Download presentation
Presentation is loading. Please wait.
1
Applications Software: End User Applications
Lecture Series 2 Applications Software: End User Applications
2
Types of Software Software can be divided into two types: 1) System software, and 2) Application software (End-user applications) This slide and the next discuss four main technology trends that raise ethical issues. Which of these trends do students believe might have the most adverse consequences? Why do they feel this way? Do the positives outweigh the negatives for all four issues? Why or why not?
3
End User Classifications
We can look at the end user classifications from different perspective. Following figure shows the categories of end users This slide and the next discuss four main technology trends that raise ethical issues. Which of these trends do students believe might have the most adverse consequences? Why do they feel this way? Do the positives outweigh the negatives for all four issues? Why or why not?
4
Resources End-Users Need
To use end user applications the users need a combination of resources These resources are: Basic hardware Add-on peripherals (devices) Hardware maintenance and upgrades Software and software upgrades Supplies Data and information Technical support Facilities, administration, and overhead: Total Cost of Ownership includes all kind of cost that includes acquisition, facilities, support and upgrade Online profiling is one of the most controversial computer-related ethical, social and political issues today. While it is used fairly extensively on the Internet, it is also used by insurance firms, health insurance firms, casinos, and of course national authorities around the globe for finding potential terrorists.
5
End Users Applications Software
Electronic mail and instant messaging Web browser Word processing Spreadsheet DBMS Graphics Planning and scheduling Desktop publishing Web site development Educational and entertainment Mainframe applications Explain that NORA is used by both the government and the private sector for its profiling capabilities. Ask students to provide potential examples of NORA (other than the one mentioned in the caption) for both governmental and business purposes. One such example might be an airline identifying potential terrorists attempting to board a plane. Another might government identifying potential terrorists by monitoring phone calls.
6
Problems With End-User Computing
Waste: Money, time, energy Piracy: Breach of copyright Mistakes: Small mistake may lead to huge loss Invasion of privacy: Unauthorized access by hackers, co- workers Health problems: Carpal Tunnel Syndrome, Eye strain Computer crime: Lack of security measures Computer virus: Malware Loss of data: Hardware, software, and network fails may lead to lost data. Data backup must be done. Do students believe that any aspect of ethical analysis is lacking from this process? If so, what? Can students offer a brief example of an ethical dilemma and how they would resolve it using this process? One class exercise is to work with students to identify an ethical situation they are aware of, or that may have been in the news. Then, go through the ethical analysis described in the slide to illustrate the process of analyzing an ethical situation.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.