Social implications Flashcards
The effect on workplace and employment practices
the impact of tech is continuously changing with technological advancements. Face-to-face meetings have often been given away to video conferences and file rooms to mass storage devices. Traditional offices have changed to “desk space” in a large office where employees sit anywhere ,or they may work from home
Acceptable user policy
is a set of rules drawn up by the management of a company to protect the company , the network the company’s devices, and data from misuse
mobile offices vs virtual offices
mobile offices
=comfortable working space
=need good internet .laptop, headphones
=limits to battery life
=lack of power outlets
=aim to have fewer devices so that transportation is easy
virtual offices
=give the business the appearance that it physically exists
=laptops, phones, and the Internet to interact with its customers through the service provider
=savings are made
=use of paper is kept to a minimum ,online resources
advantages of decentralization of labor
= Transport and space costs are reduced
= Some employment categories lend themselves well to decentralization
disadvantages of decentralization of labor
=loss of cohesion and common purpose
=others would benefit more by maintaining interaction in the formal office environment
robotics
complex machines that perform dangerous ,repetitive or distasteful jobs that are boring or risky for humans
advantages and disadvantages of robotics
A = They reduce injuries
D= requires more skilled labor that is able to program and maintain
it s used in medicine and manufacturing industries
artificial intelligence
=a branch of science that deal with machines finding solutions to complex problems n a more human-like manner
=borrowing characteristics from human intelligence and applying them algorithms in a computer-friendly way
unmanned aerial vehicles
a type of aircraft that operates without human pilot on board(drone)
=used to check lands, delivery and other things
social engineering
the act of manuipulating people into giving out personal information in order to commit fraud or gain unauthorised computer access
name 3 technological advancements that could replace the workplace
=robotics
=AI
=Unmanned aerial vehicles
what is ergonomics
the science which deals with the design of equipment ,furniture and environment to fit the user’s capabilities and to promote user safety
physical probelms that come with computers
-text messaging
-repetitive strain injuries
-carpal tunnel syndrome
-eyestrain
what are the reasons for a digital divide
-infrasturucture
-poverty
-education
-political
what is a digital divide
the gap between the haves and have-nots. The haves are the people that have regular access to digital and information technology
discuss economic reasons for using computers
-the computer does more things quickly and more accurately than the alternate option of doing the tasks manually provided that the user feeds the computer accurate data
-productivity in the industry is much greater, more cost-effective more efficient, and more reliable when computers are used in manufacturing, replacing manual labor.
-It allows us to tear extremely large amounts of data with effortless retrieval
reverse social engineering or role-playing
an attack in which an attacker convinces the target that the target has a problem or might have a certain problem in the future and that the attacker, is ready to help solve the problem
effects of computer crime
-social engineering
-shoulder surfing
-dumpster diving
-phising
-reverse social engineering or rola playing
-use of social media for social engineering
shoulder surfing
where the attacker uses observational techniques such as:
-looking over the shoulder to get information while the user inputting sensitive data
-can be performed at a long range using binoculars , vision-enhancing devices
dumpster diving
when an attacker uses thrown documents t get info about the company , employees and network structure
phishing
-convincing email that is sent to a user requesting the user to click on a link that will take them to a fake spoofed website, requiring personal or like banking details
reverse social engineering involves what 3 parts ?
sabotage
marketing
support
sabotage
when the ttacker corrupts the system so the user may ask fr help
marketing
the attacker advertises himself as the only person who can solve the problem so the user can approach him
support
the attacker gains the trust of the target and gets access to sensitive information .
use of social media for social engineering
hackers create a fake account using someone else’s details, then requests the person’s friends and tells them that there is a problem ,
send a link that when clicked, will install a virus on the target’s machine
= Use popular sites also linked in
=use Facebook to gain personal information
hackers and cracker 3 categories are :
-white hat: non-malicious hackers, like employees who test the security of the film’s computer system by trying to break into it.
-black hat/crackers: malicious , hack into systems with the internet to steal or vandalize
-grey hat: in between hackers, sometimes act illegally
virus writers
computer programs that are spread from one computer to another. Others used viruses to prevent their software from being pirated, it’s malicious.
hardware theft
If the hardware is stolen, the software goes with it, and the hardware and applications may be replaced at a considerable cost and should be insured. If the data is stored remotely and is regularly backed up, it can be easily replaced. If the data is confidential it should be encrypted.
software theft
illegal copying , sharing, or usage of copy-right protected programs
happens when someone performs:
-steals software media
-deliberately erases programs
-illegal copies or distributes a program
-register or activates software program illegally
information theft
illegally copying any info that is confidential , personal, including passwords.
identity theft
when a person pretends to be someone else in order to access resources /credit or other benefits in that person’s name.
bandwidth theft
-connecting to the Wi-Fi /internet which you don’t belong to or don’t have permission to use.
- can be used to gain access to the owner’s computer and commit identity theft.
theft of time
when employees accept payment for work not done.
theft of services
using a service without paying for it.
effect of cyber crimes
-everybody who uses the internet is at risk, financial impact
-individuals and companies could potentially lose everything
= People must take every possible precaution to protect themselves.
how to protect your personal info and stay safe online
-install anti-malware and a firewall
- surf and download safely
-never click “agree” or “ok” to close a pop-up window you may be unaware of what you are agreeing to.
-update your software regularly to make security security
- use an updated web browser
-be wary of email attachments
- store sensitive data securely
-be cautious about giving out your personal information to anyone
-choose secure passwords
-never cellphone bank on public computers and Wi-Fi
-stay alert to the latest scams
-be wary of entering online competitions
evaluating information
we need to be aware that there is a great deal of inaccurate information on the web.
fake news
fake news, stories, or hoaxes created to deliberately misinform or deceive readers
different types of fake news are generated;
-clickbait
-propaganda
-satire/parody
- sloppy journalism
evaluating websites
It is important to be able to evaluate websites and select the most relevant information. When you use a search engine, you need to be able to make informed choices when selecting appropriate websites from the vast list provided by the search engine
affiliation
- who supports the website
-is the company or institution or individual affiliated with any professional organization?
companies may present biased information promoting their products or causes. One should always check to see if an organization has affiliations and to whom they are accountable.
audience
- who is it intended for
- is the content appropriate for the intended audience
the level of language, as well as the content of a site, is normally a quick indication of the intended audience.
authority
-who is the author and what are their credentials or qualifications -are they listed??
-check the domain of the document ,what institution publishes the document
often the author is not given, but it is published by a reputable company. If a site does do not have an author and it is not published by a reputable organization, it should be rejected
content
-is the content of the site organized logically?
-are the links all working
-is the info presented cited correctly??
if the content and language of a site is badly written and presented it can be an indication that the information may be incorrect.
currency
-is the information on the web page up to date?
-when was it produced??
-when was it updated?
-how up-to-date are the links?
topics where new developments occur should be up to date
design
- is it easy to navigate and visually pleasing
-can you view the information properly?
-does the webpage load easily ?
-are you required to register and provide personal information
if a website is difficult to vavigate then mst users will leave after 3 clicks of the mouse to hyerlinks. If the site requires you to register
design
- is it easy to navigate and visually pleasing
-can you view the information properly?
-does the webpage load easily?
-are you required to register and provide personal information
if a website is difficult to navigate then most users will leave after 3 clicks of the mouse to hyperlinks. If the site requires you to register, generally avoid it unless you are sure that site will be beneficial
objectivity
- does it reflect preconceptions?
-is the page a mask for advertising? If so, the information might be biased.
-how detailed is the information
-does the author use emotive language - does the author cite a few limits to support their arguments
it has to do with whether the info is presented in a fair and balanced way, by offering different points of view. To understand objectivity, understand the purpose of the website.
what is green computing
the study of designing devices in a way that reduces their environmental impact ,engineering,manufacturing , using and disposing of computing
name the 4 approaches to green computing
-green use
green disposal
green design
green manufacturing
green use
minimizing the electricity consumption of computers and their peripheral devices and using them in an eco frienf\dly manner
green disposal
repurposing existing equipment or appropriately disposing of or recycling unwanted electronic equipment
green design
designing energy-efficient computers ,servers and printers and other digital devices .
green manufacturing
Reduce waste during the manufacturing of computers and other computing devices to reduce the environmenta l impact
green manufacturing
Reduce waste during the manufacturing of computers and other computing devices to reduce the environmental impact
what are the strategies to make your computer usage greener?
-use the hibernate or sleep mode when away for the computer
-buy energy-efficient notebook computers instead of desktops
- activate the power management features for controlling energy consumption
-make arrangements for safe disposal
-turn off the computer at the end of each day
-don’t buy,upgrade the existing one
Data misuse
when data is used for a different purpose than the original reason it was collected
Cyberbullying
bullying that takes place over digital devices which includes sending, posting or sharing negative content about someone else
Child pornography
images of children involved in sexual activities traded on the internet often using the dark web around the clock
Electronic Communications and Transactions Act
any form of communication by email, the internet etc it does not include voice communications between two people
Cryptocurrencies
a form of payment that can be exchanged online for goods and services