EFFECTS & USES OF ICT.

Slides:



Advertisements
Similar presentations
09/04/2015Unit 2 (b) Back-Office processes Unit 2 Assessment Criteria (b) 10 marks.
Advertisements

Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
ICT IGCSE Expert Systems.
Why Buy Online? Selena Day. Statistics National Retail Federation by BIGResearch estimated that shoppers would do a quarter of their holiday shopping.
E-commerce The requirements of interactive shopping
Opening a bank account.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Internet Auctions Users can post items for sale and set a minimum price for it. Other internet users can now bid for the item being sold. These items.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How It Applies In A Virtual World
Electronic Payment. Amounts transferred through accounts Money transfer instructions Bank’s computer system Other banks / Businesses.
ICT in ORGANISATIONS. ICT AND BANKING Know, Describe and Understand!
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
ICA on-line shopping & on-line banking. On-line shopping In early days of internet this was limited due to concerns over security of personal and bank.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
3.3 Internet Services. Overview Demonstrate knowledge and understanding of the following internet services and describe the advantages and disadvantages.
Topic 4 - Home Business Online shopping, booking and verification of data.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Lesson Objectives By the end of this lesson you will be able to: 1.Describe the terms batch, online and real time processing 2.Give examples of each type.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 43 Shopping on the Internet.
Reliability & Desirability of Data
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Scams & Schemes Common Sense Media.
Online Goods and Services. Topics Online Shops and Physical Goods Online Shops and Physical Goods Booking Systems Banking Education and Training Gaming.
ICT in Banking.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
Modelling and Simulations The Kingsway School. What are Computer Models? When a real life situation is represented by computer software. Can you think.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
ND e-commerce Carl Arrowsmith Session 14 Consumer Protection & Trust.
Understanding e-Commerce A-Level Ict. E-Commerce is impossible to avoid now days.Almost everyone in the western world is at one point a consumer of the.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Execute sales transactions. Sales transactions include: Cash or check Debit card sales Credit card sales Layaway sales On approval sale Cash-on-delivery.
ICT & Crime Introduction. Homework read THREE stories from ict.com/news/news_stories/news_crime.htm & produce a 3-fold leaflet describing/discussing.
Introduction With the development of the Internet a phenomenon known as 'electronic commerce' or 'ecommerce' for short, has been growing. Ecommerce has.
INTRODUCTION & QUESTIONS.
Electronic Payment. Amounts transferred through accounts Money transfer instructions Bank’s computer system Other banks / Businesses.
ONLINE SHOPPING. Refers to buying and selling of goods and services using websites accessed through the internet physical goods such as clothes and books.
Protecting Your Assets By Preventing Identity Theft 1.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Use of this service Checking location departure/arrival Checking time departure/arrival Benefits to the user or company Provides up to date information.
Security of, privacy of and access to personal/confidential information/data.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
INTERNET APPLICATIONS. WHAT ARE INTERNET APPLICATIONS? Many applications have been built to work specifically on the internet. These applications share.
Online Shopping. Learning Objectives To learn how society has been affected by online shopping (e-Commerce)
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Online Shopping With the development of the Internet and the popularization of computer , shopping online has become a commonplace in our life . We can.
The impact of I.T on society
Legislation in ICT.
Ian Ramsey C of E School GCSE ICT Smart working Online shopping.
Electronic Transactions
Legislation in ICT.
Presentation transcript:

EFFECTS & USES OF ICT

Online Services Examples of online services that would not be called as transaction. Arranging packages to be picked up and delivered to addresses People filling in their tax returns Reserving and renewing library books

Online Shopping (e-commerce) Reasons for its popularity Items are cheaper online Shopping can be done in the comfort of home at convenient time Can shop from their favourite shop Can avoid travelling and spending time and money for visiting many shops Can compare wide range of product, sellers from different countries There is a greater choice of manufacturers, sellers and brands. There is no need to wait for delivery when software are purchased

Online Shopping (e-commerce) Reasons for its popularity Online catalogues are available Customer can read reviews of previous buyers More helpful for disabled people to do shopping Sellers can keep details of buyer for future use Buyers can use coupons.

Steps customers to go through while doing online shopping Deciding which online shop to use Browsing product categories Using virtual shopping basket (shopping cart) Making payment – check out Billing address, shipping address, customer phone number, email address

Selling goods online Can offer cheaper price for products Warehouse and staff costs are lower Air-conditioning and shop space are not required

Security issues Identity fraud/identity theft – encryption Hackers Fake websites and sellers

Online banking Advantages to the Customers No need to spend money for transportation to bank Can do banking at any time Easier for people with disability Interest rates on saving accounts are higher

Online banking Disadvantages to the Customers May loose personal contact with the bank Must have access to computer and internet Risk of hacking and interception Customer may mismanage the account. Cost of buying computer and internet connection Cannot make cash withdraw May receive fraudulent emails asking for username and passwords.

Data Protection Act Personal data shall be obtained and processed fairly and lawfully Data should be used only for specified and lawful purposes Should be adequate, relevant and not excessive for the required purpose. Personal data shall be accurate and kept up to date Data should be destroyed when it is no longer required. Data should be processed in accordance with the right of the data subject. Appropriate security measures must be takes to prevent unauthorized access Personal data cannot be transferred to any third party or any other country

Internet Use Issues Reliability of Information –anyone can create a website Undesirable information Security of Data Transferred Using the Internet Phishing – someone pretending to be a representative from bank to steal credit card details/username/password, through email. Pharming – redirect genuine website’s traffic to their own site

Internet Use Issues ‘Skimming’ – stealing all the information on the card. Employees of call-in centers pass information to criminals Identity Theft – Usually occurs in the form of stolen credit card. Spyware – key loggers It happens when you download untrusted software from internet E-Mail Spam – un-solicited emails

Expert Systems Expert system is a computer which can replace a human expert in a particular subject area. It is used in places where human experts are rare.

How Expert Systems Work It has three components: User Interface – allows user to ask questions/answer questions and receive advice. Knowledge Base – a large collection of information & rules, collected from different sources. Inference Engine – Picks information from the knowledge base that matches the queries

Expert System - Design Knowledge Base Inference Engine User interface

Uses of Expert System Medical Diagnosis Strategy Games – Chess Financial Advice – Tax calculations Identify items – plant taxonomy Mineral prospecting Discover locations to drill for water / oil Diagnose Car problems

Computer Model It is a computer generated design that attempts to simulate a real world situation.

Computer Model are used for... For testing systems Predicting results Training people To investigate

Applications of Computer Model Designing cars and testing them Weather forecasting Construction of buildings Business predictions Training pilots

Flight Simulator

Flight Simulator - Advantages Safer – because pilots mistakes doesn’t cause accidents. No need to use real flights-they can be in service for other purpose Trainer can test the pilot by creating artificial flying situations (impossible in real flights)

Simulation - Testing cars Safer – can be done in the comfort of a room. Cheap – no need to destroy real cars for testing.