Professional Documents
Culture Documents
Chapter 9
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Chapter Topics
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Errors, Accidents, & Natural Hazards
• Human errors
Using Information Technology, 11e
5
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Procedural errors
• When people fail to follow established procedures, errors can
Using Information Technology, 11e
occur
Software errors
• Software bug: an error in a program that causes it not to
work properly
7
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Computer Crimes
• Two types of computer crime:
Using Information Technology, 11e
8
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Computer Crimes (continued)
• Theft of hardware
Using Information Technology, 11e
• Theft of software
• Theft of intellectual property (piracy)
• Theft of time and services
• Theft of information (e.g., medical info, credit card
info)
• Internet-related fraud (e.g., Wi-Fi phishing, or evil twin
attack)
• Crimes of malice: crashing entire systems
• Attacks on power-control systems and attacks on the Internet
9
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Security is a system of safeguards for protecting
information technology against disasters, system
Using Information Technology, 11e
13
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Encryption
• The process of altering readable data into unreadable form to
Using Information Technology, 11e
15
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Disaster-recovery plans
• Method of restoring information-processing operations that
Using Information Technology, 11e
16
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
The rise of Big Data has led to continuing threats to
privacy from three giant sources:
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Business & Cyberspying
• Almost everything we do online is being scooped up and
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Government & Cyberspying
• Governments at all levels spy on their citizens, sometimes
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Spying, Hacking, & Cyberwarfare by Foreign
Governments & Groups
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
UNIT 9B: Other Social, Economic, & Political
Issues
Using Information Technology, 11e
22
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Using Information Technology, 11e
23
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Digital sound and images can be manipulated (morphed).
• Pros:
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Environmental Problems
• Manufacturing computers and circuits can cause pollution
Using Information Technology, 11e
27
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Protecting Children
• Pornography
Using Information Technology, 11e
28
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Online Sexual Predators
• Prevention Strategies
Using Information Technology, 11e
29
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Sexting is use of a smartphone or other mobile device
to send sexually explicit photos or videos; sometimes
Using Information Technology, 11e
30
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Cyberbullies
• Another example of how information technology can
Using Information Technology, 11e
31
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Workplace Problems
• Misuse of technology
Using Information Technology, 11e
32
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Information Overload
• Term first used by Alvin Toffler in 1970: he
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
What are some of the signs of information overload?
• Increased cardiovascular stress owing to a rise in blood
Using Information Technology, 11e
pressure.
• Weakened vision.
• Confusion and frustration.
• Impaired judgment based on overconfidence.
• Irritation with others owing to an environmental input glut
(which may also account for part of the “brusqueness”
that is commonly attributed to big-city dwellers).
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
What can be done about information overload? For example:
• Spend less time on information that is nice to know and more
Using Information Technology, 11e
36
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
• Technology may replace humans in many jobs.
• Technology may affect the gap between the rich and the poor
Using Information Technology, 11e
(“digital divide”).
• Most jobs require employees who are tech-savvy.
• People who are not tech-savvy won’t qualify for those jobs.
• Technology is being used to replace employees in traditional
jobs, traditionally filled by untrained workers.
• Not everyone can afford computers and Internet connectivity.
• Many governments censor Internet content available in their
countries, but they can’t control all Internet political activism.
• Internet is only loosely policed, so criminals take advantage.
• Being able to adapt to technology is critical for people.
37
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.