Sunteți pe pagina 1din 8

FINAL TOPICS:

Artificial Intelligence
E-commerce
Security
Health Issues
Information Ethics
Transaction Processing Systems
Management Information Systems
Database Management Systems
Expert Systems
Executive Information Systems
Decision Support Systems

Artificial Intelligence
-thescienceandengineeringof makingintelligentmachines, especiallyintelligent
computer programs

Specific Applications
game playing
speech recognition
understandingnatural language
computer vision
expert systems
heuristicclassification

Turing Test
is designedto satisfactorily identifyif the machine isintelligent
topassthetest,themachineshould possess thefollowing:
o natural language processing to enable it to communicatesuccessfully
o knowledge representation to store information provided before or during the
interrogation
o machine learning to adapt to new circumstances and to detect and
extrapolate patterns
o computer vision to perceive objects
o robotics to moveabout

E-commerce
is an emerging concept that describes the process of buying and selling or exchanging of
products, services, and information via computer networks including the Internet.

It can be defined from different perspectives


communicationsperspective
businessprocessperspective
serviceperspective
online perspective

Origins and Growth of E-commerce


Electronic FundTransfers (EFT)
o refers to the electronic transmissions of account exchange information over
private networks
Electronic Data Interchange(EDI)
o occurs when one business transmits computer-readable data in a standard
format to anotherbusiness

Features of E-commerce Technology


ubiquitous
global reach
universal standards
richness
interactivity
information density
personalization

Introduction to Computing Page 1


Advantages of E-commerce
Benefits toMerchants
o increases sales opportunities forthe seller
o reduces operationalcosts
o increases purchasing opportunities forthe buyer

o provides wide range of choices


o usethewebtotargettheirofferstoa niche market
o "The store is always open!"
o establishes better relationships with customers
o low cost information distribution
o increases speed to market
o expanded deliverychannels
o global exposure andreach

Benefits to Consumers
o convenience
o informative
o value presented upfront: demo and free download
o no long wait times
o easy flow and navigation
o search capabilities
o engaging presentation
o constantupdates
o easy tobuy

Disadvantages of E-commerce
Cost andJustification
Security andPrivacy
Lack of trust and user resistance
Other limitingfactors

Major Types
Market Relationships
o Business-to-Consumers (B2C)
o Business-to-Business (B2B)
o Consumer-to-Consumer (C2C)
Technology-based
o Peer-to-Peer (P2P)
o Mobile Commerce(M-Commerce)

Security
Computer Crimes
couldreasonablyincludeawidevarietyof criminaloffenses,activities,orissues
canbeseparatedintotwo (2)categories
o crimes facilitatedby a computer
o crimeswherethe computer is the target

Computer SecurityIssues
1. bugs \or misconfiguration problems.
2. browser-siderisks.
3. interception of network data sent from browser to server or vice versa via network
eavesdropping.

Aspects of ComputerSecurity
physicalsecurity
viruses
malicious logic
hacking
internal misuse
spoofing

TwoCategoriesofElectronic CrimeTypes
crimesinwhichthecomputeristhe target of the attack
incidentsinwhichthecomputerisa meansofperpetratingacriminalact

Introduction to Computing Page 2


Security Incidents
The Morris Worm (November,1988)
Citibank and Vladimir Levin (June- October, 1994)
Kevin Mitnick (February,1995)
Omega Engineering and Timothy Lloyd (July, 1996)
Jester and the Worcester Airport (March, 1997)
Solar Sunrise (February,1998)
The Melissa Virus (March, 1999)
TheLoveLetterWorm(May,2000)
The Code-RedWorm (2001)
AdilYahyaZakariaShakour(August, 2001-May,2002)
TheSlammer Worm (2003)
July 2009 cyber attacks
Shamoon (2012)

Threats to Security
viruses andworms
intruders
insiders
criminal organizations
terroristsand informationwarfare

Security Basics
Computervs. Network Security
o Computer security focuses onsecurity aspects of systems in isolation.
– e.g. viruses, secure data storage, OS
security
o Network security focuses on security of data as it is transmitted between
networked systems.
– e.g. authentication protocols, encryption of transmitted data, firewalls

The CIA ofSecurity


Confidentiality
Integrity
Availability
o Authentication
o Non repudiation

ThreeWaysanOrganization can choose toaddresstheProtectionofitsNetwork


Ignore securityissues
Provide hostsecurity
o takes a granular view of security by focusingonprotectingeachcomputerand
deviceindividuallyinsteadofaddressing protection of the network as a whole
Approach securityat a networklevel
o emphasisis placedoncontrollingaccess to internal computers from external
entities

Least Privilege
means that a subject (which may be a user,application,orprocess)shouldhave onlythe
necessaryrightsandprivilegesto perform its task with no additional permissions
this concept applies to more network securityissuesthanjustprovidingusers with
specificrights and permissions
anotherissuewiththisconceptisthe securitycontext in which an application runs

Layered Security

Introduction to Computing Page 3


Diversity ofDefense
isaconceptthatcomplementstheidea of various layers of security
involves making different layers of security dissimilar so that even if attackers
know how to get through a systemmakinguponelayer,theymay notknowhowtoget
throughadifferent typeoflayerthatemploysadifferent system forsecurity

Access Control
Discretionary AccessControl
o is anaccess control mechanism in which theownerofanobject(suchasafile)can
decide which other subjects (such as other users) may have access to the
object, and what access (read, write, execute) these subjects may have
Mandatory AccessControl
o is anaccess control mechanism inwhich thesecuritymechanism controlsaccess
to all objects (files), and individual subjects (processes or users) cannot
change thataccess

Role-BasedAccess Control
o is anaccess control mechanism inwhich, instead of the users being assigned
specific access permissions for the objects associated with the computer
system ornetwork,asetofrolesthatthe usermayperformwillbeassignedtoeach user

Health Issues

Ergonomics
isthestudyofdesigningandpositioning computer equipment
is an approach which puts human needs and capabilities at the focus of designing
technologicalsystems

Objectives ofErgonomics
toensurethathumansandtechnology work in complete harmony, with the
equipmentandtasksalignedtohuman characteristics
to have “no pain” computing

Essential Implications forProductivity, Efficiency, Safety,andHealthinWork Setting


designing equipment and work arrangements to improve workingposture and ease the load
on the body
information design, to make the interpretation and use of handbooks, signs,and
displayseasierandlesserror- prone
designing equipment and systems includingcomputers,sothattheyare easierto
useandlesslikelytoleadto errors inoperation
designing working environments, includinglighting and heating, to suit the needs of the
users and the tasks performed
designoftrainingarrangementstocover all significant aspects of the job concerned andto
takeaccountofhuman learning requirements
the design of military and space equipmentandsystems–anextreme caseof
demandson the human being
designingtasksandjobs sothattheyare effective and take account of human needs such
as rest breaks and sensible shift patterns

OriginsofErgonomics
a relatively new branch of science, celebratedits 50thanniversaryin 1999
reliesonresearchcarriedout inmany other older, establishedscientific areas, such as
physiology, psychology and engineering
originated in World War 2, when scientistsdesignedadvancednewand potentially
improved systems without fully consideringthe people who would be usingthem
itgraduallybecameclearthatsystems andproductswouldhaveto bedesigned to take
account of many human and environmentalfactorsiftheyaretobe used safely and
effectively
this awareness of people’s requirements resultedinthedisciplineofergonomics

Introduction to Computing Page 4


A User-FriendlyWorkstation

Equipment Checklist
Buying Tips
o ask for equipment that meets American National Standards Institute (ANSI)
standards
o try equipmentout before purchasing whenever possible
Computer Terminal
o easy to use brightness and control knobs
o no perceptible screen flicker
o detachable keyboard
o reduced electromagnetic fields (EMF) emissions
o tiltable screen
o character size at least 3/16"
Chair
o back provides firm lower and mid-back support
o adjustable arm rests, if neededto prevent shoulder fatigue
o seatandbackeasilyadjustableforheight andtiltfromseatedpositionwithoutuse of
tools
o seatupholsteredandpadded,curves down at frontedge
o 5 casters forstability
Table
o adjustable easily from seated position without use oftools
o bi-leveltoallowindependentadjustment of screen andkeyboard
o adequate legroom
o adequatetabletopspaceforrequired tasks

Introduction to Computing Page 5


Accessories(asneeded)
o footrestforuserswhosefeetdon’trest flat on thefloor
o adjustablekeyboard tray, if table is too high
o wrist rest that is padded, movable, same height as keyboard home row
o document holder adjustableto screen height
o glare screen with grounding wire
o lumbar support cushion, if chair doesn’t support lower back
o telephone headset
o task lighting

Health Tips
ReduceGlare to Avoid Eyestrain
o lowerlighting levelto about halfof normal office lighting
o avoid placing computer directlyunder a bank of lights
o avoid light shining directlyinto your eyes or onto your screen
o use window curtainsor blindsifnecessary
o position screenat right angleto window
o hold a mirror in front of your screen to
identify sources ofglare
o use task lighting if necessary

Information Ethics
Ethics
refers to the rules and standards governing the conductof an individual with others

Business Ethics
iscodeofmoralsofaparticular profession
isthestandardsofconductof agiven profession

Information Ethics
is defined as agreement among informationsystemsprofessionalstodo rightandto
avoidwrongin theirwork

Unique Sensitive Attributesof Information Systems


Location
Time
Separation of Act from Consequences
Individual Power

Privacy
referstotherightofpeoplenottoreveal information aboutthem
istherighttokeeppersonalinformation, such as personal e-mail messages, medical
histories, studentrecords,and financialinformationfromgetting into the wrong hands

Privacy atWork
o someexpertsbelievethattherewillbea collision between workers who want their
privacyandcompaniesthat demandto know more about their employees
o computer-monitoringsystemstiedirectly into computerized workstations;
specialized computer programs can track every keystroke made by user

EmailPrivacyIssues
o federallaw allows employersto monitor e- mailsent and received byemployees
o emailmessages that have been erased from hard disks may be retrieved and
used in lawsuits because the laws of discovery demand that companies
produce all relevant business documents
o theuseofemailamongpublic officials mayviolate “openmeeting”laws

Accuracy

EthicalApproachtoInformationAccuracy
o individuals should be given an opportunity to correct inaccurate information held
about them indatabase
o contents ofdatabasescontainingdata about individuals should be reviewed at
frequentintervals, withobsoletedata discarded
o system safeguards,suchascontrol audits are necessary to maintain information
accuracy

Introduction to Computing Page 6


o a professional should not misrepresent
his or herqualificationsto perform a task
o aprofessionalshouldindicatetohisor heremployertheconsequencestobe
expected if his or her judgment is overruled

Accessibility
accesstofiles,bothforonlineandoffline, should be restricted only to those who have a
legitimate right to access
manyorganizationskeepatransaction logthatnotesallaccessesorattempted accesses
todata
mostLANmanagementsoftwareincludes this function

Property
many networks have audit controls to track which files opened, which programs and
serverswere used,and so on
thiscreatesanaudittrail,arecordofhow a transaction was handled from input through
processingand output

Computer Crime
Computer CrimeLaws
o FairCreditReporting Act of 1970 (FCRA)
o Freedom of Information Act of 1970
o TaxReform Act of 1976
o RightstoFinancialPrivacyActof1978
o ElectronicFundsTransferActof1979
o Computer Matching and Privacy Act of 1988
o Video Privacy Act of 1988
o Telephone Consumer Protection Act of 1991
o Cable Act of1992
o Computer Abuse AmendmentsAct of 1994.
o Children’sOnlinePrivacyProtection Actof 1998
o Education Privacy Act

 FederalComputerCrime Laws
o Copyrights Law
o Fraud and False Statements Law
o Espionage and Censorship
o Mail FraudLaw

 TipstoHelpPreventCrimeonthe Internet
o use of stand-alone firewall, including hardware and software with network
monitoring capabilities
o use internet security specialists to perform audits of all internetand network
activities
o developeffectiveinternetandsecurity policies for all employees
o monitor managers and employees to makesuretheyareusingtheinternetfor
business purposesonly

Service Theft

 somepeopleareusingtheiremployer’s computertime to play games

 the biggest abuse is probably wasting timewith electronicmail and theinternet

 one analysis of e-mail logs of three companies (IBM, Apple, At&T) found their employees
visitedPenthousemagazine website12,823times in a singlemonth

 theftoftelephoneserviceshasincreased significantly

Introduction to Computing Page 7


Data Alteration/Theft

 is the intentional use of illegal and destructiveprograms to alter or destroy data is as


mucha crime as destroying tangible goods
o most common of these types of programs
are virusesand worms
o there are more than 53,000 known computer viruses today, with more than
6,000 new viruses and worms being discovered eachyear

Malicious Access

 arecrimesinvolvingillegalsystemaccess and use of computer services are a concern to


both government and business

 federal,state, and local government computers are sometimes left unattended


overweekendswithout proper security

 universitycomputersareoftenusedfor commercialpurposesunderthepretense of
researchorotherlegitimateacademic pursuits

Computer Viruses

 Application Virus
o infects executable applicationfiles such as word processingprograms
o infects the computersystem
o canoftenbedetectedbycheckingthe length or size of the file
 System Virus
o typicallyinfectsoperatingsystem programsorother systemsfiles
o usuallyinfects thesystem as soon as the computer isstarted

TenCommandmentsofComputerEthics
1. Thoushaltnotuseacomputertoharm other people.
2. Thoushaltnotinterfere with other people’s computerwork.
3. Thoushaltnotsnooparoundin other people’s files.
4. Thoushaltnotuse acomputertosteal.
5. Thoushaltnotuseacomputertobear false witness.
6. Thoushaltnotuseorcopysoftwarefor which you have not paid.
7. Thoushaltnotuseotherpeople’s computer resources without authorization.
8. Thou shalt not appropriate other people’sintellectualoutput.
9. Thoushaltthinkaboutthesocial consequencesoftheprogramyou write.
10. Thoushaltuseacomputerinwaysthat showconsiderationandrespect.

Introduction to Computing Page 8

S-ar putea să vă placă și