INFORMATION SYSTEM DESIGN AND DEVELOPMENT Computer Science - Higher.

Post on 20-Jan-2016

212 views 0 download

Tags:

transcript

INFORMATION SYSTEM DESIGN AND DEVELOPMENT

Computer Science - Higher

INFORMATION SYSTEM DESIGN AND DEVELOPMENT

Structures and links (database)

National 5

database structure: flat file, linked tables, primary keys and foreign keys

field types (text, number, date, time, graphic, object, calculated, link, Boolean)

validation (including presence check, restricted choice, field length and range)

database operations search, sort (on multiple fields)

good design to avoid data duplication and modification errors (insert, delete, update)

INFORMATION SYSTEM DESIGN AND DEVELOPMENT

Higher

database structures: relational

primary keys, including compound keys

relationships (one-to-one, one-to-many, many-to-many) complex database operations (including queries, forms, reports, calculating

DATABASE FUNDAMENTALS

DATABASE FUNDAMENTALS

RELATIONAL DATABASES

relations that hold multi-valued cells contain repeating data items and where there are one or more of these items they are referred to, collectively, as a repeating group.

COMPOUND KEYSIn this case we can’t use surname on it’s own as there are three people called KellyWe cant even use First Name and Second Name as there are 2 Connor KellysWe have to have a compound key that would include First Name, Second Name and Date of Birth to uniquely identify each one.

SURROGATE KEYS

The common sense solution to this issue is using Surrogate Keys.

The surrogate key is the SQA number as it is unique for each row and has no connection with the actual data.

Other examples of surrogate keys – Passport Number, National Insurance Number, SQA Number.

NEED FOR RELATIONAL DATABASES

Name Year Date of Birth

House Group

Guidance Teacher

House Colour

Conor Kelly

4 30/2/99 Morven Mrs Leitch

Red

Jade Stevenson

2 21/2/01 Morven Mrs Leitch

Red

Courtney Smith

3 4/3/00 Morven Mrs Leitch

Red

Adam Love

6 25/12/97 Morven Mrs Leitch

Red

SOLUTIONPupil ID

Name Year

Date of Birth

House Group*

36876 Conor Kelly

4 30/2/99 Morven

85320 Jade Stevenson

2 21/2/01 Morven

56907 Courtney Smith

3 4/3/00 Morven

25935 Adam Love

6 25/12/97 Morven

House Group Guidance Teacher

House Colour

Morven Mrs Leitch Red

ERD

House Group

Pupil

ENTITY RELATIONSHIP DIAGRAMS

ENTITY RELATIONSHIP DIAGRAMS

ENTITY RELATIONSHIP DIAGRAMS

ONE TO ONE

Each pupil has their own individual locker which is used by them alone

ONE TO MANY

Each doctor has many patients but each patient only sees their own doctor

MANY TO MANY

There are many basketball teams in the leagueEach player is free to play for more than one teamEach player must be linked to at least 1 team Each team must have at least 1 player

IMPLEMENTATION IN ACCESS - QUERIESSimple query – Search on only1 field

IMPLEMENTATION IN ACCESS - QUERIESComplex query – Search on more than1 field

IMPLEMENTATION IN ACCESS – QUERIES, USING TOTALS Using the totals

IMPLEMENTATION IN ACCESS – QUERIES, USING TOTALS Same query without using the sum function

IMPLEMENTATION IN ACCESS – QUERIES, USING TOTALS

Other than Sum the following functions can also be used

IMPLEMENTATION IN ACCESS –USING FORMS

IMPLEMENTATION IN ACCESS –USING FORMS

Forms allow inexperienced users to input data

Clicking on the box will open a query by using the Macro on the right

IMPLEMENTATION IN ACCESS – REPORTSReports provide summarised information for Managers in a format

STRUCTURES AND LINKS - WEB BASED TOPICS

NATIONAL 5

webpage, page, URL

hyperlink (internal, external), relative absolute addressing

navigation

web browsers and search engines

good design to aid navigation, usability and acccessibility

HIGHER

site structure : multilevel

page structure, including: head, title, body

Cascading style sheets

Meta Tags

dynamic web pages, database-driven website

interactive web page

HTML – TAGS YOU NEED TO KNOW

• <meta>, <head>, <body>, <div>, <title>, <table>, <tr>, <td>, <hl h6>, <p>, <br>, <font>, <img>, <span>, <video>,

• <a href="http://www.w3schools.com/">Visit W3Schools</a>

• <img src="boat.gif" alt="Big Boat">

• <img src="test.jpg" width=100 height=100>

• http://www.w3schools.com/html/

HIGHER - HTML & SCRIPTING LANGUAGES

HTML - used to code web pages using a variety of tags

Scripting Languages - add functionality and interactive

features, validate data and access the data behind database-driven websites

They are also used in databases to create Macros

HTML

• Used to create web pages

• HyperText Markup Language

• Drawback of HTML – it is only a mark up language

• Does not have variables, loops, IF statements, arithmetical or logical operators.

NEW TAGS FOR HTML5

New semantic elements like <header>, <footer>, <article>, and <section>.

New form controls like number, date, time, calendar, and range.

New graphic elements: <svg> and <canvas>.

New multimedia elements: <audio> and <video>.

<SPAN> TAG

Inline elements

<DIV> TAG

Block elements

CREATE YOUR OWN TAGS

CSS

Cascading Style Sheets provide the format and style for a web site in a standard way

This code will set all text on the page to Verdana

CSS TASK

CSS THEORYCreate a style rule for the following

H2 {

Font-family : Arial;

Font – size : 12px;

Color; red;

Font-weight ; bold

}

Text Font Colour Style Size

Headings Arial Red Bold 12

CSS SELECTORS

The element selector defines everything in that tag

Paragraph in this case

p {    font-family: Verdana;    color: blue;}

CSS SELECTORS

The id selector, this will be applied to any html called #para1

#para1 {    font-family: Verdana;    color: blue;}

CSS SELECTORSClass selectors set the layout whenever the class is selected, anywhere in the document.

INTERNAL, INLINE, & EXTERNAL STYLESHEETS

Internal style sheet will set the definition for an html tag in a single sheet

INTERNAL, INLINE, & EXTERNAL STYLESHEETSInline only affects the contents of the individual line

INTERNAL, INLINE, & EXTERNAL STYLESHEETS

An external style sheet is created e.g. and saved as test.css

body{ background-color: gray;}

p { color: blue; }

h3{ color: white; }

INTERNAL, INLINE, & EXTERNAL STYLESHEETS

Save an html file in the same folder with the code<html><head><link rel="stylesheet" type="text/css" href="test.css" /></head><body><h3> A White Header </h3><p> This paragraph has a blue font. The background color of this page is gray becausewe changed it with CSS! </p></body></html>

INTERNAL, INLINE, & EXTERNAL STYLESHEETS PRECEDENCE

Priority

Inline

Internal

External

META TAGS<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"><html> <head> <title>All our wooden furniture is water proof.</title> <meta name="keywords" content="wood, furniture, garden, garden-table, etc"> <meta name="description" content="Official dealer of wooden garden furniture.">

</head>

<body>

Visit our showroom on weekdays from 9 to 5...

</body></html>

META TAGS

• Keywords which feature in the <head> tag.

• allows search engines to match website to searches

• Web designers have to anticipate have to anticipate the types of key words users will use.

DATABASE DRIVEN WEBSITE

all information is stored in a databases on the server, script generates pages that are shown on the site.

MEDIA TYPES

National 5

text: txt, rtf

audio: wav, mp3

graphics: jpeg, bmp, gif, png

video: mpeg, avi

spreadsheet: xls, csv, xml

Pdf

Factors affecting file size and quality, including resolution, colour depth, sampling rate. Calculation of file size for colour bitmap. Need for compression

MEDIA TYPES

Higher

Compression:

lossy and lossless compression techniques applied to:

• sound

• graphic

• video

CALCULATION OF THE SIZE OF A PHOTOGRAPH

• Problem

• Wiktoria has bought a 12 Gigabyte flash card. She takes 4 inch by 6 inch photographs with a resolution of 1024 dpi and using 24-bit colour depth. Calculate the maximum number of photographs which can be stored on this card. Show all working.

CALCULATION OF THE SIZE OF A PHOTOGRAPH

Calculate the number of pixels = 4 * 6 * 1024 * 1024

This equals 25165824

Multiply by 24 when you include 24 bit colour

This is equal to 603979776 bits

Now we convert into bytes by dividing by 8

This equals 75497472 bytes

Now divide by 1024 to convert into Kilobytes

This equals 73728 Kb

Now divide by 1024 to convert into Megabytes

This equals 72 Megabytes

CALCULATION OF THE SIZE OF A PHOTOGRAPH

Calculate the number of pixels = 4 * 6 * 1024 * 1024

This equals 25165824

Multiply by 24 when you include 24 bit colour

This is equal to 603979776 bits

Now we convert into bytes by dividing by 8

This equals 75497472 bytes

Now divide by 1024 to convert into Kilobytes

This equals 73728 Kb

Now divide by 1024 to convert into Megabytes

This equals 72 Megabytes

COMPRESSION

Lossy and lossless compression techniques, applied to

• sound

• graphic

• video

LOSSY AND LOSSLESS COMPRESSIONType of Compression

Benefits Drawbacks File Types

Lossy Significant reduction in file size

Some loss in quality

JPEG MP3 MP4

Lossless Less reduction in file size

No loss in quality

PNG TIFF MPEG

SAMPLING SOUNDS – TYPICAL SOUND FILE

SAMPLING SOUNDSThis is too low a rate as it will not pick up all of the sounds

SAMPLING SOUNDSThis is at 44,100 samples per second. This ensures it is far more accurate reflection of the actual sound of the song

HOW DOES IT WORK?It takes advantage of the imperfect nature of the human ear Helps to identify (and discard) unimportant parts of the music: • there are frequencies humans can't hear, • there are frequencies humans distinguish better than

others• when two sounds play at the same time, we hear the

louder sound rather than the softer one.

SAMPLING PICTURES

https://vimeo.com/46248066

VIDEO COMPRESSION

http://www.youtube.com/watch?v=TrRg0xa4JQA

CODING

National 5

Exemplification and implementation of coding to create

and modify information systems including the use of:

• scripting languages (including JavaScript)

• mark-up languages (including HTML)

CODING

Higher

Exemplification and implementation of coding to create and modify information systems including the use of: scripting (database/web pages)

client-side scripting

server-side scripting optimisation (web search (crawlers) and efficiency of coding)

CLIENT SIDE AND SERVER SIDE COMPARISON

EXAMPLES OF CLIENT SIDE SCRIPTING

http://mikekus.com/

http://hellomonday.com/

http://multeor.com/game/

http://crimetimeline.io/

http://hereistoday.com/

THE RULES OF CASCADING STYLESHEETS STATE THAT:

embedded styles within the text over-rule all others

document level styles, defined in the document , over-rule external Stylesheets external stylesheets only apply if they are not over-ruled by the other 2 methods

CASCADING STYLE SHEETS

• A cascading stylesheet (CSS) is a separate file which defines colours, fonts and sizes

• to be used on web pages. A reference to this file is included within every web page in a website.

• This ensures that each page is consistent in format.

WEBSITES FOR JAVASCRIPT

Codeacademy

W3C for schools

JAVASCRIPT

• Allows user interaction

• User validation possible

• Page content can be customised based on time, browser, location

• Javascript blocks popups

• Used for menus and galleries

FORM VALIDATION

• Need for validation

• Simple VBS validation script

• Mailto:

• Problems with Mailto:

• CGI_bin

• Alert messages

POPUP BLOCK CODE - EXAMPLE OF JAVASCRIPT

PHP

• Future development

• Web server processing of hyper text

• MySQL

• Cookies and databases

CLIENT SIDE SCRIPTING (INCLUDING FORM VALIDATION AND ALERTS).

• Server-side scripting is a web server technology in which a user’s request is fulfilled by running a script directly

• on the web server to generate dynamic HTML pages

FACEBOOK DATABASE

PHP IN ACTION

W3 schools php

CLIENT SIDE SCRIPTING

• JavaScript

• VBScript

• Compare JavaScript and VBScript

• Need for client side scripting

• Document.Write command

• Document.Cookie command

CRAWLERS

• Search engines use programs called ‘bots’ or ‘spiders’ or ‘web crawlers’

• Googlebot is Google’s web crawler

• https://www.google.co.uk/insidesearch/howsearchworks/thestory/

• Yahoo’s is called Yahoo!Slurp.

• http://blogs.bing.com/search/2014/04/21/predictions-with-bing/

• These programs scan web servers for new pages and send the information back to the main database.

• This is how Search engines work. When you search, you are going through their database to find relevant pages.

• http://patch.com/connecticut/orange/the-differences-between-google--bing-seo-algorithms

SEARCH ENGINES - OCTOBER 2015

SECURITY PRECAUTIONS

National 5

anti-virus software, passwords/encryption, biometrics, security protocols and firewalls, use of security suites.

Higher

Encryption, digital certificates and signatures, server-side validation of online form data, biometrics in industry

BROWSERS

• HTML interpretation – X Ray goggles

• client side scripting - http://www.w3schools.com/js/default.asp

• cookie functions - http://www.w3schools.com/js/js_cookies.asp

• built in encryption functions - http://www.w3schools.com/php/func_string_crypt.asp

COOKIES

ENCRYPTION –SYMMETRIC

key distribution problem

SUBMISSION FORM

BIOMETRICS IN INDUSTRY

SYMMETRIC ENCRYPTION – PUTTING THE DATA INTO CODE

• A = D

• B = E

• C = F

Plus 3 encryption

ENCRYPTION –ASYMMETRIC

The person who will receive the data decides on a private keyThe RSA algorithm generates a public key which will be used to encrypt the messageit is mathematically (almost) impossible to calculate the private key from the public key.

PGP – X SEND Y A MESSAGE

1. PGP first compresses the message - harder to decode the message

2. PGP then creates a session key, which is a one-time-only secret key

3. session key itself is encrypted using Y’s public key.

4. AXcrypt

PGP – Y RECEIVES THE MESSAGE

1. Y’s copy of PGP uses his or her private key to decrypt the temporary session key.

2. PGP then uses the session key to decrypt the encryptedMessage.

This is the most secure and quickest means of encryption

ENCRYPTION IN ACTION

ENCRYPTION IN ACTION

SECURE SOCKETS LAYER

• Implemented by browsers

FIREWALLS (SECURITY RISKS)

FIREWALLS (SECURITY RISKS)

The firewall software can be set up to:

• reject packets from selected IP addresses (for example, blocking inappropriate sites)

• allow only packets from selected sites

• reject or allow packets from particular domain names

• only allow packets to and from certain ports (a useful defence against many viruses)

• allow or reject packets using particular protocols (for example, blocking all FTP requests)

• "sniff" packets, and reject any which contain certain words

TESTING

National 5

links and navigation

matches user interface design

Higher

Beta testing

usability

compatibility issues (including memory and storage requirements, OS compatibility)

BETA TESTINGThe intended end users are asked to test the software, they are from outwith the software development company.

USABILITY TESTING

This involves testing software applications like websites and programmes using a real life test group using scenarios which accurately reflect the types of tasks the software is expected to perform.

COMPATIBILITY

When developing an Information System the developers must ensure it can run on the types of devices users own.

Issue can be

• RAM

• Storage Requirements

• Operating System

PURPOSE, FEATURES, FUNCTIONALITY, USERS

National 5

Description of purpose Users: expert, novice, age-range

Higher

detailed descriptions of purpose

Interaction of information systems with:

human users: expert, novice, age-range

other software: search engines

INFORMATION SYSTEM PURPOSE

Before the start of the design process the specific purpose of the information system must be defined. This includes

• data design 

• architecture design  

• interface design  

• procedural design 

NOVICE, EXPERT, AGE RANGES

Expert users – prefer to use key board short cuts while novice users require menus and detailed explanations.

AGE RANGE

Certain pieces of information systems are specifically aimed at certain users

SEARCH ENGINES

SEARCH ENGINES - BAIDU

BROWSERS

TECHNICAL IMPLEMENTATION (HARDWARE REQUIREMENTS)

National 5

input and output devices

processor type and speed (Hz)

memory (RAM, ROM)

device type (including supercomputer, desktop, portable devices including laptop, tablet, smartphone

TECHNICAL IMPLEMENTATION (HARDWARE REQUIREMENTS)

input and output devices

processor type, number and speed (Hz)

memory (RAM, ROM, cache)

device type (including desktop, laptop, tablet, smartphone)

TECHNICAL IMPLEMENTATION (SOFTWARE REQUIREMENTS)

National 5

web browsers

specific applications and/or utilities

Higher

operating systems

licensing

proprietary versus open source

portability Description and exemplification of current trends in operating system design

OPERATING SYSTEMS

• Manages the hardware and software of the computer system

• File Management

• Memory Management

• Input / Output Management

LICENSING

Single License – one use only

Multiple License – more than one person

Site License – allows everyone in the business access to the software.

Freeware – distributed free of charge

Shareware – Trial version given for 30-60 days.

PORTABILITY

• Software designers have to ensure that their software can be used on as many different devices as possible.

• Helps maximise sales as it can run on different operating systems.

CURRENT TRENDS IN OS• Operating systems have been redesigned to deal

with touchscreen technology.

• Simpler icon based design

• Complex tasks like graphic editing and web design are still better done using a mouse and keyboard.

TECHNICAL IMPLEMENTATION (STORAGE)

National 5

local, web cloud

capacity (in appropriate units)

rewritable, read-only

interface type

data transfer speed Storage devices: built-in, external, portable, magnetic, optical, solid state

TECHNICAL IMPLEMENTATION (STORAGE)

Higher

distributed and offline storage

backup systems and strategy

capacity (in appropriate units)

rewritable, read-only

interface type

data transfer speed Storage devices:

built-in, external magnetic, optical, solid state.

Description and exemplification of current trends in storage Systems

DISTRIBUTED AND OFFLINE STORAGEDistributed – Data is stored in a number of different servers usually different offices but can be accessed by all users in separate locations

Offline – Storage devices like CD ROMs, DVDs, USB Drives etc.

CENTRALISED AND DISTRIBUTED DATABASESCentralised database.

• All the data is held on a central computer- mainframe or server.

• Advantages.• far easier to manage and control • far easier to back up

CENTRALISED AND DISTRIBUTED DATABASESDistributed Database.

• Consists of two or more files located at different sites on a computer network.

• different users can access it without interfering with one another.

• The DBMS must synchronise the scattered databases to make sure they all have consistent data.

BACKUP SYSTEMS AND STRATEGY

• Every computer user should have a strategy in place to backup their data.

• This is the process of making a copy of data stored on fixed hard disks to some other media.

• This can be tape, external portable hard disks, writeable CD-ROM, DVD or to the cloud

• This ensures that the most recent copy of the data can be recovered and restored in the event of data loss.

MOST COMMON REASONS FOR DATA LOSS

1. Deleting files accidentally

2. Viruses and damaging malware

3. Mechanical damages of hard drive

4. Power failures

5. Theft of computer

6. Spilling coffee, and other water damages

7. Fire accidents and explosions

ARCHIVE, RECOVERY AND STORAGE METHODS

• Archive.• The process of copying data from hard disk drives to

tape or other media for long-term storage.

• Data verification.• it is important to check that the data stored on the

backup media can be recovered.

• Frequency and Version Control.• Full back up – all the existing data• Differential backup – only the data since the last full backup is

stored• Incremental backup – saves only the data changed since the last

backup of any type

GRANDFATHER, FATHER, SON

TECHNICAL IMPLEMENTATION (NETWORKING/CONNECTIVITY)

National 5

peer-to-peer, client/server, wired, optical, wireless

Higher

Cloud systems and server provision: public, private, hybrid cloud-based services

web hosting

current trends in networking and connectivity

CLOUD SYSTEMS

• Data and software operate on the web rather than a local computer.

• User can access their documents from anywhere.

SERVER PROVISION: PUBLIC, PRIVATE, HYBRID AND CLOUD-BASED SERVICES

Public Cloud – available to anyone either free or for a fee

PRIVATE AND HYBRID CLOUDS

Private are based only within an organisation but still stored in the cloud.

Hybrid is a mixture of the public and private systems

WEB HOSTS

Companies which, for a fee, allow the owners of websites to store a website which can then be viewed on the WWW

NETWORKING AND CONNECTIVITY

LAN

WAN

Intranet

Internet

3G 4G

Wifi

SECURITY RISKS

National 5/Higher

spyware, phishing, keylogging

online fraud, identity theft

DOS (Denial of Service) attacks

SPYWARE

Software that can obtain information from a users computer without them being aware of it.

PHISHING

KEYLOGGING

Software which records every keystroke on a PC

ONLINE FRAUD

DENIAL OF SERVICE ATTACKS

Attempt to make a computer network unavailable to its users. This can be done by bombarding the server with requests for information until the server can longer cope with amount of traffic.

LEGAL IMPLICATIONS

Computer Misuse Act, Data Protection Act, Copyright, Designs and Patents Act (plagiarism), Health and Safety regulations, Communication Act

Regulation of Investigatory Powers Act

137

LEGAL IMPLICATIONS OF INFORMATION SYSTEMS

• The Data Protection Act 1998

• Copyright Designs and Patents Act 1988

• The Regulation of Investigatory Powers Act 2000

• The Freedom of Information Act (Scotland) 2002

• Health and safety Regulations

COMPUTER MISUSE ACT

It is illegal to

1. Unauthorised access to computer material.

2. Unauthorised access with intent to commit or facilitate commission of further offences.

3.Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of computer, etc.

3A.Making, supplying or obtaining articles for use in offence under section 1 or 3

139

THE 1998 DATA PROTECTION ACT • The 8 Data Protection Principles.

• Personal data shall be processed fairly and lawfully.

• Personal data shall be obtained only for lawful purposes,

• Personal data shall be adequate, relevant and not excessive.

• Personal data shall be accurate and, kept up to date.

• Personal data shall not be kept for longer than is necessary.

• Personal data shall be processed in accordance with the rights of data subjects.

• Appropriate measures shall be taken against unauthorised or unlawful processing of data.

• Personal data shall not be transferred to a country outside Europe.

• Data must be registered with the Data Commissioner.

140

THE 1998 DATA PROTECTION ACT

• Unconditional exemptions.• Data related to National Security.• Data which by law has to be made public (e.g.

voters’ roll).• Data held by the Police and National Health

Service.

•  conditional exemptions.• mailing lists (names and addresses).• data used for calculating and paying wages.• information used for club memberships.• data used by a data subject at home.

141

THE 1998 DATA PROTECTION ACT • Rights of Data Subjects.

• To see any personal data stored either electronically or manually about them.

• The Data controller may ask that a small fee be paid to cover their costs in providing the data.

• To have their data corrected if it is inaccurate.• To prevent their data being used by companies to send

them junk mail.

• Responsibilities of Data Users.• Have to register with the Data Protection Registrar if

they wished to hold personal information about data subjects.

• They must be willing to let data subjects see data held about them, but must amend any false data without charge.

• Data Users must also be willing to remove subjects’ names and addresses from mailing lists if asked to.

142

THE 1998 DATA PROTECTION ACT • Changes From 1984 Act.

• The 1984 DPA had certain shortcomings.• only covered data in electronic form.• companies could circumvent certain provisions.• It had no European or worldwide dimension.• there was no obligation on any data user to tell the

data subject that they held any data about them.

• The 1998 Act.• covers the transmission of data in electronic form,

which was not really an issue in 1984.• harmonised the European Union Data Protection

legislation.• It also made it a requirement of the Act to ask for

the prior consent of data subjects to have data held about them, and included paper based records.

143

COPYRIGHT, DESIGNS & PATENTS ACT • Software Licensing.

• Software can be legally installed on as many computers as the licence allows.

• Shareware can be used legally for 30 days then either paid for or deleted.

• Freeware can be downloaded and used free of charge.

• Computer Applications.• Databases can store vast amounts of

copyright data.• Act covers extracts from computer

databases.• Plagiarism to copy work directly from the

Web.• Music downloads must be paid for and

copyright checked.• Software piracy a crime - FAST.

144

THE REGULATION OF INVESTIGATORY POWERS ACT

2000 • Gives powers to:-.

• Police, Special Branch, GCHQ and MI5.• It allows organisations to monitor employees, e-mail

and Web usage.• It also provides powers to help combat the threat

posed by rising criminal use of strong encryption to try to break into electronic transactions.

• The Act contains 5 parts.• allows the authorities to monitor our personal e-mail

and Internet usage.• businesses, local authorities and government

departments can and do monitor internal e-mails,• monitor Internet usage of staff, students and pupils.

• sounds very “Big Brother.”• May enrage and disturb many people to realise this.• When terrorists can be anywhere in our society it

may be a relief to know that the authorities are taking such steps to catch them.

145

THE FREEDOM OF INFORMATION ACT (SCOTLAND) 2002

• From 1st January 2005.• General right of public access to all types of

'recorded' information held by public authorities.• sets out exemptions from that general right.• places a number of obligations on public

authorities.• The Act applies only to 'public authorities' and not

to private entities.• Public authorities include Government

Departments, local authorities and many other public bodies, and also schools, colleges and universities.

• The Act will be enforced by the Scottish Information Commissioner.

• Responsibilities of public authorities.• Required to adopt and maintain a Publication

Scheme.• Sets out the classes of information available (eg.

prospectuses, almanacs and websites).• the manner in which they intend to publish the

information,• whether a charge will be made for the

information.

COMMUNICATIONS ACT

• Protects the public from harmful or menacing electronic communication

• Makes it illegal to use other people's wifi without their permission

147

HEALTH AND SAFETY REGULATIONS

• Requirement on employers.• Carry out a risk assessment.• Employers with five or more employees need to

record the significant findings of the risk assessment.

• Risk assessment should be straightforward in a simple workplace such as a typical office.

• Provide a safe and secure working environment.

NEED FOR INTERNATIONAL POLICING OF THE INTERNET.

Why it won’t happen

- Each country has separate legal systems

- Don’t want to lose control.

- UN style organsiation is required

Why would it be good

- Prevent more crime

- Censorship would be universal.

ENVIRONMENTAL IMPACT/IMPLICATI ONS

National 5

Energy use, Disposal of IT equipment, Carbon footprint

Higher

Lifetime carbon footprint (manufacture, use, disposal), Environmental benefits

LIFETIME CARBON FOOTPRINT

• Manufacture - Energy and resources are used to bring together the raw materials for a PC or Laptop.

• The actual production process also requires energy and resources.

• While it is being used the PC/Laptop will be using energy and create heat emissions

• Disposal - Much computer hardware contains emissions that can cause cancer. Therefore they have to be disposed of with care.

ENVIRONMENTAL BENEFITS

• Communication can take place on-line rather than people travelling to meetings.

• Companies now recycle IT equipment rather than send it to landfill.

ECONOMIC AND SOCIAL IMPACT

Economic: competitive advantage, global marketplace, business costs, maintainability, scalability

Social: censorship and freedom of speech, privacy and encryption, global citizenship, online communities.

ACADEMIC, COMMERCIAL AND PERSONAL WEB PAGES

• http://www.cristianoronaldo.com/

• http://www.lilyallenmusic.com/

• http://www.amazon.com/

• http://www.debenhams.com/

• https://retail.santander.co.uk

• https://www.edx.org/

• http://www.st-andrews.ac.uk/

• https://www.whitehouse.gov/administration/president-obama

COMPETITIVE ADVANTAGE

When they invest in excellent IT systems organisations can gain a competitive advantages over their rivals as this can lead them to offer better value to their customers as they are more efficient.

GLOBAL MARKETPLACE

Selling products and services across the world rather than just in a single country or regions.

Coca Cola are global.

Barr’s Irn Bru is national.

The VG store in Motherwell is local

BUSINESS COSTS

Expensive to invest in the hardware and software for a new computerised system.

Staff Training can be expensive.

MAINTAINABILITY

How easy is it to repair and update any ICT equipment.

SCALABILITY

Is it possible for an information system to be used to meet a global audience rather than a national or local one.

CENSORSHIP AND FREEDOM OF SPEECHThe challenge for the authorities is to find a balance between the individuals' right to express themselves freely and the need to protect the public from offence content or opinions.

The authorities in, for example, China and Iran filter the content of websites preventing their citizens from gaining free access whereas in the UK it is only content which is extremely offensive that would be blocked.

PRIVACY AND ENCRYPTION

Authorities try to reach a balance between successfully preventing and investigating crime and allowing individuals the right to express their own opinions and follow their personal interests.

GLOBAL CITIZENSHIP

awareness of global issues such as environment, commerce, politics and society in general.

ONLINE COMMUNITIES

A virtual community whose members interact with each other primarily via the Internet.