Presentation is loading. Please wait.

Presentation is loading. Please wait.

C OMPUTING E SSENTIALS 1999 2000 1999 2000 1999 2000 Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary.

Similar presentations


Presentation on theme: "C OMPUTING E SSENTIALS 1999 2000 1999 2000 1999 2000 Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary."— Presentation transcript:

1 C OMPUTING E SSENTIALS 1999 2000 1999 2000 1999 2000 Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary

2 9 9 Privacy, Security, Ergonomics and the Environment CHAPTER

3 3 Computing Essentials 1999 - 2000 Chapter 9 Competencies After reading this chapter, you should be able to: 1. Discuss the privacy issues raised by the presence of large databases, electronic networks, the Internet and the Web. 2. List the major laws on privacy. 3. Explain the effects of computer crimes, including the spreading of computer viruses.

4 4 Computing Essentials 1999 - 2000 Chapter 9 Competencies 4. Describe other hazards to the computer. 5. Discuss security measures that may be taken. 6. Describe ergonomics and how it helps avoid physical and mental risks. 7. Describe the four ethical issues: privacy, accuracy, property and access.

5 5 Computing Essentials 1999 - 2000 Chapter 9 Competencies 8. Discuss what the computer industry is doing to help protect the environment. 9. Discuss what you can do to help protect the environment.

6 6 Computing Essentials 1999 - 2000 Chapter 9 Overview Information systems do not operate in a vacuum People are important components Result is computer usage for both good and bad purposes What impact does information technology have on individuals and society?

7 Privacy Every computer user should be aware of ethical matters, including how databases and networks are used and the major privacy laws.

8 8 Computing Essentials 1999 - 2000 Chapter 9 Ethics Standards of moral conduct Computer ethics: morally acceptable use of computers Standards or guidelines are important in this industry, because technology changes are outstripping the legal system’s ability to keep up

9 9 Computing Essentials 1999 - 2000 Chapter 9 Ethics Four primary issues –Privacy - collection and use of data about individuals –Accuracy - responsibility of data collectors to ensure accuracy –Property - data ownership and software usage rights –Access - responsibility of data collectors to control access

10 10 Computing Essentials 1999 - 2000 Chapter 9 Large Databases Data collected and stored on citizens every day Collectors include –Government agencies - Federal government has 2,000 databases –Businesses

11 11 Computing Essentials 1999 - 2000 Chapter 9 Large Databases Social security numbers are often used as key fields in databases related to our employment, tax and credit activities This information has value - rise of the information reseller industry Information resellers provide this gathered data to others for a fee

12 12 Computing Essentials 1999 - 2000 Chapter 9 Large Databases Spreading information without consent –Blockbuster to sell video rental habits - dropped project –Lotus Development and Equifax - information on 120 million Americans - abandoned project under pressure –Some large companies using medical records as a factor in important personnel decisions

13 13 Computing Essentials 1999 - 2000 Chapter 9 Large Databases Spreading inaccurate information –Mistakes in one computer file can easily migrate to others –Inaccurate data may linger for years –Laws help individuals with correcting credit data and finding out what personal information is being maintained by government agencies

14 14 Computing Essentials 1999 - 2000 Chapter 9 Private Networks Currently legal for employers to monitor electronic mail - survey reported 20% do Most online services reserve the right to censor content Contentious issue over property rights versus free speech and privacy

15 15 Computing Essentials 1999 - 2000 Chapter 9 The Internet and the Web Little concerns about email privacy on the Web due to illusion of anonymity Browser records pages visited Web sites often employ programs called cookies to record times and pages visited, and credit card numbers

16 16 Computing Essentials 1999 - 2000 Chapter 9 Major Laws on Privacy

17 17 Computing Essentials 1999 - 2000 Chapter 9 Major Laws on Privacy

18 18 Computing Essentials 1999 - 2000 Chapter 9 Major Laws on Privacy

19 19 Computing Essentials 1999 - 2000 Chapter 9 Major Laws on Privacy

20 Security Threats to computer security are computer crimes, including viruses, electronic break-ins and natural and other hazards. Security measures consist of encryption, restricting access, anticipating disasters and making backup copies.

21 21 Computing Essentials 1999 - 2000 Chapter 9 Threats to Computer Security Computer criminals - those using computer technology to engage in Illegal action, four types –Employees - the largest category –Outside users - customers or suppliers –“Hackers” and “crackers” - hackers do it “for fun” but crackers have malicious intent –Organized crime - tracking illegal enterprises, forgery, counterfeiting

22 22 Computing Essentials 1999 - 2000 Chapter 9 Threats to Computer Security Computer crime can take various forms –Damage to computers, programs or files Viruses - migrate through systems attached to files and programs Worms - virus variants that continuously self- replicate –Theft Of hardware, software, data, computer time Software piracy - unauthorized copies of copyrighted material

23 23 Computing Essentials 1999 - 2000 Chapter 9 Threats to Computer Security - Viruses

24 24 Computing Essentials 1999 - 2000 Chapter 9 Threats to Computer Security Computer crime can take various forms –Manipulation “Unauthorized entry and “harmless message” still illegal Computer Fraud and Abuse Act of 1986 - no unauthorized viewing across state lines, of any government or federally insured institution computer Max sentence of 20 years in prison and $100,000

25 25 Computing Essentials 1999 - 2000 Chapter 9 Threats to Computer Security Other hazards –Natural –Civil strife and terrorism –Technological failures –Human errors

26 26 Computing Essentials 1999 - 2000 Chapter 9 Measures to Protect Computer Security Security involves protecting information, hardware and software from unauthorized use, damage from intrusions, sabotage and natural disasters Encrypting messages to frustrate interception, federal government wants standardized scheme to facilitate wire- tap of criminal enterprises

27 27 Computing Essentials 1999 - 2000 Chapter 9 Measures to Protect Computer Security Security involves protecting information, hardware and software from unauthorized use, damage from intrusions, sabotage and natural disasters Encrypting messages to frustrate interception, federal government wants standardized scheme to facilitate wire- tap of criminal enterprises

28 28 Computing Essentials 1999 - 2000 Chapter 9 Measures to Protect Computer Security Restricting access - both access to the hardware locations, and into the system itself Anticipating disasters - disaster recovery plan

29 29 Computing Essentials 1999 - 2000 Chapter 9 Measures to Protect Computer Security Backing up data Security for microcomputers –Avoid extreme conditions –Guard the computer –Guard programs and data

30 Ergonomics Ergonomics helps computer users take steps to avoid physical and mental health risks and to increase productivity.

31 31 Computing Essentials 1999 - 2000 Chapter 9 Physical Health Avoiding eyestrain and headache –Regular breaks every couple of hours –Avoid monitors that flicker –Control ambient light –Insure adequate monitor brightness –Keep all objects being focused on at the same distance

32 32 Computing Essentials 1999 - 2000 Chapter 9 Physical Health Avoiding back and neck pain –Have adjustable equipment –Adequate back support –Monitor at, or slightly below eye level

33 33 Computing Essentials 1999 - 2000 Chapter 9 Recommendations for the ideal microcomputer work environment

34 34 Computing Essentials 1999 - 2000 Chapter 9 Physical Health Avoiding effects of electromagnetic fields (EMF) –Some believe a connection to miscarriages and cancers –No statistical support yet –Exercise caution, particularly if pregnant

35 35 Computing Essentials 1999 - 2000 Chapter 9 Physical Health Avoiding repetitive strain injury (RSI) –Injuries from fast, repetitive work –Billions of dollars in claims and productivity losses every year –Carpal tunnel syndrome - nerve and tendon damage in hands and wrists; common with computer workers

36 36 Computing Essentials 1999 - 2000 Chapter 9 Mental Health Avoiding noise Avoiding stress from excessive monitoring –Workers electronically monitored have more health problems –Recently researchers have discovered what a common sense manager already knew: human monitoring yields more productivity than electronic

37 37 Computing Essentials 1999 - 2000 Chapter 9 Design Capabilities of microprocessor stimulate manufacturers to load on the features Often, the result is a product difficult to use Recent trend toward including fewer features

38 38 Computing Essentials 1999 - 2000 Chapter 9 Ergonomic keyboard

39 The Environment The computer industry has responded to the Energy Star program with the Green PC. You can help by conserving, recycling and educating.

40 40 Computing Essentials 1999 - 2000 Chapter 9 The Environment Microcomputers are the greatest user of electricity in the workplace, forecasted 10% by year 2000 Increased power consumption contributes to pollution and natural resource depletion

41 41 Computing Essentials 1999 - 2000 Chapter 9 The Green PC Heart of the Energy Star program developed by the Environmental Protection Agency (EPA) –System unit and display - minimize unnecessary energy consumption –Manufacturing - avoiding harmful chemicals in production, focus on chlorofluorocarbons (CFC’s) which some blame for ozone layer depletion

42 42 Computing Essentials 1999 - 2000 Chapter 9 The Green PC

43 43 Computing Essentials 1999 - 2000 Chapter 9 Personal Responsibility Conserve - turn computers off at end of work day, use screen savers Recycle - most of the paper we use is eligible Educate - know the facts about ecological issues

44 44 Computing Essentials 1999 - 2000 Chapter 9


Download ppt "C OMPUTING E SSENTIALS 1999 2000 1999 2000 1999 2000 Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary."

Similar presentations


Ads by Google