Download presentation
Presentation is loading. Please wait.
Published byStanley Booker Modified over 9 years ago
2
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible for Web site to customize pages for users. Spyware – is software that secretly gathers information about users while they browse the Web. Spyware can also interfere with user’s control of their computing by installing additional software and redirecting Web browser.
3
Adware- is a form of spyware that collects information about the user to display advertisement in the Web browser based on information it collects from the user browsing patterns. Phishing- is ending fraudulent e-mails that seen to come from legitimate sources such as a bank or university. Key Loggers- monitor and record keystrokes and can be software or hardware devices. However keyloggers can be use for malicious purposes. Sniffing- is capturing and recording network traffic. Spoofing- is an attempt to gain access to a network by posing as an authorized user to find sensitive information.
4
They’ve created some concerns about privacy workplace. For example some players search social networking sites, such as facebook or MySpace to find background information on applicants. E-mail- Is widely used it present some serious privacy. Spamming- unsolicited e-mail sent for advertising purposes.
5
Log File- which are generated by Web server software record users actions or a Web sites. 3. Ethical Issues of Information Technology Information system professionals believe that information technology offers many oportunities for unethical behavior. Censorship- Is the censoring of books, plays, films or reports, especially by government officials.
6
1. Public 2. Private Another type of censoring is restricting access to the Internet. Intellectual Property Is a legal umbrella covering protections that involve copyrights trademark secret and patents for creation of the mind. Cyber Squatting- is registering selling or using a domain name to profit from someone else trademark.
7
Social Divisions- social stratification resulting from the unequal distribution of wealth, power and prestige Digital Divide- information technology and the internet have created a digital divide. Computers still aren’t affordable for many people. The digital divide has implication for education. 2 types of societal group: 1. The information rich 2. The information poor
8
Information technologies have a direct effect on the nature of jobs. Have made some jobs more interesting by handling repetitive and boring tasks so some workers are more satisfied with their jobs. Virtual Organization- are network of independent companies, suppliers, customer, and manufacturers connected via information technologies so that they can share skills and cost have access to each others markets.
9
Information Technology and Health Issues The health problems are associated with the environment in which computers are used. Health problems related to computer equipment include vision problems. Recent health issue is the amount of tome some people spend on the Web playing games, participating in chat rooms and other activities.
10
Presented by: Richelle D. Ambrocio Presented to: Prof. Anecito Ganancial
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.