1 information systems using information (intermediate 2)

55
1 Information Systems Information Systems Using Information Using Information (Intermediate 2) (Intermediate 2)

Upload: erik-fisher

Post on 25-Dec-2015

219 views

Category:

Documents


0 download

TRANSCRIPT

11

Information SystemsInformation Systems

Using InformationUsing Information(Intermediate 2)(Intermediate 2)

22

IntroductionIntroduction• Information and knowledge are so important that Information and knowledge are so important that

society can be divided up into two groups.society can be divided up into two groups.– Information richInformation rich - you have access to:-. - you have access to:-.

• many TV and radio channels.many TV and radio channels.• books, newspapers and journals.books, newspapers and journals.• computers and the World Wide Web.computers and the World Wide Web.

– Information poor.Information poor.• tend to not have access to the Web and tend to not have access to the Web and

probably find it difficult to access relevant probably find it difficult to access relevant books and journals.books and journals.

– If you are following this course you will probably If you are following this course you will probably be information rich.be information rich.

33

IntroductionIntroductionWe are going to examine the nature and uses of We are going to examine the nature and uses of

information by looking at.information by looking at.1.1. Differences between Data and Information.Differences between Data and Information.2.2. Organisational Information Systems.Organisational Information Systems.3.3. Information Management Software.Information Management Software.4.4. Implications of Information and Communications Implications of Information and Communications

Technology.Technology.

44

Data and InformationData and Information• DataData

– raw unprocessed facts and figuresraw unprocessed facts and figures– has no context has no context – no purposeful meaning.no purposeful meaning.

• InformationInformation– is processed data is processed data – it has meaning it has meaning – It has a context. It has a context. 25/08/0911:3525/08/0911:35

55

Data and InformationData and Information

• DataData

– 36.4136.41

– Binary patterns on a discBinary patterns on a disc

• InformationInformation

– £36.41 – bill for DVD’s£36.41 – bill for DVD’s

– Processed DataProcessed Data

– display on screen, Icons etc.display on screen, Icons etc.

66

Benefits of Information Benefits of Information SystemsSystems• Easy to find informationEasy to find information

• Faster than using paper based Faster than using paper based

• Takes up less spaceTakes up less space

• Neater, easier to read infoNeater, easier to read info

• Possible to back upPossible to back up

• Can process lots of data at onceCan process lots of data at once

• More accurateMore accurate

• More ReliableMore Reliable

77

Organisational Information Organisational Information SystemsSystems• ConceptsConcepts

– Speed, accuracy, efficiency, volumeSpeed, accuracy, efficiency, volume

• Functions Functions – Gathering, Storing, Processing and Gathering, Storing, Processing and

outputting Information.outputting Information.

• StrategiesStrategies– Network, Security, Backup, Upgrade, Network, Security, Backup, Upgrade,

SoftwareSoftware

• Centralised Database SystemCentralised Database System

88

Concepts in Relation to Organisational Concepts in Relation to Organisational

Management SystemsManagement Systems • Speed.Speed.

– The processor is able to carry out The processor is able to carry out millions of calculations per second.millions of calculations per second.

• Accuracy.Accuracy.– computers store and process numbers computers store and process numbers

to a great degree of accuracy.to a great degree of accuracy.– depends on the software written and of depends on the software written and of

course human accuracy.course human accuracy.– Much financial software is accurate to Much financial software is accurate to

3 decimal places rounded to 2.3 decimal places rounded to 2.– the software and hardware combined the software and hardware combined

will perform the calculation correctly will perform the calculation correctly every time.every time.

99

Concepts in Relation to Organisational Concepts in Relation to Organisational Management Systems (2)Management Systems (2)

• Volume.Volume.– The number of transactions in a period The number of transactions in a period

of time is the volumeof time is the volume..    

• Efficiency.Efficiency.– The efficiency of an Information System The efficiency of an Information System

is a combination of the speed, accuracy is a combination of the speed, accuracy and volume of the data processed.and volume of the data processed.

1010

The Functions Of An Organisational The Functions Of An Organisational

Information SystemInformation System • Gathering DataGathering Data

– Turnaround Documents in mail order and bills.Turnaround Documents in mail order and bills.– Bar Codes on almost every item soldBar Codes on almost every item sold– Call Centres, customers pay by card.Call Centres, customers pay by card.– Internet Ordering – Credit and Debit cardsInternet Ordering – Credit and Debit cards– Cards with magnetic strips and chip and PINCards with magnetic strips and chip and PIN– Magnetic Ink Character reader on cheques.Magnetic Ink Character reader on cheques.– Optical character recognitionOptical character recognition– Mark Sense reader (Lottery tickets)Mark Sense reader (Lottery tickets)– In each case the data is captured and then stored In each case the data is captured and then stored

electronically and used for some purpose.electronically and used for some purpose.

1111

The Functions Of An Organisational The Functions Of An Organisational

Information SystemInformation System

• Storing InformationStoring Information– Magnetic MediaMagnetic Media

•Magnetic Tape – long term and backup Magnetic Tape – long term and backup storage. Very cheap but slow to access.storage. Very cheap but slow to access.

•Hard Disk – Very fast random access, used in Hard Disk – Very fast random access, used in most applications including ordering and most applications including ordering and booking systems.booking systems.

– Optical MediaOptical Media•CD-ROMS and DVD’s – both available in CD-ROMS and DVD’s – both available in

writeable and re-writeable formats. Not as writeable and re-writeable formats. Not as flexible as disk, but very compact.flexible as disk, but very compact.

1212

The Functions Of An Organisational The Functions Of An Organisational

Information SystemInformation System • Processing Data.Processing Data.

– Searching and Selection.Searching and Selection.•Search and select a sub-section of the Search and select a sub-section of the

data that matches specified criteria.data that matches specified criteria.

– Sorting and Rearranging.Sorting and Rearranging.•Alphabetic or numeric, ascending or Alphabetic or numeric, ascending or

descending.descending.

– Aggregating.Aggregating.•Summarising data by totalling details.Summarising data by totalling details.

– Performing Calculations.Performing Calculations.•Working out bills like utility bills.Working out bills like utility bills.

1313

The Functions Of An Organisational The Functions Of An Organisational

Information SystemInformation System • Outputting InformationOutputting Information..

– Paper.Paper.•Till receipts, statements, cheques, Till receipts, statements, cheques,

internal reports and almost anything.internal reports and almost anything.

– Screen.Screen.•Data entry screens and reports for Data entry screens and reports for

managers.managers.•Web aware applications where pages Web aware applications where pages

are viewed as if on the Internet.are viewed as if on the Internet.

– File.File.•Saving to backing storage.Saving to backing storage.•Files can be e-mailed as attachments.Files can be e-mailed as attachments.

1414

Organisational Information System Organisational Information System

Management StrategiesManagement Strategies • Network Strategy.Network Strategy.

– Addresses Data Transfer, Distribution, Access Addresses Data Transfer, Distribution, Access & Security, Facilities, Storage.& Security, Facilities, Storage.

• Security Strategy.Security Strategy.– Deals with access to the network and keeping Deals with access to the network and keeping

unauthorised people out.unauthorised people out.

• Backup & Recovery Strategy.Backup & Recovery Strategy.– To ensure data is not accidentally erased and To ensure data is not accidentally erased and

can be recovered once backed up.can be recovered once backed up.

• Upgrade Strategy.Upgrade Strategy.– To plan new hardware and software and To plan new hardware and software and

ensure everything new will work properly.ensure everything new will work properly.

• Software Strategy.Software Strategy.– Choose between bespoke and standard Choose between bespoke and standard

packages.packages.

1515

Network StrategyNetwork StrategyNetworks.Networks.

– LANLAN (Local Area Network) – in one (Local Area Network) – in one building.building.•Device Sharing.Device Sharing.•Software Sharing.Software Sharing.•Data Sharing.Data Sharing.•Communication.Communication.

– WANWAN (Wide Area Network) – over a (Wide Area Network) – over a city, country or the wide world.city, country or the wide world.•Uses telecommunications.Uses telecommunications.

– Distributed Networks.Distributed Networks.•LAN with several servers, data accessible LAN with several servers, data accessible

from all over the network.from all over the network.

1616

Security StrategySecurity Strategy

• Security, Integrity and Privacy Security, Integrity and Privacy of Data.of Data.

• Data SecurityData Security means keeping means keeping data safe from physical loss.data safe from physical loss.

• Data IntegrityData Integrity means the means the correctness of the stored data.correctness of the stored data.

• Data PrivacyData Privacy means keeping means keeping data secret so that unauthorised data secret so that unauthorised users cannot access it.users cannot access it.

1717

Backup StrategyBackup Strategy • Every computer user should have a strategy in Every computer user should have a strategy in

place to backup their data.place to backup their data.• Backing up is the process of making a copy of Backing up is the process of making a copy of

data stored on fixed hard disks to some other data stored on fixed hard disks to some other media.media.

• This can be tape, external portable hard disks, This can be tape, external portable hard disks, writeable CD-ROM or DVD.writeable CD-ROM or DVD.

• The purpose of backing up data is to ensure The purpose of backing up data is to ensure that the most recent copy of the data can be that the most recent copy of the data can be recovered and restored in the event of data recovered and restored in the event of data loss.loss.

• Reasons for loss.Reasons for loss.– electronic disasters such as a disk head.electronic disasters such as a disk head.– files being accidentally erased,files being accidentally erased,– the disk being attacked by a virus.the disk being attacked by a virus.

1818

Upgrade StrategyUpgrade Strategy

• Future Proofing.Future Proofing.– making sure that a system has a making sure that a system has a

reasonable life and does not need to be reasonable life and does not need to be totally replaced too soontotally replaced too soon..

– Hardware & software compatibilityHardware & software compatibility•will older s/w work with new operating will older s/w work with new operating

systems etc. systems etc.

•will older h/w work with newer equipment will older h/w work with newer equipment (e.g. printers with computers).(e.g. printers with computers).

1919

Issues Affecting Decisions to Issues Affecting Decisions to Upgrade SoftwareUpgrade Software

• Lack of functionalityLack of functionality..– Business changes, new technology outdates Business changes, new technology outdates

software.software.

• Hardware Incompatibility.Hardware Incompatibility.– Upgraded computers do not support old software.Upgraded computers do not support old software.

• Software IncompatibilitySoftware Incompatibility..– New operating system will not run old software.New operating system will not run old software.

• Perfecting the Software.Perfecting the Software.– Removing bugs and improving it – will existing Removing bugs and improving it – will existing

data work with it.data work with it.

2020

Software StrategySoftware Strategy

• Needs to take account of the issues :-Needs to take account of the issues :-– evaluating the software for use, using evaluating the software for use, using

several key criteriaseveral key criteria– the user support for the softwarethe user support for the software– the training supplied for end users of the the training supplied for end users of the

softwaresoftware– the upgrade path of the softwarethe upgrade path of the software

2121

Centralised DatabaseCentralised Database • A very large and powerful databaseA very large and powerful database - at the - at the

heart of an organisationheart of an organisation..– Database program is called the database Database program is called the database

engine and it saves and indexes files in tables engine and it saves and indexes files in tables and manages the relationships between the and manages the relationships between the tables.tables.

– information can be found fairly easily by information can be found fairly easily by querying the centralised database.querying the centralised database.

– Usually a multi-user or network system is used Usually a multi-user or network system is used which means that any user on the system can which means that any user on the system can have access to the database.have access to the database.

• Advantages to the database being Advantages to the database being centralisedcentralised..– much easier to organise, edit, update and much easier to organise, edit, update and

back-up the data.back-up the data.– Communications are easier.Communications are easier.– no real disadvantages to a centralised no real disadvantages to a centralised

database.database.

2222

Information Management Information Management SoftwareSoftware

• Uses of Types of SoftwareUses of Types of Software

• Word Processing SoftwareWord Processing Software

• Spreadsheet SoftwareSpreadsheet Software

• Evaluation of SoftwareEvaluation of Software

2323

Information Management Software Information Management Software

(1)(1) • Word ProcessingWord Processing

– Commonest Application - WordCommonest Application - Word • SpreadsheetSpreadsheet

– Financial and numerical analysis and Financial and numerical analysis and record keeping - Excelrecord keeping - Excel

• DatabaseDatabase – Store, select, sort dataStore, select, sort data

• Graphics DesignGraphics Design – Create & manipulate pictures Create & manipulate pictures 

• BrowsersBrowsers – Surf the NetSurf the Net

• Email ClientEmail Client – Compose, Send & receive e:mailsCompose, Send & receive e:mails

2424

Information Management Software (2)Information Management Software (2)• Chat ClientChat Client

– Send & receive messages interactivelySend & receive messages interactively

• Desk-Top Publishing (DTP)Desk-Top Publishing (DTP) – Layout text & graphics professionallyLayout text & graphics professionally

• PresentationPresentation – Create slide showsCreate slide shows

• ReferenceReference – Encyclopaedias & dictionariesEncyclopaedias & dictionaries

• FinancialFinancial – Manage and control moneyManage and control money

• Web AuthoringWeb Authoring– Create web pages and sitesCreate web pages and sites

2525

Word Processing SoftwareWord Processing Software

• Data Objects.Data Objects.– characters, wordscharacters, words– paragraphsparagraphs– graphic objects.graphic objects.

• Formatting functionsFormatting functions– found mostly in the format menufound mostly in the format menu– also on the icons on the menu line also on the icons on the menu line

with with B B II UU on it. on it.

2626

Word Processing SoftwareWord Processing Software

• Operations.Operations.•File MenuFile Menu – performed on whole files. – performed on whole files.•Edit MenuEdit Menu – cut, copy and paste. – cut, copy and paste.•View MenuView Menu – including headers and footers. – including headers and footers.•Insert MenuInsert Menu – Page break, date/time, – Page break, date/time,

picture etc.picture etc.•Format MenuFormat Menu – format text (an extensive – format text (an extensive

menu).menu).•Tools MenuTools Menu – Mail merge, spelling and – Mail merge, spelling and

grammar, options and customisation.grammar, options and customisation.•Table MenuTable Menu – Insert table then table – Insert table then table

operations.operations.•WindowWindow and and HelpHelp much as in other much as in other

Windows applications.Windows applications.

2727

Spreadsheet SoftwareSpreadsheet Software

• Data ObjectsData Objects..– Cells and groups of cells Cells and groups of cells – containing text, numbers, formulas.containing text, numbers, formulas.

• Formatting functionsFormatting functions– found mostly in the format menufound mostly in the format menu– also on the icons on the menu line also on the icons on the menu line

with with B B II UU on it. on it.

2828

Spreadsheet SoftwareSpreadsheet Software• Operations.Operations.

•File MenuFile Menu – performed on whole files. – performed on whole files.•Edit MenuEdit Menu – cut, copy and paste. – cut, copy and paste.•View MenuView Menu – including headers and footers. – including headers and footers.•Insert MenuInsert Menu – rows, columns, worksheet, – rows, columns, worksheet,

functions.functions.•Format MenuFormat Menu – format cells including – format cells including

numeric like currency as well as standard numeric like currency as well as standard text formatting.text formatting.

•Tools MenuTools Menu – spelling protection and – spelling protection and macros.macros.

•Data MenuData Menu – Sort, filter and pivot tables. – Sort, filter and pivot tables.•WindowWindow and and HelpHelp much as in other much as in other

Windows applications.Windows applications.

2929

Evaluation of SoftwareEvaluation of Software• Range of Data Objects.Range of Data Objects.

– Are the objects appropriate to the software.Are the objects appropriate to the software.– e.g. graphics and audio files important for web design.e.g. graphics and audio files important for web design.

• Range of Operations.Range of Operations.– Appropriate to software – database should have good Appropriate to software – database should have good

search and sort and reporting.search and sort and reporting.

• Formatting Functions.Formatting Functions.– Look at fonts, style, graphics handling, paragraphing, Look at fonts, style, graphics handling, paragraphing,

text wrap, numerical formats etc.text wrap, numerical formats etc.

• HCI.HCI.– Use of keyboard commands, menus, toolbars and Use of keyboard commands, menus, toolbars and

icons.icons.

• Help and Tutorials.Help and Tutorials.– Most package have on-line help and tutorials.Most package have on-line help and tutorials.– Often displayed as web pages but are NOT on the Often displayed as web pages but are NOT on the

Internet.Internet.

3030

Implications of ICTImplications of ICT

• Social ImplicationsSocial Implications

• Legal ImplicationsLegal Implications

• Economic ImplicationsEconomic Implications

• Ethical ImplicationsEthical Implications

3131

Social ImplicationsSocial Implications

• Ease of Access and AvailabilityEase of Access and Availability

• Information Rich / PoorInformation Rich / Poor

• Impact of IS on Social StructuresImpact of IS on Social Structures

• Educational Qualifications and ICTEducational Qualifications and ICT

• Knowledge WorkersKnowledge Workers

• Online retail and changing shopping habitsOnline retail and changing shopping habits

3232

Ease of Access and Availability.Ease of Access and Availability.

– Access to Internet at work and home.Access to Internet at work and home.– Digital Satellite TV with all its services.Digital Satellite TV with all its services.– Access to magazines, books & newspapers.Access to magazines, books & newspapers.– Access in social lives – libraries and Internet Access in social lives – libraries and Internet

cafes.cafes.– We expect Internet access on holiday and in We expect Internet access on holiday and in

hotel rooms.hotel rooms.– Fact – There are more telephones in the city of Fact – There are more telephones in the city of

New York than the continent of Africa (and New York than the continent of Africa (and telephones give access to information).telephones give access to information).

3333

Information rich/Information poorInformation rich/Information poor • Information richInformation rich – They will:- – They will:-

– Have easy access to computers and electronic Have easy access to computers and electronic communications.communications.

– Get information and news from the InternetGet information and news from the Internet– Buy the latest products through on-line shopping. Buy the latest products through on-line shopping. – Follow computer-based learning and skills training Follow computer-based learning and skills training

courses at homecourses at home– Look for jobs that are advertised solely on the Look for jobs that are advertised solely on the

Internet. Internet. – Find it easier to get well-paid jobs and will enjoy a Find it easier to get well-paid jobs and will enjoy a

more comfortable and secure life-style.more comfortable and secure life-style.

• Information poorInformation poor – They will – They will notnot:-:-– Have easy access to computersHave easy access to computers– Have the IT skills and confidence to take part in Have the IT skills and confidence to take part in

teleshopping, telebanking, Internet chat and news teleshopping, telebanking, Internet chat and news groups.groups.

3434

Impact of IS on Social Impact of IS on Social StructuresStructures• Families.Families.

– Feel more secure with two wages coming into Feel more secure with two wages coming into the family.the family.

– More mothers have careers and they may not More mothers have careers and they may not have any children till they are 30 or older.have any children till they are 30 or older.

– Is this change in family patterns partly caused Is this change in family patterns partly caused by computerisation?by computerisation?

– Are there any risks to the family and to society Are there any risks to the family and to society as a whole from this development?as a whole from this development?

• Banks.Banks.– Used to be paper based and only for middle Used to be paper based and only for middle

and upper classes – reasons of wealth and and upper classes – reasons of wealth and trust.trust.

– Use of IT means anyone can have a bank Use of IT means anyone can have a bank account – transaction processing and high account – transaction processing and high levels of security.levels of security.

– Now widespread use of plastic money – credit Now widespread use of plastic money – credit and debit cards.and debit cards.

3535

• Educational Qualifications.Educational Qualifications.– QQualifications in Computing since the early ualifications in Computing since the early

1960’s, but these were solely in Universities and 1960’s, but these were solely in Universities and collegescolleges..

– mid 1980’s computing was available in schools.mid 1980’s computing was available in schools.– 1999 two strands of software and hardware 1999 two strands of software and hardware

divided into Computing and Information Systems.divided into Computing and Information Systems.– Now there are very many different courses Now there are very many different courses

offered at degree and NC level all related to ICT.offered at degree and NC level all related to ICT.

• Need for ICT awarenessNeed for ICT awareness..– ICT lets people vote by text on game shows, shop ICT lets people vote by text on game shows, shop

on the Internet, use digital TV to order goods.on the Internet, use digital TV to order goods.– Families sending digital photos round the world.Families sending digital photos round the world.– Almost all office jobs and professionals need to Almost all office jobs and professionals need to

use ICT.use ICT.

3636

Knowledge WorkersKnowledge Workers • Knowledge workerKnowledge worker..

– someone who adds value by processing someone who adds value by processing existing information to create new existing information to create new information that could be used to define information that could be used to define and solve problems.and solve problems.

• Examples of knowledge workers.Examples of knowledge workers.– include lawyers, doctors, diplomats, law-include lawyers, doctors, diplomats, law-

makers, software developers, managers makers, software developers, managers and bankers.and bankers.

– use their intellect to convert their ideas into use their intellect to convert their ideas into products, services, or processes.products, services, or processes.

– a problem solver rather than a production a problem solver rather than a production worker.worker.

– Uses intellectual rather than manual skills Uses intellectual rather than manual skills to earn a living .to earn a living .

3737

Knowledge WorkersKnowledge Workers

• Core knowledge workers.Core knowledge workers.– Those in specific ‘knowledge management’ Those in specific ‘knowledge management’

roles.roles.– Knowledge Managers, Librarians, Content Knowledge Managers, Librarians, Content

Managers, Information Officers, Knowledge Managers, Information Officers, Knowledge Analysts, etc.Analysts, etc.

• Everyone else.Everyone else.– All the other knowledge workersAll the other knowledge workers– everyone engaged in some form of everyone engaged in some form of

‘knowledge work’.‘knowledge work’.

3838

Online Retail Online Retail • Internet shoppingInternet shopping – the here and – the here and

now.now.– Young people much more likely to shop Young people much more likely to shop

on-line than older people.on-line than older people.– Young people spend on low value goods Young people spend on low value goods

(CDs, DVDs, books.(CDs, DVDs, books.– Older people spend on high value items Older people spend on high value items

like holidays and make repeat grocery like holidays and make repeat grocery orders.orders.

• Why Internet Shop?Why Internet Shop?– Goods difficult to buy locally.Goods difficult to buy locally.– Goods often much cheaper.Goods often much cheaper.– National chains carry the same goods – National chains carry the same goods –

the Internet gives more choice.the Internet gives more choice.

3939

Advantages of Online ShoppingAdvantages of Online Shopping• Consumer – Advantages.Consumer – Advantages.

– No travel costsNo travel costs– Cheaper prices often (online discounts)Cheaper prices often (online discounts)– More choiceMore choice– Products available more quicklyProducts available more quickly– Quicker going onlineQuicker going online

• On-line Retailer – Advantages.On-line Retailer – Advantages.– More potential customersMore potential customers– Don’t need to pay staffDon’t need to pay staff– Extra profit through postageExtra profit through postage– Don’t need to pay for premisesDon’t need to pay for premises–

4040

Advantages of Online ShoppingAdvantages of Online Shopping• Consumer – Advantages.Consumer – Advantages.

– More choice of goods on-line.More choice of goods on-line.– Cheaper prices.Cheaper prices.– Home delivery – Grocery shopping on-line Home delivery – Grocery shopping on-line

very useful for young families.very useful for young families.

• On-line Retailer – Advantages.On-line Retailer – Advantages.– Can reach a far wider audience.Can reach a far wider audience.– Don’t need expensive showrooms.Don’t need expensive showrooms.– Don’t need to employ trained sales staff.Don’t need to employ trained sales staff.

4141

Disadvantages of Online ShoppingDisadvantages of Online Shopping

• Consumer – Disadvantages.Consumer – Disadvantages.– Often long delivery times.Often long delivery times.– Temptation to spend more than Temptation to spend more than

intended.intended.– Social isolation (supermarkets are the Social isolation (supermarkets are the

new social scene).new social scene).

• On-line Retailer – Disadvantages.On-line Retailer – Disadvantages.– Must spend money on a web site with Must spend money on a web site with

secure payment system.secure payment system.– Must accept a high rate of returns.Must accept a high rate of returns.– Never meets customers.Never meets customers.

4242

Legal Implications of Legal Implications of Information SystemsInformation Systems• The Data Protection Act 1998The Data Protection Act 1998• Computer Misuse Act 1990Computer Misuse Act 1990• Copyright Designs and Patents Act 1988Copyright Designs and Patents Act 1988• Health and safety RegulationsHealth and safety Regulations

• www.braidhurst.n-lanark.sch.ukwww.braidhurst.n-lanark.sch.uk• Computing and info sysComputing and info sys• Int 2 Info sysInt 2 Info sys• Using InformationUsing Information• Legal implicationsLegal implications

4343

The 1998 Data Protection ActThe 1998 Data Protection Act • The 8 Data Protection Principles.The 8 Data Protection Principles.

– Personal data shall be processed fairly and lawfully.Personal data shall be processed fairly and lawfully.– Personal data shall be obtained only for lawful purposes,Personal data shall be obtained only for lawful purposes,– Personal data shall be adequate, relevant and not Personal data shall be adequate, relevant and not

excessive.excessive.– Personal data shall be accurate and, kept up to date.Personal data shall be accurate and, kept up to date.– Personal data shall not be kept for longer than is Personal data shall not be kept for longer than is

necessary.necessary.– Personal data shall be processed in accordance with the Personal data shall be processed in accordance with the

rights of data subjects.rights of data subjects.– Appropriate measures shall be taken against unauthorised Appropriate measures shall be taken against unauthorised

or unlawful processing of dataor unlawful processing of data..– Personal data shall not be transferred to a country outside Personal data shall not be transferred to a country outside

EuropeEurope..

• Data must be registered with the Data Data must be registered with the Data Commissioner. Commissioner.

4444

The 1998 Data protection ActThe 1998 Data protection Act

• Unconditional exemptions.Unconditional exemptions.– Data related to National Security.Data related to National Security.– Data which by law has to be made public (e.g. Data which by law has to be made public (e.g.

voters’ roll).voters’ roll).– Data held by the Police and National Health Data held by the Police and National Health

Service.Service.

•   conditional exemptions.conditional exemptions.– mailing lists (names and addresses).mailing lists (names and addresses).– data used for calculating and paying wages.data used for calculating and paying wages.– information used for club memberships.information used for club memberships.– data used by a data subject at home.data used by a data subject at home.

4545

The 1998 Data Protection ActThe 1998 Data Protection Act • Rights of Data Subjects.Rights of Data Subjects.

– TTo see any personal data stored either electronically o see any personal data stored either electronically or manually about them.or manually about them.

– The Data controller may ask that a small fee be paid The Data controller may ask that a small fee be paid to cover their costs in providing the data.to cover their costs in providing the data.

– TTo have their data corrected if it is inaccurate.o have their data corrected if it is inaccurate.– TTo prevent their data being used by companies to o prevent their data being used by companies to

send them junk mail.send them junk mail.

• Responsibilities of Data Users.Responsibilities of Data Users.– Have to register with the Data Protection Registrar if Have to register with the Data Protection Registrar if

they wished to hold personal information about data they wished to hold personal information about data subjects.subjects.

– They must be willing to let data subjects see data held They must be willing to let data subjects see data held about them, but must amend any false data without about them, but must amend any false data without charge.charge.

– Data Users must also be willing to remove subjects’ Data Users must also be willing to remove subjects’ names and addresses from mailing lists if asked to.names and addresses from mailing lists if asked to.

4646

Computer Misuse ActComputer Misuse Act• The Act contains three sections coveringThe Act contains three sections covering:-.:-.

– Unauthorised access to computer materialUnauthorised access to computer material..• Basic hacking – e.g. breaking into the school network, Basic hacking – e.g. breaking into the school network,

locking a user out of the system etc.locking a user out of the system etc.

– Unauthorised access with intent to commit or Unauthorised access with intent to commit or facilitate commission of further offences.facilitate commission of further offences.• Where a computer system is used to help commit a crime.Where a computer system is used to help commit a crime.

– Unauthorised modification of computer Unauthorised modification of computer material.material.• Expert hacking – modification of data without permission.Expert hacking – modification of data without permission.

• Also covers the transmission of viruses.Also covers the transmission of viruses.

4747

Copyright, Designs & Patents ActCopyright, Designs & Patents Act • Software Licensing.Software Licensing.

– Software can be legally installed on as many Software can be legally installed on as many computers as the licence allows.computers as the licence allows.

– Shareware can be used legally for 30 days Shareware can be used legally for 30 days then either paid for or deleted.then either paid for or deleted.

– Freeware can be downloaded and used free of Freeware can be downloaded and used free of charge.charge.

• Computer Applications.Computer Applications.– Databases can store vast amounts of Databases can store vast amounts of

copyright data.copyright data.– Act covers extracts from computer databases.Act covers extracts from computer databases.– Plagiarism to copy work directly from the Plagiarism to copy work directly from the

Web.Web.– Music downloads must be paid for and Music downloads must be paid for and

copyright checked.copyright checked.– Software piracy a crime - FAST.Software piracy a crime - FAST.

4848

Health and Safety RegulationsHealth and Safety Regulations • Covers physical aspects of work.Covers physical aspects of work.

– Seating.Seating.• Is the seating comfortable and not causing strain?Is the seating comfortable and not causing strain?

– LightingLighting..• Is the lighting adequate for the work?Is the lighting adequate for the work?

• Employee Injuries etc.Employee Injuries etc.– Repetitive Strain Injury (RSI).Repetitive Strain Injury (RSI).

• Caused by doing the same repetitive task too long Caused by doing the same repetitive task too long (typing numbers all day on the number pad).(typing numbers all day on the number pad).

– Radiation.Radiation.• Not so much of a problem now but the big old Not so much of a problem now but the big old

monitors emitted a lot of radiation and were very monitors emitted a lot of radiation and were very dangerous.dangerous.

– Eye Strain.Eye Strain.• Caused by spending too much time looking at the Caused by spending too much time looking at the

screen.screen.

4949

Economic Implications of ICTEconomic Implications of ICT

• Type of Jobs and Costs in ICT.Type of Jobs and Costs in ICT.

• The Effect of New ICT on Business.The Effect of New ICT on Business.

• Business and ICT.Business and ICT.

5050

Jobs in ICTJobs in ICT• Starting Positions.Starting Positions.

– Programmer / Analyst.Programmer / Analyst.• Responsible for program development and Responsible for program development and

modification,modification,

– Web Administrator.Web Administrator.• Responsible for developing, managing and co-Responsible for developing, managing and co-

ordinating the posting of company material from ordinating the posting of company material from departments onto the company web site.departments onto the company web site.

– Network Administrator.Network Administrator.• Responsible for the day-to-day management and Responsible for the day-to-day management and

maintenance of the network.maintenance of the network.

– Salaries.Salaries.• in the region of £20,000 to £30,000 depending in the region of £20,000 to £30,000 depending

on the level of responsibility.on the level of responsibility.

5151

Jobs in ICTJobs in ICT• Advanced development positions.Advanced development positions.

– Database Manager.Database Manager.• Responsible for identifying needs and developing Responsible for identifying needs and developing

software accordingly. There is an increasing role software accordingly. There is an increasing role for data mining and data warehousing experts in for data mining and data warehousing experts in this field.this field.

– Project Leader and Senior Analyst.Project Leader and Senior Analyst.• Sometimes separate posts, sometimes a joint post Sometimes separate posts, sometimes a joint post

the project leader will liase with directors and top the project leader will liase with directors and top managers and translate ideas into computer managers and translate ideas into computer related documentation.related documentation.

– IT Manager.IT Manager.• Generally in charge of the entire IT operation, staff Generally in charge of the entire IT operation, staff

and equipment.and equipment.

– Salaries.Salaries.• These senior posts can carry very high salaries with These senior posts can carry very high salaries with

fringe benefits such as company cars.fringe benefits such as company cars.

5252

The Effect of New ICT on The Effect of New ICT on

BusinessBusiness

• Costs.Costs.– Investing in a new computerised system Investing in a new computerised system

is very expensive.is very expensive.– Staff training a major cost.Staff training a major cost.

• BenefitsBenefits..– Increased productivity (fewer staff).Increased productivity (fewer staff).– Increased functionality.Increased functionality.– Reports from the computerised system Reports from the computerised system

can save the expense of professionals.can save the expense of professionals.

5353

Ethical Implications of ICTEthical Implications of ICT

• Censorship Censorship

• Regulating The Content of The Regulating The Content of The InternetInternet

• Privacy Privacy

• EncryptionEncryption

• Global CitizenshipGlobal Citizenship

5454

NetiquetteNetiquette• General Points.General Points.

– Treat others the way you expect to be Treat others the way you expect to be treated.treated.

– Act within the Law.Act within the Law.– Act responsibly and ethically.Act responsibly and ethically.

• Advice.Advice.– Do not type e:mails in capitals – shouting.Do not type e:mails in capitals – shouting.– Always fill in the subject field.Always fill in the subject field.– Don’t abuse people – Flaming.Don’t abuse people – Flaming.– Always minimize or compress large files.Always minimize or compress large files.– Do not forward stupid jokes and chain Do not forward stupid jokes and chain

letters.letters.– Do not forward hoax virus warnings.Do not forward hoax virus warnings.

5555

Intellectual Property RightsIntellectual Property Rights

• Written Work.Written Work.– Knowledge the principal source of competitive Knowledge the principal source of competitive

advantage.advantage.– All original work published on the Internet has All original work published on the Internet has

IRP.IRP.– Applies also to Software.Applies also to Software.

• Music Etc.Music Etc.– IRPs relate to the Internet sites where music can IRPs relate to the Internet sites where music can

be downloaded from.be downloaded from.– Copyright material must usually be paid for as Copyright material must usually be paid for as

the publishers of the music own the IRPs.the publishers of the music own the IRPs.