+ All Categories
Home > Documents > social impacts of IT

social impacts of IT

Date post: 17-Sep-2015
Category:
Upload: muskan-rastogi
View: 35 times
Download: 0 times
Share this document with a friend
Description:
plagiarismsecurity careers in IThardware and softwaregood pictures and transition effects.
Popular Tags:
10
SOCIAL IMPACTS OF IT MUSKAN RASTOGI IX-C
Transcript

Slide 1

SOCIAL IMPACTS OF ITMUSKAN RASTOGI IX-C1

INDEX1)Plagiarism2)Security3)Intellectual property rights4)Career in IT

2

WHAT IS PLAGIARISM?Many people think of plagiarism as copying another's work or borrowing someone else's original ideas. But terms like "copying" and "borrowing" can disguise the seriousness of the offenseto steal and pass off (the ideas or words of another) as one's ownto use (another's production) without crediting the sourceto commit literary theftto present as new and original an idea or product derived from an existing sourceIn other words, plagiarism is an act of fraud. It involves both stealing someone else's work and lying about it afterward.

1)PLAGIARISM3

Place all quoted passages in quotation marks and provide source information, even if it is only one phrase.

Identify the source from which you have paraphrased or summarized ideas, just as you do when you quote directly.

Give credit for any creative ideas you borrow from an original source. For example, if you use an author's anecdote to illustrate a point, acknowledge it.

Replace unimportant language with your own, and use different sentence structures when you paraphrase or summarize.

Acknowledge the source if you borrow any organizational structures or headings from an author. Don't use the same subtopics, for example.

Steps to prevent plagiarism

PLAGIARISM continued...4

2)SECURITYThe global digital era has led to the creation of innovative business models but also ushered in many unforeseen challenges in the area of data security and privacy. With business and social networks scaling up and expanding, we need to tackle the problem of maintaining data privacy through consistent and updated efforts in terms of technology deployment. Privacy issues come into picture when personal information is collected and stored and shared without the consent of the person/business concerned. The key issue in maintaining the data privacy is to share data while protecting personally identifiable information. Successful security solutions require a convergence of the three components TechnologyPeopleProcesses

5

3) Intellectual property rightsIntellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.IP is divided into two categories: Industrial property, which includes inventions (patents), trademarks, industrial designs, and geographic indications of source; and Copyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs and sculptures, and architectural designs.

Rights related to copyright include those of performing artists in their performances, producers of phonograms in their recordings, and those of broadcasters in their radio and television programs. The innovations and creative expressions of indigenous and local communities are also IP, yet because they are traditional they may not be fully protected by existing IP systems. Access to, and equitable benefit-sharing in, genetic resources also raise IP questions. Normative and capacity-building programs are underway at WIPO to develop balanced and appropriate legal and practical responses to these issues6

There are two main sectors in this field:

Hardware:This includes the physical elements of the computer system and deals with the designing, manufacturing and maintenance of computers. This area also includes the assembling of the manufactured components of the computers.

Software:This includes the set of instructions by which a computer is programmed for working and performing the specified tasks. This realm includes the work of designing the programs for various purposes. Programs may be for controlling the functioning of the computers or they may also be some user-friendly programs for specific needs. The programs may also come in the form of packages, which are designed for meeting the different kinds requirements for large number of people.4) CAREER IN I.T.7

1. Functional areas inHardware:

Manufacturing:This involves the work of production and assembly of components of computer systems.

Maintenance:People in maintenance look after the smooth functioning of the machine and help in rectifying and detecting the breakdown in them. They also help in taking preventive measures so that least amount of damage could be caused to the computer systems and peripherals.

Research and Development:It involves designing of chips and circuits, computer architecture and integration of peripherals. It also includes improvement and upgrading of the existing systems.

Management:Managers ensure that the development and production work goes on smoothly. They look after the allocation of resources and planning.

8

2. Functional areas inSoftware:Manufacture:This involves preparing the set of instructions or programs to let the computer work. This further needs combining of application of computer science and telecommunications principles and creativity.Software development:This involves updating and development of existing operations as well as their refining and improvement. All this is carried is carried out in various stages like analysis, designing, construction, implementation etc.Data entry:The data for the programs, which are made, have to be fed in computers. So this work is done at data entry level.Programmers/Coders:They write and test programs and convert the strategies of the system analyst into working programs.Application programmers:They prepare programs either for general purpose or user-friendly programs or some specific programs for individual use along with testing and integrating them.Support services:They vary in nature and can range from helping a customers in the purchase of the software, suggesting its right kind of application and providing them with the required training at the initial stage of its use.There are other technical areas where one can look for employment in this field:

Computer operations:It requires handling of computer peripherals along with other accessories like CD-ROMs, disk drives, printers etc.Database administration:It involves management and maintenance of data.9

Acknowledgement

www.google.co.inwww.shutterstock.comwww.wikipedia.com

10


Recommended