Copyright Prentice-Hall, Inc. 2001
Computers in Computers in Society: TodaySociety: TodayComputers in Computers in Society: TodaySociety: Today
Chapter 10Chapter 10
10-2Our Information SocietyOur Information Society
Monthly Monthly Technology Technology
Update Update
IT ParadoxIT Paradox
Working in the Information SocietyWorking in the Information Society
The WorkplaceThe Workplace
EthicsEthics
Security IssuesSecurity Issues
10-3IT ParadoxIT Paradox
Are we ready for IT?Are we ready for IT? Do we really want IT?Do we really want IT? We are reaching the point of no return!We are reaching the point of no return!
Information Technology is thriving in a Information Technology is thriving in a society that may not be ready for it.society that may not be ready for it.
10-4Why Choose an IT Career?Why Choose an IT Career?
Computer Systems Analyst called best job in AmericaComputer Systems Analyst called best job in America
Internet economy is growing at 20 times Internet economy is growing at 20 times the rate of the general economythe rate of the general economy
IT careers consistently ranked IT careers consistently ranked among the most desirable jobsamong the most desirable jobs
1 in every 10 jobs for IT specialists is open1 in every 10 jobs for IT specialists is open
10-5Working in the Working in the Information Society: IT JobsInformation Society: IT Jobs
Chief Information Officer (CIO)Chief Information Officer (CIO) Systems AnalystSystems Analyst Applications ProgrammerApplications Programmer Programmer/AnalystProgrammer/Analyst Network AdministratorNetwork Administrator System ProgrammerSystem Programmer
Jobs Jobs
Courtesy of Novell
10-6
Database Database Administrator (DBA)Administrator (DBA)
Internet Site SpecialistInternet Site Specialist WebmasterWebmaster Computer OperatorComputer Operator User LiaisonUser Liaison PC SpecialistPC Specialist
Working in the Working in the Information Society: IT JobsInformation Society: IT Jobs
Photo courtesy of Intel Corporation
10-7
Licensing not currently requiredLicensing not currently required Certifications offered by:Certifications offered by:
Institute for Certification of Computer Institute for Certification of Computer ProfessionalsProfessionals
MicrosoftMicrosoft NovellNovell
IT Competent MinorityIT Competent Minority Jobs are ChangingJobs are Changing
Working in the Working in the Information Society: IssuesInformation Society: Issues
10-8The WorkplaceThe Workplace
Cumulative trauma disorderCumulative trauma disorder
Carpal tunnel syndromeCarpal tunnel syndrome
Repetitive stress injuriesRepetitive stress injuries
Video operator’s distress syndromeVideo operator’s distress syndrome
Ergonomics:Ergonomics:
Study of the Study of the relationships betweenrelationships between
people and the people and the things we use.things we use.
10-10The WorkplaceThe Workplace
Workplace DesignWorkplace Design Include flexibilityInclude flexibility OSHA requirementsOSHA requirements Ergonomic considerationsErgonomic considerations
Green ComputingGreen Computing Energy Star guidelinesEnergy Star guidelines Less printingLess printing Recycle whenever possibleRecycle whenever possible
10-11Ethics: ACM Code of Ethics: ACM Code of ConductConduct
Contribute to society and human well-beingContribute to society and human well-being Avoid harm to othersAvoid harm to others Be honest and trustworthyBe honest and trustworthy Be fair and take action not to discriminateBe fair and take action not to discriminate Honor property rights including copyrights and Honor property rights including copyrights and
patentspatents Give proper credit for intellectual propertyGive proper credit for intellectual property Respect the privacy of othersRespect the privacy of others Honor confidentialityHonor confidentiality
General Moral ImperativesGeneral Moral Imperatives
http://www.acm.orghttp://www.acm.orghttp://www.acm.orghttp://www.acm.org
10-12Ethics: Misuse of Ethics: Misuse of Personal InformationPersonal Information
Sources of Personal DataSources of Personal Data Violating PrivacyViolating Privacy
Selling your informationSelling your information CookiesCookies
Computer MatchingComputer Matching Privacy Question: No Easy AnswersPrivacy Question: No Easy Answers Computer MonitoringComputer Monitoring
Ethics in ComputingEthics in Computing
40% of all white-40% of all white-collar workers are collar workers are
afraid of new afraid of new technology. This is technology. This is somewhat due to a somewhat due to a
fear of loss of fear of loss of privacy.privacy.
10-13Ethics: Computer CrimeEthics: Computer Crime
Law is not always clearLaw is not always clear Computer FraudComputer Fraud Negligence & IncompetenceNegligence & Incompetence Crackers (or Hackers)Crackers (or Hackers)
Evidence is called a footprintEvidence is called a footprint Crime on the InternetCrime on the Internet Software PiracySoftware Piracy
Computer Crime Computer Crime
10-14Computer, Internet, and Computer, Internet, and System SecuritySystem Security
White-Collar CrimeWhite-Collar Crime Computer VirusesComputer Viruses Natural DisastersNatural Disasters VandalismVandalism CarelessnessCarelessness
ThreatsThreats
10-15Computer-Center SecurityComputer-Center Security
HardwareHardware Use fault-tolerant designUse fault-tolerant design Install uninterruptible power source (UPS) Install uninterruptible power source (UPS)
for backupfor backup SoftwareSoftware
Minimize opportunities for unlawful Minimize opportunities for unlawful modification of softwaremodification of software
Use antiviral programsUse antiviral programs Protect and backup files/databasesProtect and backup files/databases
10-16Computer-Center SecurityComputer-Center Security
Data CommunicationsData Communications Employ cryptography Employ cryptography
technologytechnology Encryption/DecryptionEncryption/Decryption Secure Sockets Layer - SSLSecure Sockets Layer - SSL Digital IDDigital ID
PersonnelPersonnelSerendipitous Serendipitous
Surfing: Music Surfing: Music
Courtesy of E-Systems, Inc.
10-17Other Security IssuesOther Security Issues
Information Systems SecurityInformation Systems Security Physical SecurityPhysical Security Logical Security (ID and Password)Logical Security (ID and Password)
PC SecurityPC Security Acceptable Level of RiskAcceptable Level of Risk
Courtesy of Kensington Technology Group