UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
4-1. Business in a Changing World McGraw-Hill/Irwin Copyright © 2009 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Managing Information.
Social Effects of ICT. AT WORK computers have Removed boring repetitive tasks in factories – now done by robots… Removed the need to do lots of calculations.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Understand applications and issues of technology. 1.
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 11 SLIDE Computer Systems Business Applications.
EFFECTS & USES OF ICT.
ELECTRONIC COMMERCE. CONTEXT: Definition of E-Commerce. History of E-Commerce. Advantages and Disadvantages of E-Commerce. Types of E-Commerce. E-Commerce.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Introduction to Business © Thomson South-Western ChapterChapter Business and Technology Computer Systems Business Applications of Technology.
Understand applications and issues of technology. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Objective 2.04 Understand applications and issues of technology. 1.
4-1 Technology – Impact on Our Lives Information technology– processes and applications that create new methods to solve problems, perform tasks, and manage.
Click to begin Click to begin Mr. Thomas Chapter 11.
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 11 SLIDE 1 DEFINE KEY TERMS ●computer system ●hardware ●software.
Essential Standard 2.00 Understand the nature of business. 1.
Unethical use of Computers and Networks
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 11 SLIDE Computer Systems Business Applications.
Understand the nature of business. 1. Understand applications and issues of technology. 2.
Introduction to Business © Thomson South-Western ChapterChapter Business and Technology Computer Systems Business Applications of Technology.
STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES.
 Understand the nature of business. 1.  Understand applications and issues of technology. 2.
Understand applications and issues of technology. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Chapter 10 Electronic Commerce. E-commerce is the buying and selling of products and services electronically over the Internet.
Essential Standard 2.00 Understand the nature of business. 1.
Security and Ethics Safeguards and Codes of Conduct.
CHAPTER 11 BUSINESS & TECHNOLOGY.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ESSENTIAL STANDARD 2.00 Understand the nature of business. 1.
© 2012 Cengage Learning. All Rights Reserved. Objective 2.04 Understand applications and issues of technology SLIDE 1 Objective 2.00 Understand the nature.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Essential Standard 2.00 UNDERSTAND THE NATURE OF BUSINESS. 1.
Essential Standard 2.00 Understand the nature of business. 1.
OBJECTIVE 2.02: ACQUIRE A FOUNDATIONAL KNOWLEDGE OF INFORMATION MANAGEMENT TO UNDERSTAND ITS NATURE AND SCOPE.
Essential Standard 2.00 Understand the nature of business. 1.
Intro to Business, 7e © 2009 South-Western, Cengage Learning SLIDE Chapter 11 1 CHAPTER Computer Systems Business Applications of.
Chapter 11 Business and Technology Objective 2.04.
Objective 2.02: Acquire a foundational knowledge of information management to understand its nature and scope.
Essential Standard 2.00 Objective 2.04
Information Technology
Understand the nature of business.
Principles of Business Objective 2.04
Chapter 17 Your Future with Technology
Objective 2.02: Acquire a foundational knowledge of information management to understand its nature and scope.
Essential Standard 2.00 Objective 2.04
Five Unethical Uses of Computers
Chapter 11 Business Applications of Technology Section 2
BCT 2.00 Analyze Technology Issues
Essential Standard 2.00 Objective 2.04
11 Business and Technology 11-1 Computer Systems
Chapter 11 Business and Technology
Business and Technology
Other Technology Issues Jasmine Florence
11 Business and Technology 11-1 Computer Systems
Understand the nature of business.
Business Applications of Technology
Understand the nature of business.
Presentation transcript:

UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04

Topics 2 Businesses use of technology Concerns of using technology

Parts of the Computer

Comparing Sizes of Computers

Alternative Input Devices

6 Business Technology Applications What are computer networks? Computer networks are computers linked in a school or business so users can share hardware, software, and data. Davie High is part of the DCS network. We have over 300 computers. Networking allows students to access previously saved information anywhere in the building or at other schools in the system.

7 Internet Public network used most often for:  ing  Accessing the World Wide Web (WWW) Intranet Private network primarily used to share:information WITHIN a business Only members or employees can utilize Effective tool for sharing information, saving time & money Examples of Computer Networks

Applications of Technology by Businesses 8 What is artificial intelligence (AI)? software that enables computers to reason learn and make decisions. Example: voice recognition software Why is Computer- aided design (CAD) used? used to create product styles and designs. Examples:  Design for a camera  Drawings for homes, buildings, equipment  Electronic prototypes

9 Computer Assisted Design Example

Business Technology Applications 10 Computer assisted Instruction  Used in education  Help people improve skills at their own pace Financial activities  Bill paying online, checking credit report, selling stocks Telemedicine  Video conferencing from remote areas so patients have access to diagnosis by doctor in another location Public records  Military records  Social security  Medical information  Police records

Technology Applications by Businesses 11 What is E-commerce? E-commerce is conducting business transactions using the Internet or other technology.  *E=electronic

Common E-Commerce Activities 12 Providing product information Promoting/marketing a company Selling online Conducting market research Collecting/making payments on line Obtaining parts and supplies Tracking shipments

E-Commerce Examples 13 Message on your cell phone screen from a business advertising their sale Ebay- online auction Website that asks market survey questions and give prizes for participation

Four Basic E-commerce Models 14 B2C: Business-to-Consumer  Example: Lands’ End.com selling swimwear to expecting mothers B2B: Business-to-Business  Example: Staples.com ships office supplies to local hospitals C2B: Consumer-to-Business  Example: Customers completing on-line surveys in order to provide feedback to Dunkin’ Donuts C2C: Consumer-to-Consumer  Example: Customer buying electronics from other customers through eBay.com

Expert Systems 15 How do expert systems help people? Expert systems are computer programs that help people solve technical problems including medical services, financial planning, and legal matters. Examples: -Automotive parts electronic catalogues -Quicken books -Peachtree Accounting

Management Information Systems (MIS) 16 An ordered system of processing and reporting information in an organization Management uses information to make business decisions. Four main components of a MIS:  Gathering data  Analyzing data  Storing data  Reporting results

MIS Categories of Information 17 Financial  Information for budgets and financial reports and statements Production and inventory  Information for production summaries and supplies Marketing and sales  Information to determine customer needs, economic conditions, and competitors action Human resources  Information about employees’ salaries, benefits and evaluations

Business Applications of Technology 14 What is robotics ? mechanical devices are programmed to do routine tasks, such as those seen on an assembly line in factories Robots can:  Work underground  Work under water  Work in outer space  Work 24 hours/7days a week  Work in humanly impossible situations

Vacuum Cleaner

Telecommuting What happens during telecommuting activities? Workers use computers off-site (at home) to do a job, saving travel time and costs. Works well for occupations:  Writers  Editors  Accountants  Computer Programmers  Web designers Workers send reports, documents, & ideas to employers via , fax, videoconferencing 20

Business Applications Financial activities  Bill pay online  Direct deposit  Electronic Funds Transfer  Selling stocks  Completing tax returns  Checking credit reports Public Records  Military records  Social security  Medical information  Police records Telemedicine  Video conferencing from remote locations so patients have access to diagnosis by doctor in another location  Using robotics for surgical procedures 21

Computer Assisted Instruction Advantages  Learner proceeds at own ability level and pace  Learner has necessary tools to learn material  Company/trainer can deliver same training to every user  Offers flexibility in timing and outcomes Disadvantages  Lack of personal contact with a teacher may be detrimental to the student  Learner must be self motivated  Learner must be technology savvy  Learner must have access to computer  Limited professional training given 22

23 Concerns of Using Technology Ethics moral guidelines that govern the use of computers and information systems Employment Trends Shift in duties and skills needed in the workplace. Companies retrain displaced workers who are unemployed because of changing job conditions. Computer literacy is vital.  Literacy the ability to enter, store, process, and retrieve information.

24 Concerns-Computer Crimes A computer virus is a hidden program code in a system that can do damage to software or stored data.  How many people have encountered a computer virus?  Will someone tell how they removed the virus? Viruses may be programmed to become active :  At a specific date  When certain keystrokes are made  When certain data is accessed

Types of Viruses Bomb - Destructive computer code or virus designed to activate at a specific time Hoax - A program intended to scare users into thinking they have a virus Phage - A program that modifies other programs, operating systems, and databases on a Personal Digital Assistant Trojan Horse - A virus disguised as a useful piece of software Virus - A computer program designed to cause damage to computer files Worm Destructive computer program that bores its way through a computer network 25

Copyright Protection of intellectual property Gives owner/creator exclusive rights to reproduce or distribute copies of his/her own work Examples:  Poetry, novels, plays  Computer software & video games  Musical scores & lyrics Copyrights last 70 years 26

27 Theft Concerns How many people have access to software that has been copied to a CD by a personal contact? Did that person commit an act of piracy? Piracy -stealing or illegally copying software packages or information Copyright infringement - the illegal copying of proprietary (property of another) works

White Collar Crimes An illegal act carried out by office or professional workers while at work including: stealing money, information, or computer time through improper use of computer systems. Would you be afraid of this person? Check out this website and see what he did collar-criminals #james-t-hammes-2

29 Health Concerns of Using Technology Eyestrain and vision problems Muscle tension and nerve damage  Ergonomically poor equipment Carpal tunnel syndrome  A repetitive stress syndrome Lack of physical exercise & obesity

Privacy Concerns of Using Technology 30 Dishonest people have access to customer records. Companies have changed which employees as well as other people that may have access to customer records. To protect customers, some companies are:  Increasing database security  Changing access codes multiple times during day  Becoming more strict about who has access  Purchasing tighter security systems Laws are changing but can’t keep up with technology.

Identity Theft Thieves:  Obtain information online  Apply for credit cards  Access bank account information Do not give private information out over the internet or phone unless you know the site is secure! der.com/americas-most- wanted-white-collar- criminals #leonard-weston- ramey-12 der.com/americas-most- wanted-white-collar- criminals #leonard-weston- ramey-12 Check out the website and see how many identities this man has had. 31

Frank William Abagnale, Jr. Known as a cheque forger, skilled impostor, and escape artist.forgerimpostor escape artist Notorious in the 1960s for successfully passing US$2.5 million worth of meticulously forged checks across 26 countries over the course of five years, beginning when he was 16 years old. US$forged checks Assumed no fewer than eight separate identities, successfully impersonating an airline pilot, a doctor, a Bureau of Prisons agent, and a lawyer all before he was 21 years old.airline pilotdoctorBureau of Prisonslawyer 32

Protecting Your Information Antivirus program  Detects viruses and repairs files Encryption  Converts readable data into unreadable characters to prevent unauthorized access Hacker  Person who secretly gains access to computers and files without permission Password (access code)  Safeguard for access to a computer program  Should be unique  Should be private  Should be changed 33 Utilize antivirus programs, encryption; select passwords carefully and change often to reduce the risk of hackers accessing your personal information.