Social Issues. Employment change Computer Ethics Privacy Piracy Computer Crime Computer Viruses Data Protection and security.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Social Effects of ICT. AT WORK computers have Removed boring repetitive tasks in factories – now done by robots… Removed the need to do lots of calculations.
Security, Privacy, and Ethics Online Computer Crimes.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Data Protection Act. Lesson Objectives To understand the data protection act.
The laws Organizations are covered by lots of different laws
The Legal Framework Can you work out which slide each bullet point should go on?!
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Standard Grade Computing COMMERCIAL DATA PROCESSING CHAPTER 13.
Chapter 1 Introduction to Computer User Support
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Possible WebQuest type links  
Social Implications General Purpose Packages. Effects on Jobs & Careers Types of job Retraining Employment Working conditions Mail Shots Increased paper.
Social Impact of Computers
Understand applications and issues of technology. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Objective 2.04 Understand applications and issues of technology. 1.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
©Holm Publications Security Awareness Presentation.
Essential Standard 2.00 Understand the nature of business. 1.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Understand the nature of business. 1. Understand applications and issues of technology. 2.
SOCIAL IMPACT OF COMPUTERS
Computers and Business. Retail Kiosks Kiosks Point-of-sale terminals Point-of-sale terminals UPC UPC Debit cards Debit cards Social computing Social computing.
IT Professionalism Ethics Modified by Andrew Poon.
ICT in the Home. Introduction ICT is used today for entertainment It influences how people spend their time ICT is used for most every day tasks: tv,
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Ethical and Legal Practices in INFORMATION TECHNOLOGY.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Essential Standard 2.00 Understand the nature of business. 1.
Jobs have been lost and technical jobs have been created.
Essential Standard 2.00 Understand the nature of business. 1.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Social impacts of IT By Lewis dancocks. Social impacts Due to IT people around the world can commutate with each other anywhere at any time, this is due.
ETHICS IN USING COMPUTER
ESSENTIAL STANDARD 2.00 Understand the nature of business. 1.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Essential Standard 2.00 UNDERSTAND THE NATURE OF BUSINESS. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Chapter 11 Business and Technology Objective 2.04.
Copyright Computer crime and cyber security.
The impact of I.T on society
Legal and ethical issues
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computers and Business, Finance, and Marketing
Computer Ethics.
BCT 2.00 Analyze Technology Issues
– Communication Technology in a Changing World
Chapter 11 Business and Technology
Social Issues in Computing
Social Issues in Computing
Ethical Use of Computers
Presentation transcript:

Social Issues

Employment change Computer Ethics Privacy Piracy Computer Crime Computer Viruses Data Protection and security

Employment change Many jobs replaced by computers and robots Increase in efficiency and productivity New jobs produced Programmer, analyst, technician, operator, etc. Nature of jobs changed (office and factory automation) Computers/robots : Boring and repetitive work Human : management,design, control, research

Employment change Increase of decrease job opportunity ? Result : Fewer employees for large companies Retrained regularly to update IT knowledge Efficiency increased and working hours shortened Retirement age lowered (computers jobs favour the young)

Computer Ethics Moral guidelines for the use of computers and information systems Should not use computers without permission Should not disclose confidential information Should not copy or use software illegally Any more ?

Privacy Many companies, organizations, and the government kept a lot of our information Do they use, kept and destroy the data in a right way ? E.g. (junk) , phone calls, promotion letters Invasion of privacy : right to determine degree to which one is willing to share one ’ s info. Some companies sell customers ’ info. to others

Computer Crime Illegal access to info. thro ’ NW Illegal access to internet accounts thro ’ passwords and user-ids. Illegal transfer of money by modifying programs Illegal copying of copyrighted SW Damaging computer system on purpose Producing and spreading of virus programs

SW Copyright and Piracy Copyright - legal ownership of the duplication rights for computer SW Piracy – illegal copying of these SW