Chapter 8 SecurityAndEthicalChallengesII
Chapter 8 SecurityAndEthicalChallengesII
MANAGING INFORMATION
TECHNOLOGY
Cyber
Hacking
Theft
Computer
Viruses
Unauthorized
Piracy
Use at work
1.1. Hacking
Hacking: The unauthorized access and use of
networked computer systems and reading files, but
neither stealing nor damaging anything
Cracker: is a hacker with criminal intent of gaining
unauthorized access by finding weaknesses in the
security protections employed by Web sites and
computer systems, often taking advantage of
various features of the Internet
Hackers and crackers try to retrieve passwords,
access or steal network files, overload computer
systems, or damage data and programs.
Working
Conditions
Health
Security Management
Issues
Employment Challenges
IT has created new jobs and increased productivity;
While it has caused a significant reduction in some types of
job opportunities.
Working Conditions
◦ computers have eliminated monotonous or unpleasant tasks,
thereby improving the quality of work.
◦ Computerized systems can depersonalize human transactions,
forcing people to confront and respond to impersonal
programmed logic which lessens the importance of empathy
◦ Information systems also often require strict adherence to
detailed procedures, which undrmines human ideals of
flexibility.
However, widespread use of personal computers and
the Internet has dramatically improved the
development of people-oriented and personalized
systems.
Chapter 7: Security and Ethical
Challenges 19
Health Issues
Heavy use of computers is linked to
◦ eyestrain,
◦ damaged arm,
◦ neck muscles, and
◦ radiation exposure.
Ergonomics (Also called human factors
engineering) is the science that seeks Solutions
to some of these health problems
The Goal of ergonomics is to design healthy work
environments that are Safe, comfortable, and pleasant for
people to work