Beruflich Dokumente
Kultur Dokumente
e) describe the effects of information technology on patterns of employment, including areas of work where there is increased unemployment; f) describe the effects of microprocessor-controlled devices in the home, including their effects on leisure time, social interaction and the need to leave the home; g) describe the capabilities and limitations of IT; h) discuss issues relating to information found on the Internet, including unreliability, undesirability and the security of data transfer; i) describe the potential health problems related to the prolonged use of ICT equipment, for example repetitive strain injury (RSI), back problems, eye problems and some simple strategies for preventing these problems;
j) describe a range of safety issues related to using computers and measures for preventing accidents
Copyright
Copyright is the name given to the protection of the rights of the
person(s) responsible for creating such things as text, a piece of music, a painting or a computer program. The Copyright, Designs and Patents Act, 1989 - a criminal offence to be caught copying or stealing software. The Act also makes it an offence to:
copy or distribute software without permission run copyright software that has been bought on two or more computers at the same time unless the software agreement (licence) allows it
Copyright
The main types of piracy are: The copying of software (and its packaging) to try to make it look like a genuine product. The copying and selling of recordable CD-ROMs that contain pirated software.
Downloading copyright software from the Internet. Because software can be downloaded from certain sites does not mean that it is free or legal for you to download.
The use of software on more computers in a network than the number of computers for which there are software licenses. www.fast.org.uk
Hacking
Hackers are people who gain access to computer systems without
permission and who then may detrimentally interfere with the programs and data.
Deliberately plant computer viruses that damage program files and data.
Hack into a computer with the intention of seeing or altering information.
Use a computer to commit crimes (frauds): e.g. to create a fictitious worker and get money paid into this non-existent person's bank account.
Use your employer's computer to carry out unauthorized work.
People found guilty under the Computer Misuse Act may receive a large fine or a prison sentence.
Hacking
Viruses 1
A program that infects computer files and makes them do something unexpected or damaging. The virus is inserted into a computer file, and when the file is loaded, other files become infected. In 1986, one known computer virus. Today, up to fifteen new viruses every day. A hoax virus - an e-mail that is intended to scare people about a non-existent virus threat and make them delete files. Some viruses can destroy a computer's hard disk. In 1999, Melissa virus resulted in many of the world's largest companies having to shut down their e-mail systems In the year 2000, millions of people opened an attachment to an e-mail headed 'I love you' and thus infected their computers and spread this virus.
Viruses 2
There are three main types of virus:
Those that infect program files. The virus code is attached to program files and when the program is loaded, the virus is also loaded.
Those that infect system/boot files - a small program that tells the computer how to load the rest of the operating system. By infecting this boot (start-up) file, the virus is loaded into memory runs whenever the computer is on. Macro viruses. These are written in a macro language with an application such as Microsoft Word. The macro virus is executed when the document is opened. Over half of the known viruses are macro viruses spread by e-mail attachments.
Medical details
Criminal convictions Records of Phone calls Political beliefs Car and insurance details
Data Protection
Rules about what information can be kept about you.
Many people have their details held on other people's computers - your school, your doctor. Can lead to many problems and dangers. Information held on one computer can easily be transferred to another. Some companies make money out of selling personal information. The information held on you might be wrong - entered incorrectly, out of date, been confused with someone elses!. It could state that you had been in trouble with the police when you hadn't, or that you owed money when you didn't. The 1998 Data Protection Act sets out in law the rules for processing personal information. A Data Protection Commissioner is responsible for enforcing the Act. The Act applies to paper records, as well as computer. data subjects people who have data held about them . data controllers The organizations and people who have the data.
Data Protection Act, 1998: The eight rules: 1. Fairly and lawfully processed 2. Processed for limited purposes 3. Adequate, relevant and not excessive 4. Accurate 5. Not kept longer than necessary 6. Processed in line with data subjects' rights 7. Secure 8. Not transferred to countries without adequate protection
1. Manual jobs replaced by robots e.g. car assembly 2. Manual jobs replaced by computer systems print workers replaced by DTP 3. Office jobs replaced by computers filing clerks
4. Banking industry
Teleworking Hot desking, work-centre shared by different companies De-skilling - in some factories where 'new' jobs involve packing boxes and sweeping up.
1. Jobs involving the design and manufacture of computer hardware 2. Systems analysts and programmers 3. Network managers and technicians 4. computer design & animation 5. Internet changed commerce Ecommerce
Pros: More work done Computers can do boring jobs Cons: Expensive to keep up with latest technology Some job losses
16
17
Many people worried - they see it as a possible identity card identity card help fight crime Britain - only European country not to have one.
18
Personal computers used at home, mobile telephones and information system devices
Growth of telecommunications - Internet 'global village'. More tolerant with different cultures Computer games develops problem-solving skills and encourage collaboration and teamwork
Too many computer games less time reading Education standards will drop
Too much stress Changes in technology all the time The pace of computers means work harder
Environmental Effects
the need to power millions of computers has increased the electricity consumption but Consumption of electricity reduced as computers carefully control air-conditioning and heating systems
Some saving on the use of paper (and therefore trees) as data is communicated and stored digitally.
teleworking from home - less travel to and from work - a reduction in traffic pollution.
How far should the law go in giving the police access to personal data, or e-mails, in order to fight crime or to defend national security?
Blogs
commentary on a topic On-line diaries combines text, images, and links to other blogs readers can leave comments in an interactive format
Wikis
Wiki is a piece of server software that allows users to create and edit Web pages - Wiki Design Principles
Create group communication and collaboration across the internet project work Sound text, pictures, video Groups form around specific topics higher education authoritative but possible bias Need monitoring heavy in personnel Occasionally need authorised use http://net.educause.edu/ir/library/pdf/ELI7004.pdf Pride of ownership