SlideShare une entreprise Scribd logo
1  sur  12
1
Is information technology a good
thing?
Arguments in favour
 The jobs replaced by computers are the rather Ineresting ones. People
are free to do more interesting tasks.
 Higher productivity enables people to work fewer hours and yet have
the same standard of living.
 Other countries make use of IT. If we did not, our goods and services
would become uncompetitive and there would be even more
unemployment.
 There are many tasks that would be impossible without the use of IT.
Air-traffic control, credit cards, space travel and medical research are
just some examples.
 New jobs are being created by the introduction of IT e.g.
programming, network managing etc.
 Many of the old boring jobs can now be done by a computer,
which leaves workers to do more interesting tasks.
 Computerisation has improved levels of productivity, which
means that workers need to work shorter hours and still
maintain the same standard of living.
2
Is information technology a good
thing?
Arguments against
 Life without IT is slower and less stressful.
 Computers are cheaper than people are so if a computer can
do a job then it will lead to higher unemployment.
 The new jobs being created by the use of IT are only for highly
skilled and qualified people.
 The people who did the boring repetitive jobs now done by
computers no longer have a job.
 The storage of personal data held on computer has eroded
people's privacy.
 The gap will be widened between those countries able to afford
the new technologies and those that can't.
3
Changing Employment Patterns
 Robots are now performing many of the manual tasks such as
assembly work and paint spraying in factories.
 Many industrial processes operate 24 hours a day and are
continually being monitored and controlled by computers.
 There are fewer paper-based systems in offices. Some jobs
such as filing clerks no longer exist. New jobs involving
computers have been created.
 More and more people work form home, with the advantage of
no travelling and the freedom of being able to live in any part of
the country (or the world for that matter).
 Computers are sometimes used to monitor the performance of
their users. For instance, in supermarkets they can tell the
management about the number of customers dealt with per
hour or how many items are passed through the scanner in a
day. Order entry clerks and airline booking clerks can have
their work similarly monitored.
4
Identity cards move a step closer
 Driving licenses are now to be in credit card format and have a
photograph of the driver on them.
 Eventually the government would like to add a microchip to these
cards, thus making the card into a 'smart card'.
 The card might also store National Insurance details, which
would enable health details to be located.
Computer game addiction
 Some children are addicted to computer games, sometimes playing them
for more than 30 hours per week.
 Many experts are worried that this solitary activity is affecting the social
and educational development of addicted children.
 Many computer games do not mimic reality and often involve simulated
violence.
 Other people are worried that many children are becoming 'couch potatoes',
and are not involved in any physical activity and do not interact very well
with adults or people their own age.
5
Who Watches the Watchers
 During the Second World War everyone
had to carry an identity card, and you
could be arrested for not having one with
you at all times.
 They will have the individual’s
photograph and a chip with biometric
data stored on it.
 The identity cards will be used by many
different government departments to
keep track of data about the whole
population, and could be used to replace
existing passports, driving licences,
National Insurance numbers, even
examination candidate numbers.
 The data stored on the identity card may
also include encoded versions of an
individual’s fingerprints, iris prints, and
facial identification points.
 The latter is a method of mapping a
person’s face and converting this data
into digital information.
6
Environmental issues
 Reduced energy consumption - Computers now control many of
the heating systems in offices and factories so it is possible for only
the rooms that are being used to be heated. This can save huge
amounts of energy.
 Reduced wastage in industrial processes - There are many process
control systems used in our factories and because these are more
accurate, there is less wastage, thus saving valuable resources.
 Saving trees - The use of the electronic office and EDI has led to
paper being almost eliminated in many offices and this means that
fewer trees need to be felled. So not only are the trees saved but the
energy that went into the making of the paper is also saved.
 Reducing car pollution - Teleworking (working at home using
information technology) means that some people no longer have to
travel to the office to work. This reduces petrol consumption and
car pollution.
7
Ethical, moral and social issues
 Software theft - It could be said that the use of personal computers
has made many users into thieves. As you can see from the
Copyright, Designs and Patents Act, 1989, it is a criminal offence to
copy or steal software.
 Hacking - Hacking means gaining illegal access to someone else's
computer system. Many people see this type of thing as a challenge
and not as an illegal activity.
 Privacy - Many people see the Data Protection Act as inadequate,
since in 1984, when the act was made law, there weren't anything
like the number of personal computers and communications
networks that there are today. Some people are totally unaware of
the act and think that it only applies to large companies or
organisations.
 Job losses - Is it right to develop new systems in the knowledge
that staff will inevitably be made redundant? Should we put
shareholders' dividends and profit before people? These are difficult
questions and ones, which need to be addressed. Everyone has his
or her own opinion on this.
8
Social and ethical considerations for
the Internet
 The Internet provides access to a variety of information on every
topic and this information comes from many different countries
throughout the world.
 Problems:
 One problem with the Internet is that all the information is freely
available once the user is connected.
 There are news areas on the Internet, which contain large amounts
of illegal pornographic material.
 Governments have the problem of finding a way of allowing users
to gain access to the Internet but not to any illegal areas.
 There is a problem in restricting access. The Internet is a global
system and it is difficult of make laws to control it by single
countries.
 Another problem with restrictions is that it could lead governments
to begin attempts to censor, legislate and regulate the Internet for
political, cultural and religious reasons.
9
Social considerations for a cashless
society
 Advantages
 It is far more convenient not to have to use cash
 Mortgage and loan repayments, gas, electricity and
phone bills are paid automatically so you don't need to
remember to pay them.
 You no longer need to take large sums of money out
of the building society or bank to pay for expensive
items: the risk of being robbed is reduced.
 You don't have to queue at the bank, building society
or cash machine to get money out.
 Credit cards allow people to buy goods and then
decide whether to pay for them at the end of the month
or obtain them on credit, paying a proportion each
month.
10
Social considerations for a cashless
society
 Disadvantages
 Credit is normally given only to people who are working
and have a steady source of income, so certain people
won't be able to get it.
 It is possible for people to spend more than they can
really afford so they can easily get into debt.
 More information is kept about individuals. Inevitably
some of this will be incorrect and lead to people
wrongly being refused cash or credit cards.
 It is harder for people to keep track of how much they
have spent, since statements are usually sent only once
a month, although statements can usually be obtained
more frequently if they are requested.
11
Crime prevention
IT can be used to help prevent crime and the systems employed include the following.
 Speed camera systems and camera systems, which detect cars jumping red lights.
 Computer controlled camera systems deter violent crime in many city centres.
 Tagging systems on bikes, cars and other property reduces the chances of them
being stolen.
 Computer controlled house security systems deter some burglars.
Crime detection
IT can be used to catch criminals and some of the ways it can do this are as follows:
 The Police National Computer (PNC) is used to hold details of all crimes committed
and criminals.
 The National Criminal Intelligence System is a computer system used to piece
together information about individual criminals and their illegal activities.
 The computer can interact with the data supplied by Interpol, the PNC, Customs
and Excise, the Inland Revenue, and the bank and building society computers.
 This system is used to gather material on organised crimes such as drug
smuggling.
 DNA profiling and fingerprinting systems enables valuable, and often conclusive,
evidence to be collected.
 Police headquarters computers for each police force are used in the day-to-day
administration of all the usual police work.
12
Problems with the Police National
Computer (PNC)
 There is a risk that illegal access to the PNC could
allow people outside the police force to gain information.
 There are worries that the running of the PNC will be
passed over to a private company.
 The PNC contains criminal records, details of wanted
or dangerous people, disqualified drivers, stolen cars
and guns and also the records of 30 million motorists.
 Some files indicate that a person is HIV positive
 Information on the PNC might be incorrect and this
could stop someone getting a job or could even result in
a person being wrongly arrested for a crime.

Contenu connexe

Tendances

19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 Timothy Holborn
 
e commerce by N.P.Ghadge
 e commerce by N.P.Ghadge e commerce by N.P.Ghadge
e commerce by N.P.Ghadgeneeta ghadge
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...Timothy Holborn
 
India Legal 17 June 2019
India Legal 17 June 2019India Legal 17 June 2019
India Legal 17 June 2019ENC
 
Introduction to electronic business electronic commerce
Introduction to electronic business electronic commerceIntroduction to electronic business electronic commerce
Introduction to electronic business electronic commerceOsama Yousaf
 
India Legal 01 October 2018
India Legal 01 October 2018India Legal 01 October 2018
India Legal 01 October 2018ENC
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
E Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal ProtectionE Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal Protectionijtsrd
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Signing away evolving law of electronic signatures & paperless office
Signing away evolving law of electronic signatures & paperless officeSigning away evolving law of electronic signatures & paperless office
Signing away evolving law of electronic signatures & paperless officePaperSave
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technologyEzraGray1
 
Behavioral Big Data: Why Quality Engineers Should Care
Behavioral Big Data: Why Quality Engineers Should CareBehavioral Big Data: Why Quality Engineers Should Care
Behavioral Big Data: Why Quality Engineers Should CareGalit Shmueli
 
3213ijist01
3213ijist013213ijist01
3213ijist01jh1234jh
 
E business applications
E business applicationsE business applications
E business applicationsRaj vardhan
 
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...IJMIT JOURNAL
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 

Tendances (20)

19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2
 
e commerce by N.P.Ghadge
 e commerce by N.P.Ghadge e commerce by N.P.Ghadge
e commerce by N.P.Ghadge
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
 
E-commerce: Smart Card, Debit card & Credit card
E-commerce: Smart Card, Debit card & Credit cardE-commerce: Smart Card, Debit card & Credit card
E-commerce: Smart Card, Debit card & Credit card
 
India Legal 17 June 2019
India Legal 17 June 2019India Legal 17 June 2019
India Legal 17 June 2019
 
Introduction to electronic business electronic commerce
Introduction to electronic business electronic commerceIntroduction to electronic business electronic commerce
Introduction to electronic business electronic commerce
 
E banking
E bankingE banking
E banking
 
India Legal 01 October 2018
India Legal 01 October 2018India Legal 01 October 2018
India Legal 01 October 2018
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
E Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal ProtectionE Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal Protection
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Signing away evolving law of electronic signatures & paperless office
Signing away evolving law of electronic signatures & paperless officeSigning away evolving law of electronic signatures & paperless office
Signing away evolving law of electronic signatures & paperless office
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Behavioral Big Data: Why Quality Engineers Should Care
Behavioral Big Data: Why Quality Engineers Should CareBehavioral Big Data: Why Quality Engineers Should Care
Behavioral Big Data: Why Quality Engineers Should Care
 
Eservice
EserviceEservice
Eservice
 
3213ijist01
3213ijist013213ijist01
3213ijist01
 
E business applications
E business applicationsE business applications
E business applications
 
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...
 
AIRLIFT
AIRLIFTAIRLIFT
AIRLIFT
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 

En vedette

Smart Transport for benefit of employees, logistics & freight carriers
Smart Transport for benefit of employees, logistics & freight carriersSmart Transport for benefit of employees, logistics & freight carriers
Smart Transport for benefit of employees, logistics & freight carriersShubhankar Thakur
 
Economic, Social & Political Impact of Web 2.0
Economic, Social & Political Impact of Web 2.0Economic, Social & Political Impact of Web 2.0
Economic, Social & Political Impact of Web 2.0is20090
 
Public Transport For Smart Cities
Public Transport For Smart CitiesPublic Transport For Smart Cities
Public Transport For Smart CitiesIPPAI
 
Impact of computers on Society
Impact of computers on SocietyImpact of computers on Society
Impact of computers on SocietyRamki M
 
Positive and Negative Impacts of Computer
Positive and Negative Impacts of ComputerPositive and Negative Impacts of Computer
Positive and Negative Impacts of ComputerHina Anjum
 
Integrated Transport Services - Cashless Transactions / Smart Card
Integrated Transport Services - Cashless Transactions / Smart CardIntegrated Transport Services - Cashless Transactions / Smart Card
Integrated Transport Services - Cashless Transactions / Smart CardValoriser Consultants
 
Economic effects of advertisements
Economic effects of advertisementsEconomic effects of advertisements
Economic effects of advertisementsAmlin David
 

En vedette (11)

Google mini
Google miniGoogle mini
Google mini
 
Transportation 2011
Transportation 2011Transportation 2011
Transportation 2011
 
Smart Transport for benefit of employees, logistics & freight carriers
Smart Transport for benefit of employees, logistics & freight carriersSmart Transport for benefit of employees, logistics & freight carriers
Smart Transport for benefit of employees, logistics & freight carriers
 
Social impact of computers
Social impact of computersSocial impact of computers
Social impact of computers
 
Economic, Social & Political Impact of Web 2.0
Economic, Social & Political Impact of Web 2.0Economic, Social & Political Impact of Web 2.0
Economic, Social & Political Impact of Web 2.0
 
Public Transport For Smart Cities
Public Transport For Smart CitiesPublic Transport For Smart Cities
Public Transport For Smart Cities
 
Impact of computers on Society
Impact of computers on SocietyImpact of computers on Society
Impact of computers on Society
 
Positive and Negative Impacts of Computer
Positive and Negative Impacts of ComputerPositive and Negative Impacts of Computer
Positive and Negative Impacts of Computer
 
Integrated Transport Services - Cashless Transactions / Smart Card
Integrated Transport Services - Cashless Transactions / Smart CardIntegrated Transport Services - Cashless Transactions / Smart Card
Integrated Transport Services - Cashless Transactions / Smart Card
 
Economic effects of advertisements
Economic effects of advertisementsEconomic effects of advertisements
Economic effects of advertisements
 
Smart Transport Facility
Smart Transport FacilitySmart Transport Facility
Smart Transport Facility
 

Similaire à Ch 19. social and economic effects of it

Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Issues and challenges in e-business
Issues and challenges in e-businessIssues and challenges in e-business
Issues and challenges in e-businessNishant Pahad
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Chapter 66.1 Changes, Fears, and QuestionsComputers free u.docx
Chapter  66.1 Changes, Fears, and QuestionsComputers free u.docxChapter  66.1 Changes, Fears, and QuestionsComputers free u.docx
Chapter 66.1 Changes, Fears, and QuestionsComputers free u.docxtidwellveronique
 
USAGE AND IMPACTS OF COMPUTER
USAGE AND IMPACTS OF COMPUTER USAGE AND IMPACTS OF COMPUTER
USAGE AND IMPACTS OF COMPUTER ramlalshah1
 
7 technologies that will change our future
7 technologies that will change our future7 technologies that will change our future
7 technologies that will change our futurePioneer Lists
 
Itc lec 1 introduction to computer applications
Itc lec 1 introduction to computer applicationsItc lec 1 introduction to computer applications
Itc lec 1 introduction to computer applicationsAnzaDar3
 
The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115Devaraj Sl
 

Similaire à Ch 19. social and economic effects of it (20)

iot.docx
iot.docxiot.docx
iot.docx
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
Topic 7
Topic 7Topic 7
Topic 7
 
IoT
IoTIoT
IoT
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Issues and challenges in e-business
Issues and challenges in e-businessIssues and challenges in e-business
Issues and challenges in e-business
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
IOT
IOTIOT
IOT
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Chapter 66.1 Changes, Fears, and QuestionsComputers free u.docx
Chapter  66.1 Changes, Fears, and QuestionsComputers free u.docxChapter  66.1 Changes, Fears, and QuestionsComputers free u.docx
Chapter 66.1 Changes, Fears, and QuestionsComputers free u.docx
 
USAGE AND IMPACTS OF COMPUTER
USAGE AND IMPACTS OF COMPUTER USAGE AND IMPACTS OF COMPUTER
USAGE AND IMPACTS OF COMPUTER
 
Computer in Society
Computer in SocietyComputer in Society
Computer in Society
 
7 technologies that will change our future
7 technologies that will change our future7 technologies that will change our future
7 technologies that will change our future
 
Itc lec 1 introduction to computer applications
Itc lec 1 introduction to computer applicationsItc lec 1 introduction to computer applications
Itc lec 1 introduction to computer applications
 
The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115
 
Exploiting the Internet of Things
Exploiting the Internet of ThingsExploiting the Internet of Things
Exploiting the Internet of Things
 

Plus de Khan Yousafzai

09.1 types of computer operation
09.1   types of computer operation09.1   types of computer operation
09.1 types of computer operationKhan Yousafzai
 
8.2 system analysis and design
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and designKhan Yousafzai
 
8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solvingKhan Yousafzai
 
Ch 22 the electronic office
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic officeKhan Yousafzai
 
Ch 21 computer and your health
Ch 21 computer and your healthCh 21 computer and your health
Ch 21 computer and your healthKhan Yousafzai
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections actKhan Yousafzai
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communicationsKhan Yousafzai
 
Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Khan Yousafzai
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information systemKhan Yousafzai
 
Ch 11 ways of presenting data
Ch 11 ways of presenting dataCh 11 ways of presenting data
Ch 11 ways of presenting dataKhan Yousafzai
 
Ch 9 types of computer operations
Ch 9 types of computer operationsCh 9 types of computer operations
Ch 9 types of computer operationsKhan Yousafzai
 
Ch 6 collecting your data
Ch 6 collecting your dataCh 6 collecting your data
Ch 6 collecting your dataKhan Yousafzai
 
18 computers and the law
18   computers and the law18   computers and the law
18 computers and the lawKhan Yousafzai
 

Plus de Khan Yousafzai (20)

14 data logging
14   data logging14   data logging
14 data logging
 
09.1 types of computer operation
09.1   types of computer operation09.1   types of computer operation
09.1 types of computer operation
 
8.2 system analysis and design
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and design
 
8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving
 
Ch 26 the internet
Ch 26 the internetCh 26 the internet
Ch 26 the internet
 
Ch 22 the electronic office
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic office
 
Ch 21 computer and your health
Ch 21 computer and your healthCh 21 computer and your health
Ch 21 computer and your health
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections act
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)
 
Ch 13 system analysis
Ch 13 system analysisCh 13 system analysis
Ch 13 system analysis
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information system
 
Ch 11 ways of presenting data
Ch 11 ways of presenting dataCh 11 ways of presenting data
Ch 11 ways of presenting data
 
Ch 9 types of computer operations
Ch 9 types of computer operationsCh 9 types of computer operations
Ch 9 types of computer operations
 
Ch 8 data base
Ch 8 data baseCh 8 data base
Ch 8 data base
 
Ch 6 collecting your data
Ch 6 collecting your dataCh 6 collecting your data
Ch 6 collecting your data
 
Ch10 data transfer
Ch10 data transferCh10 data transfer
Ch10 data transfer
 
23 simulations
23   simulations23   simulations
23 simulations
 
18 computers and the law
18   computers and the law18   computers and the law
18 computers and the law
 

Dernier

ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 

Dernier (20)

ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 

Ch 19. social and economic effects of it

  • 1. 1 Is information technology a good thing? Arguments in favour  The jobs replaced by computers are the rather Ineresting ones. People are free to do more interesting tasks.  Higher productivity enables people to work fewer hours and yet have the same standard of living.  Other countries make use of IT. If we did not, our goods and services would become uncompetitive and there would be even more unemployment.  There are many tasks that would be impossible without the use of IT. Air-traffic control, credit cards, space travel and medical research are just some examples.  New jobs are being created by the introduction of IT e.g. programming, network managing etc.  Many of the old boring jobs can now be done by a computer, which leaves workers to do more interesting tasks.  Computerisation has improved levels of productivity, which means that workers need to work shorter hours and still maintain the same standard of living.
  • 2. 2 Is information technology a good thing? Arguments against  Life without IT is slower and less stressful.  Computers are cheaper than people are so if a computer can do a job then it will lead to higher unemployment.  The new jobs being created by the use of IT are only for highly skilled and qualified people.  The people who did the boring repetitive jobs now done by computers no longer have a job.  The storage of personal data held on computer has eroded people's privacy.  The gap will be widened between those countries able to afford the new technologies and those that can't.
  • 3. 3 Changing Employment Patterns  Robots are now performing many of the manual tasks such as assembly work and paint spraying in factories.  Many industrial processes operate 24 hours a day and are continually being monitored and controlled by computers.  There are fewer paper-based systems in offices. Some jobs such as filing clerks no longer exist. New jobs involving computers have been created.  More and more people work form home, with the advantage of no travelling and the freedom of being able to live in any part of the country (or the world for that matter).  Computers are sometimes used to monitor the performance of their users. For instance, in supermarkets they can tell the management about the number of customers dealt with per hour or how many items are passed through the scanner in a day. Order entry clerks and airline booking clerks can have their work similarly monitored.
  • 4. 4 Identity cards move a step closer  Driving licenses are now to be in credit card format and have a photograph of the driver on them.  Eventually the government would like to add a microchip to these cards, thus making the card into a 'smart card'.  The card might also store National Insurance details, which would enable health details to be located. Computer game addiction  Some children are addicted to computer games, sometimes playing them for more than 30 hours per week.  Many experts are worried that this solitary activity is affecting the social and educational development of addicted children.  Many computer games do not mimic reality and often involve simulated violence.  Other people are worried that many children are becoming 'couch potatoes', and are not involved in any physical activity and do not interact very well with adults or people their own age.
  • 5. 5 Who Watches the Watchers  During the Second World War everyone had to carry an identity card, and you could be arrested for not having one with you at all times.  They will have the individual’s photograph and a chip with biometric data stored on it.  The identity cards will be used by many different government departments to keep track of data about the whole population, and could be used to replace existing passports, driving licences, National Insurance numbers, even examination candidate numbers.  The data stored on the identity card may also include encoded versions of an individual’s fingerprints, iris prints, and facial identification points.  The latter is a method of mapping a person’s face and converting this data into digital information.
  • 6. 6 Environmental issues  Reduced energy consumption - Computers now control many of the heating systems in offices and factories so it is possible for only the rooms that are being used to be heated. This can save huge amounts of energy.  Reduced wastage in industrial processes - There are many process control systems used in our factories and because these are more accurate, there is less wastage, thus saving valuable resources.  Saving trees - The use of the electronic office and EDI has led to paper being almost eliminated in many offices and this means that fewer trees need to be felled. So not only are the trees saved but the energy that went into the making of the paper is also saved.  Reducing car pollution - Teleworking (working at home using information technology) means that some people no longer have to travel to the office to work. This reduces petrol consumption and car pollution.
  • 7. 7 Ethical, moral and social issues  Software theft - It could be said that the use of personal computers has made many users into thieves. As you can see from the Copyright, Designs and Patents Act, 1989, it is a criminal offence to copy or steal software.  Hacking - Hacking means gaining illegal access to someone else's computer system. Many people see this type of thing as a challenge and not as an illegal activity.  Privacy - Many people see the Data Protection Act as inadequate, since in 1984, when the act was made law, there weren't anything like the number of personal computers and communications networks that there are today. Some people are totally unaware of the act and think that it only applies to large companies or organisations.  Job losses - Is it right to develop new systems in the knowledge that staff will inevitably be made redundant? Should we put shareholders' dividends and profit before people? These are difficult questions and ones, which need to be addressed. Everyone has his or her own opinion on this.
  • 8. 8 Social and ethical considerations for the Internet  The Internet provides access to a variety of information on every topic and this information comes from many different countries throughout the world.  Problems:  One problem with the Internet is that all the information is freely available once the user is connected.  There are news areas on the Internet, which contain large amounts of illegal pornographic material.  Governments have the problem of finding a way of allowing users to gain access to the Internet but not to any illegal areas.  There is a problem in restricting access. The Internet is a global system and it is difficult of make laws to control it by single countries.  Another problem with restrictions is that it could lead governments to begin attempts to censor, legislate and regulate the Internet for political, cultural and religious reasons.
  • 9. 9 Social considerations for a cashless society  Advantages  It is far more convenient not to have to use cash  Mortgage and loan repayments, gas, electricity and phone bills are paid automatically so you don't need to remember to pay them.  You no longer need to take large sums of money out of the building society or bank to pay for expensive items: the risk of being robbed is reduced.  You don't have to queue at the bank, building society or cash machine to get money out.  Credit cards allow people to buy goods and then decide whether to pay for them at the end of the month or obtain them on credit, paying a proportion each month.
  • 10. 10 Social considerations for a cashless society  Disadvantages  Credit is normally given only to people who are working and have a steady source of income, so certain people won't be able to get it.  It is possible for people to spend more than they can really afford so they can easily get into debt.  More information is kept about individuals. Inevitably some of this will be incorrect and lead to people wrongly being refused cash or credit cards.  It is harder for people to keep track of how much they have spent, since statements are usually sent only once a month, although statements can usually be obtained more frequently if they are requested.
  • 11. 11 Crime prevention IT can be used to help prevent crime and the systems employed include the following.  Speed camera systems and camera systems, which detect cars jumping red lights.  Computer controlled camera systems deter violent crime in many city centres.  Tagging systems on bikes, cars and other property reduces the chances of them being stolen.  Computer controlled house security systems deter some burglars. Crime detection IT can be used to catch criminals and some of the ways it can do this are as follows:  The Police National Computer (PNC) is used to hold details of all crimes committed and criminals.  The National Criminal Intelligence System is a computer system used to piece together information about individual criminals and their illegal activities.  The computer can interact with the data supplied by Interpol, the PNC, Customs and Excise, the Inland Revenue, and the bank and building society computers.  This system is used to gather material on organised crimes such as drug smuggling.  DNA profiling and fingerprinting systems enables valuable, and often conclusive, evidence to be collected.  Police headquarters computers for each police force are used in the day-to-day administration of all the usual police work.
  • 12. 12 Problems with the Police National Computer (PNC)  There is a risk that illegal access to the PNC could allow people outside the police force to gain information.  There are worries that the running of the PNC will be passed over to a private company.  The PNC contains criminal records, details of wanted or dangerous people, disqualified drivers, stolen cars and guns and also the records of 30 million motorists.  Some files indicate that a person is HIV positive  Information on the PNC might be incorrect and this could stop someone getting a job or could even result in a person being wrongly arrested for a crime.