0% found this document useful (0 votes)
24 views

Computer Chapter 1 Notes

notes

Uploaded by

42Rashika Saraf
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Computer Chapter 1 Notes

notes

Uploaded by

42Rashika Saraf
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

1.1.

Context of New System Planning

Understanding Organisational Needs


Identifying the primary objectives and needs of the organisation is crucial:
• Business Goals: Understand the broader business objectives, including
increasing e ciency, improving service, or expanding market reach.
• Current System Analysis: Examine the limitations and capabilities of the
current system. This understanding helps in pinpointing speci c
improvements or changes needed.
• User Requirements: Gather detailed input from end-users to understand
their needs, challenges, and expectations from the new system.

Market Research and Trends


Conducting thorough research and understanding emerging trends can o er
insights into innovative solutions and technologies:
• Benchmarking: Analyse how similar systems function in other
organisations, particularly those known for best practices and innovation.
• Technology Trends: Stay updated with the latest in technology to see if
emerging tools or platforms could bene t the new system.

Feasibility Study
The feasibility study assesses if the proposed system is viable and sustainable:
• Technical Feasibility: Can the existing technical infrastructure support the
new system? What upgrades are required?
• Economic Feasibility: Will the new system be cost-e ective? Consider
development, operation, and maintenance costs.
• Legal and Compliance Feasibility: Ensure the system complies with
relevant laws, regulations, and standards.

Appreciating Extent and Limitations


Technical Capabilities and Constraints
Understanding what the system can and cannot do is essential for setting realistic
expectations:
• Scalability: Can the system grow in size or scope if needed?
• Interoperability: How well will it work with other existing or potential future
systems?
• User Experience: Assess how the system will impact the end-users in their
daily tasks.

Cost-Bene t Analysis
Weigh the system's potential bene ts against its costs:
• Direct and Indirect Costs: Include development, deployment, training, and
maintenance costs.
ffi
fi
fi
fi
ff
fi
ff
• Bene ts: Increased e ciency, improved data accuracy, customer
satisfaction, and competitive advantage.

Organisational Issues in New System Installation


User Roles in System Implementation
• End-Users: In-depth understanding of their interaction with the system is
necessary. They are often the rst to spot issues in system design and
usability.
• System Administrators and IT Sta : Essential for maintaining, updating,
and troubleshooting the system.
• Decision Makers: Senior management who will approve the budget and
resources and de ne the project's scope.

Underlying Technologies
• Selection of Technologies: Decisions regarding software languages,
development frameworks, and hosting environments.
• Data Management: Ensuring the integrity, accessibility, and security of
data within the new system.

Installation Challenges
• Customisation Needs: How much customisation will the system require to
meet speci c organisational needs?
• Training and Support: Developing comprehensive training programmes for
di erent user groups.

Security and Data Protection


• Risk Analysis: Assess potential security vulnerabilities and threats.
• Data Encryption and Backup: Implementing robust encryption standards
and regular data backup procedures.

Ethical and Social Considerations


• Data Privacy: Adherence to data protection laws and ethical standards in
handling user data.
• Employee Well-being: Considering the impact of new systems on
employee workload, job security, and work-life balance.

Conclusion
Planning a new system in an organisation involves more than just technological
considerations. It's about aligning a new system with the business goals,
understanding the needs and limitations from various perspectives, and navigating
through the challenges of implementation while considering ethical, social, and
security aspects. Thorough planning, research, and engagement with all
stakeholders are key to the successful deployment of a new system that meets the
evolving needs of the organisation.
ff
fi
fi
fi
ffi
fi
ff
1.2.1
De ning Key Terms
Hardware
• Hardware refers to the tangible, physical elements of a computer system.
• Major components include the CPU (the 'brain' of the
computer), RAM (short-term memory), storage devices (like HDDs and
SSDs for long-term data storage), and motherboards (which connect all
internal components).
• External hardware, like monitors, keyboards, and printers, are known as
peripherals.

Software
• Software is the collection of data, programs, and instructions used to direct
hardware to perform desired tasks.
• Operating Systems (OS) like Windows, macOS, and Linux manage the
hardware and create an environment for other software to run.
• Application software, like Microsoft O ce or Adobe Photoshop, enables
users to perform speci c tasks.

Peripherals
• Peripherals extend a computer's capabilities, connecting externally or
internally, and can be input, output, or storage devices.
• Input devices (e.g., keyboard, mouse) allow users to input data, whereas
output devices (e.g., monitors, printers) display or project data.
• Some peripherals, like external hard drives, serve for both storage and data
transfer functions.

Network
• A network in computing refers to a collection of interconnected computers
and devices that can share resources and data.
• Networks can range from small local area networks (LANs) in a single
building to massive, spread-out wide area networks (WANs), like the
Internet.
• Components of a network include routers, switches, cables, and wireless
access points.

Human Resources
• Human Resources in IT encompass all personnel involved in system
analysis, design, implementation, maintenance, and management.
• They play key roles in project management, technical support, security, and
ensuring that IT infrastructure aligns with organisational goals.
fi
fi
ffi
Roles of Computers in a Networked World
Client
• In networking, a client is a device that accesses shared network services
provided by another computer (server).
• Clients can be a variety of devices like desktop computers, laptops,
smartphones, etc.
Server
• Servers are powerful computers or software systems that provide data,
services, or resources to clients.
• Servers can handle various functions depending on their role: le storage,
email management, web hosting, and database services.
Email Server
• An email server is a server that handles and manages the sending,
receiving, processing, and storage of emails.
• Email servers ensure security protocols, store emails, and sort incoming
and outgoing messages.
DNS Server
• A DNS server converts user-friendly domain names into IP addresses
necessary for locating computer services and devices worldwide.
• This system is like the Internet’s phonebook, essential for the functionality
of the global internet.
Router
• Routers are devices that forward data packets between computer
networks, creating an overlay internetwork.
• They manage tra c between home and o ce networks and the internet,
determining the best route for data to travel e ciently.
Firewall
• A rewall is a network security device that monitors incoming and outgoing
network tra c and decides whether to allow or block speci c tra c based
on a de ned set of security rules.
• It's a primary line of defence in network security, safeguarding internal
networks from external threats.

Social and Ethical Issues in a Networked World


Privacy and Security
• The advent of networked systems raises signi cant issues around data
privacy and information security.
• Concerns include the protection of personal data from unauthorised
access, misuse, or cyber-attacks, and ensuring user con dentiality.

Digital Divide
• The digital divide addresses inequalities in access to information
technology, heavily in uenced by geographic, economic, and socio-political
factors.
fi
fi
ffi
ffi
fl
ffi
ffi
fi
fi
fi
fi
ffi
• It questions the fairness and accessibility of technology, highlighting the
need for inclusive, global strategies to bridge this gap.

Environmental Impact
• The environmental footprint of technology is a growing concern. This
includes energy consumption of data centres, electronic waste, and the life
cycle impact of producing and disposing of tech products.
• Responsible use, recycling policies, and developing greener technologies
are ethical considerations.

Dependence on Technology
• Over-reliance on networked systems raises questions about vulnerability to
system outages, data loss, and the erosion of traditional skills and privacy.
• This dependency highlights the importance of backup systems, robust
security protocols, and balanced integration of technology in daily life.

Misinformation and Censorship


• In the era of information overload, the spread of misinformation and the role
of censorship become crucial ethical concerns.
• Balancing the freedom of information with the responsibility of providing
accurate, veri ed content is a complex challenge in the digital age.

Labour and Employment


• Technological advances, while creating new job opportunities, can also
render certain skills obsolete.
• Ethical challenges include workforce retraining, addressing unemployment
due to automation, and ensuring fair labour practices in technology-driven
economies.

1.2.2. Identifying Relevant Stakeholders

Identifying stakeholders is the rst step in ensuring their needs are met. In system
planning, stakeholders typically include:
• End-Users: Individuals who will directly interact with the system.
Understanding their needs is crucial as they determine the system's
success or failure.
• Developers: They are responsible for building the system in line with
stakeholder requirements.
• Business Owners/Managers: They ensure the system aligns with broader
business strategies and goals.
• IT Support Sta : They play a pivotal role in the ongoing maintenance and
troubleshooting of the system.
• Suppliers and Vendors: These stakeholders provide the necessary
hardware, software, and other technology components.
fi
ff
fi
• Regulators and Legal Entities: They are essential for compliance with
legal standards, especially in matters relating to data protection and
privacy.

Theory of Knowledge Perspective in Stakeholder Relevance


Understanding stakeholders also involves Theory of Knowledge (ToK)
perspectives, which can help in appreciating the depth and breadth of their
impact:
• Utilitarianism: This viewpoint suggests actions should bene t the most
signi cant number of people. Applying this to system planning means
creating systems that cater broadly to user requirements and societal
needs.
• Means-Ends Principle: This principle involves assessing the methods used
to achieve an objective, highlighting the importance of the means
(processes) just as much as the ends (goals).

Ethical Considerations
• Ethical dilemmas often arise when balancing diverse stakeholder needs. For
instance, enhancing functionality for some users might compromise the
privacy or accessibility for others.
• An ethical approach requires carefully navigating these dilemmas, ensuring
respect for individual rights and societal norms.

Methods of Obtaining Requirements from Stakeholders


The process of gathering stakeholder requirements is critical in shaping a system
that meets their needs e ectively.
Surveys
• Structure and Format: Surveys should be structured to gather speci c
data points while also allowing for open-ended responses to capture more
nuanced feedback.
• Distribution and Reach: Online tools can enhance the reach of surveys,
allowing for diverse stakeholder inputs.
• Analysis: Responses should be meticulously analysed to discern clear
patterns and speci c needs, guiding the development process.

Interviews
• Preparation: Adequate preparation is key, including developing a set of
guiding questions that are open-ended to elicit detailed responses.
• Conducting Interviews: Interviews can be face-to-face or virtual. The key
is to create a comfortable environment encouraging open communication.
• Analysis: Qualitative analysis techniques are used to interpret the
responses, extracting themes and insights to inform system development.
fi
fi
ff
fi
fi
Direct Observations
• Contextual Understanding: Observations allow for an understanding of
how stakeholders interact with existing systems in their natural settings.
• Data Collection: Notes, video recordings, and interviews can complement
observations, providing a comprehensive understanding of stakeholder
interactions and challenges.

Emphasis on E ective Collaboration (AIM 5) and Privacy


Considerations (S/E)
Fostering e ective collaboration among stakeholders and considering their privacy
are essential components of system planning.
• Collaboration Techniques: Workshops, regular meetings, and continuous
feedback channels can enhance stakeholder collaboration.
• Privacy in Data Collection: Ensuring stakeholder privacy involves securely
managing data, being transparent about its use, and adhering to data
protection regulations.

Implementing Privacy Measures


• Technical Measures: Use of encryption, secure databases, and access
controls to ensure data privacy.
• Policy Measures: Developing clear guidelines on data usage, storage, and
sharing is essential for maintaining stakeholder trust.

Navigating Ethical Dilemmas


• Case Studies and Scenarios: Exploring hypothetical scenarios or case
studies can help in understanding and resolving potential ethical dilemmas.
• Stakeholder Dialogue: Regular communication with stakeholders is
essential for understanding and addressing their ethical concerns.

1.2.3. Techniques for Gathering Information

Examining Current Systems


• Purpose: To identify limitations and potential enhancements in existing
systems.
• Methods: Involves observing how current systems are used, collecting user
feedback, and analysing performance data.
• Outcomes: Helps identify ine ciencies, understand user expectations, and
set realistic benchmarks for new systems.

Analysing Competing Products


• Objective: Gaining insight into competitors' products to inform innovative
and competitive design.
• Techniques: Involves feature comparison, understanding market trends,
and recognising strengths and weaknesses in competitors’ o erings.
ff
ff
ffi
ff
• Results: Aids in developing features that are distinct, user-focused, and
market-relevant.

Assessing Organisational Capabilities


• Aim: To align the proposed system with the organisation's current abilities
and strategic goals.
• Approach: Encompasses auditing available resources, conducting
interviews with sta , and evaluating existing technology infrastructures.
• Implications: Ensures that the proposed system is achievable and supports
organisational growth.

Literature Searches
• Purpose: To build a foundation of theoretical and empirical knowledge
around the system being developed.
• Methodology: Involves reviewing academic journals, industry-speci c
reports, and technical documents.
• Bene ts: Ensures that the system design is informed by up-to-date,
research-based insights and innovations in the eld.
Intellectual Property Considerations (S/E)
• Understanding: Emphasising the importance of adhering to legal standards
regarding intellectual property.
• Practices: This includes ensuring compliance with copyright, patents, and
trademark laws during system development.
• Consequence: Protects against legal disputes and fosters ethical
standards in IT development.

Representations of System Requirements


System Flow Charts
• De nition: Visual representations outlining how data is processed within a
system.
• Components: Uses symbols such as arrows for direction, ovals for start/
end points, rectangles for processes, and diamonds for decision-making.
• Utility: Essential for simplifying and conceptualising complex system
processes, making them understandable for stakeholders at all levels.

Data Flow Diagrams


• Purpose: To illustrate how data is handled within a system, including its
sources, destinations, and storage.
• Structure: Consists of four major components - entities (external to the
system), processes (that transform data), data stores (where data is held),
and data ows (movement of data).
• Advantage: E ectively communicates how data moves through a system,
important for understanding user interactions and backend processes.
fi
fi
fl
ff
ff
fi
fi
Structure Charts
• Explanation: Demonstrates the organisational layout of a system,
illustrating the hierarchical arrangement of various modules.
• Elements: Composed of boxes representing the system modules,
connected by lines showing intermodule relationships and data ows.
• Relevance: Crucial for developers to understand how di erent parts of a
system interconnect and rely on each other, aiding in modular design and
troubleshooting.
Excluding UML
• Reason: Given its complexity and speci c use cases, UML is not covered
here but remains a critical tool for more advanced system modelling.

Link between Flow Chart Symbols, Flow Charts, and


Pseudocode
Understanding Flow Chart Symbols
• Basic Symbols: The common symbols used in ow charts include ovals
(start/end), parallelograms (input/output), rectangles (processes), and
diamonds (decisions).
• Interpretation: These symbols provide a standard, universally understood
language in system design, making the documentation and planning
process more streamlined and accessible.

Relationship with Flow Charts


• Function of Flow Charts: Serve as a graphical step-by-step representation
of a system or a process, utilising various symbols to depict di erent
actions and decisions.
• Usage: Particularly useful in the planning stages of system development,
aiding programmers and non-technical stakeholders in understanding and
re ning system processes.

Connection to Pseudocode
• De nition of Pseudocode: A high-level description of an algorithm or
system operation, presented in a structured but readable format.
• Linkage: The transition from ow charts to pseudocode involves translating
the visual representation into a textual form that resembles actual code
structure but is simpler and language-agnostic.
• Transition: This step is crucial as it lays the groundwork for actual coding,
enabling developers to structure their code logically and e ciently.

1.2.4. Purpose of Prototypes


Prototyping is fundamental in the system design process, enabling
developers to create an early model of the system for evaluation,
design decision-making, and client interaction.
fi
fi
fl
fi
fl
ff
ffi
ff
fl
Demonstrating the Proposed System to the Client
• Visual and Interactive Representation: Prototypes provide a tangible form
of the nal product, facilitating a clearer understanding and validation of
features and design.
• Enhances Client Understanding: They help demystify technical
complexities, allowing clients to visualize and interact with the system’s
functionalities and design.
• Feedback Mechanism: Critical for gathering client and stakeholder
feedback, prototypes can reveal adjustments or enhancements needed,
ensuring the nal product aligns with expectations.

Encouraging E ective Collaboration (AIM 5)


• Team Dynamics: Collaboration during prototyping unites designers,
developers, stakeholders, and users in re ning the product, enhancing team
dynamics and shared goals.
• Con ict Resolution: It o ers a platform for addressing di erent
perspectives and resolving con icts, thereby harmonising diverse
viewpoints.
• Collective Ownership: Joint e orts in prototyping foster a sense of
collective ownership and investment in the project's success.

Promoting Logical and Critical Thinking (AIM 6)


• Problem-Solving Skills: The creation of prototypes challenges developers
to apply logical thinking to problem-solving and design conceptualisation.
• Innovation and Creativity: It encourages out-of-the-box thinking, pushing
for innovative solutions to complex design challenges.
• Technical Pro ciency: Designers and developers must think critically
about the integration of di erent system components, ensuring technical
feasibility and operational e ciency.

Importance of Iteration in Design Process


Iteration, the repeated re nement of a product, is vital in achieving
a design that is not only functional but also user-centric.

Iterative Process in Design


• Design Enhancement: Each iteration cycle focuses on enhancing the
design based on user feedback and technical evaluations.
• Flexibility: It allows for adapting to changing needs and technologies,
thereby ensuring the product remains relevant and up-to-date.

MYP Design Cycle Reference


• Educational Framework: The MYP Design Cycle, an educational
framework, provides a structured approach that mirrors professional design
methodologies.
fl
fi
fi
fi
ff
ff
ff
ffi
fi
ff
fl
fi
ff
• Cyclical Nature: It highlights the iterative nature of design, advocating for
continual evaluation and re nement.

Advantages of Iterative Design


• Quality Improvement: Iterative processes lead to gradual improvements in
quality, functionality, and user experience.
• Risk Mitigation: By identifying and addressing issues early in the design
process, iteration reduces the risk of signi cant problems at later stages.
• User-centric Design: This approach ensures the evolving needs and
feedback of users are consistently integrated into the development process.

Consequences of Excluding End-Users in Design Process


Neglecting end-user involvement in system design can lead to
signi cant repercussions in terms of utility, e ciency, and overall
success of the system.
Impact on User Productivity

• Non-alignment with User Needs: Systems that don’t re ect the real-world
context of user operations may hinder rather than help productivity.
• Usability Issues: A lack of user input can result in interfaces or
functionalities that are non-intuitive or cumbersome, increasing error rates
and reducing e ciency.

Importance of Collaboration and Communication (AIM 5, S/E)


• Feedback Integration: Regular user involvement ensures their feedback
and insights are continuously incorporated into the development.
• Understanding User Context: Frequent interaction helps designers
comprehend the practical constraints and speci c requirements of users’
environments.

Ethical and Social Considerations


• Respect for User Expertise: Involving users in the design process
acknowledges their expertise and insights, respecting their role in the
system's ecosystem.
• Promotion of Inclusivity: A collaborative design process promotes
inclusivity, ensuring the system caters to a diverse range of needs and
abilities.
• Enhancing System Acceptance: Systems designed with user input are
more likely to be accepted and e ectively integrated into daily routines.

1.2.5. Introduction to Social and Ethical Issues in IT Systems


As IT systems become increasingly integral to our daily lives, they
bring about signi cant social and ethical considerations. These
range from how personal data is used and protected to the broader
fi
ffi
fi
fi
ff
fi
fi
ffi
fl
impacts on employment and societal structure. Understanding
these issues is critical in developing IT systems that are not only
technologically advanced but also socially responsible and ethically
sound.

De ning Social and Ethical Issues


• Social Issues: Refers to the impacts on society as a whole, encompassing
aspects like privacy, security, the digital divide (the disparity between those
who have or do not have access to modern information and communication
technology), and socio-economic changes.
• Ethical Issues: Deals with the moral principles of what is considered right
and wrong. This includes the handling of personal data, intellectual property
rights, and the broader implications of machine autonomy and decision-
making.

Privacy Concerns
Privacy is a paramount concern in the age of information, where
vast amounts of personal data are collected, processed, and
stored by IT systems.

Data Collection and Surveillance


• Extent of Data Collection: Exploration of how data is collected on a
massive scale, focusing on the types of data collected and the methods
used.
• Surveillance Techniques: How modern technology has enabled
sophisticated surveillance methods by governments and private entities.
• Impact on Individuals: Discussing how such surveillance and data
collection impacts individual privacy and freedom.

Information Security and Personal Data


• Securing Data: The challenges in protecting stored data from unauthorized
access and breaches.
• Personal Data Misuse: Cases where personal information is misused for
pro t, manipulation, or exploitation.

Security Challenges
The reliance on IT systems for personal and national security brings
its own set of challenges.

Cybersecurity Threats
• Types of Threats: Delving into various forms of cyber threats such as
hacking, phishing, and ransomware.
fi
fi
• Implications for National Security: Discussing how cybersecurity is
integral to national defense strategies.

Reliance on IT Systems
• System Vulnerabilities: How dependence on IT systems makes them a
target and what vulnerabilities this reliance brings.
• Preventive Measures: Strategies and practices for mitigating these
security risks.

Impact on Society and Employment


Societal Changes
• Shift in Social Dynamics: Examining how IT systems are reshaping social
interactions, community structures, and even political landscapes.
• Cultural Impact: The in uence of IT systems on cultural norms and values.

Employment and the Economy


• Evolving Job Market: Analysing how automation and arti cial intelligence
(AI) are changing the nature of work, job availability, and required skill sets.
• Economic Implications: Understanding the broader economic impacts,
including wealth distribution and economic inequality.

Ethical Concerns in Development and Use of IT Systems


Consent and User Autonomy
• Informed Consent: The complexities involved in ensuring users are fully
informed and consenting when they use IT systems.
• Autonomy and Manipulation: Ethical issues related to user autonomy and
potential manipulation through IT systems.

Intellectual Property and Plagiarism


• Copyright Laws: Exploration of copyright laws pertaining to digital content.
• Plagiarism in the Digital Age: How IT systems have a ected the incidence
and detection of plagiarism.

Emerging Technologies
Emerging technologies such as AI, blockchain, and quantum
computing present new frontiers in ethical considerations.
AI and Ethics

• AI Decision-Making: Issues around the opacity of AI algorithms and their


decision-making processes.
• Bias and Discrimination: How biases in AI development can lead to
discriminatory outcomes.
fl
ff
fi
Blockchain and Data Integrity
• Transparency vs. Privacy: Balancing the need for transparency and
privacy in blockchain applications.
• Data Integrity: Ensuring the accuracy and integrity of data within
blockchain systems.

Regulation and Governance


Developing Legal Frameworks
• Regulatory Challenges: Understanding the challenges regulators face in
keeping up with the pace of technological change.
• Global vs. Local Regulations: The need for and challenges in establishing
global standards and regulations for IT systems.

International Standards and Cooperation


• Need for International Cooperation: Importance of international
cooperation in the development and governance of IT systems.
• Role of International Bodies: Exploring the role of organisations like the
International Telecommunication Union (ITU) and the World Wide Web
Consortium (W3C) in standard setting.
1.2.6. De ning Usability
Usability in system design is essential for ensuring that users can
interact with a system e ectively, e ciently, and satisfactorily to
accomplish their goals.

Key factors of usability include:


• Ease of Learning: How straightforward is it for users to accomplish basic
tasks the rst time they encounter the design?
• E ciency of Use: Once familiar with the design, how quickly can users
perform tasks?
• Memorability: If users return to the design after a period of not using it,
how easily can they reestablish pro ciency?
• Error Frequency and Severity: How often do users make errors, how
serious are these errors, and how do they recover from them?
• Subjective Satisfaction: How pleasant is it to use the design?

Ergonomics and Accessibility


• Ergonomics: This aspect focuses on the logical, comfortable layout of
interactive elements and physical ease of use, aiming to reduce user fatigue
and discomfort. It considers factors such as screen placement, keyboard
spacing, and mouse sensitivity.
• Accessibility: Concerned with creating systems that are usable for people
of all abilities and disabilities. This includes designing for various
impairments like visual, auditory, motor, and cognitive challenges. The goal
ffi
fi
fi
ff
fi
ffi
is to create systems that are not only usable but also equitable and
inclusive.

Usability Problems in Digital Devices


Usability problems can vary signi cantly across di erent types
of digital devices:
PCs
• Complex User Interfaces: Often, PC software features cluttered interfaces
with too many options, overwhelming users, especially beginners.
• Inconsistent User Experience: Variations in software layouts and
operating procedures can cause confusion and increase the learning curve.

Digital Cameras
• Small Physical Controls: Can be di cult to manipulate, particularly for
users with motor impairments or larger hands.
• Complex Menu Systems: Extensive, multi-level menus can be confusing,
making it hard to nd speci c settings or options.

Mobile Phones
• Screen Size Constraints: Especially in older models, small screens can
impede usability, a ecting the visibility of content and the ease of touching
controls accurately.
• Touchscreen Accuracy: Users with motor di culties or larger ngers may
struggle with precise interactions, such as typing or selecting small on-
screen items.

Games Consoles
• Controller Design: Controllers that are not ergonomically designed can
cause hand and wrist strain during extended use.
• Interface Complexity: Non-intuitive interfaces can hinder non-gamers or
beginners from fully enjoying the gaming experience.

MP3 Players
• Interface Navigation: Small buttons and screens can make navigation and
selection tasks challenging.
• Physical Interaction: Limited physical feedback can hinder the user's
ability to operate the device without looking directly at it.

Improving System Accessibility


To address these challenges, several strategies can be employed:
• Touchscreen Technology: O ers a direct and intuitive way of interaction
that can be easier for users with motor di culties who nd traditional input
devices like mice or keyboards challenging.
fi
ff
fi
ff
ffi
ffi
fi
ffi
fi
fi
ff
• Voice Recognition: Enables hands-free control and assists users with
visual impairments or motor restrictions. It allows users to interact with
devices through spoken commands.
• Text-to-Speech (TTS): Particularly bene cial for users with visual
impairments, TTS technology converts on-screen text into speech, enabling
these users to receive the same information as sighted users.
• Braille Keyboards and Displays: Essential for users who are blind,
allowing them to input and read text through tactile means.

Usability Problems in Systems


System design often overlooks potential usability problems,
impacting user e ciency and satisfaction:

Ticketing Systems
• Complex Processes: Users often face di culty understanding multiple
steps or navigating through convoluted booking processes.
• Screen Readability: Small font sizes and poor contrast in user interfaces
can make reading and selection tasks di cult, especially on mobile
platforms.

Online Payroll Systems


• Jargon and Complexity: Payroll systems lled with professional jargon or
complex navigation can be daunting for the average user, leading to errors
or underutilisation.
• Consistency and Familiarity: Lack of consistency with common software
paradigms can confuse users. Familiar layouts and terminology can
improve usability signi cantly.

Scheduling Systems
• Interface Overload: Overwhelming amounts of data or features packed
into a single screen can confuse users.
• Adaptability: Systems that fail to cater to various user working styles or
preferences can limit e ciency and satisfaction.

Voice Recognition Systems


• Accents and Speech Variations: Systems often have di culty accurately
interpreting accents, dialects, and individual speech patterns, leading to
errors or non-compliance.
• Environmental Factors: Background noise and poor microphone quality
can signi cantly a ect the system's ability to understand commands
correctly.
fi
ff
ffi
fi
ffi
ffi
fi
ffi
fi
ffi
Feedback-Providing Systems
• Response Timing: Systems that provide delayed feedback can frustrate
users, who expect prompt reactions to their inputs.
• Clarity and Helpfulness: Feedback that is vague, overly technical, or
unhelpful can lead to user dissatisfaction and a feeling of being
unsupported.

1.2.7. Moral Implications

De ning Morality in Machine Interaction


Moral implications in HMI encompass the rightness or wrongness of actions and
decisions in the context of technology usage and development.
• Decision Making in Autonomous Systems: Examining the moral
implications of decisions made by machines, such as in autonomous
vehicles or in automated nancial advice.
• In uence on Behaviour: How machines, especially through AI and
algorithms, might manipulate or subtly in uence human behaviour and
decision-making.

Illustrative Examples
• Robotic Warfare: The use of drones and autonomous weapons in con ict
and the moral questions they raise regarding human oversight.
• AI in Healthcare: Balancing the bene ts of AI in diagnosis and treatment
with the moral implications of machine error and patient consent.

Ethical Implications
Technology and Ethics
Ethical considerations focus on questions of justice, rights, and the welfare of both
individuals and society. This involves analysing the standards guiding the
behaviour of individuals and institutions in the development and use of technology.
• Algorithmic Transparency: Ensuring the operations of algorithms,
particularly in critical areas like criminal justice or credit scoring, are
transparent and fair.
• Consent and Privacy: Issues surrounding data collection, user consent,
and the usage of personal information.

Case Studies for Analysis


• Biometric Authentication: Use of facial recognition and ngerprint
scanning and the ethical concerns regarding consent, privacy, and data
security.
• Content Moderation on Social Media: Balancing freedom of expression
with the prevention of harm, misinformation, and hate speech online.
fl
fi
fi
fi
fl
fi
fl
Social Implications
Technology's Impact on Society
The social implications are broad, a ecting how people interact with each other,
changes in social norms, and societal structures.
• Digital Inequality: How socioeconomic status a ects access to and
pro ciency with technology, leading to disparities in information access and
digital literacy.
• Changes in Communication: The way technology, like social media and
messaging apps, has altered personal interactions and community
dynamics.

Examining Social Changes


• Telecommuting and Remote Work: How advances in technology enabling
remote work can reshape urban planning, family dynamics, and work-life
balance.
• Social Media and Mental Health: The impacts of constant connectivity
and social media usage on psychological well-being and social behaviours.

Economic Implications
The Economy in the Age of Technology
Economic implications consider how technology in uences job markets, economic
policies, and the overall nancial landscape.
• Automation and Employment: The balance between job creation in tech
sectors and job losses in traditional industries due to automation and AI.
• Economic Inequality: How the concentration of technological expertise
and resources can lead to wider economic disparities.

Future Economic Trends


• Cryptocurrencies and Financial Systems: Understanding the impact of
digital currencies on global nancial stability and economic policies.
• Tech Startups and Innovation: The role of tech entrepreneurs in driving
economic growth and how innovation can disrupt traditional economic
models.

Environmental Implications
Assessing Environmental Impact
Environmental considerations include the entire lifecycle of technology products,
from creation to disposal, and the sustainability of tech-driven practices.
• Carbon Footprint of Digital Services: The environmental cost of powering
large-scale data centres and cloud computing services.
• Sustainable Design: Principles of designing technology products and
services that are environmentally sustainable and energy-e cient.
fi
fi
fi
ff
ff
fl
ffi
Sustainable Technology Practices
• Renewable Energy in Tech: Incorporating solar, wind, and other renewable
energy sources in tech infrastructure.
• Recycling and Upcycling E-Waste: Strategies for dealing with the growing
challenge of electronic waste, focusing on recycling and upcycling.

Raising Awareness in Context of Science and Technology


Usage
The integration of moral, ethical, social, economic, and environmental discussions
into technology education is essential. By fostering awareness, we encourage
responsible development and usage of technology.
• Critical Thinking and Ethics Education: Incorporating ethics into STEM
education to prepare students for moral and ethical challenges in
technology.
• Public Engagement and Policy Making: Involving the general public in
discussions and decisions about technology policy and its societal impacts.

Tools for Awareness


• Interactive Learning and Simulations: Using case studies, simulations,
and role-playing exercises to explore the implications of human-machine
interactions.
• Collaborations between Academia, Industry, and
Government: Partnerships to research, discuss, and address the broader
implications of technology.

You might also like