Sie sind auf Seite 1von 16

Note:

1. Check format particularly on your references.


2. Please include the new discussions.
3. Research on applications of DSS/DSS systems of businesses.
Mariano Marcos State University

COLLEGE OF BUSINESS, ECONOMICS AND ACCOUNTANCY

City of Batac, 2906

In partial fulfillment of the requirement in

BA 41

Submitted by:

Iann Vanjett L. Pasion

Rheavelle P. Adina

Wendelyn C. Bayangos

Mitzi Ann A. Ulit

Karen M. Valenciano

Submitted to:

Ms. Carmela G. Adriatico

Instructor

August 18, 2016


PART I. INFORMATION SYSTEMS IN BUSINESS - DSS & OAS

Reporter 1: Wendelyn C. Bayangos

A. DECISIONS SUPPORT SYSTEM

Decisions support system is a business information system designed to assist in


decision making where the decision process is relatively unstructured and only
part of the information needed is structured in advance. The DSS helps the
individual to structure the problem by providing the needed information. It is
differentiated from traditional transaction processing and reporting systems by its
ability to simulate, via mobiles, the outcomes of different courses of action being
considered by a decision maker. DSS offer significant potential for assisting and
improving management decision making (Nagpal D.P. and Chand S., 2011).

B. DSS DISTINGUISHED FROM MIS

DSS are used to provide support to analysts and decision makers within an
organization that are relevant to a specific problem or situation and make an
evaluation of various different outcomes. They are used by managers and other
decision-makers in both unstructured and semi-structured situations and
largely in ad-hoc situations although it may involve repetitive decisions.
Structured decisions, or programmable tasks, can be automated because a well-
defined standard operating procedure exists for these types of decisions.
Semistructured decisions include a structured aspect that benefits from
information retrieval analytical models, and information systems technology.
Unstructured decisions are typically one-time decisions, with no standard
operating procedure pertaining to them. A DSS is used in situations where
individual managerial judgment is required.

An MIS provides routine information typically on an ongoing basis in a


standardized format. Reports may be run routinely or be provided on demand.
While an MIS can be used to solve standardized and routine problems using
specified criteria and the data from an MIS forms the base pool of information
for a DSS, MIS are also used for routine functions such as production control
and monitoring, forecasting, human resources management, financial analysis
and research. Because of the broad nature of the information presented, an MIS
might be used by lower, middle or upper level management.

While an MIS simply gathers data, a DSS manipulates that data and helps to
develop tools that aid in the decision-making process (Management Veristy).
Reporter 2: Rheavelle P. Adina

C. COMPONENTS OF DSS
1. Data Management Component
The data management component performs the function of storing and
maintaining the information that you want your Decision Support System to
use. The data management component, therefore, consists of both the
Decision Support System information and the Decision Support System
database management system. (mis2, PAGE

2. Model Management Component


The model management component consists of both the Decision Support
System models and the Decision Support System model management
system. A model is a representation of some event, fact, or situation. As it is
not always practical, or wise, to experiment with reality, people build models
and use them for experimentation. Models can take various forms.

Businesses use models to represent variables and their relationships. For


example, you would use a statistical model called analysis of variance to
determine whether newspaper, TV, and billboard advertizing are equally
effective in increasing sales.

Decision Support Systems help in various decision-making situations by


utilizing models that allow you to analyze information in many different ways.
The models you use in a Decision Support System depend on the decision
you are making and, consequently, the kind of analysis you require. For
example, you would use what-if analysis to see what effect the change of one
or more variables will have on other variables, or optimization to find the most
profitable solution given operating restrictions and limited resources.
Spreadsheet software such as excel can be used as a Decision Support
System for what-if analysis.

The model management system stores and maintains the Decision Support
System’s models. Its function of managing models is similar to that of a
database management system. The model management component can not
select the best model for you to use for a particular problem that requires your
expertise but it can help you create and manipulate models quickly and
easily.

3. User Interface Management Component


The user interface management component allows you to communicate
with the Decision Support System. It consists of the user interface
management system. This is the component that allows you to combine your
know-how with the storage and processing capabilities of the computer. The
user interface is the part of the system you see through it when enter
information, commands, and models. This is the only component of the
system with which you have direct contract. If you have a Decision Support
System with a poorly designed user interface, if it is too rigid or too
cumbersome to use, you simply won’t use it no matter what its capabilities.
The best user interface uses your terminology and methods and is flexible,
consistent, simple, and adaptable.
For an example of the components of a Decision Support System, let’s
consider the Decision Support System that Land’s End has tens of millions of
names in its customer database. It sells a wide range of women’s, men’s, and
children’s clothing, as well various household wares. To match the right
customer with the catalog, land’s end has identified 20 different specialty
target markets. Customers in these target markets receive catalogs of
merchandise that they are likely to buy, saving Lands’ End the expense of
sending catalogs of all products to all 20 million customers. To predict
customer demand, lands’ end needs to continuously monitor buying trends.
And to meet that demand, lands’ end must accurately forecast sales levels.
To accomplish these goals, it uses a Decision Support System which
performs three tasks:

Data management: The Decision Support System stores customer and


product information. In addition to this organizational information, Lands’ End
also needs external information, such as demographic information and
industry and style trend information.

Model management: The Decision Support System has to have models to


analyze the information. The models create new information that decision
makers need to plan product lines and inventory levels. For example, Lands’
End uses a statistical model called regression analysis to determine trends in
customer buying patterns and forecasting models to predict sales levels. in
statistical modeling, regression analysis is a statistical process for estimating
the relationships among variables. It includes many techniques for modeling
and analyzing several variables, when the focus is on the relationship
between a dependent variable and one or more independent variables (or
'predictors').

User interface management: A user interface enables Lands’ End decision


makers to access information and to specify the models they want to use to
create the information they need.
4. Model Base Component
Includes mathematical and statistical models that, along with the database,
enable a DSS to analyze information. A model base management system
performs tasks similar to a DBMS in accessing, maintaining, and updating
models in the model base. For example, an MBMS might include tool for
conducting what-if analysis so that a forecasting model can generate reports
showing how forecasts vary, depending on certain factors.

D. DSS CAPABILITIES (MIS2 p.215)


DSS can come in handy by evaluating stock held in a facility, or any other type of
business asset that can be moved around or otherwise optimized. This is often
one way a business can profit from "itemizing" its assets with DSS. Decision
support technology can also be a tool that analyzes sales data and makes
predictions, or monitors existing patterns. Whether it's big picture decision
support tools, active or passive solutions, or any other kind of DSS tool, planners
often tackle sales numbers using a variety of decision support resources. There
are other uses for this powerful software option - to make good projections on the
future for a business, or to get an overall "bird's eye view" of events that
determine company's progress. This can come in handy in difficult situations
where a lot of financial projection may be necessary when determining
expenditures and revenues (Business.com).
E. GROUP DECISION SUPPORT SYSTEM (include discussion in MIS2 pp. 219-
222)

DSSs are usually designed to be used by a particular decision-maker while a


GDSS is designed to be used by more than one decision-maker.

A Group Decision Support System (GDSS) is an interactive, computer-


basedsystem that helps a team of decision-makers solve problems and make
choices.GDSS are targeted to supporting groups in analyzing problem situations
and in performing group decision-making tasks (cf., DeSanctis and Gallupe,
1987; Huber, 1984).

According to Techopedia, Group decision support system (GDSS) technology


supports project collaboration through the enhancement of digital communication
with various tools and resources. These types of programs are used to support
customized projects requiring group work, input to a group and various types of
meeting protocols. GDSS proponents claim that these sorts of technologies can
advance the promotion of participation, help to streamline group communications
and foster learning. Different vendors have begun to offer group decision support
system products like ThinkTank and MeetingWorks, among others. There is also
a move to develop open-source tools that are often called discussion support
systems. GDSS is another term that can be used in various ways as makers
develop ever more versatile and sophisticated resources for helping to promote
group work. Elements of local or distance participation, meeting scheduling and
documentation, and auxiliary support features for brainstorming can all be
aspects of a GDSS design. In the most basic sense, GDSS is related to decision
support systems because both support human decision-making. The difference is
that GDSS is specifically engineered to support a team or other group.

F. GROUP DECISION SUPPORT SYSTEM ALTERNATIVES

Ravi stated that there are four alternative and these are:

Decision Room:

Participants at the meeting sit around a large horseshoe desk facing one end of the
room. There are several of these desks tiered in such a way that no one’s view is
impaired.

Each participant is equipped with his or her own display monitor and terminal. At the
front of the room, facing the participants, are two large public screens. These screens
can display any information from internal or external databases, ideas generated by the
group or any individual’s monitor screen. A ‘Facilitator’ who sits to the side of the public
screen guides most meetings conducted in this environment.

The facilitator’s role is not to participate in the decision-making but to ensure that the
meeting progresses smoothly according to some agreed procedure. Thus, the facilitator
will have his own personal monitor and terminal: through these he can view and to a
certain extent control other participants’ monitors and the information displayed on
them. Although most communication between participants will be done through their
terminals and monitors, the facilitator may communicate with the whole group verbally.
At his disposal are two large whiteboards on which he can write. These whiteboards are
also huge photocopiers that can record everything written on them and produce hard
copy at the end of the meeting. Telecommunications tend to be of a highly sophisticated
kind. For a major multinational it will allow the company to call up information from
databases and analytical models from around the world. The setting is one of deep pile
carpets, soft lighting and monitors that are sunk into quality mahogany desks.

Surrounding this room will be other smaller rooms called ‘Breakaway Rooms’ which
may be used for smaller face-to-face discussions. These meetings clearly occur at the
same time and at the same place.

Local Decision Network:

This is probably the cheapest and simplest type of GDSS based around a Local Area
Network (LAN). Although participants sit separated from one another physically, the
distances involved are so small that they may be regarded as being in the same place.
Each has his or her own personal workstation. They have access to a wide variety of
information sources, both private and public. There is specialised equipment, such as
optical scanners for document imaging, and specialised software, for example: email
and workflow management programs. The latter allow scanned documents to be sent
around a network.

These documents can be viewed and perhaps altered by those on the network. The
program can let the originator of the document know the stage in the process the
document has reached, and who has dealt with it. Thus participants can easily
communicate with one another and share information or else work privately on their own
personal matters.

Participants in this type of environment usually work closely and regularly with one
another. Group decision making can take place over a protracted period. Unlike the
previous scenario, there is no facilitator to move the action along and to get a decision
by a certain deadline. Thus, a particular issue may be left and returned to intermittently
by an individual; while in between times he deals with other work. This type of decision-
making lends itself, for example: to a head of department who wishes to stimulate
discussion on a certain topic and solicit colleagues’ opinions. On the basis of this
discussion and opinion he may take the final decision himself.

Teleconferencing:

This type of GDSS is for participants who sit geographically separated, perhaps in
different countries, and are unable to meet in the same place but can meet at the same
time: this is achieved by using telecommunications to link together two or more Decision
Rooms. This is because of the large distances between the participants, it is essential
that the telecommunications equipment is highly reliable. In this system there are large
cost savings, due to the avoidance of travel costs and productivity losses from time
spent travelling.

Remote Decision-Making:

Finally, this type of GDSS is very similar to the Local Decision Network, but the
individuals involved in the joint decision-making are geographically dispersed. Again the
telecommunications, whether they be by satellite, microwave or telephonic link, must be
of the highest standard. Unlike teleconferencing, which can take a long time to set up
and is somewhat rigid in its format, remote decision-making has the advantage of
flexibility and is on-going.
G. OFFICE AUTOMATION SYSTEM

Office automation systems (OAS) are configurations of networked computer


hardware and software. A variety of office automation systems are now applied
to business and communication functions that used to be performed manually or
in multiple locations of a company, such as preparing written communications
and strategic planning. In addition, functions that once required coordinating the
expertise of outside specialists in typesetting, printing, or electronic recording can
now be integrated into the everyday work of an organization, saving both time
and money (Encyclopedia).

H. APPLICATIONS OF OAS IN BUSINESS

1. Electronic Publishing

Electronic publishing systems include word processing and desktop


publishing.

Insert definition of word processing and desktop publishing on photocopied


hand-out (pp.39)

Word processing software, (e.g., Microsoft Word, Corel Word-Perfect) allows


users to create, edit, revise, store, and print documents such as letters,
memos, reports, and manuscripts. Desktop publishing software (e.g., Adobe
Pagemaker, Corel VENTURA, Microsoft Publisher) enables users to integrate
text, images, photographs, and graphics to produce high-quality printable
output. Desktop publishing software is used on a microcomputer with a
mouse, scanner, and printer to create professional-looking publications.
These may be newsletters, brochures, magazines, or books.

2. Electronic Communication

Electronic communication systems include electronic mail (e-mail), voice mail,


facsimile (fax), and desktop videoconferencing.

Include discussion of the ff:


Facsimile (with pics) – pp. 199-200
Voice over Internet protocol pp.201-202
Videoconferencing pp. 202-203
Centralized telephone systems – p.203
Voice mail systems – p. 204
Mobile phone – p. 206

3. Electronic Collaboration
Electronic collaboration is made possible through electronic meeting and
collaborative work systems and teleconferencing. Electronic meeting and
collaborative work systems allow teams of coworkers to use networks of
microcomputers to share information, update schedules and plans, and
cooperate on projects regardless of geographic distance. Special software
called groupware is needed to allow two or more people to edit or otherwise
work on the same files simultaneously.
Examples: teleconferencing, videoconferencing

4. Telecommuting and Collaborative Systems

Telecommuters perform some or all of their work at home instead of traveling


to an office each day, usually with the aid of office automation systems,
including those that allow collaborative work or meetings. A microcomputer, a
modem, software that allows the sending and receiving of work, and an
ordinary telephone line are the tools that make this possible.Telecommuting is
gaining in popularity in part due to the continuing increase in population,
which creates traffic congestion, promotes high energy consumption, and
causes more air pollution. Telecommuting can help reduce these problems.
Telecommuting can also take advantage of the skills of homebound people
with physical limitations. Studies have found that telecommuting programs
can boost employee morale and productivity among those who work from
home. It is necessary to maintain a collaborative work environment, however,
through the use of technology and general employee management practices,
so that neither on-site employees nor telecommuters find their productivity is
compromised by such arrangements. The technologies used in electronic
communication and teleconferencing can be useful in maintaining a
successful telecommuting program.

5. Office Management

Include discussion in photocopied handout, pp. 306-309

Office management systems include electronic office accessories, electronic


scheduling, and task management. These systems provide an electronic
means of organizing people, projects, and data. Business dates,
appointments, notes, and client contact information can be created, edited,
stored, and retrieved. Additionally, automatic reminders about crucial dates
and appointments can be programmed. Projects and tasks can be allocated,
subdivided, and planned. All of these actions can either be done individually
or for an entire group. Computerized systems that automate these office
functions can dramatically increase productivity and improve communication
within an organization.

PART II. SECURITY, PIRACY & ETHICAL ISSUES IN INFORMATION SYSTEM

A. COMPUTER WASTES
Computer Wastes involves the inappropriate use of computer technology and
resources (Josh Isay). According to the book Fundamental of Information
Systems, 5th Ed., these are the examples of Computer wastes:
• Discarding old software and even complete computer systems when they still
have value
• Building and maintaining complex systems that are never used to their fullest
extent
• Using corporate time and technology for personal use
• Spam

B. COMPUTER MISTAKES
Computer Mistakes are errors, failures, and other computer problems that make
computer output incorrect or not useful. Computer Mistakes are caused by failure
by users to follow proper procedures, unclear expectations and a lack of
feedback, program development that contains errors, Incorrect data entry by
data-entry clerk.

C. PREVENTIVE MEASURES FOR COMPUTER WASTES AND MISTAKES


Preventing waste and mistakes involves: Establishing policies and procedures,
implementing policies and procedures, monitoring policies and
procedures,reviewing policies and procedures.

1. Establishing Policies and Procedures


Establish policies and procedures regarding efficient acquisition, use, and
disposal of systems and devices
• Training programs for individuals and workgroups
• Manuals and documents on how computer systems are to be maintained
and used
• Approval of certain systems and applications to ensure compatibility and
cost-effectiveness.
2. Implementing Policies and Procedures
Policies often focus on:
- Implementation of source data automation and the use of data editing
to ensure data accuracy and completeness
- Assignment of clear responsibility for data accuracy within each
information system
• Training
- Key aspect of implementation
-
3. Monitoring Policies and Procedures
• Monitor routine practices and take corrective action if necessary
• Implement internal audits to measure actual results against established
goals

4. Reviewing Policies and Procedures


During review, people should ask the following questions:
- Do current policies cover existing practices adequately?
- Does the organization plan any new activities in the future?
- Are contingencies and disasters covered?
D. COMPUTER CRIMES
Computer crime is an act performed by a knowledgeable computer user,
sometimes referred to as a hacker that illegally browses or steals a company's or
individual's private information. In some cases, this person or group of individuals
may be malicious and destroy or otherwise corrupt the computer or data files
(Computer Hope).

E. THE COMPUTER AS AN OBJECT OF CRIME


 Crimes fall into several categories such as:
- Illegal access and use
- Data alteration and destruction
- Information and equipment theft
- Software and Internet piracy
- Computer-related scams
- International computer crime
1. Illegal Access and Use
• Hacker
- Learns about and uses computer systems
• Criminal hacker (cracker)
- Gains unauthorized use or illegal access to computer systems
• Script bunnies
- Automate the job of crackers
• Insider
- Employee who compromises corporate systems
 Virus
- Computer program file capable of attaching to disks or other files and
replicating itself repeatedly
• Worm
- Parasitic computer programs that replicate but do not infect other
computer program files
• Trojan horse
- Disguises itself as a useful application or game and purposefully does
something the user does not expect
-
2. Information and Equipment Theft
 Data and information
- Assets or goods that can also be stolen
• Password sniffer
- Small program hidden in a network or a computer system that records
identification numbers and passwords
3. Computer-Related Scams
To avoid becoming a scam victim:
- Do not agree to anything in a high-pressure meeting or seminar
- Do not judge a company based on appearances
- Avoid any plan that pays commissions simply for recruiting additional
distributors
- Do your homework
4. International Computer Crime
• Computer crime is an international issue
• Software industry loses about $11 to $12 billion in revenue to software piracy
annually

F. THE COMPUTER AS A TOOL TO COMMIT CRIME


• Social engineering
- Using social skills to get computer users to provide information to
access an information system or its data
• Dumpster diving
- Going through the trash cans of an organization to find confidential
information, including information needed to access an information
system
 Cyberterrorism
- Intimidates or coerces a government to advance his or her political or
social objectives by launching computer-based attacks against
computers, networks, and the information stored on them
 Identity Theft
- Imposter obtains key pieces of personal identification information in
order to impersonate someone else
- Consumers can help protect themselves by:
- Regularly checking their credit reports with major credit bureaus
- Following up with creditors if their bills do not arrive on time
- Not revealing any personal information in response to unsolicited e-
mail or phone calls
 Internet Gambling
- Size of the online gambling market is not known
- Estimate is that $10–20 billion is wagered on online poker alone each
year
- Revenues generated by Internet gambling
- Represent a major untapped source of income for the state and federal
governments
-
G. PREVENTIVE MEASURES FOR COMPUTER CRIMES
According to Norton these are the preventive measures for computer crimes:

1. Keep your computer current with the latest patches and updates.

One of the best ways to keep attackers away from your computer is to
apply patches and other software fixes when they become available. By
regularly updating your computer, you block attackers from being able to take
advantage of software flaws (vulnerabilities) that they could otherwise use to
break into your system. 

While keeping your computer up-to-date will not protect you from all attacks, it
makes it much more difficult for hackers to gain access to your system, blocks
many basic and automated attacks completely, and might be enough to
discourage a less-determined attacker to look for a more vulnerable computer
elsewhere. 

More recent versions of Microsoft Windows and other popular software can
be configured to download and apply updates automatically so that you do
not have to remember to check for the latest software. Taking advantage of
"auto-update" features in your software is a great start toward keeping
yourself safe online. 

2. Make sure your computer is configured properly.

Keep in mind that a newly purchased computer may not have the right
level of security for you. When you are installing your computer at home, pay
attention not just to making your new system function, but also focus on
making it work securely. 

Configuring popular Internet applications such as your Web browser and


email software is one of the most important areas to focus on. For example,
settings in your Web browser such as Internet Explorer or Firefox will
determine what happens when you visit Web sites on the Internet—the
strongest security settings will give you the most control over what happens
online but may also frustrate some people with a large number of questions
("This may not be safe, are you sure you want do this?") or the inability to do
what they want to do. 

Choosing the right level of security and privacy depends on the individual
using the computer. Oftentimes security and privacy settings can be properly
configured without any sort of special expertise by simply using the "Help"
feature of your software or reading the vendor's Web site. If you are
uncomfortable configuring it yourself consult someone you know and trust for
assistance or contact the vendor directly. 

3. Protect your Computer with Security Software

Several types of security software are necessary for basic online


security. Security software essentials include firewall and antivirus programs.
A firewall is usually your computer's first line of defense-it controls who and
what can communicate with your computer online. You could think of a
firewall as a sort of "policeman" that watches all the data attempting to flow in
and out of your computer on the Internet, allowing communications that it
knows are safe and blocking "bad" traffic such as attacks from ever reaching
your computer. 

The next line of defense many times is your antivirus software, which
monitors all online activities such as email messages and Web browsing and
protects an individual from viruses, worms, Trojan horse and other types
malicious programs. More recent versions of antivirus programs, such as
Norton AntiVirus, also protect from spyware and potentially unwanted
programs such as adware. Having security software that gives you control
over software you may not want and protects you from online threats is
essential to staying safe on the Internet. Your antivirus and antispyware
software should be configured to update itself, and it should do so every time
you connect to the Internet. 

Integrated security suites such as Norton Internet Security combine firewall,


antivirus, antispyware with other features such as antispam and parental
controls have become popular as they offer all the security software needed
for online protection in a single package. Many people find using a security
suite an attractive alternative to installing and configuring several different
types of security software as well as keeping them all up-to-date. 

H. COMPUTER ETHICS

Ethics deals with placing a “value” on acts according to whether they are “good”
or “bad”. Every society has its rules about whether certain acts are ethical or not.
These rules have been established as a result of consensus in society and are
often written into laws.

When computers first began to be used in society at large, the absence of ethical
standards about their use and related issues caused some problems. However,
as their use became widespread in every facet of our lives, discussions
in computer ethics resulted in some kind of a consensus. Today, many of these
rules have been formulated as laws, either national or international. Computer
crimes and computer fraud are now common terms. There are laws against
them, and everyone is responsible for knowing what constitutes computer crime
and computer fraud.

The Ten Commandments of computer ethics have been defined by


the Computer Ethics Institute. Here is our interpretation of them:

 1) Thou shalt not use a computer to harm other people: If it is unethical to
harm people by making a bomb, for example, it is equally bad to write a program
that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal
and destroy other people’s books and notebooks, it is equally bad to access and
destroy their files.

 2) Thou shalt not interfere with other people's computer


work: Computer viruses are small programs that disrupt other people’s
computer work by destroying their files, taking huge amounts of computer time or
memory, or by simply displaying annoying messages. Generating and
consciously spreading computer viruses is unethical.

3) Thou shalt not snoop around in other people's files: Reading other


people’s e-mail messages is as bad as opening and reading their letters: This is
invading their privacy. Obtaining other people’s non-public files should be judged
the same way as breaking into their rooms and stealing their documents. Text
documents on the Internet may be protected by encryption.

4) Thou shalt not use a computer to steal: Using a computer to break into the
accounts of a company or a bank and transferring money should be judged the
same way as robbery. It is illegal and there are strict laws against it.

5) Thou shalt not use a computer to bear false witness: The Internet can
spread untruth as fast as it can spread truth. Putting out false "information" to the
world is bad. For instance, spreading false rumors about a person or false
propaganda about historical events is wrong.
6) Thou shalt not use or copy software for which you have not
paid: Software is an intellectual product. In that way, it is like a book: Obtaining
illegal copies of copyrighted software is as bad as photocopying a copyrighted
book. There are laws against both. Information about the copyright owner can be
embedded by a process called  watermarking into pictures in the digital format.

7) Thou shalt not use other people's computer resources without


authorization: Multiuser systems use user id’s and passwords to enforce their
memory and time allocations, and to safeguard information.  You should not try
to bypass this authorization system. Hacking a system to break and bypass the
authorization is unethical.

8) Thou shalt not appropriate other people's intellectual output: For


example, the programs you write for the projects assigned in this course are your
own intellectual output. Copying somebody else’s program without proper
authorization is software piracy and is unethical. Intellectual property is a form
of ownership, and may be protected by copyright laws.

9) Thou shalt think about the social consequences of the program you
write: You have to think about computer issues in a more general social
framework: Can the program you write be used in a way that is harmful to
society? For example, if you are working for an animation house, and are
producing animated films for children, you are responsible for their contents. Do
the animations include scenes that can be harmful to children? In the United
States, the Communications Decency Act was an attempt by lawmakers to ban
certain types of content from Internet websites to protect young children from
harmful material. That law was struck down because it violated the free speech
principles in that country's constitution. The discussion, of course, is going on.

10) Thou shalt use a computer in ways that show consideration and
respect: Just like public buses or banks, people using computer communications
systems may find themselves in situations where there is some form of queuing
and you have to wait for your turn and generally be nice to other people in the
environment. The fact that you cannot see the people you are interacting with
does not mean that you can be rude to them.
Works Cited

Prezi(2016) Computer waste and mistakes. Retrived at:


https://prezi.com/fp4ermfjgslj/computer-waste-and-mistakes/

Campbell, D.J. & Craig, T. (2005) Organisations & the Business Environment Retrived
at:
 http://dsssystem.blogspot.com/2010/01/components-of-decision-support-
systems.html

Norton (2016) Decision support system. Retrived at:


http://www.business.com/business-intelligence/decision-support-systems-dss-
applications-and-uses/

Computer Hope(2016) Cyber Crime. Retrived at:


http://www.computerhope.com/jargon/c/compcrim.htm

https://www.techopedia.com/definition/27843/group-decision-support-system-gdss

https://www.reference.com/technology/difference-between-dss-mis-10ab10889dfdf245#

http://us.norton.com/cybercrime-prevention

http://www.encyclopedia.com/doc/1G2-3401200109.html

http://www.ravi.kahlon.co/2013/02/group-decision-support-systems-gdss.html

Das könnte Ihnen auch gefallen