Computer - electronic device for solving problems / processing info automatically using a stored program capable of modifying itself
Teleworking - carrying out work away from the office and communicating with the employer through the use of a computer and telecommunications equipment
Computer abuse - acts that are legal but unethical
Hacking
- unauthorised access to data held on a computer system
- motive often mischievous rather than sinister
Theft of data - data stolen by illegally accessing it or by stealing the computer on which it is stored
Viruses
- generally developed with definite intention to cause damage to computer files or cause inconvenience and annoyance to computer uses
- virus usually occupies the first few instructions of a particular program on an 'infected' disk
- when program is executed, virus is the first series of instructions to be performed
- virus copies itself from diskette to PC and 'hides' within obscure files, OS code or within unused disk blocks which are then marked as being 'bad' and are unavailable for reuse.
- REPRODUCTION - when another floppy is inserted into the computer's disk drive the virus copies itself to the floppy disk
- INFECTION - the virus may display messages, use up all the computer's memory, destroy data files or cause serious system errors
'Logic bomb'
- written to destroy or subtly change the contents of an organisation's computer system, but only when signalled to do so by the hacker or if a cancelling signal fails to arrive
- huge sums of money may be handed over to hacker by vulnerable institutions
The Computer Misuse Act, 1990
- unauthorised access to computer programs or data
- unauthorised access with a further criminal intent
- unauthorised modification of computer material (programs or data)
There have been relatively few prosecutions since organisations are reluctant to admit their security procedures have been breached (which could lead to a loss in confidence by clients)
Advanced 'Information Warfare' Techniques
- learnt from military
- use 'logic bombs', electromagnetic pulses, 'high emission radio frequency guns' etc. to blow electronic 'wind' through computer system
Copyright Designs & Patents Act, 1988
- illegal to copy software (bootlegged / programming ideas and methods stolen)
- illegal to run pirated software
- illegal to transmit software over telecommunications line thereby creating a copy
Data Protection Act, 1984 - 8 data principles of good info handling practice
Data must be:
- obtained and processed fairly and lawfully
- held for lawful purposes only
- used for those purposes and only disclosed those people described in register entry
- adequate, relevant and non excessive in relation to purposes for which they are held
- accurate and up to date
- held no longer than necessary
- accessible to individual
- surrounded by proper security
Personal data - data about living, identifiable individuals
Automatically processed - processed by computer or other technology
Data subjects - individuals to whom personal data relates
Data Protection Registrar
- promote compliance with Data Protection Principles
- disseminating information about the act and how it works
- maintain register of data users and make it publicly available
- consider complaints about breaches of the act
- prosecute offenders
Health and Safety
Stress - information overload -> managers bombarded with more information than they can assimilate -> information anxiety
Repetitive Strain Injury (RSI) - neck, shoulders and upper limbs
Eye strain
Extremely low frequency (ELF) radiation - from monitor -> may influence miscarriages
Ergonomics - refers to the design and functionality of the environment
General Purpose Packages
Spreadsheets
- used in planning and budgeting
- 'What If' calculations determine effect of several different hypothetical changes of data
Integrated package
- e.g. MS Works combines a spreadsheet module, a database module and a word processing module
- cannot buy one module separately
- data can be readily transferred between modules
Software suite
- e.g. MS Office
- data can be readily transferred between modules