Sie sind auf Seite 1von 59

TRENDS AND ISSUES

Artificial Intelligence
Web Technology

Ecommerce

Security

Health Issues

Information Ethics
Artificial Intelligence
The science and engineering of making
intelligent machines, especially intelligent
computer programs
Specific Applications
Game playing
Speech recognition
Understanding natural language
Computer vision
Expert systems
Heuristic classification
Artificial Intelligence
Turing Test
Is designed to satisfactorily identify if the machine is
intelligent
To pass the test, the machine should possess the
following:
Natural language processing to enable it to communicate
successfully
Knowledge representation to store information provided before
or during the interrogation
Machine learning to adapt to new circumstances and to detect
and extrapolate patterns
Computer vision to perceive objects
Robotics to move about
Web Technology
Internet
Refers to a collection of computers and cables
forming a communications network
Is intended to carry computer data, similar to
telephone network which is intended to carry
conversations
Carries a various data, including e-mail,
videoconferences, instant messages, and
contents of Web pages
Web Technology
Intranet
Is a private network contained in an enterprise
that includes connections through one or more
gateway computers to the outside internet
Extranet
Is a private network that uses Internet
technology and the public telecommunication
system to securely share part of a business
information or operations with suppliers,
vendors, partners, customers, or other
businesses
Web Technology

Web browser
Is an application software allowing users to
access and view web pages
Web page
Is a page consisting of HTML documents stored
on a web server
Web site
Is a collection of connected web pages stored
on a web server
Web Technology

Hypertext
Is a computer system that could store literary
documents, link them according to logical
relationships, and permit readers to comment
and annotate what they read
HTML (Hypertext Markup Language)
Refers to plain text, or ASCII, document with
embedded HTML tags
Web Technology
Other Internet Services
Electronic Mail
File Transfer Protocol (FTP)
Newsgroup and Message Boards
Mailing Lists
Chat Rooms
Instant Messaging
Internet Telephony
Web Technology
Types of Web sites
Portal
News
Informational
Business/Marketing
Educational
Entertainment
Advocacy
Blog (Web Log)
Personal
Web Technology

Search Engine
Is a program that finds web sites and pages
Helps the user find particular information
about certain topics or locate particular web
pages for which they do not know the exact
web address
Is a search text box is available where you will
enter your topic or subject to research
Web Technology

Popular Search Engine


Google
Is the largest search engine in the web whose
purpose is to organize the worlds information and
make it universally accessible and useful
Yahoo! (Yet Another Hierarchical Officious
Oracle)
Is the first navigational portal to the web by Jerry
Yang and David Filo
E-commerce
Is an emerging concept that describes the
process of buying and selling or exchanging of
products, services, and information via
computer networks including the Internet
Can be defined from different perspectives
Communications perspective
Business process perspective
Service perspective
Online perspective
E-commerce

Origins and Growth of E-commerce


Electronic Fund Transfers (EFT)
Refers to the electronic transmissions of account
exchange information over private networks
Electronic Data Interchange (EDI)
Occurs when one business transmits computer-
readable data in a standard format to another
business
E-commerce

Features of E-commerce Technology


Ubiquitous
Global reach
Universal standards
Richness
Interactivity
Information density
Personalization
E-commerce
Advantages of E-commerce
Benefits to Merchants
Increases sales opportunities for the seller
Reduces operational costs
Increases purchasing opportunities for the buyer
Provides wide range of choices
Use the web to target their offers to a niche market
"The store is always open!"
Establishes better relationships with customers
Low cost information distribution
Increases speed to market
Expanded delivery channels
Global exposure and reach
E-commerce

Benefits to Consumers
Convenience
Informative
Value presented upfront: demo and free download
No long wait times
Easy flow and navigation
Search capabilities
Engaging presentation
Constant updates
Easy to buy
E-commerce

Disadvantages of E-commerce
Cost and Justification
Security and Privacy
Lack of trust and user resistance
Other limiting factors
E-commerce

Major Types
Market Relationships
Business-to-Consumers (B2C)
Business-to-Business (B2B)
Consumer-to-Consumer (C2C)
Technology-based
Peer-to-Peer (P2P)
Mobile Commerce (M-Commerce)
Security

Computer Crimes
Could reasonably include a wide variety of
criminal offenses, activities, or issues
Can be separated into two (2) categories
Crimes facilitated by a computer
Crimes where the computer is the target
Security

Computer Security Issues


1. Bugs or misconfiguration problems.
2. Rowser-side risks.
3. Interception of network data sent from
browser to server or vice versa via network
eavesdropping.
Security

Aspects of Computer Security


Physical security
Viruses
Malicious logic
Hacking
Internal misuse
Spoofing
Security

Two Categories of Electronic Crime Types


Crimes in which the computer is the target of
the attack
Incidents in which the computer is a means of
perpetrating a criminal act
Security
Security Incidents
The Morris Worm (November, 1988)
Citibank and Vladimir Levin (June-October, 1994)
Kevin Mitnick (February, 1995)
Omega Engineering and Timothy Lloyd (July, 1996)
Jester and the Worcester Airport (March, 1997)
Solar Sunrise (February, 1998)
The Melissa Virus (March, 1999)
The Love Letter Worm (May, 2000)
The Code-Red Worm (2001)
Adil Yahya Zakaria Shakour (August, 2001-May, 2002)
The Slammer Worm (2003)
July 2009 cyber attacks
Shamoon (2012)
Security

Threats to Security
Viruses and worms
Intruders
Insiders
Criminal organizations
Terrorists and information warfare
Security

Security Basics
Computer vs. Network Security
Computer security focuses on security aspects of
systems in isolation.
e.g. viruses, secure data storage, OS security
Network security focuses on security of data as it is
transmitted between networked systems.
e.g. authentication protocols, encryption of
transmitted data, firewalls
Security
The CIA of Security
Confidentiality information should not be
disclosed to unauthorized individuals
Integrity information should not be modified
except by individuals authorized to do so
Availability hardware, software, and data
should be accessible
Authentication
Nonrepudiation
Security
Three Ways an Organization can choose to
address the Protection of its Network
Ignore security issues
Provide host security
Takes a granular view of security by focusing on
protecting each computer and device individually instead
of addressing protection of the network as a whole
Approach security at a network level
Emphasis is placed on controlling access to internal
computers from external entities
Security
Least Privilege
Means that a subject (which may be a user,
application, or process) should have only the
necessary rights and privileges to perform its task
with no additional permissions
This concept applies to more network security
issues than just providing users with specific rights
and permissions
Another issue with this concept is the security
context in which an application runs
Security
Layered Security
Network security

Network security

Host security
Host security

Audit logs
(Detection)
Access controls
Intrusion detection systems (Detection)

Firewall (Prevention)
Security

Diversity of Defense
Is a concept that complements the idea of various
layers of security
Involves making different layers of security
dissimilar so that even if attackers know how to get
through a system making up one layer, they may
not know how to get through a different type of
layer that employs a different system for security
Security
Access Control
Discretionary Access Control
Is an access control mechanism in which the owner of an
object (such as a file) can decide which other subjects
(such as other users) may have access to the object, and
what access (read, write, execute) these subjects may
have
Mandatory Access Control
Is an access control mechanism in which the security
mechanism controls access to all objects (files), and
individual subjects (processes or users) cannot change
that access
Security

Role-Based Access Control


Is an access control mechanism in which, instead of
the users being assigned specific access permissions
for the objects associated with the computer system
or network, a set of roles that the user may perform
will be assigned to each user
Health Issues
Ergonomics
Is the study of designing and positioning computer
equipment
Is an approach which puts human needs and
capabilities at the focus of designing technological
systems
Objectives of Ergonomics
To ensure that humans and technology work in
complete harmony, with the equipment and tasks
aligned to human characteristics
To have no pain computing
Health Issues

Essential Implications for Productivity, Efficiency, Safety,


and Health in Work Setting
Designing equipment and work arrangements to improve
working posture and ease the load on the body
Information design, to make the interpretation and use of
handbooks, signs, and displays easier and less error-prone
Designing equipment and systems including computers, so that
they are easier to use and less likely to lead to errors in
operation
Designing working environments, including lighting and heating,
to suit the needs of the users and the tasks performed
Health Issues

Design of training arrangements to cover all


significant aspects of the job concerned and to take
account of human learning requirements
The design of military and space equipment and
systems an extreme case of demands on the
human being
Designing tasks and jobs so that they are effective
and take account of human needs such as rest breaks
and sensible shift patterns
Health Issues
Origins of Ergonomics
A relatively new branch of science, celebrated its 50th anniversary in
1999
Relies on research carried out in many other older, established scientific
areas, such as physiology, psychology and engineering
Originated in World War 2, when scientists designed advanced new and
potentially improved systems without fully considering the people who
would be using them
It gradually became clear that systems and products would have to be
designed to take account of many human and environmental factors if
they are to be used safely and effectively
This awareness of peoples requirements resulted in the discipline of
ergonomics
Health Issues
A User-Friendly Workstation
Health Issues

Equipment Checklist
Buying Tips
Ask for equipment that meets American National Standards
Institute (ANSI) standards
Try equipment out before purchasing whenever possible
Computer Terminal
Easy to use brightness and control knobs
No perceptible screen flicker
Detachable keyboard
Reduced electromagnetic fields (EMF) emissions
Tiltable screen
Character size at least 3/16"
Health Issues
Chair
Back provides firm lower and mid-back support
Adjustable arm rests, if needed to prevent shoulder fatigue
Seat and back easily adjustable for height and tilt from seated
position without use of tools
Seat upholstered and padded, curves down at front edge
5 casters for stability
Table
Adjustable easily from seated position without use of tools
Bi-level to allow independent adjustment of screen and keyboard
Adequate leg room
Adequate table top space for required tasks
Health Issues

Accessories (as needed)


Foot rest for users whose feet dont rest flat on the floor
Adjustable keyboard tray, if table is too high
Wrist rest that is padded, movable, same height as keyboard
home row
Document holder adjustable to screen height
Glare screen with grounding wire
Lumbar support cushion, if chair doesnt support lower back
Telephone headset
Task lighting
Health Issues
Health Tips
Reduce Glare to Avoid Eyestrain
lower lighting level to about half of normal office lighting
avoid placing computer directly under a bank of lights
avoid light shining directly into your eyes or onto your
screen
use window curtains or blinds if necessary
position screen at right angle to window
hold a mirror in front of your screen to identify sources
of glare
use task lighting if necessary
Information Ethics
Ethics
Refers to the rules and standards governing the conduct
of an individual with others
Business Ethics
Is code of morals of a particular profession
Is the standards of conduct of a given profession
Information Ethics
Is defined as agreement among information systems
professionals to do right and to avoid wrong in their work
Information Ethics

Unique Sensitive Attributes of Information


Systems
Location
Time
Separation of Act from Consequences
Individual Power
Information Ethics

Privacy
Refers to the right of people not to reveal
information about them
Is the right to keep personal information, such as
personal e-mail messages, medical histories,
student records, and financial information from
getting into the wrong hands
Information Ethics

Privacy at Work
Some experts believe that there will be a collision
between workers who want their privacy and
companies that demand to know more about their
employees
Computer-monitoring systems tie directly into
computerized workstations; specialized computer
programs can track every keystroke made by user
Information Ethics

Email Privacy Issues


federal law allows employers to monitor e-mail sent
and received by employees
email messages that have been erased from hard
disks may be retrieved and used in lawsuits because
the laws of discovery demand that companies
produce all relevant business documents
the use of email among public officials may violate
open meeting laws
Information Ethics
Accuracy
Ethical Approach to Information Accuracy
Individuals should be given an opportunity to correct inaccurate
information held about them in database
Contents of databases containing data about individuals should
be reviewed at frequent intervals, with obsolete data discarded
System safeguards, such as control audits are necessary to
maintain information accuracy
A professional should not misrepresent his or her qualifications to
perform a task
A professional should indicate to his or her employer the
consequences to be expected if his or her judgment is overruled
Information Ethics
Accessibility
access to files, both for online and offline, should
be restricted only to those who have a legitimate
right to access
many organizations keep a transaction log that
notes all accesses or attempted accesses to data
most LAN management software includes this
function
Information Ethics

Property
Many networks have audit controls to track which
files opened, which programs and servers were
used, and so on
This creates an audit trail, a record of how a
transaction was handled from input through
processing and output
Information Ethics

Computer Crime
Computer Crime Laws
Fair Credit Reporting Act of 1970 (FCRA)
Freedom of Information Act of 1970
Tax Reform Act of 1976
Rights to Financial Privacy Act of 1978
Electronic Funds Transfer Act of 1979
Information Ethics

Computer Matching and Privacy Act of 1988


Video Privacy Act of 1988
Telephone Consumer Protection Act of 1991
Cable Act of 1992
Computer Abuse Amendments Act of 1994.
Childrens Online Privacy Protection Act of 1998
Education Privacy Act
Information Ethics

Federal Computer Crime Laws


Copyrights Law
Fraud and False Statements Law
Espionage and Censorship
Mail Fraud Law
Information Ethics

Tips to Help Prevent Crime on the Internet


Use of stand-alone firewall, including hardware and
software with network monitoring capabilities
Use internet security specialists to perform audits of all
internet and network activities
Develop effective internet and security policies for all
employees
Monitor managers and employees to make sure they
are using the internet for business purposes only
Information Ethics
Service Thef
Some people are using their employers computer
time to play games
The biggest abuse is probably wasting time with
electronic mail and the internet
One analysis of e-mail logs of three companies (IBM,
Apple, At&T) found their employees visited
Penthouse magazine website 12,823 times in a single
month
Theft of telephone services has increased significantly
Information Ethics

Data Alteration/Thef
Is the intentional use of illegal and destructive
programs to alter or destroy data is as much a
crime as destroying tangible goods
Most common of these types of programs are viruses
and worms
There are more than 53,000 known computer viruses
today, with more than 6,000 new viruses and worms
being discovered each year
Information Ethics
Malicious Access
Are crimes involving illegal system access and use of
computer services are a concern to both
government and business
Federal, state, and local government computers are
sometimes left unattended over weekends without
proper security
University computers are often used for commercial
purposes under the pretense of research or other
legitimate academic pursuits
Information Ethics
Computer Viruses
Application Virus
infects executable application files such as word processing
programs
infects the computer system
can often be detected by checking the length or size of the
file
System Virus
typically infects operating system programs or other systems
files
usually infects the system as soon as the computer is started
Information Ethics
Ten Commandments of Computer Ethics
1. Thou shalt not use a computer to harm other
people.
2. Thou shalt not interfere with other peoples
computer work.
3. Thou shalt not snoop around in other peoples files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
Information Ethics

6. Thou shalt not use or copy software for which you have
not paid.
7. Thou shalt not use other peoples computer resources
without authorization.
8. Thou shalt not appropriate other peoples intellectual
output.
9. Thou shalt think about the social consequences of the
program you write.
10. Thou shalt use a computer in ways that show
consideration and respect.

Das könnte Ihnen auch gefallen