Chapter-5-Information and Society
Chapter-5-Information and Society
Chapter 5
Information and Society
We live in an information society where knowledge workers channel [focus] their energies to
provide a cornucopia of computer based information service. The knowledge worker’s job
function revolves around the use, manipulation, and dissemination of information. In an
information society, the focus of commerce becomes the generation and distribution of
information. A technology revolution is changing our way of life; the way we live, work, and
play. The cornerstone of this revolution, the computer, is transforming the way we communicate,
do business, and learn and an explosion of computing advances is speeding this change.
Smart cards are similar to credit cards except that they have chips embedded in them. These
cards can be used to store value and carry authentication information. Other technologies that
are being used to provide authentication services include recognition of fingerprints, voice and
handwriting, retinal scan and resultant measurements of the signing event such as typing rhythm
and pressure exerted during input. Digital signature is also a very popular method for providing
authentication based on two-key cryptosystems.
VIRTUAL IDENTITY
Identification theft: stealing your good name – TOI – Theft of Identity – is a crime in which
thieves hijack your Name and identity and use your good credit rating to get cash or to buy
things. To do these, what they need is – full name and social security number. With the help
of these two information, add PIN number, employer driving license number, mother’s
1
Chapter 5
maiden name, and so on, they are off to the races, gambling, applying credit facility every
where often – however, thieves simply mail order what ever they want. They have
No face-to-face contact
No weapons
No finger prints
VIRTUAL UNIVERSITY
Distance learning is the use of computer and/or video networks to teach courses to students
outside the conventional classroom. Until recently, distance learning has been largely outside the
mainstream of campus life. That is, it concentrates principally on part time students, those who
cannot easily travel to campus, those interested in noncredit classes, or those seeking special
courses in business or engineering. However, part timers presently make up about 45% of all
college enrolments. This says very clearly “anytime, anywhere education holds special appeal.”
2
Chapter 5
that items be arranged alphabetically by brand, by price per unit, by package size, or we can even
request a listing by nutritional value.
In the minds of the busy people who shop online, the cost of the e-service is easily offset by
other savings [better prices, less spent on travel and so on]. These savings do not consider the
extra personal time shoppers recover by shopping online.
VIRTUAL OFFICE
Now big foreign companies are eliminating office and allowing employees to work from any
location they choose. Employees are supposed to work in virtual offices in any place, car, train,
plane, or home where their work can be done. Virtual offices are possible because of cellular
telephones, fax machines, portable computers, and other mobile computing and communication
devices. Virtual offices help
1. To reduce office space
2. answer from home
3. Eliminate office infrastructure and cost
4. Eliminate real estate costs
5. Eliminate unwanted traveling time to office
6. etc.
Virtual office employees have more flexibility and control over their own time. But, is the
virtual office a better way of working? What is its impact on individual?
1. Identity
2. Worker’s job satisfaction
3. and where is their corporate community
Some employees fear the virtual office will lead to downsizing, part time work and
eventually the loss of their jobs.
1. Other respond to the loss of daily social contacts
2. Loss of morality and integrity due to their virtual
3. Less the interaction with their colleagues, superiors and other co-workers
Organizations use networks for linking people, ideas to create and distribute products and
services, not being limited by traditional organizational boundaries or physical locations.
5.2 Issues and Ethics in IT
Issues in IT can be classified into four categories
1. Security issue
Security issues go right to the basic workability of computer and communications system in
the information society. Some threats to IT environments are
Errors and accidents
Natural and other hazards
Crime against computers and communications
Crime using computers and communications
Worms and viruses
Computer criminals
3
Chapter 5
3. Economical Issue
May people worry that the effects of IT are reducing jobs, they also worry that it is
widening the gap between the haves and have-nots.
It will give the opportunity to worry about
Technology the job killer or job creator
Gap between rich and poor
If your job is replaced by computer that means human is not fittest for that job, it is not
worthy for human that is what the interpretation should be, not in the other way.
4. Privacy issue
Privacy is the right of people not to reveal information about them.
New communication and information technologies have enabled many organizations and
people to collect, organize, and sell information about other people and organizations,
both quickly and cheaply. The easy availability of personal information makes banking,
education, health care, and sales much more convenient for both consumers and sellers.
Credit card and automated teller machine (ATM) systems would be impossible without
large databases of information available on demand. Scanners in the supermarket rapidly
and accurately record every item that passes over them, making grocery checkouts faster
and error free. Companies maintain huge mailing lists of customers that record not only
their names, addresses, and phone numbers, but also major recent purchases, credit
ratings, and demographic information (such as sex, age, income, and educational level)
that helps the companies identify target markets for specific products.
The negative side to all this shared information is that there is little control over who sees
or uses this personal information. Medical records are shared not only by doctors’ offices
and by hospitals but are regularly made available to insurance companies as well. Auto
insurance companies obtain information about traffic violations from state and local
police departments. Credit report errors occur often and can be very damaging to a
4
Chapter 5
person's financial situation. Many Americans worry that having so much of their personal
information available to so many others may hurt their privacy.
Privacy refers to how personal information is collected, used, and protected. The privacy
issue has not arisen because of computers; at one time, the taking of photographs caused
serious concern about invasion of personal privacy. In IT need of privacy is amplified
because of its enormous capabilities.
Because if a person gives an information for school admission.
Where then information now?
Who has control of it?
Who has access to it and for what purpose?
Is there a chance the data are being used in ways the student did not intend or have
not authorized?
Who knows about that student’s personal history because they have access to data
that student has provided?
Since privacy applies to IT, privacy refers to how personal information is collected, used,
and protected. However, the enormous capabilities of IT to store and retrieve data have
amplified the need for the protection of personal privacy. Earlier privacy protection was
only the consumer issue. Now it is to the whole society.
5
Chapter 5
ETHICS - Can be defined as a branch of philosophy dealings with the determination of what is
right or wrong, good or bad. Simply if we define” ethics are moral standards that help to guide,
behavior, actions, and choices. Ethics are grounded in the notion of responsibility and
accountability.
The standard of conduct and moral behavior that people are expected to follow. Personal ethics
pertain to an individual’s day-to-day activities; societal ethics pertain to the actions of people in
their various social activities including the way in which they deal with colleagues, customers,
and anyone else society with whom the society interacts.
The difference between ethical behavior and legal behavior is important. Ethics are the actions
expected of people. In contrast, laws deal with required actions. An action may be legal but not
ethical, or ethical but not legal. Business societies are challenged by many questions of ethics
surrounding the widespread use of information technology. Not limited to IT professionals, these
issues involve anyone in the business society who provides data to or uses information from the
business society systems. Therefore, IT users must count on a company’s ethical policies for
protection of private information.
6
Chapter 5
All these crimes are committed through intrusion, forced and unauthorized entry into the system.
Computer crime through intrusion can occur by following ways.
1. Hackers
2. Crackers
3. Viruses
Hackers
A hacker is a person who gains access to a system illegally. Hackers usually gain access to a
system through a network, but sometimes they will physically enter a computer or network
facility.
Skilled technicians also called themselves, which does not mean their ability to break into
computers and networks, but rather to their technical skill for computer programming and
7
Chapter 5
making a system perform in innovative and productive ways. Hackers who break into systems
also have good technical skills, but have chosen to apply them in undesirable [often-illegal]
ways. The increased frequency of hacking, coupled with the newness of the problem as an issue
of law, has led many governments to publish legislation in place to deal with this form of
computer crime.
INDIA passed a bill “the information technology act 1998”
US congress passed the “Computer Fraud and Abuse Act in 1984”
Preventing unauthorized access to a system entails having good physical security. Hiring honest,
reliable people is an obvious starting point.
Techniques helpful in deterring intrusion by hackers
1. Change access passwords frequently
2. Allow workers access to only the system functions they need to use
3. Permit workers to access only the data that they need to use
4. Establish physical security systems
5. Separate critical processing functions so that more than one person must be involved
6. Encrypt data by scrambling or coding information.
7. Adopt procedural controls
8. Keep staff well informed through education programs
9. Audit system activities
10. Keep a log of all transactions and user activities
Some expert security organizations use additional methods to supplement these techniques.
When caller dial into the system, they provide the telephone numbers from which they are
calling. The system may also sense the calling number automatically. The user then hangs up and
the system, after verifying that the telephone number is valid and authorized to call. Then it calls
back the user. This is called call back security adds another layer of protection to the above
techniques.
Despite these precautionary measures, some hackers do manage to break into even the best-
guarded systems. When a kicker has penetrated a system, it is important to determine whether
any damage or theft has occurred and to know that there is a trapdoor – that is an undetectable
way of entering the system bypassing the security system.
Crackers
Crackers also gain unauthorized access to information technology but do so for malicious
purposes. Crackers attempt to break into computers and deliberately obtain information for
financial gain, shut down hardware, pirate software, destroy.
8
Chapter 5
Computer intrusion occurs by way of software in the name of virus. The virus is written by
individual’s intent on causing damage or wreaking havoc in a system. It is called virus because it
reproduces itself, passing from computer to computer when disks are shuttled from one computer
to another. A virus can also enter a computer when a file to which it has attached itself is
downloaded from a remote computer over a communications network an infected disk or diskette
will continue to spread the virus each time it is used
Each virus has its own characteristics – its own signature. Some destroy irreplaceable data by
writing gibberish over the disk they infect. Others take control of the operating system and stop it
from functioning. Still others embed commands into the operating system, causing it to display
messages on the computer screen. The worst forms of virus are much more susceptible, moving
through data and changing small amounts of detail in selected files, so unnoticeable they are
difficult to detect.
WORMS: A Worm is a program that copies itself repeatedly into memory or onto a disk drive
until no more space is left.
A virus is a typical program that attaches itself to a computer system and destroys or corrupts
data.
Viruses are passed in three ways
1. By diskette [copying ]
2. By network [data sharing]
3. By internet [ e-mail ]
Some worms erase, destroy, and change the data
The issues discussed above are real and affecting every individual directly or indirectly. The
most important point to take from this information are simple, with the use of IT comes the need
to
9
Chapter 5
10