Using Information Technology Chapter 9 The Challenges of the Digital Age
2 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. The Challenges of the Digital Age Society & Information Technology Today 9.1Security Issues: Threats to Computers & Communications Systems 9.2Security: Safeguarding Computers & Communications 9.3Quality-of-Life Issues: The Environment, Mental Health, & the Workplace 9.4Economic Issues: Employment & the Haves/Have- Nots 9.5The Digital Environment: Is There a Grand Design?
The Challenges of the Digital Age 3 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. 9.1 Security Issues: Threats to Computers & Communications Systems Errors & Accidents: Human errors - humans cant assess own information needs - human emotions affect performance - humans act on their perceptions Software errors Procedural errors Electromechanical problems Dirty data problems
The Challenges of the Digital Age 4 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Errors & Accidents Human errors Procedural errors – computer failures occur as a result of non-compliance of procedures Software errors Electromechanical problems Dirty data problems
The Challenges of the Digital Age 5 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Errors & Accidents Human errors Procedural errors Software errors – software bugs Electromechanical problems Dirty data problems
The Challenges of the Digital Age 6 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Errors & Accidents Human errors Procedural errors Software errors Electromechanical problems – failure of mechanical systems due to faulty construction, overheating, wearing out, or damage Dirty data problems
The Challenges of the Digital Age 7 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Errors & Accidents Human errors Procedural errors Software errors Electromechanical problems Dirty data problems - incomplete, outdated, or otherwise inaccurate data
The Challenges of the Digital Age 8 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Natural & Other Hazards Natural hazards Civil strife and terrorism
The Challenges of the Digital Age 9 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Crimes Against Computers & Communications Theft of hardware - shoplifting an accessory Theft of software and data Theft of time and services Theft of information Crimes of malice and destruction
The Challenges of the Digital Age 10 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Crimes Against Computers & Communications Theft of hardware Theft of software and data - illegal copying of programssoftware Theft of time and services Theft of information Crimes of malice and destruction
The Challenges of the Digital Age 11 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Crimes Against Computers & Communications Theft of hardware Theft of software and data Theft of time and services – using employers computer time to play games Theft of information Crimes of malice and destruction
The Challenges of the Digital Age 12 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Crimes Against Computers & Communications Theft of hardware Theft of software and data Theft of time and services Theft of information – stealing confidential personal records Crimes of malice and destruction
The Challenges of the Digital Age 13 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Crimes Against Computers & Communications Theft of hardware Theft of software and data Theft of time and services Theft of information Crimes of malice and destruction – abusing or vandalizing computers
The Challenges of the Digital Age 14 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Crimes Using Computers & Communications Using information technology to assist in a crime Investment fraud Tools to detect fraud: Rule-based-detection software Predictive-statistical model software
The Challenges of the Digital Age 15 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Worms & Viruses Worm - a program that copies itself repeatedly into a computers memory or onto a disk drive Virus Virus - a deviant program, stored on a computer drive, that can cause unexpected and often undesirable effects, such as destroying or corrupting data Anti-virus software - scans a computers hard disk, floppy disks, and main memory to detect viruses and destroy them
The Challenges of the Digital Age 16 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Computer Criminals HackersHackers - gain unauthorized access to computer or telecommunications systems Crackers - illegally break into computers for malicious purposes Employees - more than 80% of all IT crime perpetrators Outside users - suppliers and clients Professional criminals - organized crime rings
The Challenges of the Digital Age 17 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. 9.2 Security: Safeguarding Computers & Communications Security - system of safeguards for protecting information technology Identification & Access Encryption Protection of software and data Disaster-recovery plans
The Challenges of the Digital Age 18 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Identification & Access What you have - What you know Who you are Cards Keys Signatures Badges
The Challenges of the Digital Age 19 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Identification & Access What you have What you know… Who you are PIN (personal identification number) - the security number known only to you that is required to access the system Password - a special word, code, or symbol required to access a computer system
The Challenges of the Digital Age 20 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Identification & Access What you have What you know Who you are… Iris scan BiometricsBiometrics - science of measuring individual body characteristics
The Challenges of the Digital Age 21 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Encryption Encryption - the process of altering readable data into unreadable form to prevent authorized access Private key - same secret key used by both sender and receiver Public key - two keys are used
The Challenges of the Digital Age 22 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Protection of Software & Data Control of access - restricts access to data files to those with a need to know Audit controls – track which programs and servers were used, which files have been opened, etc. People controls - check resumé facts, separate employee functions, shred papers, etc.
The Challenges of the Digital Age 23 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Disaster-Recovery Plan Disaster-recovery plan - a method of restoring information-processing operations that have been halted by destruction or accident
The Challenges of the Digital Age 24 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. 9.3 Quality-of-Life Issues: The Environment, Mental Health, & the Workplace Environmental problems: Manufacturing by-products - exposing semiconductor industry workers to a variety of hazardous toxins Disposal by-products Environmental blight Possible risks of nanotechnology
The Challenges of the Digital Age 25 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Environmental problems: Manufacturing by-products Disposal by-products - e-waste - obsolete or broken PCs, monitors, printers, cellphones, TVs and other electronics Environmental blight Possible risks of nanotechnology
The Challenges of the Digital Age 26 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Environmental problems: Manufacturing by-products Disposal by-products Environmental blight - visual pollution represented by wireless towers, roof antennas, satellite dishes, and all the utility poles topped with transformers and strung with electric, phone, cable-TV, and other wires Possible risks of nanotechnology
The Challenges of the Digital Age 27 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Environmental problems: Manufacturing by-products Disposal by-products Environmental blight Possible risks of nanotechnology - manipulating materials such as carbon, zinc, and gold at molecular level
The Challenges of the Digital Age 28 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Mental-Health Problems Isolation - going for days without actually speaking with or touching another person Gambling - information technology makes it almost unavoidable Stress - 83% of corporate network administrators reported abusive and violent behavior by employees toward computers
The Challenges of the Digital Age 29 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Workplace Problems: Impediments to Productivity Misuse of technology - computers may be costing U.S. companies tens of billions of dollars a year in downtime, maintenance and training costs, game playing, and information overload Fussing with computers - all the fussing that employees do with hardware, software, and online connections Information overload - employees tend to work longer hours under more severe deadline pressure
The Challenges of the Digital Age 30 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. 9.4 Economic Issues: Employment & the Haves/Have-Nots Technology, the Job Killer? Hundreds of companies are replacing service representatives with voice software. Gap between Rich & Poor Employees with technology skills earn roughly 10–15% higher pay
The Challenges of the Digital Age 31 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. 9.5 The Digital Environment: Is There a Grand Design? Internet2 - a cooperative university/business education and research project that enables high-end users to quickly and reliably move huge amounts of data over high-speed networks The 1996 Telecommunications Act - designed to let phone, cable, and TV businesses compete and combine more freely
The Challenges of the Digital Age 32 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. The Digital Environment: Is There a Grand Design? ICANN – a private corporation that regulates the domain names that overlie IP addresses and identify the website type Whom Does the Internet Serve? In a World of Breakneck Change, Can You Still Thrive? upgrade your skills, specialize, and market yourself
The Challenges of the Digital Age 33 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the science of measuring individual body characteristics called? Biometrics
The Challenges of the Digital Age 34 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is an example of biometrics? Fingerprint, palm print, iris scan, retinal scan
The Challenges of the Digital Age 35 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What non-profit organization was established to regulate Internet domain names? ICANN (Internet Corporation for Assigned Names & Numbers)
The Challenges of the Digital Age 36 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the name for a person who illegally breaks into computers for malicious purposes? Cracker
The Challenges of the Digital Age 37 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the name for a program that copies itself repeatedly into a computers memory or onto a disk drive until no space is left? Worm
The Challenges of the Digital Age 38 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What are the two broad categories of computer crime? 1. Crimes against computers or telecommunications 2. Crimes using computers or telecommunications
The Challenges of the Digital Age 39 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What group makes up the largest group of computer criminals? Employees
The Challenges of the Digital Age 40 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for data which is incomplete, outdated, or otherwise inaccurate? Dirty data
The Challenges of the Digital Age 41 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for the gap between those with and without access to information technology? Digital divide
The Challenges of the Digital Age 42 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What type of software is used to alter data so that it is not usable unless the changes are undone? Encryption software
The Challenges of the Digital Age 43 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for an error in a program that causes it not to work properly? Software glitch or software bug
The Challenges of the Digital Age 44 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for a deviant program that can cause unexpected and often undesirable effects? Virus
The Challenges of the Digital Age 45 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What are the two ways worms and viruses can be passed? By floppy disk By the Internet or some other network
The Challenges of the Digital Age 46 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for a system of safeguards to protect information technology? Security
The Challenges of the Digital Age 47 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What scans a computers hard disk, floppy disks, and main memory to detect viruses and destroy them? Anti-virus software
The Challenges of the Digital Age 48 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for a special word, code, or symbol required to access a system? Password
The Challenges of the Digital Age 49 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for the security number known only to the user and required to access the system? Personal identification number (PIN)
The Challenges of the Digital Age 50 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What are the two basic forms of encryption? Private-key or symmetric encryption Public-key encryption
The Challenges of the Digital Age 51 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for a method of restoring information- processing operations halted by destruction or accident? Disaster-recovery plan
The Challenges of the Digital Age 52 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for manipulating materials at the molecular level? Nanotechnology