computers: information technology in perspective by long and long copyright 2002 prentice hall, inc....

16
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & IT Ethics & Healthy Healthy Computing Computing Chapter 8 Chapter 8

Post on 21-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

Computers: Information Technology in PerspectiveBy Long and Long

Copyright 2002 Prentice Hall, Inc.

IT Ethics & IT Ethics & Healthy Healthy

ComputingComputing

Chapter 8Chapter 8

Page 2: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

9.9.22 QuitQuit

Our Information SocietyOur Information Society

Monthly Technology Update

The WorkplaceThe WorkplaceThe WorkplaceThe Workplace

EthicsEthicsEthicsEthics

Security IssuesSecurity IssuesSecurity IssuesSecurity Issues

Page 3: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

9.9.33 QuitQuit

The WorkplaceThe Workplace

Cumulative trauma disorderCumulative trauma disorder

Carpal tunnel syndromeCarpal tunnel syndrome

Repetitive stress injuriesRepetitive stress injuries

Video operator’s distress syndromeVideo operator’s distress syndrome

Ergonomics:Ergonomics:

Study of the Study of the relationships betweenrelationships between

people and the people and the things we use.things we use.

Ergonomics

Page 4: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

9.9.44 QuitQuit

Workplace DesignWorkplace Design

Include flexibilityInclude flexibilityOSHA requirementsOSHA requirementsErgonomic Ergonomic

considerationsconsiderationsEmployee trainingEmployee training

A healthy, happy worker is a more productive worker.A healthy, happy worker is a more productive worker.

Page 5: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

9.9.55 QuitQuit

Common Abuses of ITCommon Abuses of IT

Send/receive frivolous e-mailNon-business Internet

browsingGaming on company timeToying with technology

Page 6: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

9.9.66 QuitQuit

Green ComputingGreen Computing

Environmentally sensible computingEnvironmentally sensible computingEnergy Star guidelinesEnergy Star guidelinesLess printingLess printingRecycle whenever possibleRecycle whenever possible

Page 7: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

9.9.77 QuitQuit

Who Knows What About Who Knows What About You?You?

Tax dataTax data Education dataEducation data Medical dataMedical data Driver and crime Driver and crime

datadata Census dataCensus data

Insurance data Insurance data Lifestyle dataLifestyle data Credit dataCredit data WWW dataWWW data MiscellaneousMiscellaneous

Social Security Number is Link!Social Security Number is Link!

Page 8: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

9.9.88 QuitQuit

Privacy of Personal Privacy of Personal InformationInformation

Sources of Personal DataSources of Personal Data Credit cards provide lifestyle profileCredit cards provide lifestyle profile Phone callsPhone calls InternetInternet

Violating PrivacyViolating Privacy Selling your informationSelling your information CookiesCookies

Page 9: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

9.9.99 QuitQuit

Privacy of Personal Privacy of Personal InformationInformation

Computer MatchingComputer Matching Used to identify individuals common to Used to identify individuals common to

separate databases that are engaged in separate databases that are engaged in wrongdoingwrongdoing

Garnishing wages for student loansGarnishing wages for student loans IRS creates lifestyle profilesIRS creates lifestyle profiles

New applicationsNew applications Background checks for airline passengersBackground checks for airline passengers

Securing integritySecuring integrity

There are no easy answers to the Privacy question

Page 10: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

9.9.1010 QuitQuit

Privacy of Personal Privacy of Personal InformationInformation

Computer monitoringComputer monitoring Most controversial applicationMost controversial application Measure worker performanceMeasure worker performance Often without worker’s knowledgeOften without worker’s knowledge E-mail monitoringE-mail monitoring

Page 11: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

9.9.1111 QuitQuit

Software PiracySoftware Piracy

Theft of intellectual propertyTheft of intellectual propertyFederal copyright law automatically Federal copyright law automatically

protects softwareprotects software Install on only one computerInstall on only one computerSite license for LANSite license for LANPilferagePilferage$250,000/5 years in jail possible$250,000/5 years in jail possibleNet poses big problemsNet poses big problems

Page 12: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

9.9.1212 QuitQuit

Security IssuesSecurity Issues

White-collar crimeWhite-collar crimeComputer virusesComputer virusesNatural disastersNatural disastersVandalismVandalismCarelessnessCarelessness

4 of every 5 business computer systems has been violated in some way.

Page 13: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

9.9.1313 QuitQuit

Computer-Center Computer-Center SecuritySecurity

HardwareHardware Use fault-tolerant designUse fault-tolerant design Install uninterruptible power source Install uninterruptible power source

(UPS) for backup(UPS) for backupSoftwareSoftware

Minimize opportunities for unlawful Minimize opportunities for unlawful modification of softwaremodification of software

Use antiviral programsUse antiviral programs IBM’s electronic immune systemIBM’s electronic immune system Generations of backupsGenerations of backups

Serendipitous Surfing: Music

Page 14: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

9.9.1414 QuitQuit

Computer-Center Computer-Center SecuritySecurity

Data CommunicationsData Communications Employ cryptography Employ cryptography

technologytechnology Encryption/DecryptionEncryption/Decryption Secure Sockets Layer - SSLSecure Sockets Layer - SSL Digital IDDigital ID E-signatureE-signature

PersonnelPersonnel

Courtesy of E-Systems, Inc.

Page 15: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

9.9.1515 QuitQuit

Other Security IssuesOther Security Issues

Information systems securityInformation systems security Physical securityPhysical security Logical security (ID and password)Logical security (ID and password)

PC securityPC security Lock and keyLock and key Badge readerBadge reader ID and passwordID and password

Acceptable level of riskAcceptable level of risk

Courtesy of Kensington Technology Group

Page 16: Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8

Computers: Information Technology in PerspectiveBy Long and Long

Copyright 2002 Prentice Hall, Inc.

End of Chapter End of Chapter 88

End of Chapter End of Chapter 88