Tuesday, 4 June 2013



The impact of IT



Over the years, IT has had huge impact on daily lives.



Effects on small communities

Small communities benefit from in many ways.

The use of I.T. by smaller communities can reach out to a wider community. For example the use of social networking can link communities together, by allowing people to interact with others

IT can bring more community involvement through advertising e.g. Email contacts or websites.

Charities, in particular, can use targeted emails and the use of online fundraising pages, such as fundraizer.com, to highlight their cause and encourage people to either join in events or donate directly.

Group pages e.g. Facebook can create communities where members have common ideas or interests. They can share information, tips and ideas, support each other, and plan events. Some groups are local in nature, others national or even global.



Economic

IT has created many new jobs, due to new technology creating new manufacturing opportunities. Use of the technology has led to an expansion in the service sector e.g. call centres.

The way that jobs are advertised has changed, with many more companies choosing to advertise with online recruitment specialists. Even job centres use a website to list available employment. This means a wider range of people can see the details of advertised jobs. Once new jobs have been advertised, companies can use text messages or emails to keep in touch with candidates.

The use of IT has had a huge impact on work practices. Offices are now more efficient due to the new technology being used to carry out tasks that can become tedious and time consuming.

Many employees now work from home.  This has allowed may people who have families, disabilities or anything else that could restrict them from working, to be able to work with the right flexibility and with ease. As long as the employee has access to the internet and the business’ network then the job can be done easily.  There are some bad points to working from home.  If an employee is working from home, then they will never meet their colleagues. This is a bad thing because if the employee was to be called into work for a meeting then they would most likely find it difficult to interact with their colleagues.



Although the advancement of IT is had a good effect on businesses, Jobs have been lost.  This is down to the fact that fewer people are now needed to do tasks that would have involved a workforce of about 20 employees, over a decade ago.  This has saved companies and businesses a vast amount of money as they have less staff to pay. 

Tasks such as composing multiple letters and sorting through files can be completed by one or two people at a time.



Another downside to IT is that employees may need to learn a whole new skill set.  Re-training may be required every time a new piece of technology is introduced into an office environment; businesses will have to put aside money for all employees who will be using the technology.



When an employee is working from home, they may get distracted by other things such as family members or watching television, this may lead to procrastination. This would not be good for the company as tasks maybe not be completed until after the deadline, or they may not be completed at all.



IT can save an employee time due to the fact that most tasks are computerised.

Interacting with other businesses globally has never been easier, thanks to electronic devices and applications. Skype is an example of an application that could be used to hold a conference on-line. This is called E-conferencing.

Electronic conferencing can be very useful for a business, especially if they have other offices spread throughout the country or even the world.  This method of communication can reduce the need of travelling to other offices and countries.



More teamwork depending on job role



Working practices

All employees that use IT are required to follow certain work policies set by the business and the law.



Confidentiality is important especially if a company holds the personal information of customers or other companies.  If secret information is not kept securely, then it can be stolen and misused e.g. sold on, or used to steal money from others.

Some companies require their employees to sign certain secret acts to protect the customer’s personal data.



Information should be kept safe by following these procedures:

·         Making sure appropriate and secure usernames and passwords are used

·         Security e.g. anti-virus software, is up-to-date

·         Regular backup of information

·         Make sure information is encrypted

·         Only let authorised users  have access to it



The use of firewalls will block certain websites and protect you from hackers or viruses, by filtering the data that is sent to your system.  This will prevent employees accessing certain websites and data that maybe inappropriate, offensive or irrelevant.

Most employers would not tolerate the use of social media in the workplace. This is because it can cause the company networks to run slowly and It may also lead to employees getting distracted from their work. 



Every company needs their employees work to be kept surely, so everyone must have their own username and password.  Each user is responsible for the safekeeping of their username and password.



Certain companies have their own policies towards Email size. If an employee were to send out emails that did not comply with the company policy then, this may result in next works running slowly.



An employer may feel the need to monitor an employee’s system usage, so that they can keep an eye on them, to see whether they are abiding by the company’s policy. This may lead to instant dismissal.



Certain security procedures may be required in the workplace. For example, things like installing electronic security e.g. antivirus, setting up firewalls and disabling disk drive and usb ports are some typical methods of keeping data safe.



The use of mobile phones is forbidden in some companies due to the fact that employees maybe become distracted, and also private information may be stored or shared via mobile phones.





Sustainability

It is important to dispose of old equipment properly, because if it not disposed of it properly , then things like the toxic substances found in the components can leak into the earth’s atmosphere, and this can have a terrible affect on the environment.



Things that you could do to save the environment whilst using IT can include, saving paper, recycling components/paper and making sure that equipment is energy efficient.



Local councils offer refurbishment opportunities. This is where components can be refurbished and sent to other countries to be re-used.

Turning off equipment when not in use, doesn’t only save the environment, it can save money too. If businesses turned off all their equipment when not in use, then it would save a lot of energy.



If you reuse and recycle paper, then the amount of trees being cut down will decrease dramatically.

Things like printed documents double sided, converting to electronic storage facilities, and even just recycling paper can help reduce the amount of trees being destroyed which results in more oxygen and animals being saved.



The legal Aspects of IT

Pictures/photos on the internet owned by the photographer can be lost control of automatically. This is due to theft and unfair use of images. To avoid theft, content can be copyrighted by the owner.

Copyright is the law that was put in place to protect the owners of content like music and images.

A person can register to have their work copyrighted to avoid theft. Copyright will last the owner’s life time and 70 years after the owner has died. Copyright can also be sold to another party which will then last up to 70 years.

Content that is shared via internet has same copyright as another type of content, although it is hard to enforce copyright via the World Wide Web, due its size.

Plagiarism is when content is stolen from other people and it is claimed to be their own.

If a person puts something online and someone steals it and claims it as their own then this would be classed as plagiarism. This may lead to legal action being taken against the user.

To avoid plagiarism, copyright should be placed on to content that you wish to be shared. This can also include computer programs. Most programs require a license before the use of software.  This insures that the user has authorised usage.





Ethical

When online Information can be stolen and misused e.g. bank details can be stolen.



If you would like to protect your private information, it would not be ideal to use social networking sites such facebook, twitter and bebo.



To prevent theft when online, then the following things should be considered:

·         don’t share too information online

·         Regularly changing your password

·         don’t leave your computer unattended and logged in

·         Always make sure that people are not watching whilst you enter sensitive information

·         use only secure websites

·         Opt for banks that use safeguarding methods like bank authorisation.



Every user of ICT and business is required to comply with the data protection act.



The data protection act is a law that was introduced in 1998. It was put in place to make sure that data is used fairly and kept securely.









The Eight principles of the data protection act

Data must be:

  • used fairly and lawfully
  • used for limited, specifically stated purposes
  • used in a way that is adequate, relevant and not excessive
  • accurate
  • kept for no longer than is absolutely necessary
  • handled according to people’s data protection rights
  • kept safe and secure
  • not transferred outside the UK without adequate protection



Unequal access

Some people have unequal access to the internet.

Some people in rural areas have limited access to broadband, telephone lines, and dial up services can be slow and unreliable.

Some areas have no electricity or nowhere to buy technology, and income and employment status may limit options because of financial issues.

People who study, may need more regular access than those who don’t, and some age groups e.g. 16 – 40 years, are more likely to have access to the internet, than those younger or older. 

Not every country allows full access to the World Wide Web to its people. Eritrea, North Korea, Syria, Iran, Equatorial Guinea are the 5 most internet censored in the world. This is because of certain governments want to restrict contact with the outside world.



All these factors play apart in equality of access:



·         Employment status – someone with a job is more likely to have disposable income to buy technology, however some low income jobs allow employees regular access to the internet.

·         Income – The higher your income the more technology you can afford.

·         Education – people who have been to college are more likely to own and use a computer

·         Race/ethnicity – some religions don’t agree with technology e.g. Amish 

·         Age – younger persons are more likely to use IT than older age groups

·         Gender – up to the age of 40 more woman use the internet than men, after the age of 40 this swaps. The use of games consoles plays a part in this figure.

·         Family – families with children of school age are more likely to own a computer than those who haven’t



Abuse of IT

There are many threats of using ICT.

Cyberbullying is the bullying or abuse of people online. It can take place on many different websites such as facebook or twitter.

It can affect some venerable people by causing them stress or to become depressed.

Common things that cyber bullies do are:

·         Make people lose confidence about themselves

·         Call them  inappropriate names e.g. fat, stupid or ugly

·         Spread lies and rumours

·         Share embarrassing photos of other’s without their permission



Although the internet is a hard thing to monitor, there are things that can be done to prevent cyberbullying. For example, a person could block contact with certain people, and they can also abuse via the internet to the police or they can use privacy settings.



Spam is the method of sending the same thing to multiple people at one time, in order to annoy or con people. These emails usually are irrelevant and fraudulent. Spam emails can be a threat as they can contain viruses which can infect your system if opened.

These emails can be reduced by using spam filters. This cannot get rid of them completely, but it can reduce the amount of spam you receive.



They can also be to steal information or to spy on your computer.  This is a threat to a system as it can destroy files and the whole system.



Threats to a computer system



There are many different threats to computer system; some can be more fatal than others.



Viruses

Viruses are programmes or files that install themselves onto a system without you knowing.

Every computer virus has been made by man, and can be transmitted to anyone no matter how secure a system is.



These could get them from downloading files, browsing the internet or opening attachments infected with the files.



An example is, a file infector virus, with this type of virus replaces or overrides a file, and the user will think that it is was the original file.



Hacking

Hacking is the act of “breaking into a computer system” and accessing personal information.

This is could also be the act of changing or deleting personal information on sites such as Facebook.



There have been many cases which have been reported recently.

An example would be the hacking of the social networking site Twitter.



Not every form of hacking is bad.

For example, there are jobs that have been created in which you are asked to hack a webpage to test out the security.





Phishing

Phishing is an attempt to obtain or steal personal information by posing as genuine companies and luring their victims to fraudulent websites, so they will hand over their personal information.



An example of this type of attack is from 2003, where eBay users were sent emails linking to the fraudulent site and then fooled into thinking that they had to update their account details.



General Breakdowns

Computer breakdowns are one of the most common threats to a system.



Computers will generally break down after time; this is due to things such as power problems and hardware failures.



When the hard disk fails, it is not always possible to recover or restore data. The hard disk stores a vast amount of the data on a system.



Trojans

Trojans are similar to viruses, as they can infect your system without you knowing.

The only difference between a Trojan and a virus is that a Trojan cannot duplicate itself.

One of the most popular examples is fake antivirus software that can claim to remove viruses but they actually release them on to your computer.



Malware

Malware is the name given to malicious software that can be found on a computer.

Malware could anything like a virus or a Trojan.



Impact

The impact that these factors leave is big.



If you lose data then it could lead to; malicious use such as identity theft.



Prevention

Although sometimes we cannot stop the threats completely, we can reduce the amount of damage that we can do.



Installing anti-virus software can reduce the risk of getting a virus and can get rid of the virus completely.  Norton security is an example of an anti-virus.

Although anti-virus can be expensive, there are cheaper or free versions available.


You can prevent hacking by only give your email address to trusted persons or companies and by keeping your security details in a safe place.



Using stronger passwords is a good way of preventing hacking because they are harder for people to guess which reduces the amount of someone getting into your system.



While creating a password you should make sure that you use symbols and numbers.

An example of a good password would be something like J3lly22Fish.


Installing updates and patches are good because they can fix error and recognise the latest viruses and scams.



Firewall

Installing a firewall reduces the risk of viruses or malware, because you can monitor what enters your system.



Maintenance

Standard maintenance routines can help protect your computer’s system.

Simple tasks such as installing antivirus software and updating windows can minimize the threat of your system failing.



Physical Security

Physical security is important, because it can prevent data loss and theft.

Physical security can be anything from locking your computer when not in use, to using physical locks on cables.

Companies and organisations use different security methods to protect their data.

For example, they would limit the use of unauthorised users, in order to prevent malicious use.

No comments:

Post a Comment