Specification a. discuss the impact of ICT on society, organisations and individuals; b. discuss possible future developments in ICT and their impact on.

Slides:



Advertisements
Similar presentations
LOGOS R US – The Exam On the next few pages are sample exam questions you could be asked in exam season:
Advertisements

Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Factors to be taken into account when designing ICT Security Policies
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
The laws Organizations are covered by lots of different laws
Issues Raised by ICT.
Higher Administration
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
Understand how safe working practices are applied in a business environment.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
G041: Lecture 16 Section B Revision Questions
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
A Boon or a Curse. What is the ‘Internet’?  It is a network of networks that consists of millions of private, public, academic, business, and government.
OCR National in ICT Unit 1 – ICT in Business AO1 - Safe Working Practices in a Business Environment.
Computer Legislation The need for computer laws Go to Contents.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
G061 - ICT Health Problems. Learning objectives: By the end of this topic you should be able to: describe health problems related to working with ICT.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Computer Crimes and Health & Safety Objectives: Gain an overview of Computer Crime and Health & Safety issues so that you can write about them in your.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
Health problems related to ICT And how to avoid them!
A POWERPOINT PRESENTATION By Add your name(s) here Health, Safety and ICT.
Briefly explain the problems, dangers and preventative measures employees/employers need to take to prevent injury or injuring others who use ICT equipment.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Section 6 Theory Safety hazards and measures for preventing accidents.
Understand how safe working practices are applied in a business environment.
HEALTH AND SAFETY ISSUES. PRESENTATION INFORMATION  Areas you need to cover:  Physical safety  Health  Keeping files from being lost  Keeping other.
Legal Implications You need to know about the following:
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Health and Safety. Positive effects of ICT on physical health and mental well being Friendship using social networking Easy to keep contact with friends.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
SECURE NETWORKS Device detects all network within radius Secure networks require SSID Password ENCRYPTION Translated into code Uses a mathematical Key.
TOPIC: DIGITAL CITIZENSHIP Created by Swapnil Sahoo.
Describe four strategies that you could use to minimise the dangers of using social networking sites to make new friends. Know how to block and report.
Objectives Understand legal aspects of software
Bigger Picture.
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Impact of ICT on Health & Safety
OCR Nationals – ICT Safe Working Practices
Edexcel GCSE ICT ASSESSMENT INFORMATION
ICT meeting Business needs
Topic 6: Issues Press F5 to view!
Applications Software: End User Applications
G061 - Professional Bodies
Lesson Objectives Aims The Data Protection Act 1998
Data integrity and security
Unit 3 Information Systems
Understand mechanisms to control organisational IT security
How it affects policies and procedures
Protecting Data and Information
Impact of ICT on Health & Safety
LO5 Unit 1: Fundamentals of IT
G061 - Network Security.
BACS Laws And Acts Applications of ICT Communications
Presentation transcript:

Specification a. discuss the impact of ICT on society, organisations and individuals; b. discuss possible future developments in ICT and their impact on the following areas: transport, medicine, the disabled, education, entertainment, digital piracy, shopping, marketing and communication; c. discuss the main aspects, purpose and implications of the Data Protection Act (1998), Computer Misuse Act (1990), Copyright, Designs and Patents Act (1988), Regulation of Investigatory Powers Act (2000), Electronic Communications Act (2000) and Freedom of Information Act (2000) and subsequent changes/updates; d. explain methods for combating ICT crime and protecting ICT systems: physical security, firewalls, backup, encryption, biometric security, software patches/updates, ‘anti-virus’ and anti-spyware software, access rights, auditing, education of users, user IDs, passwords and methods for ensuring passwords remain effective; e. describe the advantages and disadvantages of networking computers; f. describe the purpose and activities of professional bodies, eg BCS; g. explain the advantages and disadvantages of belonging to a professional body; h. describe health problems related to working with ICT: repetitive strain injury, carpal tunnel syndrome, ulnar neuritis, deep vein thrombosis, eyesight defects, fatigue, backache and stress; i. describe safety problems related to working with ICT: trailing wires, risk of fire and electrocution, unsecured equipment, food and drink and proximity to water; j. describe appropriate measures for avoiding health and safety problems.

a. discuss the impact of ICT on society, organisations and individuals;

Jan 2012

b. discuss possible future developments in ICT and their impact on the following areas: transport, medicine, the disabled, education, entertainment, digital piracy, shopping, marketing and communication;

Jan 2012

Jan 2013

Jun 2014

June 2015

c. discuss the main aspects, purpose and implications of the Data Protection Act (1998), Computer Misuse Act (1990), Copyright, Designs and Patents Act (1988), Regulation of Investigatory Powers Act (2000), Electronic Communications Act (2000) and Freedom of Information Act (2000) and subsequent changes/updates;

Jan 2012

Jan 2013

Jan 2013

June 2015

d. explain methods for combating ICT crime and protecting ICT systems: physical security, firewalls, backup, encryption, biometric security, software patches/updates, ‘anti-virus’ and anti-spyware software, access rights, auditing, education of users, user IDs, passwords and methods for ensuring passwords remain effective;

Jan 2013

Jun 2013

Jun 2014

Jun 2015

e. describe the advantages and disadvantages of networking computers; a. discuss the impact of ICT on society, organisations and individuals;

June 2012

June 2014

f. describe the purpose and activities of professional bodies, eg BCS;

June 2014

g. explain the advantages and disadvantages of belonging to a professional body;

h. describe health problems related to working with ICT: repetitive strain injury, carpal tunnel syndrome, ulnar neuritis, deep vein thrombosis, eyesight defects, fatigue, backache and stress;

Jun 2013

Jun 2015

i. describe safety problems related to working with ICT: trailing wires, risk of fire and electrocution, unsecured equipment, food and drink and proximity to water;

j. describe appropriate measures for avoiding health and safety problems.