C OMPUTING E SSENTIALS Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary
9 9 Privacy, Security, Ergonomics and the Environment CHAPTER
3 Computing Essentials Chapter 9 Competencies After reading this chapter, you should be able to: 1. Discuss the privacy issues raised by the presence of large databases, electronic networks, the Internet and the Web. 2. List the major laws on privacy. 3. Explain the effects of computer crimes, including the spreading of computer viruses.
4 Computing Essentials Chapter 9 Competencies 4. Describe other hazards to the computer. 5. Discuss security measures that may be taken. 6. Describe ergonomics and how it helps avoid physical and mental risks. 7. Describe the four ethical issues: privacy, accuracy, property and access.
5 Computing Essentials Chapter 9 Competencies 8. Discuss what the computer industry is doing to help protect the environment. 9. Discuss what you can do to help protect the environment.
6 Computing Essentials Chapter 9 Overview Information systems do not operate in a vacuum People are important components Result is computer usage for both good and bad purposes What impact does information technology have on individuals and society?
Privacy Every computer user should be aware of ethical matters, including how databases and networks are used and the major privacy laws.
8 Computing Essentials Chapter 9 Ethics Standards of moral conduct Computer ethics: morally acceptable use of computers Standards or guidelines are important in this industry, because technology changes are outstripping the legal system’s ability to keep up
9 Computing Essentials Chapter 9 Ethics Four primary issues –Privacy - collection and use of data about individuals –Accuracy - responsibility of data collectors to ensure accuracy –Property - data ownership and software usage rights –Access - responsibility of data collectors to control access
10 Computing Essentials Chapter 9 Large Databases Data collected and stored on citizens every day Collectors include –Government agencies - Federal government has 2,000 databases –Businesses
11 Computing Essentials Chapter 9 Large Databases Social security numbers are often used as key fields in databases related to our employment, tax and credit activities This information has value - rise of the information reseller industry Information resellers provide this gathered data to others for a fee
12 Computing Essentials Chapter 9 Large Databases Spreading information without consent –Blockbuster to sell video rental habits - dropped project –Lotus Development and Equifax - information on 120 million Americans - abandoned project under pressure –Some large companies using medical records as a factor in important personnel decisions
13 Computing Essentials Chapter 9 Large Databases Spreading inaccurate information –Mistakes in one computer file can easily migrate to others –Inaccurate data may linger for years –Laws help individuals with correcting credit data and finding out what personal information is being maintained by government agencies
14 Computing Essentials Chapter 9 Private Networks Currently legal for employers to monitor electronic mail - survey reported 20% do Most online services reserve the right to censor content Contentious issue over property rights versus free speech and privacy
15 Computing Essentials Chapter 9 The Internet and the Web Little concerns about privacy on the Web due to illusion of anonymity Browser records pages visited Web sites often employ programs called cookies to record times and pages visited, and credit card numbers
16 Computing Essentials Chapter 9 Major Laws on Privacy
17 Computing Essentials Chapter 9 Major Laws on Privacy
18 Computing Essentials Chapter 9 Major Laws on Privacy
19 Computing Essentials Chapter 9 Major Laws on Privacy
Security Threats to computer security are computer crimes, including viruses, electronic break-ins and natural and other hazards. Security measures consist of encryption, restricting access, anticipating disasters and making backup copies.
21 Computing Essentials Chapter 9 Threats to Computer Security Computer criminals - those using computer technology to engage in Illegal action, four types –Employees - the largest category –Outside users - customers or suppliers –“Hackers” and “crackers” - hackers do it “for fun” but crackers have malicious intent –Organized crime - tracking illegal enterprises, forgery, counterfeiting
22 Computing Essentials Chapter 9 Threats to Computer Security Computer crime can take various forms –Damage to computers, programs or files Viruses - migrate through systems attached to files and programs Worms - virus variants that continuously self- replicate –Theft Of hardware, software, data, computer time Software piracy - unauthorized copies of copyrighted material
23 Computing Essentials Chapter 9 Threats to Computer Security - Viruses
24 Computing Essentials Chapter 9 Threats to Computer Security Computer crime can take various forms –Manipulation “Unauthorized entry and “harmless message” still illegal Computer Fraud and Abuse Act of no unauthorized viewing across state lines, of any government or federally insured institution computer Max sentence of 20 years in prison and $100,000
25 Computing Essentials Chapter 9 Threats to Computer Security Other hazards –Natural –Civil strife and terrorism –Technological failures –Human errors
26 Computing Essentials Chapter 9 Measures to Protect Computer Security Security involves protecting information, hardware and software from unauthorized use, damage from intrusions, sabotage and natural disasters Encrypting messages to frustrate interception, federal government wants standardized scheme to facilitate wire- tap of criminal enterprises
27 Computing Essentials Chapter 9 Measures to Protect Computer Security Security involves protecting information, hardware and software from unauthorized use, damage from intrusions, sabotage and natural disasters Encrypting messages to frustrate interception, federal government wants standardized scheme to facilitate wire- tap of criminal enterprises
28 Computing Essentials Chapter 9 Measures to Protect Computer Security Restricting access - both access to the hardware locations, and into the system itself Anticipating disasters - disaster recovery plan
29 Computing Essentials Chapter 9 Measures to Protect Computer Security Backing up data Security for microcomputers –Avoid extreme conditions –Guard the computer –Guard programs and data
Ergonomics Ergonomics helps computer users take steps to avoid physical and mental health risks and to increase productivity.
31 Computing Essentials Chapter 9 Physical Health Avoiding eyestrain and headache –Regular breaks every couple of hours –Avoid monitors that flicker –Control ambient light –Insure adequate monitor brightness –Keep all objects being focused on at the same distance
32 Computing Essentials Chapter 9 Physical Health Avoiding back and neck pain –Have adjustable equipment –Adequate back support –Monitor at, or slightly below eye level
33 Computing Essentials Chapter 9 Recommendations for the ideal microcomputer work environment
34 Computing Essentials Chapter 9 Physical Health Avoiding effects of electromagnetic fields (EMF) –Some believe a connection to miscarriages and cancers –No statistical support yet –Exercise caution, particularly if pregnant
35 Computing Essentials Chapter 9 Physical Health Avoiding repetitive strain injury (RSI) –Injuries from fast, repetitive work –Billions of dollars in claims and productivity losses every year –Carpal tunnel syndrome - nerve and tendon damage in hands and wrists; common with computer workers
36 Computing Essentials Chapter 9 Mental Health Avoiding noise Avoiding stress from excessive monitoring –Workers electronically monitored have more health problems –Recently researchers have discovered what a common sense manager already knew: human monitoring yields more productivity than electronic
37 Computing Essentials Chapter 9 Design Capabilities of microprocessor stimulate manufacturers to load on the features Often, the result is a product difficult to use Recent trend toward including fewer features
38 Computing Essentials Chapter 9 Ergonomic keyboard
The Environment The computer industry has responded to the Energy Star program with the Green PC. You can help by conserving, recycling and educating.
40 Computing Essentials Chapter 9 The Environment Microcomputers are the greatest user of electricity in the workplace, forecasted 10% by year 2000 Increased power consumption contributes to pollution and natural resource depletion
41 Computing Essentials Chapter 9 The Green PC Heart of the Energy Star program developed by the Environmental Protection Agency (EPA) –System unit and display - minimize unnecessary energy consumption –Manufacturing - avoiding harmful chemicals in production, focus on chlorofluorocarbons (CFC’s) which some blame for ozone layer depletion
42 Computing Essentials Chapter 9 The Green PC
43 Computing Essentials Chapter 9 Personal Responsibility Conserve - turn computers off at end of work day, use screen savers Recycle - most of the paper we use is eligible Educate - know the facts about ecological issues
44 Computing Essentials Chapter 9