Copyright Prentice-Hall, Inc. 2001 Computers in Society: Today Chapter 10.

18
Copyright Prentice-Hall, Inc. 2001 Computers in Computers in Society: Today Society: Today Chapter 10 Chapter 10

Transcript of Copyright Prentice-Hall, Inc. 2001 Computers in Society: Today Chapter 10.

Copyright Prentice-Hall, Inc. 2001

Computers in Computers in Society: TodaySociety: TodayComputers in Computers in Society: TodaySociety: Today

Chapter 10Chapter 10

10-2Our Information SocietyOur Information Society

Monthly Monthly Technology Technology

Update Update

IT ParadoxIT Paradox

Working in the Information SocietyWorking in the Information Society

The WorkplaceThe Workplace

EthicsEthics

Security IssuesSecurity Issues

10-3IT ParadoxIT Paradox

Are we ready for IT?Are we ready for IT? Do we really want IT?Do we really want IT? We are reaching the point of no return!We are reaching the point of no return!

Information Technology is thriving in a Information Technology is thriving in a society that may not be ready for it.society that may not be ready for it.

10-4Why Choose an IT Career?Why Choose an IT Career?

Computer Systems Analyst called best job in AmericaComputer Systems Analyst called best job in America

Internet economy is growing at 20 times Internet economy is growing at 20 times the rate of the general economythe rate of the general economy

IT careers consistently ranked IT careers consistently ranked among the most desirable jobsamong the most desirable jobs

1 in every 10 jobs for IT specialists is open1 in every 10 jobs for IT specialists is open

10-5Working in the Working in the Information Society: IT JobsInformation Society: IT Jobs

Chief Information Officer (CIO)Chief Information Officer (CIO) Systems AnalystSystems Analyst Applications ProgrammerApplications Programmer Programmer/AnalystProgrammer/Analyst Network AdministratorNetwork Administrator System ProgrammerSystem Programmer

Jobs Jobs

Courtesy of Novell

10-6

Database Database Administrator (DBA)Administrator (DBA)

Internet Site SpecialistInternet Site Specialist WebmasterWebmaster Computer OperatorComputer Operator User LiaisonUser Liaison PC SpecialistPC Specialist

Working in the Working in the Information Society: IT JobsInformation Society: IT Jobs

Photo courtesy of Intel Corporation

10-7

Licensing not currently requiredLicensing not currently required Certifications offered by:Certifications offered by:

Institute for Certification of Computer Institute for Certification of Computer ProfessionalsProfessionals

MicrosoftMicrosoft NovellNovell

IT Competent MinorityIT Competent Minority Jobs are ChangingJobs are Changing

Working in the Working in the Information Society: IssuesInformation Society: Issues

10-8The WorkplaceThe Workplace

Cumulative trauma disorderCumulative trauma disorder

Carpal tunnel syndromeCarpal tunnel syndrome

Repetitive stress injuriesRepetitive stress injuries

Video operator’s distress syndromeVideo operator’s distress syndrome

Ergonomics:Ergonomics:

Study of the Study of the relationships betweenrelationships between

people and the people and the things we use.things we use.

10-9And yet another possible And yet another possible ergonomic activity...ergonomic activity...

10-10The WorkplaceThe Workplace

Workplace DesignWorkplace Design Include flexibilityInclude flexibility OSHA requirementsOSHA requirements Ergonomic considerationsErgonomic considerations

Green ComputingGreen Computing Energy Star guidelinesEnergy Star guidelines Less printingLess printing Recycle whenever possibleRecycle whenever possible

10-11Ethics: ACM Code of Ethics: ACM Code of ConductConduct

Contribute to society and human well-beingContribute to society and human well-being Avoid harm to othersAvoid harm to others Be honest and trustworthyBe honest and trustworthy Be fair and take action not to discriminateBe fair and take action not to discriminate Honor property rights including copyrights and Honor property rights including copyrights and

patentspatents Give proper credit for intellectual propertyGive proper credit for intellectual property Respect the privacy of othersRespect the privacy of others Honor confidentialityHonor confidentiality

General Moral ImperativesGeneral Moral Imperatives

http://www.acm.orghttp://www.acm.orghttp://www.acm.orghttp://www.acm.org

10-12Ethics: Misuse of Ethics: Misuse of Personal InformationPersonal Information

Sources of Personal DataSources of Personal Data Violating PrivacyViolating Privacy

Selling your informationSelling your information CookiesCookies

Computer MatchingComputer Matching Privacy Question: No Easy AnswersPrivacy Question: No Easy Answers Computer MonitoringComputer Monitoring

Ethics in ComputingEthics in Computing

40% of all white-40% of all white-collar workers are collar workers are

afraid of new afraid of new technology. This is technology. This is somewhat due to a somewhat due to a

fear of loss of fear of loss of privacy.privacy.

10-13Ethics: Computer CrimeEthics: Computer Crime

Law is not always clearLaw is not always clear Computer FraudComputer Fraud Negligence & IncompetenceNegligence & Incompetence Crackers (or Hackers)Crackers (or Hackers)

Evidence is called a footprintEvidence is called a footprint Crime on the InternetCrime on the Internet Software PiracySoftware Piracy

Computer Crime Computer Crime

10-14Computer, Internet, and Computer, Internet, and System SecuritySystem Security

White-Collar CrimeWhite-Collar Crime Computer VirusesComputer Viruses Natural DisastersNatural Disasters VandalismVandalism CarelessnessCarelessness

ThreatsThreats

10-15Computer-Center SecurityComputer-Center Security

HardwareHardware Use fault-tolerant designUse fault-tolerant design Install uninterruptible power source (UPS) Install uninterruptible power source (UPS)

for backupfor backup SoftwareSoftware

Minimize opportunities for unlawful Minimize opportunities for unlawful modification of softwaremodification of software

Use antiviral programsUse antiviral programs Protect and backup files/databasesProtect and backup files/databases

10-16Computer-Center SecurityComputer-Center Security

Data CommunicationsData Communications Employ cryptography Employ cryptography

technologytechnology Encryption/DecryptionEncryption/Decryption Secure Sockets Layer - SSLSecure Sockets Layer - SSL Digital IDDigital ID

PersonnelPersonnelSerendipitous Serendipitous

Surfing: Music Surfing: Music

Courtesy of E-Systems, Inc.

10-17Other Security IssuesOther Security Issues

Information Systems SecurityInformation Systems Security Physical SecurityPhysical Security Logical Security (ID and Password)Logical Security (ID and Password)

PC SecurityPC Security Acceptable Level of RiskAcceptable Level of Risk

Courtesy of Kensington Technology Group

Copyright Prentice-Hall, Inc. 2001

End of Chapter End of Chapter 1010

End of Chapter End of Chapter 1010

Interactive Interactive Study GuideStudy Guide