Social implications Flashcards
The effect on workplace and employment practices
the impact of tech is continuously changing with technological advancements. Face-to-face meetings have often been given away to video conferences and file rooms to mass storage devices. Traditional offices have changed to “desk space” in a large office where employees sit anywhere ,or they may work from home
Acceptable user policy
is a set of rules drawn up by the management of a company to protect the company , the network the company’s devices, and data from misuse
mobile offices vs virtual offices
mobile offices
=comfortable working space
=need good internet .laptop, headphones
=limits to battery life
=lack of power outlets
=aim to have fewer devices so that transportation is easy
virtual offices
=give the business the appearance that it physically exists
=laptops, phones, and the Internet to interact with its customers through the service provider
=savings are made
=use of paper is kept to a minimum ,online resources
advantages of decentralization of labor
= Transport and space costs are reduced
= Some employment categories lend themselves well to decentralization
disadvantages of decentralization of labor
=loss of cohesion and common purpose
=others would benefit more by maintaining interaction in the formal office environment
robotics
complex machines that perform dangerous ,repetitive or distasteful jobs that are boring or risky for humans
advantages and disadvantages of robotics
A = They reduce injuries
D= requires more skilled labor that is able to program and maintain
it s used in medicine and manufacturing industries
artificial intelligence
=a branch of science that deal with machines finding solutions to complex problems n a more human-like manner
=borrowing characteristics from human intelligence and applying them algorithms in a computer-friendly way
unmanned aerial vehicles
a type of aircraft that operates without human pilot on board(drone)
=used to check lands, delivery and other things
social engineering
the act of manuipulating people into giving out personal information in order to commit fraud or gain unauthorised computer access
name 3 technological advancements that could replace the workplace
=robotics
=AI
=Unmanned aerial vehicles
what is ergonomics
the science which deals with the design of equipment ,furniture and environment to fit the user’s capabilities and to promote user safety
physical probelms that come with computers
-text messaging
-repetitive strain injuries
-carpal tunnel syndrome
-eyestrain
what are the reasons for a digital divide
-infrasturucture
-poverty
-education
-political
what is a digital divide
the gap between the haves and have-nots. The haves are the people that have regular access to digital and information technology
discuss economic reasons for using computers
-the computer does more things quickly and more accurately than the alternate option of doing the tasks manually provided that the user feeds the computer accurate data
-productivity in the industry is much greater, more cost-effective more efficient, and more reliable when computers are used in manufacturing, replacing manual labor.
-It allows us to tear extremely large amounts of data with effortless retrieval
reverse social engineering or role-playing
an attack in which an attacker convinces the target that the target has a problem or might have a certain problem in the future and that the attacker, is ready to help solve the problem
effects of computer crime
-social engineering
-shoulder surfing
-dumpster diving
-phising
-reverse social engineering or rola playing
-use of social media for social engineering
shoulder surfing
where the attacker uses observational techniques such as:
-looking over the shoulder to get information while the user inputting sensitive data
-can be performed at a long range using binoculars , vision-enhancing devices
dumpster diving
when an attacker uses thrown documents t get info about the company , employees and network structure
phishing
-convincing email that is sent to a user requesting the user to click on a link that will take them to a fake spoofed website, requiring personal or like banking details
reverse social engineering involves what 3 parts ?
sabotage
marketing
support
sabotage
when the ttacker corrupts the system so the user may ask fr help
marketing
the attacker advertises himself as the only person who can solve the problem so the user can approach him