Date post: | 21-Dec-2015 |
Category: |
Documents |
View: | 214 times |
Download: | 0 times |
Computers: Information Technology in PerspectiveBy Long and Long
Copyright 2002 Prentice Hall, Inc.
IT Ethics & IT Ethics & Healthy Healthy
ComputingComputing
Chapter 8Chapter 8
9.9.22 QuitQuit
Our Information SocietyOur Information Society
Monthly Technology Update
The WorkplaceThe WorkplaceThe WorkplaceThe Workplace
EthicsEthicsEthicsEthics
Security IssuesSecurity IssuesSecurity IssuesSecurity Issues
9.9.33 QuitQuit
The WorkplaceThe Workplace
Cumulative trauma disorderCumulative trauma disorder
Carpal tunnel syndromeCarpal tunnel syndrome
Repetitive stress injuriesRepetitive stress injuries
Video operator’s distress syndromeVideo operator’s distress syndrome
Ergonomics:Ergonomics:
Study of the Study of the relationships betweenrelationships between
people and the people and the things we use.things we use.
Ergonomics
9.9.44 QuitQuit
Workplace DesignWorkplace Design
Include flexibilityInclude flexibilityOSHA requirementsOSHA requirementsErgonomic Ergonomic
considerationsconsiderationsEmployee trainingEmployee training
A healthy, happy worker is a more productive worker.A healthy, happy worker is a more productive worker.
9.9.55 QuitQuit
Common Abuses of ITCommon Abuses of IT
Send/receive frivolous e-mailNon-business Internet
browsingGaming on company timeToying with technology
9.9.66 QuitQuit
Green ComputingGreen Computing
Environmentally sensible computingEnvironmentally sensible computingEnergy Star guidelinesEnergy Star guidelinesLess printingLess printingRecycle whenever possibleRecycle whenever possible
9.9.77 QuitQuit
Who Knows What About Who Knows What About You?You?
Tax dataTax data Education dataEducation data Medical dataMedical data Driver and crime Driver and crime
datadata Census dataCensus data
Insurance data Insurance data Lifestyle dataLifestyle data Credit dataCredit data WWW dataWWW data MiscellaneousMiscellaneous
Social Security Number is Link!Social Security Number is Link!
9.9.88 QuitQuit
Privacy of Personal Privacy of Personal InformationInformation
Sources of Personal DataSources of Personal Data Credit cards provide lifestyle profileCredit cards provide lifestyle profile Phone callsPhone calls InternetInternet
Violating PrivacyViolating Privacy Selling your informationSelling your information CookiesCookies
9.9.99 QuitQuit
Privacy of Personal Privacy of Personal InformationInformation
Computer MatchingComputer Matching Used to identify individuals common to Used to identify individuals common to
separate databases that are engaged in separate databases that are engaged in wrongdoingwrongdoing
Garnishing wages for student loansGarnishing wages for student loans IRS creates lifestyle profilesIRS creates lifestyle profiles
New applicationsNew applications Background checks for airline passengersBackground checks for airline passengers
Securing integritySecuring integrity
There are no easy answers to the Privacy question
9.9.1010 QuitQuit
Privacy of Personal Privacy of Personal InformationInformation
Computer monitoringComputer monitoring Most controversial applicationMost controversial application Measure worker performanceMeasure worker performance Often without worker’s knowledgeOften without worker’s knowledge E-mail monitoringE-mail monitoring
9.9.1111 QuitQuit
Software PiracySoftware Piracy
Theft of intellectual propertyTheft of intellectual propertyFederal copyright law automatically Federal copyright law automatically
protects softwareprotects software Install on only one computerInstall on only one computerSite license for LANSite license for LANPilferagePilferage$250,000/5 years in jail possible$250,000/5 years in jail possibleNet poses big problemsNet poses big problems
9.9.1212 QuitQuit
Security IssuesSecurity Issues
White-collar crimeWhite-collar crimeComputer virusesComputer virusesNatural disastersNatural disastersVandalismVandalismCarelessnessCarelessness
4 of every 5 business computer systems has been violated in some way.
9.9.1313 QuitQuit
Computer-Center Computer-Center SecuritySecurity
HardwareHardware Use fault-tolerant designUse fault-tolerant design Install uninterruptible power source Install uninterruptible power source
(UPS) for backup(UPS) for backupSoftwareSoftware
Minimize opportunities for unlawful Minimize opportunities for unlawful modification of softwaremodification of software
Use antiviral programsUse antiviral programs IBM’s electronic immune systemIBM’s electronic immune system Generations of backupsGenerations of backups
Serendipitous Surfing: Music
9.9.1414 QuitQuit
Computer-Center Computer-Center SecuritySecurity
Data CommunicationsData Communications Employ cryptography Employ cryptography
technologytechnology Encryption/DecryptionEncryption/Decryption Secure Sockets Layer - SSLSecure Sockets Layer - SSL Digital IDDigital ID E-signatureE-signature
PersonnelPersonnel
Courtesy of E-Systems, Inc.
9.9.1515 QuitQuit
Other Security IssuesOther Security Issues
Information systems securityInformation systems security Physical securityPhysical security Logical security (ID and password)Logical security (ID and password)
PC securityPC security Lock and keyLock and key Badge readerBadge reader ID and passwordID and password
Acceptable level of riskAcceptable level of risk
Courtesy of Kensington Technology Group
Computers: Information Technology in PerspectiveBy Long and Long
Copyright 2002 Prentice Hall, Inc.
End of Chapter End of Chapter 88
End of Chapter End of Chapter 88