0% found this document useful (0 votes)
19 views23 pages

Introduction To Information Technology GEED

Uploaded by

Trina Lariosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views23 pages

Introduction To Information Technology GEED

Uploaded by

Trina Lariosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Living in the IT ERA

TITO ERNESTO Z. LORETO


Instructor
Defining Information

⚫ What is Information?
Information is any knowledge that comes to our
attention. That could be voice, image, text and video
⚫ What is data?
Data is information when dealing with the machine
What Counts as information
Methods for conveying information
Defining Information Technology

⚫ Information Technologies are


systems of hardware and/or
software that capture, process,
exchange, store and/or present
information using electrical,
magnetic and/or
electromagnetic energy.
IT Example: Cellular Telephony
IT Example: Wireless Internet
IT in Society (people)

⚫ Personal Communication
⚪ Conversations (phone, cell)
⚪ Messaging (E-mail, SMS)
⚪ Video Coms

⚫ Entertainment
⚪ Web surfing
⚪ Downloading video and audio files
⚪ Interactive gaming

⚫ Day-to-Day living
⚪ Buying airline tecket
⚪ Ordering books
⚪ Electronic banking/ stock market
IT in Society (business)

⚫ Internal Communication
⚪ Computer network

⚪ Corporate website

⚪ Video teleconferencing
⚪ Messaging (SMS, email)

⚫ Electronic Commerce
⚪ Call Centres

⚪ Electronic transactions

⚪ Online sales

⚫ Business operations
⚪ Factory operation systems

⚪ Databases
Examples on IT Careers
⚫ Information Security Jobs
⚪ Address information security
⚫ IT Analyst
⚪ Translate business requirement into technical specification
⚫ Network Administration
⚪ Configure and operate computer network
⚫ Management Consulting
⚪ Provide consulting for government and organizations
⚫ Database Administration
⚪ Managing corporate database
⚫ Computer Forensics Expert
⚪ Extracts computer evidence for detecting/preventing /prosecuting crimes
⚫ IT Sales:
⚪ people on frontline to sell products
⚫ Software development:
⚪ develop software solutions
:Privacy and Information Technology
(Living in the IT Era)
GEED

TITO ERNESTO Z. LORETO


Instructor
Topics
Computer Technology and its Benefits •
Privacy •
Eavesdropping •
Trusting Computers •
Free Speech •
IP •
Crime •
Work •
Play •
Professional Ethics •
Computer Technology & its Benefits .1

What benefits has computer technology •


?brought about in the past ten years
?Directly personal perspective –
?Broader perspective –
?Is it an enabler •
?Or is it a destroyer •
Privacy .2
Risks of Computer Technology to •
Personal and Private Data
?”Big Brother“ •
,Consumer Information (databases •
(marketing
Social Insurance Numbers, IDs, Health •
Information
Protecting Privacy •
Should Google be able to keep a record of
?all search queries you have ever made
Eavesdropping .3
Encryption and Interception of Communications •
?Wiretapping? Designing this into systems •
Cryptography •
Encryption Policy •
Fundamental Issues •
Role of Secrecy –
?Status-Quo –
Trust in Government –
Trusting Computers .4
?What can go wrong •
?as a computer user –
?as a computer professional –
?as an educated member of society –
;Problems for individuals; system failures •
abandoned systems
Therac-25 •
Increasing Reliability and Safety •
Computer models and trust •
How many of you have tried hang-gliding? Or bungeejumping? How many of
you would say “No way!”? How many would ride on a computer-controlled train
that had no human driver? How many of you would like to be one of the first to
?have a computer chip implanted in your head to, say, improve language ability
Free Speech .5
?What is the web •
?Print media –
?Broadcast media –
Offensive Speech and Censorship •
Internet Access in Libraries and Schools •
”.On the Internet, no one knows you’re a dog“ •
Spam •
Diversity •

?Should spam be considered a form of trespassing


.Restaurants are open to the public but can exclude rowdy people
What rules or laws does that analogy suggest about sending spam to
subscribers of an ISP
?Are free-speech laws more relevant in one case than in another
IP .6
Intellectual Property and Changing Technology •
Copyright Law •
Copying music, movies, software, books •
Software piracy •
Free software •

?Should algorithms be patentable


?Should free music/film downloading be permitted
Crime .7
:Computers + the web •
new environment for fraud
Hacking •
– Script kiddies •
minimal computer skills needed
Hacktivism? - hacking for political cause •
Scams, phishing •
Credit cards, identity theft •

Do hackers provide a public service by finding and


?publicizing computer-security weaknesses
Work .8
Job destruction and creation •
Changing skills and jobs •
Work environment •
Employee Monitoring •
Employee e-mail, web surfing, voice mail •
Health Issues •
Eastern programmers •
Play .9
Computer games •
MMORPGs - Massive multiplayer online •
role-playing games
Messaging •
Social Networking •
E.g. Twitter, Facebook –
Professional Ethics .10
Professional ethics and responsibilities •
Ethics (briefly!), ethical views •
IEEE/ACM Codes •
Case Studies •

What are your obligations as a Professional Engineer


?in Canada
Ex: Buying Music Online
Stealing music is an old problem, but it is •
now easier to distribute it to more people
Music industry & laws took substantial •
time to adapt
Music can be widely distributed on the net •
Tradeoffs: benefits (cheaper, more convenient), •
drawbacks (increased possibility for crime)

You might also like