VCE IT Theory Slideshows By Mark Kelly Vceit.com Practices that cause conflict.

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

VCE IT Theory Slideshows By Mark Kelly Vceit.com Problem Solving Methodology Analysis Activities Revised version: 2013.
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Rockingham County Public Schools Technology Acceptable Use Policy
VCE IT Theory Slideshows By Mark Kelly McKinnon Secondary College Vceit.com Intranet, Internet, VPN.
POSSIBLE THREATS TO DATA
IRUA V2.0. Introduction Welcome Tad Stahl, CISO Jeff Hicks, Business Systems Consultant
Woodland Hills School District Computer Network Acceptable Use Policy.
VCE IT Theory Slideshows - ITA By Mark Kelly Vceit.com Entity Relationship Diagrams (ERD)
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
USER DOCUMENTATION (Part of the development phase of the PSM) Mark Kelly
Managing Conflict in the Small Group Chapter 12 Effective Group Discussion: Theory and Practice.
VCE IT Theory Slideshows Mobile computing devices By Mark Kelly, Vceit.com iPhone.
VISD Acceptable Use Policy
IT Applications Theory Slideshows By Mark Kelly Vceit.com Legislation: © OPYRIGHT.
For Students of Humble ISD
VCE IT Theory Slideshows
IT Applications Theory Slideshows By Mark Kelly Vceit.com Types and contents of On-screen user documentation.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Websites & Data.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
File Management Mark Kelly vceit.com.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Characteristics of efficient and effective solutions.
IT Theory Slideshows ITA, SD, IT11 By Mark Kelly Vceit.com Project Management Overview.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Testing Network Security.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Online community & their tools.
Wayne County Public Schools Technology Usage and Policies.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Problem Solving Methodology 3 Development.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Toolooa SHS BYOD Parent Information Night. Why is BYOD (Bring Your Own Device)happening? The current hire devices were Federally funded and the funding.
Prepared by Haverford High School Students “Against All Odds”
VCE IT Theory Slideshows By Mark Kelly Vceit.com Problem Solving Methodology 1 Analysis.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Websites & Data.
Woodland Hills School District Computer Network Acceptable Use Policy.
Cybersafe and Secure BYHS ACCEPTABLE USE POLICY.  Access to Internet and computer resources should be for educational purposes.  Transmission of copyrighted.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Computer Security Sample security policy Dr Alexei Vernitski.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Call on students to identify a difference of opinion they have had with someone. List several of them on the writing surface. Ask students to mention.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
VCE IT Theory Slideshows
VCE IT Theory Slideshows
VCE IT Theory Slideshows – ITI Updated for 2016
VCE IT Theory Slideshows
Technology Guidelines for Students
PRACTICES CAUSING CONFLICT
IT Applications Theory Slideshows
VCE IT Theory Slideshows by Mark Kelly study design
VCE IT Theory Slideshows
VCE IT Theory Slideshows
Technology Guidelines for Students
VCE IT Theory Slideshows
VCE IT Theory Slideshows Updated for 2016
VCE IT Theory Slideshows
VCE IT Theory Slideshows
VCE IT Theory Slideshows
VCE IT Theory Slideshows
Woodland Hills School District
IT Applications Theory Slideshows
Presentation transcript:

VCE IT Theory Slideshows By Mark Kelly Vceit.com Practices that cause conflict

Contents Practices that cause conflict between stakeholders who use, or are affected by, solutions that operate within networked environments

‘Stakeholders’? People who stand to gain or lose from something People who have some sort of investment (e.g. time, money) in something People who are affected by something, for better or worse.

Causes of network conflict Using more than one’s fair share of resources (e.g. hogging the printer or bandwidth) Interfering with someone else’s work or workplace Spamming Failure to follow local conventions (e.g. filenaming)

Causes of network conflict Carelessly damaging equipment Carelessly deleting vital data Violation of Acceptable Use Policies Misuse of network privileges (e.g. Youtube during working hours)

Causes of network conflict Inappropriate downloads Sexual harassment using the network Using other people’s passwords Introducing security risks (e.g. opening Trojans, bringing viruses in on Flash drives, responding to phishing) Theft of equipment or software

Causes of network conflict Copyright violation Violation of the Privacy Act, Human Rights act, etc. Sending silly, unwanted jokes in s Sending s to the wrong people or groups

Causes of network conflict Revealing valuable corporate information to competitors Using unauthorised software Using unauthorised hardware (e.g. connecting an insecure WAP to a workstation, taking work home on a Flash drive or USB HDD)

Causes of network conflict Inequality of network resources given to different people Lack of response to urgent calls for help or repairs Unrealistic expectations of a system Poor quality hardware or software

Causes of network conflict Interference by management in areas they know little about Monitoring of workers by management Lack of support by management Clueless management

Causes of network conflict Lack of training opportunities offered by management Trolls who deliberately provoke people to anger Racism, sexism, religious intolerance

Causes of network conflict Failure to attend to your section of a collaborative task Making careless work errors that coworkers have to fix Leaving jammed printers for someone else to clear

Causes of network conflict Not replying promptly to urgent communications

Causes of network conflict Embedding workmates’ mice in jelly and other office pranks

Causes of network conflict … And other annoying pranks

Resolving conflict (Not key knowledge, but useful to know) Accommodation – giving someone what they want at your own expense. Avoidance - ignoring or postponing the conflict. Collaboration - working together to achieve more for each party than either would have gained in a win/lose outcome. Competition – beat the opponent so you get what you want. Compromise – each side agrees to accept less than they originally wanted so each enjoys some benefit.

By Mark Kelly vceit.com These slideshows may be freely used, modified or distributed by teachers and students anywhere on the planet (but not elsewhere). They may NOT be sold. They must NOT be redistributed if you modify them. VCE IT THEORY SLIDESHOWS