SlideShare a Scribd company logo
1
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Social and Professional
Issues
LEARNING OUTCOMES
2
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS6| CH4
1 Discuss information privacy and methods for
improving the privacy of information
2 Explain the privacy of e-mail, data collection
issues, and censorship
3 Discuss the ethical issues related to information
technology
4 Discuss the principles of intellectual property and
issues related to the infringement of intellectual
property
3
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
LEARNING OUTCOMES (continued)
5 Discuss information system issues that affect
organizations, including the digital divide,
electronic publishing, and the connection between
the workplace and employees’ health
6 Describe green computing and the ways it can
improve the quality of the environment
4
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Privacy Issues
• Employers search social networking sites for
background information on applicants
• Monitoring systems are adopted by
employers to check employee performance
• Information technology has aided in the
easy availability of personal information
• Information in databases can be used for direct
marketing and for credit checks on potential
borrowers or renters
5
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Concepts of the Web and Network Privacy
• Set of rules specifying the legal and ethical use of a system
and the consequences of noncompliance
Acceptable use policy
• Issues involving both the user’s and the organization’s
responsibilities and liabilities
Accountability
• Method for binding all the parties to a contract
Nonrepudiation
6
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Guidelines to Minimize the Invasion of Privacy
• Conduct business only with websites having
privacy policies
• Limit access to personal information to those
with authorization
• Ensure data’s reliability and take precautions to
prevent misuse of the data
• Data collection must have a stated purpose
• Identify ways to prevent personal information
gathered being disclosed without consent
7
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Guidelines to Minimize the Invasion of Privacy
• Organizations should use verification
procedures to ensure data accuracy
• Organizations must correct or delete
incorrect data
• Prevent unauthorized access to data and misuse
of data
• Users should review their records and
correct any inaccuracies
• Transparency in record-keeping systems
storing personal data
8
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Privacy Issues Presented by E-mail
• Spam: Unsolicited e-mail sent for
advertising purposes
• Sent in bulk using automated mailing software
• Ease of access
• Individuals should assume that others have
access to their messages
• Any e-mails sent on company-owned computers
are the property of the organization
9
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Data Collection on the Web
• Due to the increase in online shopping,
personal details of individuals are prone to
misuse
• Issue of personal information being sold to
telemarketing firms resulting in spam
• Information provided on the Web can be
combined with other information and
technologies to produce new information
10
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Technologies Used for Data Collection
• Cookies: Small text files with unique ID tags
that are embedded in a Web browser and
saved on the user’s hard drive
• Help websites customize pages for users
• Considered an invasion of privacy when users’
information is used without prior consent
• Installing a cookie manager helps users disable
cookies
• Log files: Generated by Web server
software, record a user’s actions on a
website
11
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Ethical Issues of Information Technologies
• Information technology offers opportunities
for unethical behavior due to ease of
collecting and disseminating information
• Increase of cybercrime, cyberfraud, identity
theft, and intellectual property theft
• Organizations can reduce unethical
behavior of employees by developing and
enforcing codes of ethics
12
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Censorship of Types of Information on the
Web
• Public information
• Posted by an organization or public agency
• Censored for public policy reasons
• Censored if the content is deemed offensive to a
political, religious, or cultural group
• Private information
• Posted by a person
• Uncensored because of constitutional freedom
of expression
13
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Censorship
• Restricting access to the Web
• Countries like Burma, China, and Singapore,
restrict or forbid their citizens’ access to the Web
• Internet neutrality: Internet service providers
(ISPs) and government agencies should treat
all data on the Internet equally
• Parents use programs like CyberPatrol,
CyberSitter, Net Nanny, and SafeSurf to prevent
children’s access to certain websites
14
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Intellectual Property
• Legal umbrella covering protections that
involve copyrights, trademarks, trade
secrets, and patents developed by people
or businesses
15
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Categories in Intellectual Property
• Industrial property
• Inventions, trademarks, logos, and industrial
designs
• Copyrighted material
• Literary and artistic works
• Covers online materials like Web pages, HTML
code, and computer graphics
• Fair Use Doctrine: Exception to the Copyright
law which allows the use of copyrighted
material for certain purposes
16
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Intellectual Property Protections
• Trademark: Protects product names and
identifying marks
• Patent: Protects new processes
• Advantages to organizations
• Generates revenue by licensing the patent
• Attracts funding for research and
development
• Keeps competitors from entering certain
market segments
17
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Laws Covering Software Piracy
• 1980 revisions to the Copyright Act of 1976
include computer programs
• Laws covering legal issues related to
information technologies in the United
States
• Telecommunications Act of 1996
• Communications Decency Act (CDA)
• Laws against spamming
18
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Cybersquatting
• Registering, selling, or using a domain name
to profit from someone else’s trademark
• Typosquatting: Relies on typographical
errors made by Web users when typing a
website address into a Web browser
• Variation of cybersquatting
• Called URL hijacking
19
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Digital Divide
• Information technology and the Internet
that is not accessible for all
• Increasing funding for computers at schools,
public places, helps offset the divide
20
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Impact of Information Technology in the
Workplace
• Creation of technical jobs, requiring
extensive training
• Increased consumers’ purchasing power
• Results in a stronger economy by reducing
production costs
• Direct effect on the nature of jobs
• Telecommuting enables work from home option
• Organizations can use the best and most cost-
effective human resources in a large
geographical region
21
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Impact of Information Technology in the
Workplace
• Job deskilling: Occurs when skilled labor is
eliminated due to high technology
• Virtual organizations: Companies,
suppliers, customers, and manufacturers
connected via information technologies
• To share skills and cost
• To have access to each other’s markets
22
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Table 4.1 Potential Benefits and Drawbacks of
Telecommuting
23
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Information Technology and Health Issues
• Increasing popularity of touchscreens result
in stress related injuries of the users’ hands,
arms, back, and eyes
• Related health problems associated with
computer equipment
• Vision issues
• Musculoskeletal issues
• Skin issues
• Reproductive system issues
• Stress issues
24
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Green Computing
• Promotes a sustainable environment and
consumes the least amount of energy
• Involves the design, manufacture, use, and
disposal of computers, servers, and computing
devices with minimal impact on the environment
• Requires cooperation of both private and
public sectors
25
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Ways to Achieve Green Computing
• Design products that last longer and are
modular in design
• Parts can be upgraded without replacing the
entire system
• Design search engines and computing
routines that are faster and consume less
energy
• Replace underutilized smaller servers with
one large server using a virtualization
technique
26
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
Ways to Achieve Green Computing
• Use computing devices that consume less
energy and are biodegradable
• Allow certain employees to work from their
homes to reduce carbon foot prints
• Conduct meetings over computer networks
to reduce business travel
• Encourage carpool and nonmotorized
transportation for employees
• Turn off idle PCs and recycle computer-
related materials
KEY TERMS
27
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS6 | CH4
• Acceptable use policy
• Accountability
• Cookies
• Cybersquatting
• Digital divide
• Green computing
KEY TERMS
28
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS6 | CH4
• Intellectual property
• Log files
• Nonrepudiation
• Spam
• Virtual organizations
SUMMARY
29
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
• Employers search social networking sites,
such as Facebook or MySpace, to find
background information on applicants
• e-mail is distributed through the Web or a
company network; people should assume
that others have access to their messages
• Public information, posted by an
organization or public agency, can be
censored for public policy reasons
SUMMARY
30
Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4
• Children, in particular, are victims of the
digital divide
• Information technology has created many
new jobs
• Green computing is one of the methods for
combating global warming

More Related Content

What's hot

Raspberry Pi Technology
Raspberry Pi TechnologyRaspberry Pi Technology
Raspberry Pi Technology
Ravi Basil
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
BESOR ACADEMY
 
Presentation on computer system
Presentation on computer systemPresentation on computer system
Presentation on computer system
Annavi John
 
It essentials pc hardware and software overview
It essentials pc hardware and software overviewIt essentials pc hardware and software overview
It essentials pc hardware and software overviewAhmed Sultan
 
Internet Principles and Components, Client-Side Programming
Internet Principles and Components, Client-Side ProgrammingInternet Principles and Components, Client-Side Programming
Internet Principles and Components, Client-Side Programming
Prabu U
 
Raspberry Pi presentation for Computer Architecture class
Raspberry Pi presentation for Computer Architecture classRaspberry Pi presentation for Computer Architecture class
Raspberry Pi presentation for Computer Architecture class
Michael Gordon
 
Raspberry pi
Raspberry pi Raspberry pi
Raspberry pi
Naga Srinivas
 
20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology
Kathirvel Ayyaswamy
 
generation of computer
generation of computergeneration of computer
generation of computer
Muhammed Nihal
 
Raspberry pi ppt
Raspberry pi pptRaspberry pi ppt
Raspberry pi ppt
PavanKumar3601
 
Raspberry Pi Introduction
Raspberry Pi IntroductionRaspberry Pi Introduction
Raspberry Pi Introduction
Michal Sedlak
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
Maddy garg
 
Generations of computers iv delmundo report
Generations of computers iv delmundo reportGenerations of computers iv delmundo report
Generations of computers iv delmundo reportJonard Pristo
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
Al Forte
 
Introduction to raspberry pi
Introduction to raspberry piIntroduction to raspberry pi
Introduction to raspberry pi
동호 손
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
Amir_Mukhtar
 
Generations of computer
Generations of computerGenerations of computer
Generations of computerJyothi Reddy
 

What's hot (20)

Raspberry Pi Technology
Raspberry Pi TechnologyRaspberry Pi Technology
Raspberry Pi Technology
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
 
Presentation on computer system
Presentation on computer systemPresentation on computer system
Presentation on computer system
 
It essentials pc hardware and software overview
It essentials pc hardware and software overviewIt essentials pc hardware and software overview
It essentials pc hardware and software overview
 
Internet Principles and Components, Client-Side Programming
Internet Principles and Components, Client-Side ProgrammingInternet Principles and Components, Client-Side Programming
Internet Principles and Components, Client-Side Programming
 
Raspberry Pi presentation for Computer Architecture class
Raspberry Pi presentation for Computer Architecture classRaspberry Pi presentation for Computer Architecture class
Raspberry Pi presentation for Computer Architecture class
 
Third generation of computer
Third generation of computerThird generation of computer
Third generation of computer
 
Raspberry pi
Raspberry piRaspberry pi
Raspberry pi
 
Raspberry pi
Raspberry pi Raspberry pi
Raspberry pi
 
20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology
 
generation of computer
generation of computergeneration of computer
generation of computer
 
Raspberry pi ppt
Raspberry pi pptRaspberry pi ppt
Raspberry pi ppt
 
Raspberry Pi Introduction
Raspberry Pi IntroductionRaspberry Pi Introduction
Raspberry Pi Introduction
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
 
Generations of computers iv delmundo report
Generations of computers iv delmundo reportGenerations of computers iv delmundo report
Generations of computers iv delmundo report
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Introduction to raspberry pi
Introduction to raspberry piIntroduction to raspberry pi
Introduction to raspberry pi
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
 
Pl internet(cyberspace)
Pl internet(cyberspace)Pl internet(cyberspace)
Pl internet(cyberspace)
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
 

Similar to Week 4.5.ppt

4LTR_MIS6_Ch04.ppt
4LTR_MIS6_Ch04.ppt4LTR_MIS6_Ch04.ppt
4LTR_MIS6_Ch04.ppt
MohammadHaider44
 
4LTR_MIS6_Ch04.ppt
4LTR_MIS6_Ch04.ppt4LTR_MIS6_Ch04.ppt
4LTR_MIS6_Ch04.ppt
AlvinOdion
 
Personal, Legal, Ethical, and Organizational Issues of .docx
Personal, Legal, Ethical, and Organizational Issues of .docxPersonal, Legal, Ethical, and Organizational Issues of .docx
Personal, Legal, Ethical, and Organizational Issues of .docx
karlhennesey
 
Ethics_6e_PPT_Ch09.pptx
Ethics_6e_PPT_Ch09.pptxEthics_6e_PPT_Ch09.pptx
Ethics_6e_PPT_Ch09.pptx
FrankKhoza
 
Elet5e ch09
Elet5e ch09Elet5e ch09
Elet5e ch09
DeAnna Gossett
 
How to Build Management Career in IT
How to Build Management Career in ITHow to Build Management Career in IT
Alexander sambuk
Alexander sambuk  Alexander sambuk
Alexander sambuk
Lviv Startup Club
 
Elet5e ch03
Elet5e ch03Elet5e ch03
Elet5e ch03
DeAnna Gossett
 
SharePoint for Communicators and Intranet Managers
SharePoint for Communicators and Intranet ManagersSharePoint for Communicators and Intranet Managers
SharePoint for Communicators and Intranet Managers
Prescient Digital Media
 
Online Reputation Clean-up
Online Reputation Clean-upOnline Reputation Clean-up
Online Reputation Clean-up
Alexander Bayliss
 
How the ID graph enables people-based marketing
How the ID graph enables people-based marketingHow the ID graph enables people-based marketing
How the ID graph enables people-based marketing
Louisville Digital
 
Gareth Young - Creating A Global Internet Anti-Piracy Strategy
Gareth Young - Creating A Global Internet Anti-Piracy StrategyGareth Young - Creating A Global Internet Anti-Piracy Strategy
Gareth Young - Creating A Global Internet Anti-Piracy StrategyEleonora Rosati
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
PECB
 
Creating An Intranet News Team
Creating An Intranet News TeamCreating An Intranet News Team
Creating An Intranet News Team
Prescient Digital Media
 
Search Profile Index Service by 4th Media
Search Profile Index Service by 4th MediaSearch Profile Index Service by 4th Media
Search Profile Index Service by 4th Media
Janette Toral
 
Elet5e ch07
Elet5e ch07Elet5e ch07
Elet5e ch07
DeAnna Gossett
 
Why Has Content Marketing Become So Important to SEO
Why Has Content Marketing Become So Important to SEOWhy Has Content Marketing Become So Important to SEO
Why Has Content Marketing Become So Important to SEO
Tim Aldiss
 
Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011
iohann Le Frapper
 
Alexander sambuk
Alexander sambukAlexander sambuk
Alexander sambuk
Lviv Startup Club
 
Seven components of successful sales and business development framework
Seven components of successful sales and business development frameworkSeven components of successful sales and business development framework
Seven components of successful sales and business development framework
Alexander Sambuk - Leadership and Execution, IT and HiTech
 

Similar to Week 4.5.ppt (20)

4LTR_MIS6_Ch04.ppt
4LTR_MIS6_Ch04.ppt4LTR_MIS6_Ch04.ppt
4LTR_MIS6_Ch04.ppt
 
4LTR_MIS6_Ch04.ppt
4LTR_MIS6_Ch04.ppt4LTR_MIS6_Ch04.ppt
4LTR_MIS6_Ch04.ppt
 
Personal, Legal, Ethical, and Organizational Issues of .docx
Personal, Legal, Ethical, and Organizational Issues of .docxPersonal, Legal, Ethical, and Organizational Issues of .docx
Personal, Legal, Ethical, and Organizational Issues of .docx
 
Ethics_6e_PPT_Ch09.pptx
Ethics_6e_PPT_Ch09.pptxEthics_6e_PPT_Ch09.pptx
Ethics_6e_PPT_Ch09.pptx
 
Elet5e ch09
Elet5e ch09Elet5e ch09
Elet5e ch09
 
How to Build Management Career in IT
How to Build Management Career in ITHow to Build Management Career in IT
How to Build Management Career in IT
 
Alexander sambuk
Alexander sambuk  Alexander sambuk
Alexander sambuk
 
Elet5e ch03
Elet5e ch03Elet5e ch03
Elet5e ch03
 
SharePoint for Communicators and Intranet Managers
SharePoint for Communicators and Intranet ManagersSharePoint for Communicators and Intranet Managers
SharePoint for Communicators and Intranet Managers
 
Online Reputation Clean-up
Online Reputation Clean-upOnline Reputation Clean-up
Online Reputation Clean-up
 
How the ID graph enables people-based marketing
How the ID graph enables people-based marketingHow the ID graph enables people-based marketing
How the ID graph enables people-based marketing
 
Gareth Young - Creating A Global Internet Anti-Piracy Strategy
Gareth Young - Creating A Global Internet Anti-Piracy StrategyGareth Young - Creating A Global Internet Anti-Piracy Strategy
Gareth Young - Creating A Global Internet Anti-Piracy Strategy
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
Creating An Intranet News Team
Creating An Intranet News TeamCreating An Intranet News Team
Creating An Intranet News Team
 
Search Profile Index Service by 4th Media
Search Profile Index Service by 4th MediaSearch Profile Index Service by 4th Media
Search Profile Index Service by 4th Media
 
Elet5e ch07
Elet5e ch07Elet5e ch07
Elet5e ch07
 
Why Has Content Marketing Become So Important to SEO
Why Has Content Marketing Become So Important to SEOWhy Has Content Marketing Become So Important to SEO
Why Has Content Marketing Become So Important to SEO
 
Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011
 
Alexander sambuk
Alexander sambukAlexander sambuk
Alexander sambuk
 
Seven components of successful sales and business development framework
Seven components of successful sales and business development frameworkSeven components of successful sales and business development framework
Seven components of successful sales and business development framework
 

More from JohnLagman3

8.-Javascript-report powerpoint presentation
8.-Javascript-report powerpoint presentation8.-Javascript-report powerpoint presentation
8.-Javascript-report powerpoint presentation
JohnLagman3
 
7.-Bootstrap-5-report powerpoint presentation
7.-Bootstrap-5-report powerpoint presentation7.-Bootstrap-5-report powerpoint presentation
7.-Bootstrap-5-report powerpoint presentation
JohnLagman3
 
1._Introduction_to_HTML5 powerpoint presentation
1._Introduction_to_HTML5 powerpoint presentation1._Introduction_to_HTML5 powerpoint presentation
1._Introduction_to_HTML5 powerpoint presentation
JohnLagman3
 
bufferoverflow-151214121251 presentation
bufferoverflow-151214121251 presentationbufferoverflow-151214121251 presentation
bufferoverflow-151214121251 presentation
JohnLagman3
 
Variables in MIT App Inventor powerpoint
Variables in MIT App Inventor powerpointVariables in MIT App Inventor powerpoint
Variables in MIT App Inventor powerpoint
JohnLagman3
 
Web-Development Powerpoint Presentation.
Web-Development Powerpoint Presentation.Web-Development Powerpoint Presentation.
Web-Development Powerpoint Presentation.
JohnLagman3
 
History of Android powerpoint presentation
History of Android powerpoint presentationHistory of Android powerpoint presentation
History of Android powerpoint presentation
JohnLagman3
 
Mobile Application Development powerpoint
Mobile Application Development powerpointMobile Application Development powerpoint
Mobile Application Development powerpoint
JohnLagman3
 
Presentation of Hyper Text Markup Language
Presentation of Hyper Text Markup LanguagePresentation of Hyper Text Markup Language
Presentation of Hyper Text Markup Language
JohnLagman3
 
html-150424090224-conversion-gate0.2.pdf
html-150424090224-conversion-gate0.2.pdfhtml-150424090224-conversion-gate0.2.pdf
html-150424090224-conversion-gate0.2.pdf
JohnLagman3
 
Hypertext Mark Up Language Introduction.
Hypertext Mark Up Language Introduction.Hypertext Mark Up Language Introduction.
Hypertext Mark Up Language Introduction.
JohnLagman3
 
Multiple_Linear_Regression Presentation.
Multiple_Linear_Regression Presentation.Multiple_Linear_Regression Presentation.
Multiple_Linear_Regression Presentation.
JohnLagman3
 
Lesson 4 - Introduction to Filmora.pptx
Lesson 4 - Introduction to Filmora.pptxLesson 4 - Introduction to Filmora.pptx
Lesson 4 - Introduction to Filmora.pptx
JohnLagman3
 
1.-Introduction-report.pdf
1.-Introduction-report.pdf1.-Introduction-report.pdf
1.-Introduction-report.pdf
JohnLagman3
 
Lesson 1 Animation.pdf
Lesson 1 Animation.pdfLesson 1 Animation.pdf
Lesson 1 Animation.pdf
JohnLagman3
 
Lesson 1.pdf
Lesson 1.pdfLesson 1.pdf
Lesson 1.pdf
JohnLagman3
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.ppt
JohnLagman3
 
physicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdfphysicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdf
JohnLagman3
 
Introduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptxIntroduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptx
JohnLagman3
 
1.-Introduction-report.pptx
1.-Introduction-report.pptx1.-Introduction-report.pptx
1.-Introduction-report.pptx
JohnLagman3
 

More from JohnLagman3 (20)

8.-Javascript-report powerpoint presentation
8.-Javascript-report powerpoint presentation8.-Javascript-report powerpoint presentation
8.-Javascript-report powerpoint presentation
 
7.-Bootstrap-5-report powerpoint presentation
7.-Bootstrap-5-report powerpoint presentation7.-Bootstrap-5-report powerpoint presentation
7.-Bootstrap-5-report powerpoint presentation
 
1._Introduction_to_HTML5 powerpoint presentation
1._Introduction_to_HTML5 powerpoint presentation1._Introduction_to_HTML5 powerpoint presentation
1._Introduction_to_HTML5 powerpoint presentation
 
bufferoverflow-151214121251 presentation
bufferoverflow-151214121251 presentationbufferoverflow-151214121251 presentation
bufferoverflow-151214121251 presentation
 
Variables in MIT App Inventor powerpoint
Variables in MIT App Inventor powerpointVariables in MIT App Inventor powerpoint
Variables in MIT App Inventor powerpoint
 
Web-Development Powerpoint Presentation.
Web-Development Powerpoint Presentation.Web-Development Powerpoint Presentation.
Web-Development Powerpoint Presentation.
 
History of Android powerpoint presentation
History of Android powerpoint presentationHistory of Android powerpoint presentation
History of Android powerpoint presentation
 
Mobile Application Development powerpoint
Mobile Application Development powerpointMobile Application Development powerpoint
Mobile Application Development powerpoint
 
Presentation of Hyper Text Markup Language
Presentation of Hyper Text Markup LanguagePresentation of Hyper Text Markup Language
Presentation of Hyper Text Markup Language
 
html-150424090224-conversion-gate0.2.pdf
html-150424090224-conversion-gate0.2.pdfhtml-150424090224-conversion-gate0.2.pdf
html-150424090224-conversion-gate0.2.pdf
 
Hypertext Mark Up Language Introduction.
Hypertext Mark Up Language Introduction.Hypertext Mark Up Language Introduction.
Hypertext Mark Up Language Introduction.
 
Multiple_Linear_Regression Presentation.
Multiple_Linear_Regression Presentation.Multiple_Linear_Regression Presentation.
Multiple_Linear_Regression Presentation.
 
Lesson 4 - Introduction to Filmora.pptx
Lesson 4 - Introduction to Filmora.pptxLesson 4 - Introduction to Filmora.pptx
Lesson 4 - Introduction to Filmora.pptx
 
1.-Introduction-report.pdf
1.-Introduction-report.pdf1.-Introduction-report.pdf
1.-Introduction-report.pdf
 
Lesson 1 Animation.pdf
Lesson 1 Animation.pdfLesson 1 Animation.pdf
Lesson 1 Animation.pdf
 
Lesson 1.pdf
Lesson 1.pdfLesson 1.pdf
Lesson 1.pdf
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.ppt
 
physicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdfphysicalsecurity-150317020111-conversion-gate01.pdf
physicalsecurity-150317020111-conversion-gate01.pdf
 
Introduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptxIntroduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptx
 
1.-Introduction-report.pptx
1.-Introduction-report.pptx1.-Introduction-report.pptx
1.-Introduction-report.pptx
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 

Recently uploaded (20)

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 

Week 4.5.ppt

  • 1. 1 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Social and Professional Issues
  • 2. LEARNING OUTCOMES 2 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS6| CH4 1 Discuss information privacy and methods for improving the privacy of information 2 Explain the privacy of e-mail, data collection issues, and censorship 3 Discuss the ethical issues related to information technology 4 Discuss the principles of intellectual property and issues related to the infringement of intellectual property
  • 3. 3 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 LEARNING OUTCOMES (continued) 5 Discuss information system issues that affect organizations, including the digital divide, electronic publishing, and the connection between the workplace and employees’ health 6 Describe green computing and the ways it can improve the quality of the environment
  • 4. 4 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Privacy Issues • Employers search social networking sites for background information on applicants • Monitoring systems are adopted by employers to check employee performance • Information technology has aided in the easy availability of personal information • Information in databases can be used for direct marketing and for credit checks on potential borrowers or renters
  • 5. 5 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Concepts of the Web and Network Privacy • Set of rules specifying the legal and ethical use of a system and the consequences of noncompliance Acceptable use policy • Issues involving both the user’s and the organization’s responsibilities and liabilities Accountability • Method for binding all the parties to a contract Nonrepudiation
  • 6. 6 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Guidelines to Minimize the Invasion of Privacy • Conduct business only with websites having privacy policies • Limit access to personal information to those with authorization • Ensure data’s reliability and take precautions to prevent misuse of the data • Data collection must have a stated purpose • Identify ways to prevent personal information gathered being disclosed without consent
  • 7. 7 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Guidelines to Minimize the Invasion of Privacy • Organizations should use verification procedures to ensure data accuracy • Organizations must correct or delete incorrect data • Prevent unauthorized access to data and misuse of data • Users should review their records and correct any inaccuracies • Transparency in record-keeping systems storing personal data
  • 8. 8 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Privacy Issues Presented by E-mail • Spam: Unsolicited e-mail sent for advertising purposes • Sent in bulk using automated mailing software • Ease of access • Individuals should assume that others have access to their messages • Any e-mails sent on company-owned computers are the property of the organization
  • 9. 9 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Data Collection on the Web • Due to the increase in online shopping, personal details of individuals are prone to misuse • Issue of personal information being sold to telemarketing firms resulting in spam • Information provided on the Web can be combined with other information and technologies to produce new information
  • 10. 10 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Technologies Used for Data Collection • Cookies: Small text files with unique ID tags that are embedded in a Web browser and saved on the user’s hard drive • Help websites customize pages for users • Considered an invasion of privacy when users’ information is used without prior consent • Installing a cookie manager helps users disable cookies • Log files: Generated by Web server software, record a user’s actions on a website
  • 11. 11 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Ethical Issues of Information Technologies • Information technology offers opportunities for unethical behavior due to ease of collecting and disseminating information • Increase of cybercrime, cyberfraud, identity theft, and intellectual property theft • Organizations can reduce unethical behavior of employees by developing and enforcing codes of ethics
  • 12. 12 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Censorship of Types of Information on the Web • Public information • Posted by an organization or public agency • Censored for public policy reasons • Censored if the content is deemed offensive to a political, religious, or cultural group • Private information • Posted by a person • Uncensored because of constitutional freedom of expression
  • 13. 13 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Censorship • Restricting access to the Web • Countries like Burma, China, and Singapore, restrict or forbid their citizens’ access to the Web • Internet neutrality: Internet service providers (ISPs) and government agencies should treat all data on the Internet equally • Parents use programs like CyberPatrol, CyberSitter, Net Nanny, and SafeSurf to prevent children’s access to certain websites
  • 14. 14 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Intellectual Property • Legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents developed by people or businesses
  • 15. 15 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Categories in Intellectual Property • Industrial property • Inventions, trademarks, logos, and industrial designs • Copyrighted material • Literary and artistic works • Covers online materials like Web pages, HTML code, and computer graphics • Fair Use Doctrine: Exception to the Copyright law which allows the use of copyrighted material for certain purposes
  • 16. 16 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Intellectual Property Protections • Trademark: Protects product names and identifying marks • Patent: Protects new processes • Advantages to organizations • Generates revenue by licensing the patent • Attracts funding for research and development • Keeps competitors from entering certain market segments
  • 17. 17 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Laws Covering Software Piracy • 1980 revisions to the Copyright Act of 1976 include computer programs • Laws covering legal issues related to information technologies in the United States • Telecommunications Act of 1996 • Communications Decency Act (CDA) • Laws against spamming
  • 18. 18 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Cybersquatting • Registering, selling, or using a domain name to profit from someone else’s trademark • Typosquatting: Relies on typographical errors made by Web users when typing a website address into a Web browser • Variation of cybersquatting • Called URL hijacking
  • 19. 19 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Digital Divide • Information technology and the Internet that is not accessible for all • Increasing funding for computers at schools, public places, helps offset the divide
  • 20. 20 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Impact of Information Technology in the Workplace • Creation of technical jobs, requiring extensive training • Increased consumers’ purchasing power • Results in a stronger economy by reducing production costs • Direct effect on the nature of jobs • Telecommuting enables work from home option • Organizations can use the best and most cost- effective human resources in a large geographical region
  • 21. 21 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Impact of Information Technology in the Workplace • Job deskilling: Occurs when skilled labor is eliminated due to high technology • Virtual organizations: Companies, suppliers, customers, and manufacturers connected via information technologies • To share skills and cost • To have access to each other’s markets
  • 22. 22 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Table 4.1 Potential Benefits and Drawbacks of Telecommuting
  • 23. 23 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Information Technology and Health Issues • Increasing popularity of touchscreens result in stress related injuries of the users’ hands, arms, back, and eyes • Related health problems associated with computer equipment • Vision issues • Musculoskeletal issues • Skin issues • Reproductive system issues • Stress issues
  • 24. 24 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Green Computing • Promotes a sustainable environment and consumes the least amount of energy • Involves the design, manufacture, use, and disposal of computers, servers, and computing devices with minimal impact on the environment • Requires cooperation of both private and public sectors
  • 25. 25 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Ways to Achieve Green Computing • Design products that last longer and are modular in design • Parts can be upgraded without replacing the entire system • Design search engines and computing routines that are faster and consume less energy • Replace underutilized smaller servers with one large server using a virtualization technique
  • 26. 26 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 Ways to Achieve Green Computing • Use computing devices that consume less energy and are biodegradable • Allow certain employees to work from their homes to reduce carbon foot prints • Conduct meetings over computer networks to reduce business travel • Encourage carpool and nonmotorized transportation for employees • Turn off idle PCs and recycle computer- related materials
  • 27. KEY TERMS 27 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS6 | CH4 • Acceptable use policy • Accountability • Cookies • Cybersquatting • Digital divide • Green computing
  • 28. KEY TERMS 28 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS6 | CH4 • Intellectual property • Log files • Nonrepudiation • Spam • Virtual organizations
  • 29. SUMMARY 29 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 • Employers search social networking sites, such as Facebook or MySpace, to find background information on applicants • e-mail is distributed through the Web or a company network; people should assume that others have access to their messages • Public information, posted by an organization or public agency, can be censored for public policy reasons
  • 30. SUMMARY 30 Copyright ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly acce ssible website, in whole or in part. MIS5 | CH4 • Children, in particular, are victims of the digital divide • Information technology has created many new jobs • Green computing is one of the methods for combating global warming