Documente Academic
Documente Profesional
Documente Cultură
Artificial Intelligence
E-commerce
Security
Health Issues
Information Ethics
Transaction Processing Systems
Management Information Systems
Database Management Systems
Expert Systems
Executive Information Systems
Decision Support Systems
Artificial Intelligence
-thescienceandengineeringof makingintelligentmachines, especiallyintelligent
computer programs
Specific Applications
game playing
speech recognition
understandingnatural language
computer vision
expert systems
heuristicclassification
Turing Test
is designedto satisfactorily identifyif the machine isintelligent
topassthetest,themachineshould possess thefollowing:
o natural language processing to enable it to communicatesuccessfully
o knowledge representation to store information provided before or during the
interrogation
o machine learning to adapt to new circumstances and to detect and
extrapolate patterns
o computer vision to perceive objects
o robotics to moveabout
E-commerce
is an emerging concept that describes the process of buying and selling or exchanging of
products, services, and information via computer networks including the Internet.
Benefits to Consumers
o convenience
o informative
o value presented upfront: demo and free download
o no long wait times
o easy flow and navigation
o search capabilities
o engaging presentation
o constantupdates
o easy tobuy
Disadvantages of E-commerce
Cost andJustification
Security andPrivacy
Lack of trust and user resistance
Other limitingfactors
Major Types
Market Relationships
o Business-to-Consumers (B2C)
o Business-to-Business (B2B)
o Consumer-to-Consumer (C2C)
Technology-based
o Peer-to-Peer (P2P)
o Mobile Commerce(M-Commerce)
Security
Computer Crimes
couldreasonablyincludeawidevarietyof criminaloffenses,activities,orissues
canbeseparatedintotwo (2)categories
o crimes facilitatedby a computer
o crimeswherethe computer is the target
Computer SecurityIssues
1. bugs \or misconfiguration problems.
2. browser-siderisks.
3. interception of network data sent from browser to server or vice versa via network
eavesdropping.
Aspects of ComputerSecurity
physicalsecurity
viruses
malicious logic
hacking
internal misuse
spoofing
TwoCategoriesofElectronic CrimeTypes
crimesinwhichthecomputeristhe target of the attack
incidentsinwhichthecomputerisa meansofperpetratingacriminalact
Threats to Security
viruses andworms
intruders
insiders
criminal organizations
terroristsand informationwarfare
Security Basics
Computervs. Network Security
o Computer security focuses onsecurity aspects of systems in isolation.
– e.g. viruses, secure data storage, OS
security
o Network security focuses on security of data as it is transmitted between
networked systems.
– e.g. authentication protocols, encryption of transmitted data, firewalls
Least Privilege
means that a subject (which may be a user,application,orprocess)shouldhave onlythe
necessaryrightsandprivilegesto perform its task with no additional permissions
this concept applies to more network securityissuesthanjustprovidingusers with
specificrights and permissions
anotherissuewiththisconceptisthe securitycontext in which an application runs
Layered Security
Access Control
Discretionary AccessControl
o is anaccess control mechanism in which theownerofanobject(suchasafile)can
decide which other subjects (such as other users) may have access to the
object, and what access (read, write, execute) these subjects may have
Mandatory AccessControl
o is anaccess control mechanism inwhich thesecuritymechanism controlsaccess
to all objects (files), and individual subjects (processes or users) cannot
change thataccess
Role-BasedAccess Control
o is anaccess control mechanism inwhich, instead of the users being assigned
specific access permissions for the objects associated with the computer
system ornetwork,asetofrolesthatthe usermayperformwillbeassignedtoeach user
Health Issues
Ergonomics
isthestudyofdesigningandpositioning computer equipment
is an approach which puts human needs and capabilities at the focus of designing
technologicalsystems
Objectives ofErgonomics
toensurethathumansandtechnology work in complete harmony, with the
equipmentandtasksalignedtohuman characteristics
to have “no pain” computing
OriginsofErgonomics
a relatively new branch of science, celebratedits 50thanniversaryin 1999
reliesonresearchcarriedout inmany other older, establishedscientific areas, such as
physiology, psychology and engineering
originated in World War 2, when scientistsdesignedadvancednewand potentially
improved systems without fully consideringthe people who would be usingthem
itgraduallybecameclearthatsystems andproductswouldhaveto bedesigned to take
account of many human and environmentalfactorsiftheyaretobe used safely and
effectively
this awareness of people’s requirements resultedinthedisciplineofergonomics
Equipment Checklist
Buying Tips
o ask for equipment that meets American National Standards Institute (ANSI)
standards
o try equipmentout before purchasing whenever possible
Computer Terminal
o easy to use brightness and control knobs
o no perceptible screen flicker
o detachable keyboard
o reduced electromagnetic fields (EMF) emissions
o tiltable screen
o character size at least 3/16"
Chair
o back provides firm lower and mid-back support
o adjustable arm rests, if neededto prevent shoulder fatigue
o seatandbackeasilyadjustableforheight andtiltfromseatedpositionwithoutuse of
tools
o seatupholsteredandpadded,curves down at frontedge
o 5 casters forstability
Table
o adjustable easily from seated position without use oftools
o bi-leveltoallowindependentadjustment of screen andkeyboard
o adequate legroom
o adequatetabletopspaceforrequired tasks
Health Tips
ReduceGlare to Avoid Eyestrain
o lowerlighting levelto about halfof normal office lighting
o avoid placing computer directlyunder a bank of lights
o avoid light shining directlyinto your eyes or onto your screen
o use window curtainsor blindsifnecessary
o position screenat right angleto window
o hold a mirror in front of your screen to
identify sources ofglare
o use task lighting if necessary
Information Ethics
Ethics
refers to the rules and standards governing the conductof an individual with others
Business Ethics
iscodeofmoralsofaparticular profession
isthestandardsofconductof agiven profession
Information Ethics
is defined as agreement among informationsystemsprofessionalstodo rightandto
avoidwrongin theirwork
Privacy
referstotherightofpeoplenottoreveal information aboutthem
istherighttokeeppersonalinformation, such as personal e-mail messages, medical
histories, studentrecords,and financialinformationfromgetting into the wrong hands
Privacy atWork
o someexpertsbelievethattherewillbea collision between workers who want their
privacyandcompaniesthat demandto know more about their employees
o computer-monitoringsystemstiedirectly into computerized workstations;
specialized computer programs can track every keystroke made by user
EmailPrivacyIssues
o federallaw allows employersto monitor e- mailsent and received byemployees
o emailmessages that have been erased from hard disks may be retrieved and
used in lawsuits because the laws of discovery demand that companies
produce all relevant business documents
o theuseofemailamongpublic officials mayviolate “openmeeting”laws
Accuracy
EthicalApproachtoInformationAccuracy
o individuals should be given an opportunity to correct inaccurate information held
about them indatabase
o contents ofdatabasescontainingdata about individuals should be reviewed at
frequentintervals, withobsoletedata discarded
o system safeguards,suchascontrol audits are necessary to maintain information
accuracy
Accessibility
accesstofiles,bothforonlineandoffline, should be restricted only to those who have a
legitimate right to access
manyorganizationskeepatransaction logthatnotesallaccessesorattempted accesses
todata
mostLANmanagementsoftwareincludes this function
Property
many networks have audit controls to track which files opened, which programs and
serverswere used,and so on
thiscreatesanaudittrail,arecordofhow a transaction was handled from input through
processingand output
Computer Crime
Computer CrimeLaws
o FairCreditReporting Act of 1970 (FCRA)
o Freedom of Information Act of 1970
o TaxReform Act of 1976
o RightstoFinancialPrivacyActof1978
o ElectronicFundsTransferActof1979
o Computer Matching and Privacy Act of 1988
o Video Privacy Act of 1988
o Telephone Consumer Protection Act of 1991
o Cable Act of1992
o Computer Abuse AmendmentsAct of 1994.
o Children’sOnlinePrivacyProtection Actof 1998
o Education Privacy Act
FederalComputerCrime Laws
o Copyrights Law
o Fraud and False Statements Law
o Espionage and Censorship
o Mail FraudLaw
TipstoHelpPreventCrimeonthe Internet
o use of stand-alone firewall, including hardware and software with network
monitoring capabilities
o use internet security specialists to perform audits of all internetand network
activities
o developeffectiveinternetandsecurity policies for all employees
o monitor managers and employees to makesuretheyareusingtheinternetfor
business purposesonly
Service Theft
one analysis of e-mail logs of three companies (IBM, Apple, At&T) found their employees
visitedPenthousemagazine website12,823times in a singlemonth
theftoftelephoneserviceshasincreased significantly
Malicious Access
universitycomputersareoftenusedfor commercialpurposesunderthepretense of
researchorotherlegitimateacademic pursuits
Computer Viruses
Application Virus
o infects executable applicationfiles such as word processingprograms
o infects the computersystem
o canoftenbedetectedbycheckingthe length or size of the file
System Virus
o typicallyinfectsoperatingsystem programsorother systemsfiles
o usuallyinfects thesystem as soon as the computer isstarted
TenCommandmentsofComputerEthics
1. Thoushaltnotuseacomputertoharm other people.
2. Thoushaltnotinterfere with other people’s computerwork.
3. Thoushaltnotsnooparoundin other people’s files.
4. Thoushaltnotuse acomputertosteal.
5. Thoushaltnotuseacomputertobear false witness.
6. Thoushaltnotuseorcopysoftwarefor which you have not paid.
7. Thoushaltnotuseotherpeople’s computer resources without authorization.
8. Thou shalt not appropriate other people’sintellectualoutput.
9. Thoushaltthinkaboutthesocial consequencesoftheprogramyou write.
10. Thoushaltuseacomputerinwaysthat showconsiderationandrespect.