Download presentation
Presentation is loading. Please wait.
Published byBernadette Hart Modified over 8 years ago
1
Grace Campbell
2
o The change in organisation has increased in technical departments. The areas of increased unemployment has arisen. Some jobs have been lost as a result of computers being used to do the same work that people used to do. o The areas of increased employment has also altered. Although many employment areas have suffered job losses, other regions have developed and jobs have been created. o Some examples of areas where jobs have been created – IT Technicians, Computer Programmers, Web Designers and Help-Desk Staff. CHANGE IN ORGANISATION
3
o Reliance on computers can be observed on every business organisation o With heavy volume of complicated tasks, employees need to be able to use something that will allow them to work faster and more efficiently. o The help of computers helps workers find it easier to fulfil tasks. o Apart from being use in commercial settings, computers also play a big role in everyday lives of people. RELIANCE ON COMPUTERS
4
o The reduced number of employees has increased in technical departments but decreased in others. o Many factories have fully automatic production lines. Instead of using people to build things, computer-controlled robots are used. o Offices used to employee many office assistants to help produce the documents essential for the business to run, now people have personal computers, they tend to type and print their own papers. o It used to take a team of highly skilled printers to types a newspaper page and to then print thousands of newspapers, the same task can now be done far more quickly using computers with DTP software and computer- controlled printing presses. REDUCED NUMBER OF EMPLOYEES
5
o The process of putting new information system online and retiring the old system is known as system changeover. o There are four changeover methods. One of which is: o Direct Cutover: This is the approach which causes the changeover from the old system to the new system to occur immediately when the new system is operational. o It is the least expensive but involves more risks than other changeover methods. o There have been lots of changeover in the organizations. This is because of new software and new ideas on how to make your internet faster. CHANGEOVER
6
o Even when you oversee self-monitoring employees, its important to check – in with them from time to time to provide managerial support and keep the communication streams open. o Employees who monitor themselves are used to having their independence and freedom when it comes to where they work, when they work and how they work. o To maintain a productive and successful organization, managing self- monitoring employees is an important part of the process of the organization, so that’s why they need them to make profit as a business. INCREASED NUMBER IN EMPLOYEES
7
o Advantages – you wont have to travel to meetings, cuts company fuel bills, its better for the environment o Disadvantages – not as personal, time zones are going to be different in parts of the world, the technology you use may fail to work, have to employ somebody to set up the equipment, VIDEO CONFERENCING
8
o The widespread diffusion of information and communication technologies has helped to make technology a part of our daily lives. o ICT is part of every day life and subjects. SOCIAL IMPACT OF I.T ON INDIVIDUALS
9
Advantages – use of encryption, circuit switching (packet switching for mail delivery). Disadvantages – no employees, missing faculties TRANSMISSION OF INFO WORLDWIDE
10
o Increase in identity theft - Identity theft happens when fraudsters access an adequate amount of information about someone’s identity this is includes their name, date of birth and current or previous addresses. When they have this information, they use it to commit identity fraud. o Identity theft is able to take place whether the fraud victim is alive or deceased. o Identity fraud – It can be described as the use of that stolen identity in criminal activity to obtain goods or services by deception. o Fraudsters can use your identity details to - open bank accounts, obtain credit cards, order goods in your name, take over your existing accounts, obtain genuine documents such as passports and driving licenses. RISKS OF ICT ON SOCIETY
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.