Ch 19. social and economic effects of it

Khan Yousafzai
Khan YousafzaiIT Coordinator / O' Level Teacher um The City School Pvt Ltd
1
Is information technology a good
thing?
Arguments in favour
 The jobs replaced by computers are the rather Ineresting ones. People
are free to do more interesting tasks.
 Higher productivity enables people to work fewer hours and yet have
the same standard of living.
 Other countries make use of IT. If we did not, our goods and services
would become uncompetitive and there would be even more
unemployment.
 There are many tasks that would be impossible without the use of IT.
Air-traffic control, credit cards, space travel and medical research are
just some examples.
 New jobs are being created by the introduction of IT e.g.
programming, network managing etc.
 Many of the old boring jobs can now be done by a computer,
which leaves workers to do more interesting tasks.
 Computerisation has improved levels of productivity, which
means that workers need to work shorter hours and still
maintain the same standard of living.
2
Is information technology a good
thing?
Arguments against
 Life without IT is slower and less stressful.
 Computers are cheaper than people are so if a computer can
do a job then it will lead to higher unemployment.
 The new jobs being created by the use of IT are only for highly
skilled and qualified people.
 The people who did the boring repetitive jobs now done by
computers no longer have a job.
 The storage of personal data held on computer has eroded
people's privacy.
 The gap will be widened between those countries able to afford
the new technologies and those that can't.
3
Changing Employment Patterns
 Robots are now performing many of the manual tasks such as
assembly work and paint spraying in factories.
 Many industrial processes operate 24 hours a day and are
continually being monitored and controlled by computers.
 There are fewer paper-based systems in offices. Some jobs
such as filing clerks no longer exist. New jobs involving
computers have been created.
 More and more people work form home, with the advantage of
no travelling and the freedom of being able to live in any part of
the country (or the world for that matter).
 Computers are sometimes used to monitor the performance of
their users. For instance, in supermarkets they can tell the
management about the number of customers dealt with per
hour or how many items are passed through the scanner in a
day. Order entry clerks and airline booking clerks can have
their work similarly monitored.
4
Identity cards move a step closer
 Driving licenses are now to be in credit card format and have a
photograph of the driver on them.
 Eventually the government would like to add a microchip to these
cards, thus making the card into a 'smart card'.
 The card might also store National Insurance details, which
would enable health details to be located.
Computer game addiction
 Some children are addicted to computer games, sometimes playing them
for more than 30 hours per week.
 Many experts are worried that this solitary activity is affecting the social
and educational development of addicted children.
 Many computer games do not mimic reality and often involve simulated
violence.
 Other people are worried that many children are becoming 'couch potatoes',
and are not involved in any physical activity and do not interact very well
with adults or people their own age.
5
Who Watches the Watchers
 During the Second World War everyone
had to carry an identity card, and you
could be arrested for not having one with
you at all times.
 They will have the individual’s
photograph and a chip with biometric
data stored on it.
 The identity cards will be used by many
different government departments to
keep track of data about the whole
population, and could be used to replace
existing passports, driving licences,
National Insurance numbers, even
examination candidate numbers.
 The data stored on the identity card may
also include encoded versions of an
individual’s fingerprints, iris prints, and
facial identification points.
 The latter is a method of mapping a
person’s face and converting this data
into digital information.
6
Environmental issues
 Reduced energy consumption - Computers now control many of
the heating systems in offices and factories so it is possible for only
the rooms that are being used to be heated. This can save huge
amounts of energy.
 Reduced wastage in industrial processes - There are many process
control systems used in our factories and because these are more
accurate, there is less wastage, thus saving valuable resources.
 Saving trees - The use of the electronic office and EDI has led to
paper being almost eliminated in many offices and this means that
fewer trees need to be felled. So not only are the trees saved but the
energy that went into the making of the paper is also saved.
 Reducing car pollution - Teleworking (working at home using
information technology) means that some people no longer have to
travel to the office to work. This reduces petrol consumption and
car pollution.
7
Ethical, moral and social issues
 Software theft - It could be said that the use of personal computers
has made many users into thieves. As you can see from the
Copyright, Designs and Patents Act, 1989, it is a criminal offence to
copy or steal software.
 Hacking - Hacking means gaining illegal access to someone else's
computer system. Many people see this type of thing as a challenge
and not as an illegal activity.
 Privacy - Many people see the Data Protection Act as inadequate,
since in 1984, when the act was made law, there weren't anything
like the number of personal computers and communications
networks that there are today. Some people are totally unaware of
the act and think that it only applies to large companies or
organisations.
 Job losses - Is it right to develop new systems in the knowledge
that staff will inevitably be made redundant? Should we put
shareholders' dividends and profit before people? These are difficult
questions and ones, which need to be addressed. Everyone has his
or her own opinion on this.
8
Social and ethical considerations for
the Internet
 The Internet provides access to a variety of information on every
topic and this information comes from many different countries
throughout the world.
 Problems:
 One problem with the Internet is that all the information is freely
available once the user is connected.
 There are news areas on the Internet, which contain large amounts
of illegal pornographic material.
 Governments have the problem of finding a way of allowing users
to gain access to the Internet but not to any illegal areas.
 There is a problem in restricting access. The Internet is a global
system and it is difficult of make laws to control it by single
countries.
 Another problem with restrictions is that it could lead governments
to begin attempts to censor, legislate and regulate the Internet for
political, cultural and religious reasons.
9
Social considerations for a cashless
society
 Advantages
 It is far more convenient not to have to use cash
 Mortgage and loan repayments, gas, electricity and
phone bills are paid automatically so you don't need to
remember to pay them.
 You no longer need to take large sums of money out
of the building society or bank to pay for expensive
items: the risk of being robbed is reduced.
 You don't have to queue at the bank, building society
or cash machine to get money out.
 Credit cards allow people to buy goods and then
decide whether to pay for them at the end of the month
or obtain them on credit, paying a proportion each
month.
10
Social considerations for a cashless
society
 Disadvantages
 Credit is normally given only to people who are working
and have a steady source of income, so certain people
won't be able to get it.
 It is possible for people to spend more than they can
really afford so they can easily get into debt.
 More information is kept about individuals. Inevitably
some of this will be incorrect and lead to people
wrongly being refused cash or credit cards.
 It is harder for people to keep track of how much they
have spent, since statements are usually sent only once
a month, although statements can usually be obtained
more frequently if they are requested.
11
Crime prevention
IT can be used to help prevent crime and the systems employed include the following.
 Speed camera systems and camera systems, which detect cars jumping red lights.
 Computer controlled camera systems deter violent crime in many city centres.
 Tagging systems on bikes, cars and other property reduces the chances of them
being stolen.
 Computer controlled house security systems deter some burglars.
Crime detection
IT can be used to catch criminals and some of the ways it can do this are as follows:
 The Police National Computer (PNC) is used to hold details of all crimes committed
and criminals.
 The National Criminal Intelligence System is a computer system used to piece
together information about individual criminals and their illegal activities.
 The computer can interact with the data supplied by Interpol, the PNC, Customs
and Excise, the Inland Revenue, and the bank and building society computers.
 This system is used to gather material on organised crimes such as drug
smuggling.
 DNA profiling and fingerprinting systems enables valuable, and often conclusive,
evidence to be collected.
 Police headquarters computers for each police force are used in the day-to-day
administration of all the usual police work.
12
Problems with the Police National
Computer (PNC)
 There is a risk that illegal access to the PNC could
allow people outside the police force to gain information.
 There are worries that the running of the PNC will be
passed over to a private company.
 The PNC contains criminal records, details of wanted
or dangerous people, disqualified drivers, stolen cars
and guns and also the records of 30 million motorists.
 Some files indicate that a person is HIV positive
 Information on the PNC might be incorrect and this
could stop someone getting a job or could even result in
a person being wrongly arrested for a crime.
1 von 12

Recomendados

contemporary application of information technology von
contemporary application of information technologycontemporary application of information technology
contemporary application of information technologyPANKHURI JAIN
651 views40 Folien
E commerce von
E commerceE commerce
E commerceJed Concepcion
45 views37 Folien
IT LAW PRESENATION von
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATIONNayana Pingle
1.2K views53 Folien
IT (4).pdf von
IT (4).pdfIT (4).pdf
IT (4).pdfMadhavi38
56 views21 Folien
Electronic Business von
Electronic BusinessElectronic Business
Electronic BusinessMayank Kashyap
1.4K views28 Folien
It act,2000 von
It act,2000It act,2000
It act,2000Priya Kushwah
611 views10 Folien

Más contenido relacionado

Was ist angesagt?

19 July 2012 - Loc-poi overview v2 von
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 Timothy Holborn
189 views17 Folien
e commerce by N.P.Ghadge von
 e commerce by N.P.Ghadge e commerce by N.P.Ghadge
e commerce by N.P.Ghadgeneeta ghadge
821 views22 Folien
feb 2018 - Sub22 - The impact of new and emerging information and communicati... von
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...Timothy Holborn
67 views10 Folien
India Legal 17 June 2019 von
India Legal 17 June 2019India Legal 17 June 2019
India Legal 17 June 2019ENC
252 views52 Folien
Introduction to electronic business electronic commerce von
Introduction to electronic business electronic commerceIntroduction to electronic business electronic commerce
Introduction to electronic business electronic commerceOsama Yousaf
64 views24 Folien

Was ist angesagt?(20)

19 July 2012 - Loc-poi overview v2 von Timothy Holborn
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2
Timothy Holborn189 views
e commerce by N.P.Ghadge von neeta ghadge
 e commerce by N.P.Ghadge e commerce by N.P.Ghadge
e commerce by N.P.Ghadge
neeta ghadge821 views
feb 2018 - Sub22 - The impact of new and emerging information and communicati... von Timothy Holborn
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
Timothy Holborn67 views
India Legal 17 June 2019 von ENC
India Legal 17 June 2019India Legal 17 June 2019
India Legal 17 June 2019
ENC 252 views
Introduction to electronic business electronic commerce von Osama Yousaf
Introduction to electronic business electronic commerceIntroduction to electronic business electronic commerce
Introduction to electronic business electronic commerce
Osama Yousaf64 views
E banking von femymoni
E bankingE banking
E banking
femymoni61 views
India Legal 01 October 2018 von ENC
India Legal 01 October 2018India Legal 01 October 2018
India Legal 01 October 2018
ENC 144 views
Cyber law & information technology von Talwant Singh
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
Talwant Singh5.3K views
E Commerce Platform Data Ownership and Legal Protection von ijtsrd
E Commerce Platform Data Ownership and Legal ProtectionE Commerce Platform Data Ownership and Legal Protection
E Commerce Platform Data Ownership and Legal Protection
ijtsrd63 views
Ethical issues and social issues related to systems upload von waiforchi Wagiteerhh
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
Signing away evolving law of electronic signatures & paperless office von PaperSave
Signing away evolving law of electronic signatures & paperless officeSigning away evolving law of electronic signatures & paperless office
Signing away evolving law of electronic signatures & paperless office
PaperSave 163 views
Legal issues in technology von EzraGray1
Legal issues in technologyLegal issues in technology
Legal issues in technology
EzraGray173 views
Behavioral Big Data: Why Quality Engineers Should Care von Galit Shmueli
Behavioral Big Data: Why Quality Engineers Should CareBehavioral Big Data: Why Quality Engineers Should Care
Behavioral Big Data: Why Quality Engineers Should Care
Galit Shmueli269 views
3213ijist01 von jh1234jh
3213ijist013213ijist01
3213ijist01
jh1234jh300 views
E business applications von Raj vardhan
E business applicationsE business applications
E business applications
Raj vardhan5.3K views
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente... von IJMIT JOURNAL
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...
IJMIT JOURNAL58 views
AIRLIFT von cloudPWR
AIRLIFTAIRLIFT
AIRLIFT
cloudPWR560 views
Roots of Indian IT ACT 2000- UNCITRAL von Rahul Gurnani
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
Rahul Gurnani10.6K views

Destacado

Google mini von
Google miniGoogle mini
Google miniShiva Krishna Chandra Shekar
698 views18 Folien
Transportation 2011 von
Transportation 2011Transportation 2011
Transportation 2011Elcio Queiroz
685 views19 Folien
Smart Transport for benefit of employees, logistics & freight carriers von
Smart Transport for benefit of employees, logistics & freight carriersSmart Transport for benefit of employees, logistics & freight carriers
Smart Transport for benefit of employees, logistics & freight carriersShubhankar Thakur
319 views22 Folien
Social impact of computers von
Social impact of computersSocial impact of computers
Social impact of computersChristian Macatangay
4.7K views30 Folien
Economic, Social & Political Impact of Web 2.0 von
Economic, Social & Political Impact of Web 2.0Economic, Social & Political Impact of Web 2.0
Economic, Social & Political Impact of Web 2.0is20090
14.8K views54 Folien
Public Transport For Smart Cities von
Public Transport For Smart CitiesPublic Transport For Smart Cities
Public Transport For Smart CitiesIPPAI
1.6K views27 Folien

Destacado(11)

Smart Transport for benefit of employees, logistics & freight carriers von Shubhankar Thakur
Smart Transport for benefit of employees, logistics & freight carriersSmart Transport for benefit of employees, logistics & freight carriers
Smart Transport for benefit of employees, logistics & freight carriers
Shubhankar Thakur319 views
Economic, Social & Political Impact of Web 2.0 von is20090
Economic, Social & Political Impact of Web 2.0Economic, Social & Political Impact of Web 2.0
Economic, Social & Political Impact of Web 2.0
is2009014.8K views
Public Transport For Smart Cities von IPPAI
Public Transport For Smart CitiesPublic Transport For Smart Cities
Public Transport For Smart Cities
IPPAI1.6K views
Impact of computers on Society von Ramki M
Impact of computers on SocietyImpact of computers on Society
Impact of computers on Society
Ramki M7.1K views
Positive and Negative Impacts of Computer von Hina Anjum
Positive and Negative Impacts of ComputerPositive and Negative Impacts of Computer
Positive and Negative Impacts of Computer
Hina Anjum138K views
Integrated Transport Services - Cashless Transactions / Smart Card von Valoriser Consultants
Integrated Transport Services - Cashless Transactions / Smart CardIntegrated Transport Services - Cashless Transactions / Smart Card
Integrated Transport Services - Cashless Transactions / Smart Card
Economic effects of advertisements von Amlin David
Economic effects of advertisementsEconomic effects of advertisements
Economic effects of advertisements
Amlin David36.9K views

Similar a Ch 19. social and economic effects of it

iot.docx von
iot.docxiot.docx
iot.docxMonuBhagat4
44 views5 Folien
Role of CAs in cyber world von
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber worldCA. (Dr.) Rajkumar Adukia
638 views50 Folien
Topic 7 von
Topic 7Topic 7
Topic 7MLG College of Learning, Inc
69 views26 Folien
IoT von
IoTIoT
IoTMphasis
1.8K views7 Folien
The Endless Possibilities Of 3D Printing Essay von
The Endless Possibilities Of 3D Printing EssayThe Endless Possibilities Of 3D Printing Essay
The Endless Possibilities Of 3D Printing EssaySheila Brooks
2 views40 Folien
Ethical, Legal and Social issues IoT von
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
1.3K views16 Folien

Similar a Ch 19. social and economic effects of it(20)

IoT von Mphasis
IoTIoT
IoT
Mphasis1.8K views
The Endless Possibilities Of 3D Printing Essay von Sheila Brooks
The Endless Possibilities Of 3D Printing EssayThe Endless Possibilities Of 3D Printing Essay
The Endless Possibilities Of 3D Printing Essay
Sheila Brooks2 views
Ethical, Legal and Social issues IoT von Luckeylama
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
Luckeylama1.3K views
Issues and challenges in e-business von Nishant Pahad
Issues and challenges in e-businessIssues and challenges in e-business
Issues and challenges in e-business
Nishant Pahad3.6K views
computer and society impact of Computer in society von Sumama Shakir
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
Sumama Shakir1.8K views
The internet of things..perspectives for the Nigerian legal system von Simon Aderinlola
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
Simon Aderinlola575 views
Smart Data Module 5 d drive_legislation von caniceconsulting
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
caniceconsulting262 views
Future of privacy - An initial perspective - Stephen Deadman, Vodafone von Future Agenda
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future Agenda1.6K views
Data protection & security breakfast briefing master slides 28 june-final von Dr. Donald Macfarlane
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final von Dr. Donald Macfarlane
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Chapter 66.1 Changes, Fears, and QuestionsComputers free u.docx von tidwellveronique
Chapter  66.1 Changes, Fears, and QuestionsComputers free u.docxChapter  66.1 Changes, Fears, and QuestionsComputers free u.docx
Chapter 66.1 Changes, Fears, and QuestionsComputers free u.docx
USAGE AND IMPACTS OF COMPUTER von ramlalshah1
USAGE AND IMPACTS OF COMPUTER USAGE AND IMPACTS OF COMPUTER
USAGE AND IMPACTS OF COMPUTER
ramlalshah133 views
7 technologies that will change our future von Pioneer Lists
7 technologies that will change our future7 technologies that will change our future
7 technologies that will change our future
Pioneer Lists138 views
Chip Cards And Magnetic Stripe Cards von Lisa Olive
Chip Cards And Magnetic Stripe CardsChip Cards And Magnetic Stripe Cards
Chip Cards And Magnetic Stripe Cards
Lisa Olive3 views

Más de Khan Yousafzai

14 data logging von
14   data logging14   data logging
14 data loggingKhan Yousafzai
522 views18 Folien
09.1 types of computer operation von
09.1   types of computer operation09.1   types of computer operation
09.1 types of computer operationKhan Yousafzai
4K views14 Folien
8.2 system analysis and design von
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and designKhan Yousafzai
2.7K views26 Folien
8.1 alogorithm & prolem solving von
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solvingKhan Yousafzai
4.6K views77 Folien
Ch 26 the internet von
Ch 26 the internetCh 26 the internet
Ch 26 the internetKhan Yousafzai
359 views18 Folien
Ch 22 the electronic office von
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic officeKhan Yousafzai
2.7K views15 Folien

Más de Khan Yousafzai(20)

8.2 system analysis and design von Khan Yousafzai
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and design
Khan Yousafzai2.7K views
8.1 alogorithm & prolem solving von Khan Yousafzai
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving
Khan Yousafzai4.6K views
Ch 22 the electronic office von Khan Yousafzai
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic office
Khan Yousafzai2.7K views
Ch 21 computer and your health von Khan Yousafzai
Ch 21 computer and your healthCh 21 computer and your health
Ch 21 computer and your health
Khan Yousafzai2.2K views
Ch 15 .networks and communications von Khan Yousafzai
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
Khan Yousafzai519 views
Ch 14. weather forecasting ( application of data logging) von Khan Yousafzai
Ch 14. weather forecasting ( application of data logging)Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)
Khan Yousafzai1.5K views
Ch 12 describing information system von Khan Yousafzai
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information system
Khan Yousafzai1.7K views
Ch 9 types of computer operations von Khan Yousafzai
Ch 9 types of computer operationsCh 9 types of computer operations
Ch 9 types of computer operations
Khan Yousafzai5.5K views

Último

EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx von
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxISSIP
369 views50 Folien
Scope of Biochemistry.pptx von
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptxshoba shoba
133 views55 Folien
AUDIENCE - BANDURA.pptx von
AUDIENCE - BANDURA.pptxAUDIENCE - BANDURA.pptx
AUDIENCE - BANDURA.pptxiammrhaywood
84 views44 Folien
GSoC 2024 von
GSoC 2024GSoC 2024
GSoC 2024DeveloperStudentClub10
79 views15 Folien
PLASMA PROTEIN (2).pptx von
PLASMA PROTEIN (2).pptxPLASMA PROTEIN (2).pptx
PLASMA PROTEIN (2).pptxMEGHANA C
68 views34 Folien
231112 (WR) v1 ChatGPT OEB 2023.pdf von
231112 (WR) v1  ChatGPT OEB 2023.pdf231112 (WR) v1  ChatGPT OEB 2023.pdf
231112 (WR) v1 ChatGPT OEB 2023.pdfWilfredRubens.com
157 views21 Folien

Último(20)

EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx von ISSIP
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
ISSIP369 views
Scope of Biochemistry.pptx von shoba shoba
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptx
shoba shoba133 views
PLASMA PROTEIN (2).pptx von MEGHANA C
PLASMA PROTEIN (2).pptxPLASMA PROTEIN (2).pptx
PLASMA PROTEIN (2).pptx
MEGHANA C68 views
11.28.23 Social Capital and Social Exclusion.pptx von mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239298 views
Are we onboard yet University of Sussex.pptx von Jisc
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
Jisc96 views
When Sex Gets Complicated: Porn, Affairs, & Cybersex von Marlene Maheu
When Sex Gets Complicated: Porn, Affairs, & CybersexWhen Sex Gets Complicated: Porn, Affairs, & Cybersex
When Sex Gets Complicated: Porn, Affairs, & Cybersex
Marlene Maheu67 views
REPRESENTATION - GAUNTLET.pptx von iammrhaywood
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptx
iammrhaywood100 views
UWP OA Week Presentation (1).pptx von Jisc
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
Jisc88 views
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... von Ms. Pooja Bhandare
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Narration lesson plan.docx von TARIQ KHAN
Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docx
TARIQ KHAN112 views
The Open Access Community Framework (OACF) 2023 (1).pptx von Jisc
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
Jisc110 views

Ch 19. social and economic effects of it

  • 1. 1 Is information technology a good thing? Arguments in favour  The jobs replaced by computers are the rather Ineresting ones. People are free to do more interesting tasks.  Higher productivity enables people to work fewer hours and yet have the same standard of living.  Other countries make use of IT. If we did not, our goods and services would become uncompetitive and there would be even more unemployment.  There are many tasks that would be impossible without the use of IT. Air-traffic control, credit cards, space travel and medical research are just some examples.  New jobs are being created by the introduction of IT e.g. programming, network managing etc.  Many of the old boring jobs can now be done by a computer, which leaves workers to do more interesting tasks.  Computerisation has improved levels of productivity, which means that workers need to work shorter hours and still maintain the same standard of living.
  • 2. 2 Is information technology a good thing? Arguments against  Life without IT is slower and less stressful.  Computers are cheaper than people are so if a computer can do a job then it will lead to higher unemployment.  The new jobs being created by the use of IT are only for highly skilled and qualified people.  The people who did the boring repetitive jobs now done by computers no longer have a job.  The storage of personal data held on computer has eroded people's privacy.  The gap will be widened between those countries able to afford the new technologies and those that can't.
  • 3. 3 Changing Employment Patterns  Robots are now performing many of the manual tasks such as assembly work and paint spraying in factories.  Many industrial processes operate 24 hours a day and are continually being monitored and controlled by computers.  There are fewer paper-based systems in offices. Some jobs such as filing clerks no longer exist. New jobs involving computers have been created.  More and more people work form home, with the advantage of no travelling and the freedom of being able to live in any part of the country (or the world for that matter).  Computers are sometimes used to monitor the performance of their users. For instance, in supermarkets they can tell the management about the number of customers dealt with per hour or how many items are passed through the scanner in a day. Order entry clerks and airline booking clerks can have their work similarly monitored.
  • 4. 4 Identity cards move a step closer  Driving licenses are now to be in credit card format and have a photograph of the driver on them.  Eventually the government would like to add a microchip to these cards, thus making the card into a 'smart card'.  The card might also store National Insurance details, which would enable health details to be located. Computer game addiction  Some children are addicted to computer games, sometimes playing them for more than 30 hours per week.  Many experts are worried that this solitary activity is affecting the social and educational development of addicted children.  Many computer games do not mimic reality and often involve simulated violence.  Other people are worried that many children are becoming 'couch potatoes', and are not involved in any physical activity and do not interact very well with adults or people their own age.
  • 5. 5 Who Watches the Watchers  During the Second World War everyone had to carry an identity card, and you could be arrested for not having one with you at all times.  They will have the individual’s photograph and a chip with biometric data stored on it.  The identity cards will be used by many different government departments to keep track of data about the whole population, and could be used to replace existing passports, driving licences, National Insurance numbers, even examination candidate numbers.  The data stored on the identity card may also include encoded versions of an individual’s fingerprints, iris prints, and facial identification points.  The latter is a method of mapping a person’s face and converting this data into digital information.
  • 6. 6 Environmental issues  Reduced energy consumption - Computers now control many of the heating systems in offices and factories so it is possible for only the rooms that are being used to be heated. This can save huge amounts of energy.  Reduced wastage in industrial processes - There are many process control systems used in our factories and because these are more accurate, there is less wastage, thus saving valuable resources.  Saving trees - The use of the electronic office and EDI has led to paper being almost eliminated in many offices and this means that fewer trees need to be felled. So not only are the trees saved but the energy that went into the making of the paper is also saved.  Reducing car pollution - Teleworking (working at home using information technology) means that some people no longer have to travel to the office to work. This reduces petrol consumption and car pollution.
  • 7. 7 Ethical, moral and social issues  Software theft - It could be said that the use of personal computers has made many users into thieves. As you can see from the Copyright, Designs and Patents Act, 1989, it is a criminal offence to copy or steal software.  Hacking - Hacking means gaining illegal access to someone else's computer system. Many people see this type of thing as a challenge and not as an illegal activity.  Privacy - Many people see the Data Protection Act as inadequate, since in 1984, when the act was made law, there weren't anything like the number of personal computers and communications networks that there are today. Some people are totally unaware of the act and think that it only applies to large companies or organisations.  Job losses - Is it right to develop new systems in the knowledge that staff will inevitably be made redundant? Should we put shareholders' dividends and profit before people? These are difficult questions and ones, which need to be addressed. Everyone has his or her own opinion on this.
  • 8. 8 Social and ethical considerations for the Internet  The Internet provides access to a variety of information on every topic and this information comes from many different countries throughout the world.  Problems:  One problem with the Internet is that all the information is freely available once the user is connected.  There are news areas on the Internet, which contain large amounts of illegal pornographic material.  Governments have the problem of finding a way of allowing users to gain access to the Internet but not to any illegal areas.  There is a problem in restricting access. The Internet is a global system and it is difficult of make laws to control it by single countries.  Another problem with restrictions is that it could lead governments to begin attempts to censor, legislate and regulate the Internet for political, cultural and religious reasons.
  • 9. 9 Social considerations for a cashless society  Advantages  It is far more convenient not to have to use cash  Mortgage and loan repayments, gas, electricity and phone bills are paid automatically so you don't need to remember to pay them.  You no longer need to take large sums of money out of the building society or bank to pay for expensive items: the risk of being robbed is reduced.  You don't have to queue at the bank, building society or cash machine to get money out.  Credit cards allow people to buy goods and then decide whether to pay for them at the end of the month or obtain them on credit, paying a proportion each month.
  • 10. 10 Social considerations for a cashless society  Disadvantages  Credit is normally given only to people who are working and have a steady source of income, so certain people won't be able to get it.  It is possible for people to spend more than they can really afford so they can easily get into debt.  More information is kept about individuals. Inevitably some of this will be incorrect and lead to people wrongly being refused cash or credit cards.  It is harder for people to keep track of how much they have spent, since statements are usually sent only once a month, although statements can usually be obtained more frequently if they are requested.
  • 11. 11 Crime prevention IT can be used to help prevent crime and the systems employed include the following.  Speed camera systems and camera systems, which detect cars jumping red lights.  Computer controlled camera systems deter violent crime in many city centres.  Tagging systems on bikes, cars and other property reduces the chances of them being stolen.  Computer controlled house security systems deter some burglars. Crime detection IT can be used to catch criminals and some of the ways it can do this are as follows:  The Police National Computer (PNC) is used to hold details of all crimes committed and criminals.  The National Criminal Intelligence System is a computer system used to piece together information about individual criminals and their illegal activities.  The computer can interact with the data supplied by Interpol, the PNC, Customs and Excise, the Inland Revenue, and the bank and building society computers.  This system is used to gather material on organised crimes such as drug smuggling.  DNA profiling and fingerprinting systems enables valuable, and often conclusive, evidence to be collected.  Police headquarters computers for each police force are used in the day-to-day administration of all the usual police work.
  • 12. 12 Problems with the Police National Computer (PNC)  There is a risk that illegal access to the PNC could allow people outside the police force to gain information.  There are worries that the running of the PNC will be passed over to a private company.  The PNC contains criminal records, details of wanted or dangerous people, disqualified drivers, stolen cars and guns and also the records of 30 million motorists.  Some files indicate that a person is HIV positive  Information on the PNC might be incorrect and this could stop someone getting a job or could even result in a person being wrongly arrested for a crime.