Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10
10-2 Our Information Society MonthlyTechnologyUpdate IT Paradox Working in the Information Society The Workplace Ethics Security Issues
10-3 IT Paradox l Are we ready for IT? l Do we really want IT? l We are reaching the point of no return! Information Technology is thriving in a society that may not be ready for it.
10-4 Why Choose an IT Career? Computer Systems Analyst called best job in America Internet economy is growing at 20 times the rate of the general economy IT careers consistently ranked among the most desirable jobs 1 in every 10 jobs for IT specialists is open
10-5 Working in the Information Society: IT Jobs l Chief Information Officer (CIO) l Systems Analyst l Applications Programmer l Programmer/Analyst l Network Administrator l System Programmer Jobs Courtesy of Novell
10-6 l Database Administrator (DBA) l Internet Site Specialist l Webmaster l Computer Operator l User Liaison l PC Specialist Working in the Information Society: IT Jobs Photo courtesy of Intel Corporation
10-7 l Licensing not currently required l Certifications offered by: u Institute for Certification of Computer Professionals u Microsoft u Novell l IT Competent Minority l Jobs are Changing Working in the Information Society: Issues
10-8 The Workplace Cumulative trauma disorder Carpal tunnel syndrome Repetitive stress injuries Video operator’s distress syndrome Ergonomics: Study of the relationships between people and the things we use.
10-9 And yet another possible ergonomic activity...
10-10 The Workplace l Workplace Design u Include flexibility u OSHA requirements u Ergonomic considerations l Green Computing u Energy Star guidelines u Less printing u Recycle whenever possible
10-11 Ethics: ACM Code of Conduct l Contribute to society and human well-being l Avoid harm to others l Be honest and trustworthy l Be fair and take action not to discriminate l Honor property rights including copyrights and patents l Give proper credit for intellectual property l Respect the privacy of others l Honor confidentiality General Moral Imperatives
10-12 Ethics: Misuse of Personal Information l Sources of Personal Data l Violating Privacy u Selling your information u Cookies l Computer Matching l Privacy Question: No Easy Answers l Computer Monitoring Ethics in Computing 40% of all white- collar workers are afraid of new technology. This is somewhat due to a fear of loss of privacy.
10-13 Ethics: Computer Crime l Law is not always clear l Computer Fraud l Negligence & Incompetence l Crackers (or Hackers) u Evidence is called a footprint l Crime on the Internet l Software Piracy Computer Crime
10-14 Computer, Internet, and System Security l White-Collar Crime l Computer Viruses l Natural Disasters l Vandalism l Carelessness Threats
10-15 Computer-Center Security l Hardware u Use fault-tolerant design u Install uninterruptible power source (UPS) for backup l Software u Minimize opportunities for unlawful modification of software u Use antiviral programs u Protect and backup files/databases
10-16 Computer-Center Security l Data Communications u Employ cryptography technology u Encryption/Decryption u Secure Sockets Layer - SSL u Digital ID l Personnel Serendipitous Surfing: Music Courtesy of E-Systems, Inc.
10-17 Other Security Issues l Information Systems Security u Physical Security u Logical Security (ID and Password) l PC Security l Acceptable Level of Risk Courtesy of Kensington Technology Group
Copyright Prentice-Hall, Inc End of Chapter 10 Interactive Study Guide