social implications Flashcards
what is acceptable user policy or AUP
set of rules drawn up by management of company to protect company, network, devices and data from misuse
what are mobile offices
work at remore locations away from main offices by synchronising ICT devices
what is the aim of mobile offices
as few devices as possible so less must be transported
what are the disadvantages of mobiles offices
limitations of battery life and lack of power outlets
what is a virtual office
range of services offered by service prviders that gives appearance of that it physically exists onlince services are administered by service provider to interact with customers
why are virtual offices so useful
money can be saved
use of paper kept to minimum
documents shared using online storage resources
what is decentralistion of labour
employees have little need to perform jobs effectively in formal office environment
what is the advantageof decentralistion of labour
transport and office space costs are reduced
what are the disadvantages of decentralisation of labour
loss in cohesion and common business purpose when emplouees don’t have regular contact with each other
what can robotics do
complex machines perform dangerous, repetitive and distasteful jobs which are boring and risky for human workers
what are the advantages of robotics
reduces emplyee injuries caused by programming errors, mechanical failures and lack of worker vigilance
perform low-level tasks effectively
used in many indsutries
what is Artificial intelligence
helping machines find solutions to complex problems in human-like manner uses algorithms to have abstract thought pattern recognition and reasoning
what are unmanned aerial vehicles (UAV)
type of aircraft that oeprates without human pilot on board
what are the advantages of UAV’s
reduces labours cost
what is social engineering
manipulating people into divulging confidential informatnion with intent to commit computer fraud
what is shoulder surfing
attacker uses observational techninques to get informatnio whilst user inputs sensitive data close range or long range
what is dupster diving
use dumped items to get informatnion about company empolyee and network structure
what is reverse social engineering
attacker convines target might have problem in future and ready to help solve it
what is sabotage
corrupt system to appear to be corrupted after gaining access so that user looks for help to solve problem