Download Powerpoint on social impact issuses

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Business intelligence wikipedia , lookup

Information privacy law wikipedia , lookup

Computer security wikipedia , lookup

Transcript
Social Impact of Computers
By
Mak Mang Tao
The Cashless Society
• Companies with terminals linked to central
computer can handle money transactions
• Smart Card- money “added to the
card(equipped with a chip) through addvalue machine
Advantages and Disadvantages
• Convenient, shopping
no need to carry large
amount of money
• reduce the risk of
robbery
• save time, don’t have
to wait in queues for
withdrawing money
• no foreign exchange
for travelling overseas
• Easy to spend more
than you can afford
• fraud- card is stolen
and signature is fraud
or the number changed
through ironing and
embossing
• problems arise when
computers breakdown
or human errors
Unemployment and employment
• Automation has cause threat to workers as
computers controlled machine or robots are
replacing them
• however, the computer industry can create
many new jobs
• now, many jobs are computer related in
order to work smoothly
• but in the long run, the number of these jobs
will decline as computer are easier to use
• see 98-CE-STUD 1B 6(c)
Computers’ related jobs
Data processing
manager
Systems analyst
Applications
programmer
Systems
programmer
Database
administrator
Computer
Operator
Data entry
operator
-responsible for overall running of the data processing
department
-analyses information system. He works with users to deal
with requirements and solve problems. He also helps to
design systems
-responsible for writing high level programs under the
systems designs and specifications of system analyst.
-responsible for writing low level systems program to
improve the performance of hardware
-designs, creates and maintains the database of the
organization
-look after day- to- day operation of the system, includeing
loading and back up disc
-prepares and enters data into the computer
Computers Related jobs
• See 2000-CE-COMP STUD 1B 2(a),(b)
Change in work pattern
•
•
•
•
Shorter working hours
sharing jobs
reduce the age of retirement
“remote office” at home by using modem
devices- reduce traffic jam, can work and do
housework at the same time
• enjoy more leisure time???or no private
space???
New Lifestyle
• Computers are becoming easier to learn and
to use
• ‘user-friendly’ interactive graphics-user
interface (icons, menus…)
• easier to train staff
• multimedia environment makes people to
use computer for learning and for
entertaining e.g. learning a foreign language,
browsing multimedia encyclopedia
Computer Ethics
• Question (1)
What if you do a friend a favour and make a
copy on a blank diskette of a microcomputer
game that he/she has admired ?
• What’s your view?(Agree or disagree)
– “Just one copy can’t hurt”
– “Everybody does it, why shouldn’t I”
– “Copying software is un-ethical”
• Question (2)
What if you have spent weeks of writing a
project, but somebody else photocopy it and
turn it in for a grade?
• What will you feel?
Computer Ethics
• About what is right and what is wrong
• users adopt a code of ethics
1. Do not violate the confidentiality of your
employer
2. Use information responsibly
3. Do not violate the rights or privacy of
others
4. Do not break the law
Topics of computer ethics
•
•
•
•
•
•
Privacy and confidentiality
Data transfer
Data accuracy
Software Piracy(盜版軟件)
Computer crime
Computer viruses
Privacy and confidentiality
• Companies and government departments use
computers to store confidential personal data
e.g. medical records, tax information, credit card
information, immigrate/emigrate records, public
exam records, id-card number
• may be illegally accessed, changed and
abused(e.g.梁愛詩病歷報告外洩, X週刊報導
某人資料)
• Personal data must not kept longer than
necessary
• see 98-CE-COMP-STUD 1B 6(d)
Data transfer
• Data can be easily transfer from one
computer to another
• mail order company can purchase mailing
lists from special organizations which sell
information of other people
Data accuracy
• Information about a person may be
incorrect
• e.g. a loan might be rejected for incorrect
information(poor credit ratings)
• ensure accuracy by data validation and
verification and regularly updated
Software Piracy
• Refers to illegal copying software(except
for backup purposes)
• include programmers who “steal” programs
from the companies works for
• copying copyrighted software and then
reselling it breaks the copyright law.
• Using unlicensed software is also breaking
the law
• Are you helping to sell the program or
break the law?
Software piracy
• Intellectual Property Department
http://www.info.gov.hk/ipd/index.htm
• see 97-CE-COMP-STUD IB 6(b)
• see 99-CE-COMP-STUD IB 1(d)
• see 00-CE-COMP-STUD IB 2(c)
Computer Crimes
• Theft of computer time
– using employer’s computer to type term papers,
calculate racing scores etc.
– playing computer games during computer
lessons
• Manipulation of computer programs or data
– student illegally gain access to school computer
and change subject grades in school database
– programmer working in a bank change the
computer program and transfer funds into his
own account
Computer Crimes
• Manipulation of computer programs or data
– develop an electronic device which can rewrite
the values of MTR stored-value tickets
– develop a virus program(usually by hackers)
and put it in a network, which not only destroy
the data on disks but also spread the network
• Theft of Data
– computer criminals using home computers to
break security codes and review confidential
data bakns of the government
Computer Viruses
• A virus is a subversive program that can
corrupt , erase data files, or overwrites the
boot sector. It replicates itself and spreads
to other systems
• can be imported through disks or networks
• motives:
– pride to demonstrate one’s computer knowledge
and ability
– revenge to vandalism
– terrorism
Computer Viruses
• To minimize the damage by viruses, one
should
– avoid use of illegal software or program with
unknown source
– do a regular clean backup or disk files
– perform virus scan and cleaning of hard disks
• see 2000-CE-COMP STUD 1B 2(d)