature E-signature  Personnel Courtesy of E- Systems, Inc.

15 Quit 9.15 Other Security Issues  Information systems security Physical security Physical security Logical security (ID and password) Logical security (ID and password)  PC security Lock and key Lock and key Badge reader Badge reader ID and password ID and password  Acceptable level of risk Courtesy of Kensington Technology Group

16 Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. End of Chapter 8


Download ppt "Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8."

Similar presentations


Ads by Google