Date post: | 20-Jan-2016 |
Category: |
Documents |
Upload: | philip-mccormick |
View: | 212 times |
Download: | 0 times |
INFORMATION SYSTEM DESIGN AND DEVELOPMENT
Computer Science - Higher
INFORMATION SYSTEM DESIGN AND DEVELOPMENT
Structures and links (database)
National 5
database structure: flat file, linked tables, primary keys and foreign keys
field types (text, number, date, time, graphic, object, calculated, link, Boolean)
validation (including presence check, restricted choice, field length and range)
database operations search, sort (on multiple fields)
good design to avoid data duplication and modification errors (insert, delete, update)
INFORMATION SYSTEM DESIGN AND DEVELOPMENT
Higher
database structures: relational
primary keys, including compound keys
relationships (one-to-one, one-to-many, many-to-many) complex database operations (including queries, forms, reports, calculating
DATABASE FUNDAMENTALS
DATABASE FUNDAMENTALS
RELATIONAL DATABASES
relations that hold multi-valued cells contain repeating data items and where there are one or more of these items they are referred to, collectively, as a repeating group.
COMPOUND KEYSIn this case we can’t use surname on it’s own as there are three people called KellyWe cant even use First Name and Second Name as there are 2 Connor KellysWe have to have a compound key that would include First Name, Second Name and Date of Birth to uniquely identify each one.
SURROGATE KEYS
The common sense solution to this issue is using Surrogate Keys.
The surrogate key is the SQA number as it is unique for each row and has no connection with the actual data.
Other examples of surrogate keys – Passport Number, National Insurance Number, SQA Number.
NEED FOR RELATIONAL DATABASES
Name Year Date of Birth
House Group
Guidance Teacher
House Colour
Conor Kelly
4 30/2/99 Morven Mrs Leitch
Red
Jade Stevenson
2 21/2/01 Morven Mrs Leitch
Red
Courtney Smith
3 4/3/00 Morven Mrs Leitch
Red
Adam Love
6 25/12/97 Morven Mrs Leitch
Red
SOLUTIONPupil ID
Name Year
Date of Birth
House Group*
36876 Conor Kelly
4 30/2/99 Morven
85320 Jade Stevenson
2 21/2/01 Morven
56907 Courtney Smith
3 4/3/00 Morven
25935 Adam Love
6 25/12/97 Morven
House Group Guidance Teacher
House Colour
Morven Mrs Leitch Red
ERD
House Group
Pupil
ENTITY RELATIONSHIP DIAGRAMS
ENTITY RELATIONSHIP DIAGRAMS
ENTITY RELATIONSHIP DIAGRAMS
ONE TO ONE
Each pupil has their own individual locker which is used by them alone
ONE TO MANY
Each doctor has many patients but each patient only sees their own doctor
MANY TO MANY
There are many basketball teams in the leagueEach player is free to play for more than one teamEach player must be linked to at least 1 team Each team must have at least 1 player
IMPLEMENTATION IN ACCESS - QUERIESSimple query – Search on only1 field
IMPLEMENTATION IN ACCESS - QUERIESComplex query – Search on more than1 field
IMPLEMENTATION IN ACCESS – QUERIES, USING TOTALS Using the totals
IMPLEMENTATION IN ACCESS – QUERIES, USING TOTALS Same query without using the sum function
IMPLEMENTATION IN ACCESS – QUERIES, USING TOTALS
Other than Sum the following functions can also be used
IMPLEMENTATION IN ACCESS –USING FORMS
IMPLEMENTATION IN ACCESS –USING FORMS
Forms allow inexperienced users to input data
Clicking on the box will open a query by using the Macro on the right
IMPLEMENTATION IN ACCESS – REPORTSReports provide summarised information for Managers in a format
STRUCTURES AND LINKS - WEB BASED TOPICS
NATIONAL 5
webpage, page, URL
hyperlink (internal, external), relative absolute addressing
navigation
web browsers and search engines
good design to aid navigation, usability and acccessibility
HIGHER
site structure : multilevel
page structure, including: head, title, body
Cascading style sheets
Meta Tags
dynamic web pages, database-driven website
interactive web page
HTML – TAGS YOU NEED TO KNOW
• <meta>, <head>, <body>, <div>, <title>, <table>, <tr>, <td>, <hl h6>, <p>, <br>, <font>, <img>, <span>, <video>,
• <a href="http://www.w3schools.com/">Visit W3Schools</a>
• <img src="boat.gif" alt="Big Boat">
• <img src="test.jpg" width=100 height=100>
• http://www.w3schools.com/html/
HIGHER - HTML & SCRIPTING LANGUAGES
HTML - used to code web pages using a variety of tags
Scripting Languages - add functionality and interactive
features, validate data and access the data behind database-driven websites
They are also used in databases to create Macros
HTML
• Used to create web pages
• HyperText Markup Language
• Drawback of HTML – it is only a mark up language
• Does not have variables, loops, IF statements, arithmetical or logical operators.
NEW TAGS FOR HTML5
New semantic elements like <header>, <footer>, <article>, and <section>.
New form controls like number, date, time, calendar, and range.
New graphic elements: <svg> and <canvas>.
New multimedia elements: <audio> and <video>.
<SPAN> TAG
Inline elements
<DIV> TAG
Block elements
CREATE YOUR OWN TAGS
CSS
Cascading Style Sheets provide the format and style for a web site in a standard way
This code will set all text on the page to Verdana
CSS TASK
CSS THEORYCreate a style rule for the following
H2 {
Font-family : Arial;
Font – size : 12px;
Color; red;
Font-weight ; bold
}
Text Font Colour Style Size
Headings Arial Red Bold 12
CSS SELECTORS
The element selector defines everything in that tag
Paragraph in this case
p { font-family: Verdana; color: blue;}
CSS SELECTORS
The id selector, this will be applied to any html called #para1
#para1 { font-family: Verdana; color: blue;}
CSS SELECTORSClass selectors set the layout whenever the class is selected, anywhere in the document.
INTERNAL, INLINE, & EXTERNAL STYLESHEETS
Internal style sheet will set the definition for an html tag in a single sheet
INTERNAL, INLINE, & EXTERNAL STYLESHEETSInline only affects the contents of the individual line
INTERNAL, INLINE, & EXTERNAL STYLESHEETS
An external style sheet is created e.g. and saved as test.css
body{ background-color: gray;}
p { color: blue; }
h3{ color: white; }
INTERNAL, INLINE, & EXTERNAL STYLESHEETS
Save an html file in the same folder with the code<html><head><link rel="stylesheet" type="text/css" href="test.css" /></head><body><h3> A White Header </h3><p> This paragraph has a blue font. The background color of this page is gray becausewe changed it with CSS! </p></body></html>
INTERNAL, INLINE, & EXTERNAL STYLESHEETS PRECEDENCE
Priority
Inline
Internal
External
META TAGS<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"><html> <head> <title>All our wooden furniture is water proof.</title> <meta name="keywords" content="wood, furniture, garden, garden-table, etc"> <meta name="description" content="Official dealer of wooden garden furniture.">
</head>
<body>
Visit our showroom on weekdays from 9 to 5...
</body></html>
META TAGS
• Keywords which feature in the <head> tag.
• allows search engines to match website to searches
• Web designers have to anticipate have to anticipate the types of key words users will use.
DATABASE DRIVEN WEBSITE
all information is stored in a databases on the server, script generates pages that are shown on the site.
MEDIA TYPES
National 5
text: txt, rtf
audio: wav, mp3
graphics: jpeg, bmp, gif, png
video: mpeg, avi
spreadsheet: xls, csv, xml
Factors affecting file size and quality, including resolution, colour depth, sampling rate. Calculation of file size for colour bitmap. Need for compression
MEDIA TYPES
Higher
Compression:
lossy and lossless compression techniques applied to:
• sound
• graphic
• video
CALCULATION OF THE SIZE OF A PHOTOGRAPH
• Problem
• Wiktoria has bought a 12 Gigabyte flash card. She takes 4 inch by 6 inch photographs with a resolution of 1024 dpi and using 24-bit colour depth. Calculate the maximum number of photographs which can be stored on this card. Show all working.
CALCULATION OF THE SIZE OF A PHOTOGRAPH
Calculate the number of pixels = 4 * 6 * 1024 * 1024
This equals 25165824
Multiply by 24 when you include 24 bit colour
This is equal to 603979776 bits
Now we convert into bytes by dividing by 8
This equals 75497472 bytes
Now divide by 1024 to convert into Kilobytes
This equals 73728 Kb
Now divide by 1024 to convert into Megabytes
This equals 72 Megabytes
CALCULATION OF THE SIZE OF A PHOTOGRAPH
Calculate the number of pixels = 4 * 6 * 1024 * 1024
This equals 25165824
Multiply by 24 when you include 24 bit colour
This is equal to 603979776 bits
Now we convert into bytes by dividing by 8
This equals 75497472 bytes
Now divide by 1024 to convert into Kilobytes
This equals 73728 Kb
Now divide by 1024 to convert into Megabytes
This equals 72 Megabytes
COMPRESSION
Lossy and lossless compression techniques, applied to
• sound
• graphic
• video
LOSSY AND LOSSLESS COMPRESSIONType of Compression
Benefits Drawbacks File Types
Lossy Significant reduction in file size
Some loss in quality
JPEG MP3 MP4
Lossless Less reduction in file size
No loss in quality
PNG TIFF MPEG
SAMPLING SOUNDS – TYPICAL SOUND FILE
SAMPLING SOUNDSThis is too low a rate as it will not pick up all of the sounds
SAMPLING SOUNDSThis is at 44,100 samples per second. This ensures it is far more accurate reflection of the actual sound of the song
HOW DOES IT WORK?It takes advantage of the imperfect nature of the human ear Helps to identify (and discard) unimportant parts of the music: • there are frequencies humans can't hear, • there are frequencies humans distinguish better than
others• when two sounds play at the same time, we hear the
louder sound rather than the softer one.
SAMPLING PICTURES
https://vimeo.com/46248066
VIDEO COMPRESSION
http://www.youtube.com/watch?v=TrRg0xa4JQA
CODING
National 5
Exemplification and implementation of coding to create
and modify information systems including the use of:
• scripting languages (including JavaScript)
• mark-up languages (including HTML)
CODING
Higher
Exemplification and implementation of coding to create and modify information systems including the use of: scripting (database/web pages)
client-side scripting
server-side scripting optimisation (web search (crawlers) and efficiency of coding)
CLIENT SIDE AND SERVER SIDE COMPARISON
EXAMPLES OF CLIENT SIDE SCRIPTING
http://mikekus.com/
http://hellomonday.com/
http://multeor.com/game/
http://crimetimeline.io/
http://hereistoday.com/
THE RULES OF CASCADING STYLESHEETS STATE THAT:
embedded styles within the text over-rule all others
document level styles, defined in the document , over-rule external Stylesheets external stylesheets only apply if they are not over-ruled by the other 2 methods
CASCADING STYLE SHEETS
• A cascading stylesheet (CSS) is a separate file which defines colours, fonts and sizes
• to be used on web pages. A reference to this file is included within every web page in a website.
• This ensures that each page is consistent in format.
WEBSITES FOR JAVASCRIPT
Codeacademy
W3C for schools
JAVASCRIPT
• Allows user interaction
• User validation possible
• Page content can be customised based on time, browser, location
• Javascript blocks popups
• Used for menus and galleries
FORM VALIDATION
• Need for validation
• Simple VBS validation script
• Mailto:
• Problems with Mailto:
• CGI_bin
• Alert messages
POPUP BLOCK CODE - EXAMPLE OF JAVASCRIPT
PHP
• Future development
• Web server processing of hyper text
• MySQL
• Cookies and databases
CLIENT SIDE SCRIPTING (INCLUDING FORM VALIDATION AND ALERTS).
• Server-side scripting is a web server technology in which a user’s request is fulfilled by running a script directly
• on the web server to generate dynamic HTML pages
FACEBOOK DATABASE
PHP IN ACTION
W3 schools php
CLIENT SIDE SCRIPTING
• JavaScript
• VBScript
• Compare JavaScript and VBScript
• Need for client side scripting
• Document.Write command
• Document.Cookie command
CRAWLERS
• Search engines use programs called ‘bots’ or ‘spiders’ or ‘web crawlers’
• Googlebot is Google’s web crawler
• https://www.google.co.uk/insidesearch/howsearchworks/thestory/
• Yahoo’s is called Yahoo!Slurp.
• http://blogs.bing.com/search/2014/04/21/predictions-with-bing/
• These programs scan web servers for new pages and send the information back to the main database.
• This is how Search engines work. When you search, you are going through their database to find relevant pages.
• http://patch.com/connecticut/orange/the-differences-between-google--bing-seo-algorithms
SEARCH ENGINES - OCTOBER 2015
SECURITY PRECAUTIONS
National 5
anti-virus software, passwords/encryption, biometrics, security protocols and firewalls, use of security suites.
Higher
Encryption, digital certificates and signatures, server-side validation of online form data, biometrics in industry
BROWSERS
• HTML interpretation – X Ray goggles
• client side scripting - http://www.w3schools.com/js/default.asp
• cookie functions - http://www.w3schools.com/js/js_cookies.asp
• built in encryption functions - http://www.w3schools.com/php/func_string_crypt.asp
COOKIES
ENCRYPTION –SYMMETRIC
key distribution problem
SUBMISSION FORM
BIOMETRICS IN INDUSTRY
SYMMETRIC ENCRYPTION – PUTTING THE DATA INTO CODE
• A = D
• B = E
• C = F
Plus 3 encryption
ENCRYPTION –ASYMMETRIC
The person who will receive the data decides on a private keyThe RSA algorithm generates a public key which will be used to encrypt the messageit is mathematically (almost) impossible to calculate the private key from the public key.
PGP – X SEND Y A MESSAGE
1. PGP first compresses the message - harder to decode the message
2. PGP then creates a session key, which is a one-time-only secret key
3. session key itself is encrypted using Y’s public key.
4. AXcrypt
PGP – Y RECEIVES THE MESSAGE
1. Y’s copy of PGP uses his or her private key to decrypt the temporary session key.
2. PGP then uses the session key to decrypt the encryptedMessage.
This is the most secure and quickest means of encryption
ENCRYPTION IN ACTION
ENCRYPTION IN ACTION
SECURE SOCKETS LAYER
• Implemented by browsers
FIREWALLS (SECURITY RISKS)
FIREWALLS (SECURITY RISKS)
The firewall software can be set up to:
• reject packets from selected IP addresses (for example, blocking inappropriate sites)
• allow only packets from selected sites
• reject or allow packets from particular domain names
• only allow packets to and from certain ports (a useful defence against many viruses)
• allow or reject packets using particular protocols (for example, blocking all FTP requests)
• "sniff" packets, and reject any which contain certain words
TESTING
National 5
links and navigation
matches user interface design
Higher
Beta testing
usability
compatibility issues (including memory and storage requirements, OS compatibility)
BETA TESTINGThe intended end users are asked to test the software, they are from outwith the software development company.
USABILITY TESTING
This involves testing software applications like websites and programmes using a real life test group using scenarios which accurately reflect the types of tasks the software is expected to perform.
COMPATIBILITY
When developing an Information System the developers must ensure it can run on the types of devices users own.
Issue can be
• RAM
• Storage Requirements
• Operating System
PURPOSE, FEATURES, FUNCTIONALITY, USERS
National 5
Description of purpose Users: expert, novice, age-range
Higher
detailed descriptions of purpose
Interaction of information systems with:
human users: expert, novice, age-range
other software: search engines
INFORMATION SYSTEM PURPOSE
Before the start of the design process the specific purpose of the information system must be defined. This includes
• data design
• architecture design
• interface design
• procedural design
NOVICE, EXPERT, AGE RANGES
Expert users – prefer to use key board short cuts while novice users require menus and detailed explanations.
AGE RANGE
Certain pieces of information systems are specifically aimed at certain users
SEARCH ENGINES
SEARCH ENGINES - BAIDU
BROWSERS
TECHNICAL IMPLEMENTATION (HARDWARE REQUIREMENTS)
National 5
input and output devices
processor type and speed (Hz)
memory (RAM, ROM)
device type (including supercomputer, desktop, portable devices including laptop, tablet, smartphone
TECHNICAL IMPLEMENTATION (HARDWARE REQUIREMENTS)
input and output devices
processor type, number and speed (Hz)
memory (RAM, ROM, cache)
device type (including desktop, laptop, tablet, smartphone)
TECHNICAL IMPLEMENTATION (SOFTWARE REQUIREMENTS)
National 5
web browsers
specific applications and/or utilities
Higher
operating systems
licensing
proprietary versus open source
portability Description and exemplification of current trends in operating system design
OPERATING SYSTEMS
• Manages the hardware and software of the computer system
• File Management
• Memory Management
• Input / Output Management
LICENSING
Single License – one use only
Multiple License – more than one person
Site License – allows everyone in the business access to the software.
Freeware – distributed free of charge
Shareware – Trial version given for 30-60 days.
PORTABILITY
• Software designers have to ensure that their software can be used on as many different devices as possible.
• Helps maximise sales as it can run on different operating systems.
CURRENT TRENDS IN OS• Operating systems have been redesigned to deal
with touchscreen technology.
• Simpler icon based design
• Complex tasks like graphic editing and web design are still better done using a mouse and keyboard.
TECHNICAL IMPLEMENTATION (STORAGE)
National 5
local, web cloud
capacity (in appropriate units)
rewritable, read-only
interface type
data transfer speed Storage devices: built-in, external, portable, magnetic, optical, solid state
TECHNICAL IMPLEMENTATION (STORAGE)
Higher
distributed and offline storage
backup systems and strategy
capacity (in appropriate units)
rewritable, read-only
interface type
data transfer speed Storage devices:
built-in, external magnetic, optical, solid state.
Description and exemplification of current trends in storage Systems
DISTRIBUTED AND OFFLINE STORAGEDistributed – Data is stored in a number of different servers usually different offices but can be accessed by all users in separate locations
Offline – Storage devices like CD ROMs, DVDs, USB Drives etc.
CENTRALISED AND DISTRIBUTED DATABASESCentralised database.
• All the data is held on a central computer- mainframe or server.
• Advantages.• far easier to manage and control • far easier to back up
CENTRALISED AND DISTRIBUTED DATABASESDistributed Database.
• Consists of two or more files located at different sites on a computer network.
• different users can access it without interfering with one another.
• The DBMS must synchronise the scattered databases to make sure they all have consistent data.
BACKUP SYSTEMS AND STRATEGY
• Every computer user should have a strategy in place to backup their data.
• This is the process of making a copy of data stored on fixed hard disks to some other media.
• This can be tape, external portable hard disks, writeable CD-ROM, DVD or to the cloud
• This ensures that the most recent copy of the data can be recovered and restored in the event of data loss.
MOST COMMON REASONS FOR DATA LOSS
1. Deleting files accidentally
2. Viruses and damaging malware
3. Mechanical damages of hard drive
4. Power failures
5. Theft of computer
6. Spilling coffee, and other water damages
7. Fire accidents and explosions
ARCHIVE, RECOVERY AND STORAGE METHODS
• Archive.• The process of copying data from hard disk drives to
tape or other media for long-term storage.
• Data verification.• it is important to check that the data stored on the
backup media can be recovered.
• Frequency and Version Control.• Full back up – all the existing data• Differential backup – only the data since the last full backup is
stored• Incremental backup – saves only the data changed since the last
backup of any type
GRANDFATHER, FATHER, SON
TECHNICAL IMPLEMENTATION (NETWORKING/CONNECTIVITY)
National 5
peer-to-peer, client/server, wired, optical, wireless
Higher
Cloud systems and server provision: public, private, hybrid cloud-based services
web hosting
current trends in networking and connectivity
CLOUD SYSTEMS
• Data and software operate on the web rather than a local computer.
• User can access their documents from anywhere.
SERVER PROVISION: PUBLIC, PRIVATE, HYBRID AND CLOUD-BASED SERVICES
Public Cloud – available to anyone either free or for a fee
PRIVATE AND HYBRID CLOUDS
Private are based only within an organisation but still stored in the cloud.
Hybrid is a mixture of the public and private systems
WEB HOSTS
Companies which, for a fee, allow the owners of websites to store a website which can then be viewed on the WWW
NETWORKING AND CONNECTIVITY
LAN
WAN
Intranet
Internet
3G 4G
Wifi
SECURITY RISKS
National 5/Higher
spyware, phishing, keylogging
online fraud, identity theft
DOS (Denial of Service) attacks
SPYWARE
Software that can obtain information from a users computer without them being aware of it.
PHISHING
KEYLOGGING
Software which records every keystroke on a PC
ONLINE FRAUD
DENIAL OF SERVICE ATTACKS
Attempt to make a computer network unavailable to its users. This can be done by bombarding the server with requests for information until the server can longer cope with amount of traffic.
LEGAL IMPLICATIONS
Computer Misuse Act, Data Protection Act, Copyright, Designs and Patents Act (plagiarism), Health and Safety regulations, Communication Act
Regulation of Investigatory Powers Act
137
LEGAL IMPLICATIONS OF INFORMATION SYSTEMS
• The Data Protection Act 1998
• Copyright Designs and Patents Act 1988
• The Regulation of Investigatory Powers Act 2000
• The Freedom of Information Act (Scotland) 2002
• Health and safety Regulations
COMPUTER MISUSE ACT
It is illegal to
1. Unauthorised access to computer material.
2. Unauthorised access with intent to commit or facilitate commission of further offences.
3.Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of computer, etc.
3A.Making, supplying or obtaining articles for use in offence under section 1 or 3
139
THE 1998 DATA PROTECTION ACT • The 8 Data Protection Principles.
• Personal data shall be processed fairly and lawfully.
• Personal data shall be obtained only for lawful purposes,
• Personal data shall be adequate, relevant and not excessive.
• Personal data shall be accurate and, kept up to date.
• Personal data shall not be kept for longer than is necessary.
• Personal data shall be processed in accordance with the rights of data subjects.
• Appropriate measures shall be taken against unauthorised or unlawful processing of data.
• Personal data shall not be transferred to a country outside Europe.
• Data must be registered with the Data Commissioner.
140
THE 1998 DATA PROTECTION ACT
• Unconditional exemptions.• Data related to National Security.• Data which by law has to be made public (e.g.
voters’ roll).• Data held by the Police and National Health
Service.
• conditional exemptions.• mailing lists (names and addresses).• data used for calculating and paying wages.• information used for club memberships.• data used by a data subject at home.
141
THE 1998 DATA PROTECTION ACT • Rights of Data Subjects.
• To see any personal data stored either electronically or manually about them.
• The Data controller may ask that a small fee be paid to cover their costs in providing the data.
• To have their data corrected if it is inaccurate.• To prevent their data being used by companies to send
them junk mail.
• Responsibilities of Data Users.• Have to register with the Data Protection Registrar if
they wished to hold personal information about data subjects.
• They must be willing to let data subjects see data held about them, but must amend any false data without charge.
• Data Users must also be willing to remove subjects’ names and addresses from mailing lists if asked to.
142
THE 1998 DATA PROTECTION ACT • Changes From 1984 Act.
• The 1984 DPA had certain shortcomings.• only covered data in electronic form.• companies could circumvent certain provisions.• It had no European or worldwide dimension.• there was no obligation on any data user to tell the
data subject that they held any data about them.
• The 1998 Act.• covers the transmission of data in electronic form,
which was not really an issue in 1984.• harmonised the European Union Data Protection
legislation.• It also made it a requirement of the Act to ask for
the prior consent of data subjects to have data held about them, and included paper based records.
143
COPYRIGHT, DESIGNS & PATENTS ACT • Software Licensing.
• Software can be legally installed on as many computers as the licence allows.
• Shareware can be used legally for 30 days then either paid for or deleted.
• Freeware can be downloaded and used free of charge.
• Computer Applications.• Databases can store vast amounts of
copyright data.• Act covers extracts from computer
databases.• Plagiarism to copy work directly from the
Web.• Music downloads must be paid for and
copyright checked.• Software piracy a crime - FAST.
144
THE REGULATION OF INVESTIGATORY POWERS ACT
2000 • Gives powers to:-.
• Police, Special Branch, GCHQ and MI5.• It allows organisations to monitor employees, e-mail
and Web usage.• It also provides powers to help combat the threat
posed by rising criminal use of strong encryption to try to break into electronic transactions.
• The Act contains 5 parts.• allows the authorities to monitor our personal e-mail
and Internet usage.• businesses, local authorities and government
departments can and do monitor internal e-mails,• monitor Internet usage of staff, students and pupils.
• sounds very “Big Brother.”• May enrage and disturb many people to realise this.• When terrorists can be anywhere in our society it
may be a relief to know that the authorities are taking such steps to catch them.
145
THE FREEDOM OF INFORMATION ACT (SCOTLAND) 2002
• From 1st January 2005.• General right of public access to all types of
'recorded' information held by public authorities.• sets out exemptions from that general right.• places a number of obligations on public
authorities.• The Act applies only to 'public authorities' and not
to private entities.• Public authorities include Government
Departments, local authorities and many other public bodies, and also schools, colleges and universities.
• The Act will be enforced by the Scottish Information Commissioner.
• Responsibilities of public authorities.• Required to adopt and maintain a Publication
Scheme.• Sets out the classes of information available (eg.
prospectuses, almanacs and websites).• the manner in which they intend to publish the
information,• whether a charge will be made for the
information.
COMMUNICATIONS ACT
• Protects the public from harmful or menacing electronic communication
• Makes it illegal to use other people's wifi without their permission
147
HEALTH AND SAFETY REGULATIONS
• Requirement on employers.• Carry out a risk assessment.• Employers with five or more employees need to
record the significant findings of the risk assessment.
• Risk assessment should be straightforward in a simple workplace such as a typical office.
• Provide a safe and secure working environment.
NEED FOR INTERNATIONAL POLICING OF THE INTERNET.
Why it won’t happen
- Each country has separate legal systems
- Don’t want to lose control.
- UN style organsiation is required
Why would it be good
- Prevent more crime
- Censorship would be universal.
ENVIRONMENTAL IMPACT/IMPLICATI ONS
National 5
Energy use, Disposal of IT equipment, Carbon footprint
Higher
Lifetime carbon footprint (manufacture, use, disposal), Environmental benefits
LIFETIME CARBON FOOTPRINT
• Manufacture - Energy and resources are used to bring together the raw materials for a PC or Laptop.
• The actual production process also requires energy and resources.
• While it is being used the PC/Laptop will be using energy and create heat emissions
• Disposal - Much computer hardware contains emissions that can cause cancer. Therefore they have to be disposed of with care.
ENVIRONMENTAL BENEFITS
• Communication can take place on-line rather than people travelling to meetings.
• Companies now recycle IT equipment rather than send it to landfill.
ECONOMIC AND SOCIAL IMPACT
Economic: competitive advantage, global marketplace, business costs, maintainability, scalability
Social: censorship and freedom of speech, privacy and encryption, global citizenship, online communities.
ACADEMIC, COMMERCIAL AND PERSONAL WEB PAGES
• http://www.cristianoronaldo.com/
• http://www.lilyallenmusic.com/
• http://www.amazon.com/
• http://www.debenhams.com/
• https://retail.santander.co.uk
• https://www.edx.org/
• http://www.st-andrews.ac.uk/
• https://www.whitehouse.gov/administration/president-obama
COMPETITIVE ADVANTAGE
When they invest in excellent IT systems organisations can gain a competitive advantages over their rivals as this can lead them to offer better value to their customers as they are more efficient.
GLOBAL MARKETPLACE
Selling products and services across the world rather than just in a single country or regions.
Coca Cola are global.
Barr’s Irn Bru is national.
The VG store in Motherwell is local
BUSINESS COSTS
Expensive to invest in the hardware and software for a new computerised system.
Staff Training can be expensive.
MAINTAINABILITY
How easy is it to repair and update any ICT equipment.
SCALABILITY
Is it possible for an information system to be used to meet a global audience rather than a national or local one.
CENSORSHIP AND FREEDOM OF SPEECHThe challenge for the authorities is to find a balance between the individuals' right to express themselves freely and the need to protect the public from offence content or opinions.
The authorities in, for example, China and Iran filter the content of websites preventing their citizens from gaining free access whereas in the UK it is only content which is extremely offensive that would be blocked.
PRIVACY AND ENCRYPTION
Authorities try to reach a balance between successfully preventing and investigating crime and allowing individuals the right to express their own opinions and follow their personal interests.
GLOBAL CITIZENSHIP
awareness of global issues such as environment, commerce, politics and society in general.
ONLINE COMMUNITIES
A virtual community whose members interact with each other primarily via the Internet.