Impact of Computer Technology On Society
Impact of Computer Technology On Society
HUMAN ISSUES.
Job Displacement.
With the coming of the information age, many jobs have been replaced by
computers or automated machinery, such as robots. A few examples are
listed below.
- A large proportion of the manufacturing and assembly work is now
done by robots.
- Managers rarely have shorthand secretaries, but are expected to word
process their own letters.
- Bank notes are rarely hand counted, but are either weighed or counted
using machines.
- With the advancement in software, people who needed special skills
such as typesetting, for newspapers and publications, have been de-
skilled, since the software does all the layouts for them.
- Shop assistants no longer need to calculate the change that should be
given since the checkout computers does it.
- Payrolls are now automatically done using application programs. This
would previously have involved a number of people, depending on the
size of the organization, and several days to work to prepare.
As can be seen from the previous section, as number of work skills are no
longer required, but at the same time, jobs have been created that require
new ICT (Information and Communications Technology) skills. New jobs
such as programming, network installation, network administration, web
design, etc have been created.
Job Security.
Due to the increase in automation and computer technology, there is a risk
that jobs may be lost. Robots take over jobs that were reserved for humans
and are doing those jobs much more quickly and efficiently. As employers
cannot predict the pace of technology changes, industries that are dominated
by use of information and communications technologies, may only offer short-
term contracts. Therefore, employees loose their sense of job security.
The pace of change, changes in supervision, and lack of job security make
many people feel increased stress. So while technological changes are
supposed to improve the quality of life of people, it sometimes makes things
worse.
There are a number of safety issues that are related to the use of computers.
- It is important to use the right type of power sockets and not overload
the socket.
- Keep food and drink away from any electrical equipment.
- Computer generates a lot of heat and there is risk of fire. It is important
to have the right type of flooring, good ventilation and fire extinguishers
within easy reach.
- All wires should be neatly laid, and covered appropriately to prevent
people from tripping over them.
Breakthroughs:
Health Care:
- Expert systems which act as “intelligent assistants” to doctors, and are
programmed to suggest possible diagnoses, or present information in a
way that helps the doctor to make decisions on causes and treatment
of diseases.
- Patient monitoring systems which are commonly used in intensive care
units to monitor heart rates, breathing rates, blood pressure, etc, at
frequent intervals. These systems display the required information on a
digital display or produce it as paper output. Such systems make use of
microprocessors and are referred to as embedded systems.
- Medical imaging which is the study of human functions and anatomy by
means of pictorial information. Medical scanning technology uses
microprocessors to display and interpret the digitized information
gathered.
- Medical training is making use of computer simulation to show students
how to operate and carryout medical procedures.
Banks have also changed the way they operate. Customers can now check
their balances, transfer money and carry out many other transactions over the
internet. Automatic Teller Machines (ATMs) dispense cash at the touch of a
button.
Communications:
Broadband:
The major breakthrough in the communications industry has been the
improvements in bandwidth. Bandwidth is simply a measure of how much
data can be transferred within a given time unit. While fibre-optic lines marked
a dramatic increase in the backbone capacity of long-distance networks,
recent advances in dense wave multiplexers, digital subscriber line (DSL)
technology, and cable modems has changed the types of information that can
move across networks. The rapid growth of multimedia, video conferencing
and e-commerce applications has led to the growth of broadband.
It is also possible to listen to the radio over the World Wide Web. Radio
stations can now broadcast via the WWW making it possible to listen to local
radios world wide.
COMPUTER CRIMES:
Viruses:
A computer virus is a program designed specifically to damage other
programs or cause irregular behavior. A virus is a computer code usually
designed to carry out three tasks.
- Attach itself to another program or file.
- Locate itself within a computer system in such a way as to make it
possible for it to destroy/amend programs and data files, by interfering with
the normal processes of the operating system.
- Spread itself from one computer system to another.
It is against the law to knowingly distribute or write a virus. There are many
different viruses which are often identified by name. Many viruses are spread
by e-mails, file attachments, Internet downloads or floppy disks. Viruses
spread very quickly through networks, and the effects can be global,
especially in the case of e-mail or internet based viruses.
Prevention against Viruses:
In today’s processing environment, which relies heavily on
telecommunications and software applications, it is impossible to guarantee
complete protection against a computer virus. Another factor that adds to the
impossibility of achieving absolute protection is that viruses, which may
originate outside of the organization, are often transmitted inadvertently by
people in the company who have legitimate access to computer systems.
Therefore, viruses and other security threats can only be solved by having the
right security policies in laces as well as the technical solution to backup the
policies
Technical Solution:
.Various anti-virus attacks may be achieved by the implementation of a
security policy designed to protect data held on PCs from a range of potential
threats, including viruses. Such a security policy should include the following
steps:
- All software and data files should have backups taken at regular
intervals.
- Users should be informed of the need for data security, and of the
potential threats to the integrity of their data.
- When opening e-mails, users should not open any messages from
unknown senders..
- File attachments should also be scanned before opening them.
- All purchased software should be carefully examined before use.
Load new software onto an isolated PC which contains no critical or
sensitive files.
- Procedures for evaluating new software should include tests for the
presence of virus code. Free copies of software should not be used.
- Always virus-check floppies when used to move files between
computers.
Hacking:;
Hacking is when an individual gets into a computer system to look at files
which are private, and to which the individual does not have authorized
access. When a person does this, it usually means that they have probably
logged onto a computer system as though they were someone else. Once
hackers break into a computer system, they may:
- Look at the data.
- Copy the data.
- Modify the data.
Usually a hacker has worked out the password and user identification of a
person who is authorized to use the computer system. There are programs
that can be downloaded from the internet to monitor systems to get the
passwords, or try out several passwords within seconds to get the correct
one. Data being transmitted via telephone or wireless can also be intercepted.
People who hack into computer systems do not always want to steal money
Usually computer hackers are either young computer enthusiasts who lack
into a system to prove that it an be done or disgruntled employees.
To address the above issues, there has been an increased demand for ICT
legislation, which is discussed in the next section.
ICT Legislation:
Computer crime is a growing industry, and a lot of money is lost every year
due to computer misuse or fraud. Some of the issues addressed by ICT
legislation are:
- To protect the confidentiality of information kept about an individual.
- To provide legal backing so that it is possible to seek redress if rights
are violated.
- To minimize the effects of exposure to uncensored materials.
- To observe copyright for those who create original works.
In Kenya, the Copyright Act was amended in 1996to provide protection for
computer programs or software copyrights. In addition to copyright protection,
there is a lot of other legislation that is in force in other countries. A few
examples are listed below with a description of what the legislation entails.
Legislation Description.
Data Protection. A safeguard to protect data. It
basically ensures that holders of
personal data do not misuse that
data.
Computer misuse. To prevent misuse of both hardware
and software, including computer
viruses, hacking,etc.
Health and safety. An explanation of what employers
must do and what the equipment
must be like to ensure the health and
safety of employees.
The data subjects should have the right to access the data that is being stored
about them and request for correction if the data is inaccurate. The data
subject should also have the right to prevent unauthorized processing of the
data or be inundated with marketing offers. If the data subject suffers damage
or in the case of sensitive data suffers distress, then they should have the
right to compensation.
Some examples of how data privacy can be violated are given below.
Privacy of E-Mail:
Until recently, compute users have treated e-mail much as they would
telephones. They freely express their thoughts in an uncensored manner,
thinking their messages are private. Deleting messages doesn’t necessarily
mean that they are gone forever. Programmers know how to uncover this data
and are often hired to do just that. Also, some e-mail software makes backups
of messages and stores these files under a different file extension.
Some measures that can be taken to ensure e-mail privacy are given below:
- Know every place where e-mail messages could possibly be stored in
the computer
- Buy commercial software currently available that truly erases files.
- Find out about your institutions policy regarding the privacy of e-mail
messages.
- Keep in mind that information you provide in e-mail messages can be
used as evidence.
FUTURE TRENDS:
Evolution of Computer Architecture:
The evolution of computer architecture focuses on improving speed,
performance and efficiency. Two main areas of focus are on the bus interface
and the CPU.
Compact PC1:
The compact PC1 bus is based on Peripheral Component Interconnect (PC1),
delivering 132-MB/s transfer rates via bus-mastered direct memory access
(DMA). It also offers eight slots for installing peripherals, a significant increase
over desktop PC1.
First, USB is a hot-pluggable plug-and-play bus, meaning that you just plug
the device into a port on your PC, and it is configured automatically.
No more opening the computer to add new hardware. You don’t even have to
turn off the computer.
Multiple devices can be connected to your PC via USB, and the bus supplies
power to these devices. USB is ideal for consumer peripherals and will be
used primarily for devices such as keyboards, mice, and joysticks.
IEEE 1394:
IEEE 1394 is a high-speed serial bus that sends information via packets. It
was developed as Fire wire by Apple Computer and became an IEEE
specification in 1995. Much like USB, the motivation behind IEEE 394 is to
consolidate and replace today’s proliferation of serial and parallel computer
interfaces.
Card Bus:
Card Bus is the extension of the Portable Computer Memory Card
International Association (PCMCIA), promising faster throughput rates by
leveraging off the PCI bus architecture. Card Bus adds DMA (Direct Memory
Access) capability while maintaining compability with existing PCMCIA cards.
Card Bus slots are already appearing on many new laptop computers and
windows 98 onwards operating-system support for this architecture.
Fibre Channel:
Fibre Channel is a serial interface that boasts 100-MB/s transfer rates. It is
emerging as a replacement for the Small Computer System Interface (SCSI)
implementations for 1/O subsystems and mass storage. Ultimately, Fibre
Channel will be used for storage-area networking where multiple servers and
data-storage devices are linked on a private network.
Processor Developments:
The microprocessor operation comprises of four sequential stages, that is, the
steps required to execute a program.
1. Fetch
2. Decode
3. Executive
4. Write
The above stages make use of the RAM and the CPU registers. The first
processors that significantly improved the processing speed were the RISC
(Reduced Instruction Set Computer) processors. These processors had
simple instruction sets that required fewer CPU cycles to execute.
Pipelining allows the CPU to process multiple instructions at the same time.
For example, a four-stage pipeline gives the processor a “window” of four
instructions. This window slides along the code stream, moving forward by
one instruction each clock cycle, and allows the processor to “look at” and
work on all four of the instructions in its window. So unlike the traditional
simple processors (e.g. Intel 80xx series), pipelined processors “hold” and
operate on more than one instruction.
It is predicted that over the next decade, processors and memory will be
merged onto a single chip. Not only will this narrow or altogether remove the
processor-memory performance gap, it will have the following additional
benefits.
- Provide an ideal building-block for parallel processing.
- Better utilize the phenomenal number of transistors that can be placed
on a single chip.
The term “IRAM” stands for Intelligent RAM, since most of transistors on this
merged chip will be devoted to memory. A single gigabit IRAM should have an
internal memory bandwidth of nearly 1000 gigabits per second (32K bits in
50ns), a hundredfold increase over the fastest computers today. Hence the
fastest programs will keep most memory accesses within a single IRAM,
rewarding compact representations of code and data.
Raw Processors:
Raw Processors is a highly parallel architecture with hundreds of very simple
processors coupled to a small portion of the on-chip memory. Each processor,
or tile, also contains a small bank of configurable logic, allowing synthesis of
complex operations directly in configurable hardware. Unlike the others, this
architecture does not use a traditional instruction set architecture. Instead,
programs are compiled directly onto the Raw hardware, with all units told
explicitly what to do by the compiler. The compiler even schedules most of the
inter-processor communication. The real limitation to this architecture is the
efficacy of the compiler.
Artificial Intelligence:
The technology of making computers performs tasks that would require
intelligence if performed by a person is called artificial intelligence (AI).
Artificial Intelligence Systems take advantage of the speed at which
computers process data.
Expert Systems:
A computer application that captures much of the expertise experience,
decision rules and logic patterns used in the thought process of an expert in a
specific field is called an expert system. Medical diagnosis, investment
counseling, legal defaces, engine repair, credit card authorization for
customers, and petroleum explorations are just a few examples of fields using
expert systems application.
One of the results of research in the area of artificial intelligence has been the
development of techniques which allow the modeling of information at higher
levels of abstraction. These techniques are embodied in languages or tools
which allow programs to be built that closely resemble human logic in their
implementation and are therefore easier to develop and maintain. These
programs, which emulate human expertise in well defined problem domains,
are called exert systems. The availability of expert system tools, such as
CLIPS, has greatly reduced the effort and cost involved in developing an exert
system.
The actions of applicable rules are executed when the inference engine is
instructed to begin execution. The inference engine selects a rule and then
the actions of the selected rule are executed (which may affect the list of
applicable rules by adding or removing facts). The inference engine then
selects another rule and executes its actions. This process continues until no
applicable rules remain.
For example, an expert system on financial planning is developed with the aid
of an expert financial planner. The rules that are coded into he program are
based on knowledge that the expert planner has and how they are used for
financial planning. Once the expert system has been given all the rules for
financial planning, it can simulate the actions of the human financial planner.
Instead of going to a professional financial planner, you can then do your own
financial planning by using the program. The program would ask several
questions about your objectives and financial status. Then based on the rules,
it can advise you on handling your finances to meet your goals, much like the
expert would.
Natural language, that is easy for humans to learn and use, is hardest for a
computer to master. For example, it is easy for humans to easily understand a
sentence like “Flying planes can be dangerous”. Yet this sentence presents
some difficulties to a software program that lacks both the knowledge of the
world and experience with linguistic structures. The sentence could have
several meanings, such as: Is the pilot at risk, or is the danger to people on
the ground? Which of the many possible meanings of “plane” is relevant?
Depending on context, “plane” could refer to, among other things, an
aeroplane, a geometric object, or a woodworking tool.
Examples of NLP packages are Clout, Q&A, and Savvy Retriever (for use with
databases) and HAL (Human Access Language) for use with Lotus 1-2-3, etc.
A biological neuron may have as many as 10,000 different inputs, and may
send its output to many other neurons. Neurons are wired up in a 3-
dimensional pattern. Real brains, however, are orders of magnitude more
complex than any artificial neural network.
Robots do not require sick leave, health benefits, vacation pay or overtime,
so they present a great saving to corporations.
To provide skilled people to perform the above tasks, there has been a
tremendous growth in IT training providers.
The above discussion shows that there are numerous career opportunities
within the ICT field, and some of the job functions are discussed in more detail
below.
Computer operator:
Computer operators oversee the operation of computer hardware systems,
ensuring that they are used as efficiently as possible. They may work with
mainframes, minicomputers, or networks of personal computers. Computer
operators must anticipate problems and take preventative action, as well as
solve problems that occur during operations. The duties of computer
operators vary with the size of the installation, the type equipment used, and
the policies of the employer.
Operators also maintain log books or operating records, listing each job that is
run and events, such as machine malfunctions, that occur during their shift. In
addition, computer operators may help programmers and systems analysts
test and debug new programs.
Programmers:
Computer programmers write, test, and maintain the detailed instructions,
called programs that computers must follow to perform their functions. They
also conceive, design, and test logical structures for solving problems by
computer. Programs vary widely depending upon the type of information to be
accessed or generated. For example, the instructions involved in updating
financial records are very different from those required to duplicate conditions
on board an air craft for pilots training in a flight simulator. Although simple
programs can be written in a few hours, programs that use complex
mathematical formulas, whose solutions can only be approximated, or that
draw data from many existing systems may require years of work. In most
cases, several programmers work together as a team under a senior
programmers supervision.
System Analyst:
Systems analyst solves computer problems and enables computer
technology to meet individual needs of an organization. They help an
organization realize the maximum benefit from its investment in equipment,
personnel, and business processes. This process may include planning and
developing new computer systems or devising ways to apply existing systems
resources to additional operations. Systems analysts may design new
systems including both hardware and software, or add a new software
application to harness more of the computers power. Most systems analysts
work with a specific type of system that varies with the type of organization
they work for, for example, business, accounting, or financial systems, or
scientific and engineering systems. Some systems analysts also are referred
to as systems developers or systems architects.
Database Administrators:
Database Administrators work with database management systems software
and determine ways to organize and store data. They determine user
requirements, set up computer databases, test and co-ordinate changes. It is
the responsibility of an organizations database administrator to ensure
performance, understand the platform the database runs on, and add new
users. Because they may also design and implement system security,
database administrators often plan and co-ordinate security measures. With
the volume of sensitive data generated every second growing rapidly, data
integrity, backup, and keeping databases secure have become an
increasingly important aspect of the job for database administrators.
Network Administrator:
Network administrators are vital to the continued efficiency of computer
workstations, network servers, and desktop computers within organization. In
small-scale organizations, systems organizations, managers may also
function as local area network (LAN) administrators. In companies with a large
organizational structure, and hence a large computer network, the functions of
the network manager and the LAN administrator may be designated to
different personnel who are both part of management information’s systems
department. Among the designated tasks of LAN administrators are the
installation of new file servers and workstations, LAN troubleshooting, periodic
backups for servers and workstations, upgrade of existing software,
administration of file and network security, and management of electronic
mail.
System Administrator:
Systems administrators manage the effectiveness of information technology
systems, and arrange system maintainance and enhancements to meet user
requirements. Some of the tasks that a systems administrator would be
responsible for are:
- Consult with managerial, administrative and technical staff to determine
information needs, data flows and system definitions.
- Establish and control system access and security.
- Monitor systems to optimize performance, perform backups and initiate
recovery action in the case of system failures.
- Co-ordinate system updates.
- Provide assistance in testing new equipment and systems.
- Co-ordinate support work and training in system use and access.
Computer Technicians:
Computer systems consist of several components such as remote PCs,
terminals, tape and disk storage units, and so on. Systems vary in size from
desktop systems consisting of a micro computer, disk drive, and printer to
large mainframe systems that occupy entire floors of office buildings and may
have terminals in locations miles from the computer. Keeping all the
equipment in good working order is the job of a computer technician
(sometimes called field engineers or customer engineers).
Computer technicians also install new equipment. They lay cables, hook up
electrical connections between machines, thoroughly test the new equipment,
and correct any problems before the customer uses the machine.
At regular intervals, computer technicians service the equipment according to
manufactures recommended maintainance schedules. For example, they
routinely adjust, oil, and clean mechanical parts of printers and sorters.
Computer Scientists:
Computer scientists work as theorists, researchers, or inventors. Their jobs
are distinguished by the higher level of theoretical expertise and innovation
they apply to complex problems and the creation or application of new
technology. Those employed by academic institutions work in areas ranging
from complexity theory, to hardware, to programming language design. Some
work on multidisciplinary projects, such as developing and advancing uses of
virtual reality, in human-computer interaction, or in robotics. Their
counterparts in private industry work in areas such as applying theory,
developing specialized languages or information technologies, or designing
programming tools, knowledge-based systems, or even computer games.
Web Designers:
The growth of the Internet and expansion of the World Wide Web (the
graphical portion of the Internet) have generated a variety of occupations
related to design, development, and maintainance of Web sites and their
servers. Web designers, also called Internet developers or web developers,
are responsible for day-to-day site design and creation. Initially, web pages
were sites are more interactive, with graphics, animations and live links to
databases. The increase in e-commerce also provides more challenges to
web site creation. Depending on he type and scope of the web site, web
designers need a variety of skills such as graphics design, programming and
database knowledge.
Webmasters:
Webmasters are responsible for all technical aspects of a web site, including
performance issues such as seed of access, and for approving site context.
Webmasters must ensure that the web sites are available at all times. They
also need to provide statistics on the web site, such as how often the site is
accessed, the most frequently visited pages, keywords used to search the
sites, and so on. They would deal with registering the site with search engines
to increase the hit rates (number of times a site is visited).
Computer Trainers:
The people who provide training to end-users are generally referred to as
computer trainers. Usually computer trainers will be employed by IT training
providers who offer training in various application packages.
There are also institutions that provide basic training on word processing,
spreadsheets and database management using packages such as MS-Office,
Lotus Smart suite, etc. Trainers who provide this type of training do not
require specialized skills, but need to be well versed with the packages.
Large organizations that have in-house developed applications may also have
IT trainers who are responsible for training end-users and writing user
documentation.
Colleges:
Colleges usually provide a variety of courses with a majority specializing
commercial software packages. They offer introductory course such as
micro computer basics, word processing, spreadsheets, database
packages, accounting packages, web design, and so on. They may also
offer more specialized courses such as operating systems administration,
networking, database management, and so on.
Polytechnics:
Polytechnics offer degree courses which are usually theoretical in nature
and are designed to provide a good knowledge base. This enables the
graduate to apply the knowledge gained to different scenarios.
Research Institutions:
Universities also provide opportunities for further specialized training
through postgraduate, masters and doctoral programmes. A doctorial (Ph.
D.) thesis must make a district and significant contribution to knowledge or
understanding in the area of study, and must afford evidence of originality
shown either by the discovery of new facts or by the exercise of
independent critical thinking. Universities have research facilities have
much to offer industry in both the local and national economics. Industry,
too, has realized that there is more to a university than a source of fresh
graduates. Higher education has the research knowledge and resources a
firm needs to compete effectively. Partnerships are developing between
academic researchers and companies in all fields of manufacturing and
commerce. Some of the breakthroughs in information and communications
technologies have been a result of research carried out for
masters/doctoral programmes
END..
.
-