Computer tools fo information age pt 2
-
Upload
independent -
Category
Documents
-
view
3 -
download
0
Transcript of Computer tools fo information age pt 2
Copyright © 2003 by Prentice Copyright © 2003 by Prentice HallHall
Computers:Computers:Tools for an Tools for an
Information AgeInformation Age
Chapter 9Chapter 9Social and Ethical Issues in Social and Ethical Issues in
Computing:Computing:Doing the Right ThingDoing the Right Thing
22Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
The Digital DivideThe Digital DivideSeparates the computing Separates the computing haves from the have-notsSeveral initiatives exist to Several initiatives exist to narrow the divide
33Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Haves vs. Have-NotsHaves vs. Have-NotsThose with access to computers and the Those with access to computers and the Internet take advantage of personal and Internet take advantage of personal and economic opportunitieseconomic opportunitiesThose without access fall farther behind Those without access fall farther behind Major divisions within countriesMajor divisions within countries Between urban areas and rural onesBetween urban areas and rural ones Between rich and poorBetween rich and poorMajor divisions among nationsMajor divisions among nations Between industrialized and non-Between industrialized and non-industrialized nationsindustrialized nations
Return
44Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Narrowing the DivideNarrowing the DivideWithin the U.S.Within the U.S. Universal Service Fund helps service Universal Service Fund helps service providers to provide telecommunications providers to provide telecommunications services to rural areasservices to rural areas
E-Rate program provides rate subsidies E-Rate program provides rate subsidies for Internet access for schools and for Internet access for schools and librarieslibraries
WorldwideWorldwide Africa ONE is creating a fiber optic Africa ONE is creating a fiber optic network to connect the nations of Africanetwork to connect the nations of Africa
Return
55Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Workplace IssuesWorkplace IssuesHealthy computingEmployee monitoringEnvironmental concerns
66Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Healthy ComputingHealthy ComputingA number of health questions A number of health questions have been raisedhave been raised Harmful emissions from monitorHarmful emissions from monitor Eyestrain from monitorEyestrain from monitor Back pain from position of chair Back pain from position of chair and deskand desk
Repetitive strain injury
Return
77Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Repetitive Strain InjuryRepetitive Strain InjuryMay affect workers who hold their May affect workers who hold their hands over a keyboard for a long hands over a keyboard for a long period of timeperiod of time Carpal tunnel syndrome is the most Carpal tunnel syndrome is the most common form of RSIcommon form of RSI
CausesCauses SpeedSpeed RepetitionRepetition Awkward positioningAwkward positioning Holding a static position for a long Holding a static position for a long timetime
Return
88Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
ErgonomicsErgonomicsRefers to human factors related Refers to human factors related to the use of computersto the use of computersErgonomic equipmentErgonomic behavior
99Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Ergonomic EquipmentErgonomic EquipmentChair should be Chair should be pneumatically pneumatically adjustableadjustableKeyboard platform Keyboard platform should be set to should be set to proper heightproper heightMonitor must be Monitor must be adjustableadjustableLighting should be Lighting should be adjusted to minimize adjusted to minimize glare on the screenglare on the screen
Return
1010Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Ergonomic BehaviorErgonomic BehaviorErgonomic equipment must be used properlyErgonomic equipment must be used properly Turn the screen away from the window to Turn the screen away from the window to reduce glarereduce glare
Cover your screen with a glare protectorCover your screen with a glare protector Place keyboard to avoid arm and wrist fatiguePlace keyboard to avoid arm and wrist fatigue Use a raised rest for your wristUse a raised rest for your wrist Position your seat back so back is supportedPosition your seat back so back is supported Sit with your feet firmly on the floorSit with your feet firmly on the floor Enlarge fonts so they are easier to seeEnlarge fonts so they are easier to see Take frequent breaksTake frequent breaks
Return
1111Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Employee MonitoringEmployee MonitoringVarious tools allow an employer to Various tools allow an employer to monitor an employee’s performancemonitor an employee’s performance Keystroke monitors measure keystrokes per Keystroke monitors measure keystrokes per secondsecond
Other software tools monitor how long an Other software tools monitor how long an employee is away from the computeremployee is away from the computer
Monitor the files stored on the hard driveMonitor the files stored on the hard drive Monitor the sites visited on the InternetMonitor the sites visited on the InternetMany companies have policies that Many companies have policies that notify employees about monitoring notify employees about monitoring practicespractices
Return
1212Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Environmental ConcernsEnvironmental ConcernsPower consumptionComputer suppliesPC disposal
Return
1313Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Reducing Power Reducing Power ConsumptionConsumption
Energy Star Energy Star standards standards Limit the power the Limit the power the system consumes when system consumes when idleidle
Energy management Energy management featuresfeatures Specify the amount of Specify the amount of time the system will time the system will wait before turning wait before turning off system componentsoff system components
Return
1414Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Computer SuppliesComputer SuppliesUse these strategies to reduce the amount Use these strategies to reduce the amount of paper and toner cartridges usedof paper and toner cartridges used Don’t print out everythingDon’t print out everything Use e-mail instead of faxing or sending a memoUse e-mail instead of faxing or sending a memo Use the back side of already used paper for Use the back side of already used paper for draft copiesdraft copies
Save heavyweight bond paper for critical items Save heavyweight bond paper for critical items and use recycled paper for routine printingand use recycled paper for routine printing
Make sure used paper is recycled rather than Make sure used paper is recycled rather than thrown in the trashthrown in the trash
Refill and reuse empty ink-jet and toner Refill and reuse empty ink-jet and toner cartridgescartridges
Return
1515Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
PC DisposalPC DisposalFind ways to prolong the PC’s Find ways to prolong the PC’s lifelife Upgrade key componentsUpgrade key componentsGive the PC to someone in the Give the PC to someone in the organization with more limited organization with more limited computing needscomputing needsWhen you buy a new PC, reuse the When you buy a new PC, reuse the keyboard, mouse, and monitorkeyboard, mouse, and monitorDonate usable equipment to Donate usable equipment to charities and/or schoolscharities and/or schools
Return
1616Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Jurisdictional IssuesJurisdictional IssuesInternational issuesInternational issues Applying national laws to a world-wide medium is Applying national laws to a world-wide medium is a difficult processa difficult process
It would be impossible to determine if the content of It would be impossible to determine if the content of every Web site was legal according to the laws of every every Web site was legal according to the laws of every countrycountry
Issues exist over which country’s court has Issues exist over which country’s court has jurisdictionjurisdiction
National issuesNational issues Issues exist over which locality’s court has Issues exist over which locality’s court has jurisdictionjurisdiction
Imposition of sales taxes on Internet Imposition of sales taxes on Internet transactionstransactions
1717Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Protecting Children on the Protecting Children on the InternetInternet
The Internet offers many The Internet offers many opportunities for childrenopportunities for children There are also unsavory elements There are also unsavory elements on the Interneton the Internet
Ways to protect childrenWays to protect children Blocking software Child monitoring Laws to protect children
1818Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Blocking SoftwareBlocking SoftwareUsed to prevent Used to prevent children from children from accessing sites on its accessing sites on its updatable list of updatable list of objectionable sitesobjectionable sites
Blocks pornographic Blocks pornographic sites and sites with sites and sites with foul language foul language
Blocks sites requesting Blocks sites requesting names, phone numbers, names, phone numbers, and credit card numbersand credit card numbers
Sometimes criticized Sometimes criticized for being overzealousfor being overzealous
Return
1919Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Child MonitoringChild MonitoringPlace the child’s computer in a Place the child’s computer in a public area instead of his or public area instead of his or her bedroomher bedroomRestrict usage when parents are Restrict usage when parents are not presentnot present
Return
2020Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Laws to Protect ChildrenLaws to Protect ChildrenChildren’s Online Privacy Protection ActChildren’s Online Privacy Protection Act Requires Web sites that target children Requires Web sites that target children under 13 to post a privacy policy and obtain under 13 to post a privacy policy and obtain parental consent before collecting dataparental consent before collecting data
Children’s Internet Protection ActChildren’s Internet Protection Act Requires libraries receiving federal funding Requires libraries receiving federal funding to implement blocking technologyto implement blocking technology
Neighborhood Children’s Internet Neighborhood Children’s Internet Protection ActProtection Act Requires libraries receiving the E-Rate Requires libraries receiving the E-Rate discount to establish an Internet safety discount to establish an Internet safety policypolicy
Return
2121Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Ethics in ComputingEthics in ComputingEthics – standards of moral conductEthics – standards of moral conduct Used to help determine the proper Used to help determine the proper course of action in difficult course of action in difficult situationssituations
Computing IssuesComputing Issues Computer ethics Professional ethics Programmer responsibility Ethical use of computers
2222Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Computer EthicsComputer EthicsTen Commandments of Ten Commandments of Computer EthicsComputer Ethics Apply general ethical Apply general ethical principles to principles to computingcomputing
Developed by the Developed by the Computer Ethics Computer Ethics InstituteInstitute
Return
2323Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Professional EthicsProfessional EthicsRelates to ethics of those whose Relates to ethics of those whose work focuses on computer systemswork focuses on computer systemsCode of Ethics and Professional Code of Ethics and Professional Conduct developed by the Association Conduct developed by the Association for Computing Machineryfor Computing MachineryDivided into sectionsDivided into sections General principlesGeneral principles Professional responsibilitiesProfessional responsibilities Guidelines for organizational systemsGuidelines for organizational systems
Return
2424Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Programmer Programmer ResponsibilityResponsibility
Bug-free software does not existBug-free software does not exist Testing can only show the presence Testing can only show the presence of bugs, not their absenceof bugs, not their absence
Issues related to software Issues related to software qualityquality How much testing is enough?How much testing is enough? How many minor bugs are acceptable How many minor bugs are acceptable in software about to be released?in software about to be released?
Return
2525Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Ethical Use of ComputersEthical Use of ComputersData qualityProtecting customers’ personal dataDigitally altering data
Return
2626Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Data QualityData QualityUsers are responsible for the Users are responsible for the quality of data entered into quality of data entered into the systemthe systemProcedures must be in place to Procedures must be in place to detect and correct inaccurate detect and correct inaccurate informationinformation
Return
2727Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Protecting Customers’ Protecting Customers’ DataData
Particularly relevant to companies Particularly relevant to companies doing business over the Internetdoing business over the InternetDevelop privacy policies stating how Develop privacy policies stating how data will be useddata will be usedTwo approachesTwo approaches Opt-in policy – customers are notified of Opt-in policy – customers are notified of privacy policy and must agree before their privacy policy and must agree before their data can be releaseddata can be released
Opt-out policy – customers are assumed to Opt-out policy – customers are assumed to agree to the release of their data unless agree to the release of their data unless they specifically request it be kept privatethey specifically request it be kept private
Return
2828Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Altering RealityAltering RealityComputers can Computers can alter photographsalter photographs How much alteration How much alteration is ethical?is ethical?
E-mail messages E-mail messages can be destroyedcan be destroyed In a legal action, In a legal action, is this altering is this altering evidence?evidence?
Return
2929Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Intellectual Property Intellectual Property RightsRights
Refers to results of Refers to results of intellectual activity in the intellectual activity in the industrial, scientific, industrial, scientific, literary, or artistic fieldsliterary, or artistic fieldsU.S. Copyright Act provides U.S. Copyright Act provides protection in three areasprotection in three areas CopyrightsCopyrights PatentsPatents TrademarksTrademarks
3030Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
CopyrightsCopyrightsProvides the creator of a literary Provides the creator of a literary or artistic work with control over or artistic work with control over its use and distributionits use and distribution Widespread distribution of music and Widespread distribution of music and video sover the Internet has created video sover the Internet has created quite a controversyquite a controversy
Defining fair use has been difficultDefining fair use has been difficult Under fair use, you may use copyrighted Under fair use, you may use copyrighted works for limited purposesworks for limited purposes
Digital issuesDigital issuesReturn
3131Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
Digital Fair Use IssuesDigital Fair Use IssuesCopy-protection schemes make it Copy-protection schemes make it impossible to copy CDs and DVDsimpossible to copy CDs and DVDs Users claim that violates their fair use Users claim that violates their fair use rightsrights
SoftwareSoftware Users may not modify copyrighted softwareUsers may not modify copyrighted softwareDigital imagesDigital images Images on the Web may be downloaded and used Images on the Web may be downloaded and used as screen savers, but they may not be as screen savers, but they may not be distributed or altereddistributed or altered
PlagiarismPlagiarism Work taken from the Internet must be cited if Work taken from the Internet must be cited if it is used in a paper or other presentation it is used in a paper or other presentation
Return
3232Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
PatentsPatentsDesigned to protect inventions Designed to protect inventions and encourage inventorsand encourage inventors Grant patent holder exclusive rights Grant patent holder exclusive rights to the inventionto the invention
Patent Office will grant patent Patent Office will grant patent protection to software algorithms protection to software algorithms and techniquesand techniques Will also grant patents for business Will also grant patents for business methods implemented in softwaremethods implemented in software
Return
3333Copyright © 2003 by Prentice Copyright © 2003 by Prentice
HallHall
TrademarksTrademarksA word, name, symbol, or device A word, name, symbol, or device used to distinguish one company used to distinguish one company and its products from anotherand its products from anotherTwo issues in the digital arenaTwo issues in the digital arena Unauthorized use of one company’s Unauthorized use of one company’s trademarks on another’s Web sitetrademarks on another’s Web site
Cybersquatting – obtaining a domain Cybersquatting – obtaining a domain name that includes another company’s name that includes another company’s trademark, then selling that domain trademark, then selling that domain name at a profitname at a profit
Return