Applications Software: End User Applications

Slides:



Advertisements
Similar presentations
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
BUSINESS B2 Ethics.
ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
A Guide to Computer User Support for Help Desk and Support Specialists
Ethical and Social Issues in Information Systems
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Competencies (Page 1 of 2)
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 1 Information Technology, The Internet, and You.
Security Issues and Ethics in Education
Computer Ethics in Information Technology
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Chapter 1 Introduction to Computer User Support
About the Presentations The presentations cover the objectives described in the opening of each chapter. All chapter objectives are listed in the beginning.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
The Office Procedures and Technology
C4- Social, Legal, and Ethical Issues in the Digital Firm
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved. 11 CHAPTER INFORMATION TECHNOLOGY, THE INTERNET, AND YOU.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
DIT614 ~ Customer Support & Work skills CHAPTER 1 Introduction to End User Computing Prepared By : Suraya Alias.
Introduction to Business © Thomson South-Western ChapterChapter Business and Technology Computer Systems Business Applications of Technology.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved. 11 CHAPTER INFORMATION TECHNOLOGY, THE INTERNET, AND YOU.
Lecture 11 Introduction to Information Systems Lecture 12 Objectives  Describe an information system and explain its components  Describe the characteristics.
Introduction to Computer User Support
1 Inputs Physical Resources Environment The General Systems Model of the firm Transformation Process Output Resources Physical Resources Information Processor.
Copyright (c) 2003 by Prentice Hall Chapter 2 Applications Software: Getting the Work Done Computers: Tools for an Information Age BSM025 Computers.
4/17: Ethical & Social Issues in IS
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
Security and Ethics Safeguards and Codes of Conduct.
Using Technology to Solve Problems Unit 2 Mod 2 SO 7.
Intro to Business, 7e © 2009 South-Western, Cengage Learning SLIDE Chapter 11 1 CHAPTER Computer Systems Business Applications of.
Computing Essentials Plan Syllabus Class is more difficult than many previous students predicted Value of class Content.
Chapter 3 Applications Software: Getting the Work Done.
Chapter 1 Computer Technology: Your Need to Know
Chapter 1 Introduction to Computer User Support
Hardware & Software Lesson 3 Software KS3 COMPUTING KS3 Computing
Add video notes to lecture
Explain the five parts of an information system: people, procedures, software, hardware, and data.
Understand the nature of business.
Application Software Chapter 6.
How to Fix MSN error code 80072efd and Messages ?
Principles of Business Objective 2.04
How to Fix MSN error code 403 and Messages ?
Chapter 11 crime and security in the networked economy
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
About the Presentations
Ethical and Social Issues in Information Systems
Unit 7 – Organisational Systems Security
Information systems are involved in many of the things we encounter each day.
Ethical and Social Issues in Information Systems
11 Business and Technology 11-1 Computer Systems
You Are the Author.
Business and Technology
Computers Tools for an Information Age
E-commerce Infrastructure Web Servers / Web Clients / Web Browsers
Understand the nature of business.
Computer Literacy BASICS
Computers Tools for an Information Age
Understand the nature of business.
Student User Agreement and Policy 2022
Computers Tools for an Information Age
Presentation transcript:

Applications Software: End User Applications Lecture Series 2 Applications Software: End User Applications

Types of Software Software can be divided into two types: 1) System software, and 2) Application software (End-user applications) This slide and the next discuss four main technology trends that raise ethical issues. Which of these trends do students believe might have the most adverse consequences? Why do they feel this way? Do the positives outweigh the negatives for all four issues? Why or why not?

End User Classifications We can look at the end user classifications from different perspective. Following figure shows the categories of end users This slide and the next discuss four main technology trends that raise ethical issues. Which of these trends do students believe might have the most adverse consequences? Why do they feel this way? Do the positives outweigh the negatives for all four issues? Why or why not?

Resources End-Users Need To use end user applications the users need a combination of resources These resources are: Basic hardware Add-on peripherals (devices) Hardware maintenance and upgrades Software and software upgrades Supplies Data and information Technical support Facilities, administration, and overhead: Total Cost of Ownership includes all kind of cost that includes acquisition, facilities, support and upgrade Online profiling is one of the most controversial computer-related ethical, social and political issues today. While it is used fairly extensively on the Internet, it is also used by insurance firms, health insurance firms, casinos, and of course national authorities around the globe for finding potential terrorists.

End Users Applications Software Electronic mail and instant messaging Web browser Word processing Spreadsheet DBMS Graphics Planning and scheduling Desktop publishing Web site development Educational and entertainment Mainframe applications Explain that NORA is used by both the government and the private sector for its profiling capabilities. Ask students to provide potential examples of NORA (other than the one mentioned in the caption) for both governmental and business purposes. One such example might be an airline identifying potential terrorists attempting to board a plane. Another might government identifying potential terrorists by monitoring phone calls.

Problems With End-User Computing Waste: Money, time, energy Piracy: Breach of copyright Mistakes: Small mistake may lead to huge loss Invasion of privacy: Unauthorized access by hackers, co- workers Health problems: Carpal Tunnel Syndrome, Eye strain Computer crime: Lack of security measures Computer virus: Malware Loss of data: Hardware, software, and network fails may lead to lost data. Data backup must be done. Do students believe that any aspect of ethical analysis is lacking from this process? If so, what? Can students offer a brief example of an ethical dilemma and how they would resolve it using this process? One class exercise is to work with students to identify an ethical situation they are aware of, or that may have been in the news. Then, go through the ethical analysis described in the slide to illustrate the process of analyzing an ethical situation.